Answer the following questions:

Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging


Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above


Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode


Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above


Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands


Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above


Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above


Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)


Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes


Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester


Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above


Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender


Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above


Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways


Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM


Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode


Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.



Answers

Answer 1

Answer:

nasaan po yung tanongkkkkk


Related Questions

please help configure this network in packet tracer:
substitute the question mark in the ip addresses with any number, but it has to be the same number for all question marks,
show all commands for configuring each device on the entire network

additional info:

On all subinterfaces assigned the first usable IPV4 and IPV6 address
On the switchs enable IPV6 and assign IPV4 and IPV6 address to the Management Interface
All IPV6 DHCP Services are statefull
Only the voice and data vlan should be assigned a DHCP service

please help configure this network in packet tracer:substitute the question mark in the ip addresses

Answers

To  configure a device in Packet Tracer, one need to:

Launch Packet Tracer. Build the topology. Configure the Wireless RouterConfigure the Laptop. Configure the PC. Configure the Internet cloud. Configure the Cisco.com server.Refresh the IPv4 settings on the PC.

How to configure IP address command?

To set up an IP address for a network interface, use the command ifconfig followed by the name of the interface and the desired IP address. The assigned IP address for the network interface is referred to as the IP_address.

The "show ip interface brief" command can be utilized to exhibit both the IP address and condition of every switch port and interface. You also have the option to utilize the command of displaying the current configuration state known as show running-config.

Learn more about network  from

https://brainly.com/question/1326000

#SPJ1

The programmer wants to change this code so that a third background image appears when the player presses the “B” button. What does the programmer need to do?

The programmer wants to change this code so that a third background image appears when the player presses

Answers

Answer:

i think its B but im not sure

Explanation:

How is kerning used in Word?

Answers

Answer:

Following are the uses of kerning in the word is given below .

Explanation:

The keening in the Microsoft word is the method of pushing the characters nearer in by removing the unnecessary space between the character Following are the steps of using the kerning in the Microsoft word .

Choose the text that the user wanted kerning in the word .Pressing the Ctrl+D it showing the dialog box.After that there are number of option are seen then tap the check box of the  Kerning of fonts.Fedding the option of spacing as per the user need .Finally click on the "ok" option. It will make apply the kerning  in the Microsoft word

Answer:

to adjust the spacing between characters that make up a word

Explanation:

Problem: Longest Palindromic Substring (Special Characters Allowed)

Write a Python program that finds the longest palindromic substring in a given string, which can contain special characters and spaces. A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward. The program should find and return the longest palindromic substring from the input string, considering special characters and spaces as part of the palindrome. You do not need a "words.csv" as it should use dynamic programming to find the longest palindromic substring within that string.

For example, given the string "babad!b", the program should return "babad!b" as the longest palindromic substring. For the string "c bb d", the program should return " bb " as the longest palindromic substring.

Requirements:

Your program should take a string as input.
Your program should find and return the longest palindromic substring in the input string, considering special characters and spaces as part of the palindrome.
If there are multiple palindromic substrings with the same maximum length, your program should return any one of them.
Your program should be case-sensitive, meaning that "A" and "a" are considered different characters.
You should implement a function called longest_palindrome(string) that takes the input string and returns the longest palindromic substring.
Hint: You can use dynamic programming to solve this problem. Consider a 2D table where each cell (i, j) represents whether the substring from index i to j is a palindrome or not.

Note: This problem requires careful consideration of edge cases and efficient algorithm design. Take your time to think through the solution and test it with various input strings.

Answers

A Python program that finds the longest palindromic substring in a given string, considering special characters and spaces as part of the palindrome is given below.

Code:

def longest_palindrome(string):

   n = len(string)

   table = [[False] * n for _ in range(n)]

   # All substrings of length 1 are palindromes

   for i in range(n):

       table[i][i] = True

   start = 0

   max_length = 1

   # Check for substrings of length 2

   for i in range(n - 1):

       if string[i] == string[i + 1]:

           table[i][i + 1] = True

           start = i

           max_length = 2

   # Check for substrings of length greater than 2

   for length in range(3, n + 1):

       for i in range(n - length + 1):

           j = i + length - 1

           if string[i] == string[j] and table[i + 1][j - 1]:

               table[i][j] = True

               start = i

               max_length = length

   return string[start:start + max_length]

# Example usage

input_string = "babad!b"

result = longest_palindrome(input_string)

print(result)

This program defines the longest_palindrome function that takes an input string and uses a dynamic programming approach to find the longest palindromic substring within that string.

The program creates a 2D table to store whether a substring is a palindrome or not. It starts by marking all substrings of length 1 as palindromes and then checks for substrings of length 2.

Finally, it iterates over substrings of length greater than 2, updating the table accordingly.

The program keeps track of the start index and maximum length of the palindromic substring found so far.

After processing all substrings, it returns the longest palindromic substring using the start index and maximum length.

For more questions on Python program

https://brainly.com/question/30113981

#SPJ8

select al the correct statements about data stored in databases
Data is persistent across multiple run of the program

Answers

All the correct statements about data stored in databases include the following:

A. Code.org (and Applab) allow for both manual and code editing of databases.

C. Records can be complete duplicates of other records, including id numbers

D. Four main operations can be performed on the data, Create Read Update and Delete

E. Data is persistent across multiple runs of the program/app.

What is a database?

In a database management system (DBMS), a database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and they're usually accessed electronically.

In this context, we can reasonably infer and logically deduce that data records can be created as complete duplicates of other data records, such as ID numbers. Additionally, CRUD (Create Read Update and Delete) is an abbreviation for the four main operations that can be performed on the data.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

Select all correct statements about data stored in databases (multiple answers possible):

Code.org (and Applab) allow for both manual and code editing of databases

Ids of records that have been deleted will be reused when new records are created

Records can be complete duplicates of other records, including id numbers

Four main operations can be performed on the data, Create Read Update and Delete

Data is persistent across multiple runs of the program/app

Each record can have many elements (felds) that are a part of the record

what is meant by resources of computer

Answers

This question is not specific enough. However, a computer helps you listen to music, read articles and even novels, draw using online platforms, play games, etc.

Select the correct answer.
What did mobile device manufacturers do to overcome limitations associated with WAP websites in relation to app development?
OA. They created webpages in a special language called Wireless Markup Language.
B.
They developed special WAP browsers to load WAP websites.
C. They developed special mobile operating systems on which developers could build and operate apps.
OD. They developed their device's software as open-source so third-party apps could be developed.
Reset
Next

Answers

B I did the text for this

________ is a reference type.
A. A class type
B. An interface type
C. An array type
D. A primitive type

Answers

Question:

________ is NOT a reference type.

A. A class type

B. An interface type

C. An array type

D. A primitive type

Answer:

D. An primitive type

Explanation:

In many programming languages such as Java, types determine the capacity of a variable. Types, among other things, limit;

(i) the value that a variable can hold.

(ii) the values an expression can produce

(iii) operations supported on those values

(iv) determine the meaning of those operations.

Types are either primitive or reference.

(a) Primitive types can hold only a single value. Examples are:

byte, short, int, boolean, long, char, float, double.

(b) Reference types can hold more than a single value and support many complex functionalities that are not allowed in the primitive types such as inheritance, polymorphism e.t.c. Examples are:

class type, array type, interface type and even null type.

Therefore, the primitive type is definitely not a reference type.

All the options given belong to reference type EXCEPT: D. A primitive type.

Recall:

Types, which can be primitive or reference, in most programming languages like Java do limit and define the capacities of variables.Primitive type can only support a single value.Reference type supports many complex functionalities that the primitive type cannot.Examples of such functionalities the reference type can allow include: array type, class type, even null type, and interface type.

Therefore, all the options given belong to reference type EXCEPT: D. A primitive type.

Learn more here:

https://brainly.com/question/12976712

what is the difference between a storage device and storage medium. (with examples)​

Answers

Answer:

The device that actually holds the data is known as the storage device . The device that saves data onto the storage medium, or reads data from it, is known as the storage medium.

Which of the following accurately describes a user persona? Select one.

Question 6 options:

A user persona is a story which explains how the user accomplishes a task when using a product.


A user persona should be based only on real research, not on the designer’s assumptions.


A user persona should include a lot of personal information and humor.


A user persona is a representation of a particular audience segment for a product or a service that you are designing.

Answers

A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.

This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.

Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.

The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.

Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Learn more about User persona, refer to the link:

https://brainly.com/question/28236904

#SPJ1

What formatting changes do spreadsheet applications permit in the rows and columns of a spreadsheet?
Row and Column Formatting Options
Formatting rows and columns is similar to cell formatting. In an OpenOffice Calc spreadsheet, you can format data entered into rows and columns with the help of the Rows and Columns options. You can insert rows and columns into, or delete rows and columns from, a spreadsheet. Use the Insert or Delete rows and columns option on the Insert tab. Alternatively, select the row or column where you want new rows or columns to appear, right-click, and select Insert Only Row or Only Column options.

You can hide or show rows and columns in a spreadsheet. Use the Hide or Show option on the Format tab. For example, to hide a row, first select the row, then choose the Insert tab, then select the Row option, and then select Hide. Alternatively, you can select the row or columns, right-click, and select the Hide or Show option.

You can adjust the height of rows and width of columns. Select Row and then select the Height option on the Format tab. Similarly, select Column, then select the Width option on the Format tab. Alternatively, you can hold the mouse on the row and column divider, and drag the double arrow to the position. You can also use the AutoFit option on the Table tab to resize rows and columns.

Answers

Formatting rows and columns in a spreadsheet is similar to cell formatting. In OpenOffice Calc, users can insert or delete rows and columns, hide or show them, and adjust the height and width of the rows and columns.

What is spreadsheet?

A spreadsheet is an electronic document that stores data in a tabular format and is used to perform calculations and analysis. It is a type of software program designed to assist with data entry, calculations, and other analysis tasks. Spreadsheets often contain formulas and functions that allow users to quickly and accurately calculate values based on the data they enter. Spreadsheets also provide users with the ability to present data in an organized and visually appealing way. Spreadsheets are an essential tool for businesses, schools, and other organizations to help them make decisions, track progress, and manage resources.

Users can access these options from the Insert, Format, and Table tabs. Alternatively, they can select the row or column they want to format, right-click, and select the relevant option. Additionally, users can hold the mouse on the row or column divider and drag the double arrow to the desired position. The AutoFit option on the Table tab can also be used to resize rows and columns.

To learn more about spreadsheet
https://brainly.com/question/30039670
#SPJ1

Solve recurrence relation x (n) = x(n/3) +1 for n >1,x(1) =1. (Solve for n = 3k)

Answers

To solve this recurrence relation, we can use the iterative method known as substitution method. First, we make a guess for the solution and then prove it by mathematical induction.

Let's guess that x(n) = log base 3 of n. We can verify this guess by induction:

Base Case: x(1) = log base 3 of 1 = 0 + 1 = 1. So, the guess holds for n = 1.

Induction Hypothesis: Assume that x(k) = log base 3 of k holds for all k < n.

Induction Step: We need to show that x(n) = log base 3 of n holds as well. We have:

x(n) = x(n/3) + 1

     = log base 3 of (n/3) + 1 (by induction hypothesis)

     = log base 3 of n - log base 3 of 3 + 1

     = log base 3 of n

     

So, x(n) = log base 3 of n holds for all n that are powers of 3.

Therefore, the solution to the recurrence relation x(n) = x(n/3) + 1 for n > 1, x(1) = 1, is x(n) = log base 3 of n for n = 3^k.

State THE two
Component Of COMPUTER AND example

Answers

Answer:

motherhood is also called system board is the main printed circuit board most in computers

CPU the second important component of a computer is the CPU is also called central processor is the electronic circuitry within a computer

In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?

Answers

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.

There are different aspect of  security mechanism. The security mechanism that one does find the file containing data of the users/user groups have inbuilt security is that  the section access with in the qlikview script".

There are different mechanisms that is often used to secure the Web.  This is made of the mechanisms that is often used to apply security and they includes virtual private networks (VPNs), encryption, firewalls, routing filters, etc.

Note that a security mechanism in QlikView is often set up in two distinct ways or means, This can be done by building it into the QlikView document script, or by setting it up via the use of QlikView Publisher.

Learn more about Security mechanism from

https://brainly.com/question/14378794

how do computer worms spread​

Answers

Where a worm differs from a virus is that it typically doesn't infect or manipulate files on its own. Instead, it simply clones itself over and over again and spreads via a network (say, the Internet, a local area network at home, or a company's intranet) to other systems where it continues to replicate itself.

someone can help plz " Provide definitions for the following terms: bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), Terabyte (TB)."

Answers

Answer:

Explanation:

Bit: A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.

Byte: A byte is a data measurement unit that contains eight bits, or a series of eight zeros and ones.

Kilobyte: A KB (kilobyte) is 1000 bytes.

Megatype: An MB (megabyte) is 1000 kilobytes.

Gigatype: A GB (gigabyte) is 1000 megabytes.

Terabyte: A TB (terabyte) is 1000 gigabytes.

hope this helped you!

Write a program to move the Turtle based on the user’s request. Display a menu with options for the user to choose. Use the following guidelines to write your program.


1. Create a menu that gives the user options for moving the Turtle. The menu should contain letters or numbers that align with movements such as forward, backward, and/or drawing a particular pattern.

2. Use at least one if-else or elif statement in this program. It should be used to move the Turtle based on the user's input.

3. A loop is optional but may be used to ask the user to select multiple choices.

4. Use one color other than black.

Answers

Answer:

#import turtle

import turtle

 

# set screen

Screen = turtle.Turtle()

 

# decide colors

cir= ['red','green','blue','yellow','purple']

 

# decide pensize

turtle.pensize(4)

 

# Draw star pattern

turtle.penup()

turtle.setpos(-90,30)

turtle.pendown()

for i in range(5):

   turtle.pencolor(cir[i])

   turtle.forward(200)

   turtle.right(144)

 

turtle.penup()

turtle.setpos(80,-140)

turtle.pendown()

 

# choose pen color

turtle.pencolor("Black")

# importing turtle module

import turtle

 

# number of sides

n = 10

 

# creating instance of turtle

pen = turtle.Turtle()

 

# loop to draw a side

for i in range(n):

   # drawing side of  

   # length i*10

   pen.forward(i * 10)

 

   # changing direction of pen  

   # by 144 degree in clockwise

   pen.right(144)

 

# closing the instance

turtle.done()

turtle.done()

Explanation:

A while loop uses a(n) ___________ at the top of every iteration to test whether to continue or not.

Answers

Answer:

boolean

Explanation:

while loops test to see if something is true or false to know when to continue the loop

you have a table for a membership database that contains the following fields: MemberLatName, MemberFirstName, Street, City, State, ZipCode and intiation fee. there are 75,000records in the table. what indexes would you create for the table, and why would you create these indexes?

Answers

A unique lookup table called an index is used to speed performance

What is lookup function?

Use the lookup and reference function LOOKUP when you need to search a single row or column and find a value from the same position in another row or column. As an example, let's say you have the part number for a car part but don't know how much it costs.

We employ we lookup since?

Use VLOOKUP when you need to search by row in a table or a range. For instance, you could use the employee ID to look up a person's name or the part number to check the price of a car part.

To know more about speed visit:-

https://brainly.com/question/17661499

#SPJ1

Why is Roz upset with Mike at the beginning of his shift on the Scare Floor?
(Monsters Inc.)

Answers

Roz is upset with Mike at the beginning of his shift on the Scare Floor is because Mike did not file his paperwork last night.

What is Monsters, Inc.?

Monster Inc. is a franchise that makes cartoon movies. Despite the fact that they are innately good and multifaceted like humans, they all have different kinds of “monsters” and re-imagine them to just be ordinary “people” cast in a negative light.

Roz and Mike are the characters of this movie.

Therefore, Mike's failure to file his paperwork last night is the reason Roz is furious with him at the start of his shift on the Scare Floor.

To learn more about Monsters, Inc., refer to the link:

https://brainly.com/question/29219262

#SPJ1

Select the correct answer from each drop-down menu.
Which two components help input data in a computer and select options from the screen, respectively?
✓inputs data into computers in the form of text, numbers, and commands. However, a
commands from the screen.
A
Reset
Next
✓selects options and

Answers

Which two components help input data in a computer and select options from the screen, respectively?

✓ Keyboard inputs data into computers in the form of text, numbers, and commands. However, a

✓ Mouse selects options and commands from the screen.

A

Reset

Next

To know more about input data refer here

https://brainly.com/question/30256586#

#SPJ11

In a single paragraph, write about the work of the web designer and evaluate the importance of their knowledge of "code."

Answers

Web designers are responsible for creating visually appealing and user-friendly websites. Their knowledge of code is crucial for implementing design elements and ensuring smooth functionality.

Why is web design important?

A well-designed website may help you make a strong first impression on potential consumers.

It may also assist you in nurturing your leads and increasing conversions. More significantly, it gives a nice user experience and allows your website visitors to easily access and explore your website.

Learn more about web design  at:

https://brainly.com/question/22775095

#SPJ1

As a computer science student, how do you assess your vulnerability to information theft in comparison to a famous celebrity?

Answers

Answer:

Explanation:

As a computer science student, you should assess your vulnerability to information theft by analyzing the types of information you have and where you store it, as well as the security measures you have in place to protect that information. This includes things like passwords, two-factor authentication, and encryption.

A famous celebrity, on the other hand, may have a higher level of vulnerability to information theft due to their high-profile status and the fact that they may have more sensitive information such as financial information, personal contacts, and private photos and videos. They may also be targeted more frequently by hackers and scammers who are looking to exploit their fame and popularity.

It is important to note that everyone's vulnerability to information theft is different and it is important to take the necessary steps to protect your personal information, regardless of whether you are a computer science student or a famous celebrity. This includes keeping your software and operating system updated, being cautious when clicking on links or opening email attachments from unknown sources, and not sharing personal information online.

Cual es la constante de proporcionalidad de la función f(x)= 4x-6 ​

Answers

I just need points because I’m failing thank you !!

Is this statement true or false? To change the color of text, you must select the entire text to be changed.

Answers

Answer:

true is the correct answer to your questions

You need to create the app service plans for the web apps.

What is the minimum number of app service plans that should be created?

Answers

Given that you need to create the app service plans for the web apps.

In this situation, each App Service Plan on the App Service Environment will require a minimum of three instances in order to be distributed across zones.

What is a web app?

A web application is software that can be accessed using a web browser. Web apps are supplied to users with an active network connection over the World Wide Web.

Mobile applications must be downloaded from the app store, however web applications may be accessed via any browser and hence do not require installation. Mobile applications can be accessible even while not connected to the internet, however online applications cannot be used without an internet connection.

Learn more about web apps. at:

https://brainly.com/question/28431103

#SPJ1

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

what is the mean of debugging​

Answers

Answer:

the process of identifying and removing errors from computer hardware or software

Explanation:

Essentially just fixing programming errors, mainly in coding or software

Which elements of photography does the Iso rating apply

Answers

Answer:its sensitivity to light if it has a lower iso it probably would need more alumination or a longer shuter speed.

Explanation:

Answer:

the film or the sensor

Explanation:

1.13.5 Circle in a Square

Answers

Squircle is termed a Circle in a Square.

What is a Square?

A square is a standard quadrilateral, and that implies that it has four equivalent sides and four equivalent points. This is made up of four sides. Also the sides are termed equal in length.

A squircle is a shape moderate between a square and a circle. There are somewhere around two meanings of "squircle" being used, the most well-known of which depends on the superellipse.

"Squircle" is a word that is made up of two words square and a circle. The radius of a circle will be from the center of the said square.

Learn more about Square, here:

https://brainly.com/question/28776767

#SPJ1

The question is incomplete, Complete question probably will be:

What is a Circle in a Square called?

Other Questions
why are estimated losses on an entire long-term project fully recognized in the first period the loss is anticipated? Which of the following would be a type of court case heard at the state level? A. legal matters where child custody is a concern B. any case about traffic violations C. cases that have been appealed in lower courts D. all murder cases in Pennsylvania Please help me with this I need it now :) the simple form of this is....[tex] {2}^{3 } \div {2}^{ - 5} [/tex] determine the amount of fence needed to enclose a rectangular garden with length 14 feet and width 31 feet. What do drilling and mining for nonrenewable energy sources have in common?They are only used in a few countries.They remove CO. from the atmosphere.They can pollute and harm the environment,O They stop methane gas from being released. Given the 2-D vector field: G* (x,y)=(-y)+(2x)j 3. Given the 2-D vector field: (a) G(x,y) = (y) + (2x)j Describe and sketch the vector field along both coordinate axes and along the diagonal li (5.3 x 10) + (6.8 x 10) French help needed! Picture is attached here^ Solve -3 < 2x + 3 < 5 solve 4 1/2 + 1 3/5. what multilateral agreement was created in 1948 to govern the international trade of goods (merchandise)? wto gatt un eu Can someone plz help me with question? I would really appreciate if you do. please help me!!A student drew this model to show the flow of convection currentson Earth.Part AIs the model accurate? Explain your answer. Regina has a bag of marbles that contains 3 blue marbles, 4 red marbles, and 5 yellow marbles. She draws one marble, then replaces it, and draws one more.There are possible outcomes.The probability the first drawn marble will be blue is .The probability the second marble drawn will be yellow is .So, P(blue, then yellow) = . Convection occurs in the____. A. Troposphere B. Ionosphere C. Ozone LayerD. Mesosphere the output of cellular respiration are Research the issue of genetically modified foods, and then write an essay to be read by your peers in which you argue either for or against their use. Support your position with evidence. I need an essay for modified food. Which is the most abundant type of cartilage in the body?. Which of these can affect the results of biometrics systems, according to "the biometric body"? a. Aging b. Blinking c. Thinking d. Swallowing.