2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch​

Answers

Answer 1

Answer:

a. chain stitch

because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain


Related Questions

What is a banner grab?

Answers

Banner Grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.

Hope you find this helpful!
Brainliest and a like is much appreciated!

a program is under development to keep track of a clubs members

Answers

Answer:

Keep a chart with you

Explanation:

You could right something along the lines of:

To keep track of the members in the club, I'll(we'll) have them write their names down on a chart so we don't forget. I(we) could also just do a thing where I(we) plan everything out beforehand and I(we) have been keeping track of the members.

You could right something along the lines of:

Since the program is under development, I(we) could tell everyone in the club to put their names on a spreadsheet and I(we) could start developing the program further that way.

What does // this mean in your code?

Answers

Floor division

For example:-

11//5=2

Some more :-

[tex]\boxed{\begin{array}{c|c}\sf * &\sf Multiplication \\ \sf ** &\sf Exponention \\ \sf \% &\sf Remainder \\ \end{array}}[/tex]

Which steps allow a user to change the column layout in the Handout Master?

Answers

Answer:

D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.

Explanation: correctEdg

A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware

Answers

It is a citation for the answer

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer:

Algorithm

Explanation:

Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?

Answers

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

https://brainly.com/question/13171394

PLZ HELP! 50 POINTS!!!! Which device is used to change a signal into a code?


Group of answer choices


an encoder


an antenna


a wave

Answers

B) Antenna they receives signals

Answer:

It should be an encoder.

Explanation:

hope this helps and sorry if its wrong

This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:

Answers

RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.

Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.

Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card

Read more about hardware implementation

brainly.com/question/25803633

What does setTempo() allow you to do in EarSketch?

Answers

Specify the tempo of a song

Help!!
So I think that someone is tracking my truck with an apple airtag but I don't know for sure. The only apple product I have is an iPad and I don't know how to check if an airtag is near by!!

Answers

Answer:

Explanation:

   In iOS 13 or iPadOS 14 or later go to Settings > account name > Find My > Find My iPhone/iPad, and disable Find My network.

   In macOS 10.15 Catalina or later, go to the Apple ID preference pane, select the iCloud link at left, click the Options button to the right of the Find My Mac item, and uncheck Offline Finding or Find My network (the text varies by macOS version).

How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?

Answers

Answer:

you can take guide from

hope this will help you....!

A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.

Which visual aid would best support her topic?

Answers

Answer: a map showing the different sizes of the moon's craters

Explanation:

the reason for this is because the student wants to show what the surface of the moon looks like.

Please Answer ASAP!!

You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False


Answers

Answer:

I think it's true

Explanation:

Sorry if it's wrong :(

Which of the constraints listed below would be considered a physical constraint
-Materials
-Demand for product
-Timeline
-Cost

Answers

materials

materials are the only physical thing

HELP PLEASE!!

which of the following is document content that displays at the top of every page?

Answers

Explanation:

that is a trick question if you need help ask your teacher

Answer:

Title

Explanation:

3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites​

Answers

Answer:

f. Static website

Explanation:

HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.

HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.

Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.

Static website
Hope this will help.

Question 7 of 10
What are the three main parts to a slide presentation's structure?
A. Thesis statement, supporting evidence, and concluding quotes
B. Main idea, body, and summary
C. Introduction, body, and conclusion

D. Body, conclusion, and references

Answers

Answer:

A

Explanation:

....................................................................................................

Answers

Answer:

......................

..............

......

....

...

..

.

Janet is playing a game in which she interacts with an environment to solve a puzzle and to meet new characters. She really enjoys this game because there are no time constraints or pressure to perform with speed. What genre of game is Janet most likely playing?
A. simulation
B. action
C. adventure
D. sports

Answers

Answer:

C. adventure

Explanation:

Which of the following adds digital elements to a live view, often by using the camera on a smartphone? O Augmented reality O Forecasting O Problem-solving O Virtual reality​

Answers

Answer:

augmented reality

Explanation:

think "pokemon go" when youre relaxing with your buddy and you feed it berries

write 10 place where computer use and it uses​

Answers

Answer:

dynamite ohohoh

Explanation:

nânnananananananann eh

house store school park

Pls help me I beg u

Answers

Self attribute skills

differentiate between program virus and boot sector virus

Answers

Answer:

The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS

Explanation:

please mark me brainlisted answer please

Explanation:

i don't know this but i just need the points

how to check amazon gift card balance without redeeming

Answers

Answer:

Follow these steps to check your Amazon gift card balance without redeeming.

1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.

2. Sign in to your Amazon account. You can sign in through the website or the mobile app.

3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.

4. Click 'Help and customer service'. This option is located at the top of the screen.

5. Talk to a customer support agent.

Mobile app:

Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.

Computer:

Click 'Something else'.Click 'I need more help'.

6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.

7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.

12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity

Answers

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

https://brainly.com/question/5707732

In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls during the day at a discounted rate. Based on the list of defining factors for computer crimes, what best describes Murphy's crime?

A.
intentionally disrupting, degrading, or destroying information or services on a computer

B.
disclosing any data or information obtained through illegal online activity

C.
knowingly receiving or holding onto any data or information obtained through illegal online activity

D.
intentionally or recklessly tampering with, taking, transferring, concealing, altering, or damaging physical computer equipment

Answers

a. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer

_____ is the method of binding instructions and data to memory performed by most general-purpose operating systems.

Answers

Execution time binding is the method of binding instructions and data to

memory performed by most general-purpose operating systems.

This type of binding is usually done by the processor. It also generates both

logical and dynamic absolute address.  The binding can be delayed if the

process is moved during execution between two or more  memory segment.

This generally  involves binding of instructions and data to the memory of

the operating system.

Read more about Execution time binding here https://brainly.com/question/19344465

Ethan is afraid that his poor grades will get him kicked out of his university at the end of the semester. He decided to remotely access the dean's computer and change his grades in the school system. If caught, Ethan will have to confess to committing what?

A.
virtual education

B.
grade hacking

C.
a computer crime

D.
educational fraud

Answers

Answer:

Computer Crime

Explanation:

You're evading someones privacy and gaining access to their computer or device without consent. Therefore, it is a computer crime.

Answer:

Educational fraud

Explanation:

Ethan changed his grades in the school system claiming to have better grades then he really does.

A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static

Answers

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

Other Questions
Simplify this question 14. Provide a written description of the complement of the given event.of ten adults, at least one of them has high blood pressure.None of the adults have high blood pressure.At most one of the adults has high blood pressure.All of the adults have high blood pressure.Nine of the adults have high blood pressure 3 moles of nitrogen and 5 moles of hydrogen react to form ammonia. Use the balanced equation below to determine which is the limiting reactant. N2 + 3H2 --> 2NH3 A rock gym charges $5 to rent equipment and $2 per hour to climb. Logan spent $9. 50. How many hours did he spend climbing?. how did the Meredith March Against Fear reveal splits in the Civil rights Movement how long did it take michelangelo to paint the ceiling of the sistine chapel HELPPPVPLEASE Create an essay introduction for this topic. (Argumentative essay) Is reaching a consensus always a good idea, or are there times when its better to disagree? Loubelle sells a car for 960,00.if he receives a commission of 15%, how much will be his commission Using HL, are the two triangles congruent? What information would be used? Question 2 options: A) No, the triangles aren't congruent by HL. H M, N I, L J B) Yes, the triangles are congruent by HL. H M, C) Yes, the triangles are congruent by HL. , D) No, the triangles aren't congruent by HL. N I, This is the chemical formula of Nitrogen gas.NWhich of the following is NOT true of nitrogen gas?A. It is made of two atoms.B. It is a molecule.C. It is an element.D. It is a compound. Why does Earth experience different seasons?the revolution of Earth on its own axis in 24 hoursthe revolution of Earth on its own axis in 24 hoursthe presence of the Moon in between the orbit of the Sun and Earththe presence of the Moon in between the orbit of the Sun and Earththe distance between the Sun and Earth changing throughout the yearthe distance between the Sun and Earth changing throughout the yearthe variation in the amount of sunlight received due to the tilt of Earths axis What is the hardest metal if you get it right ill give you brainliest Please help with this!! Which is a TRUE statement about how profit can be an incentive for entrepreneurs?AProfit outweighs the risks of opening a business.BProfit can increase competition in a market economy.Profit encourages shareholders to open their own businesses.DProfit makes the gap between the rich and poor more noticeable. publisher who was the inspiration for citizen kane The number of students in a chess club decreased from 19 to 16. What is the percent decrease? Round your answer to the nearest percent. [The percent decrease is ___%. Factor the expression to fill in the blank. 25 + 45 = ? (5 + 9) bullet-pointed summary of ideas Walden and Other WritingsBook by Henry David Thoreau? you went to a coffee house with 2 friends and ordered an iced coffee and dessert which came to $12.96 how much is your total bill An object is moving with constant speed in a circular path. The object's centripetal acceleration.