What is the rarest gun on surviv io

Answers

Answer 1

Answer: It's the M249

Explanation: I wanna get brainliest XD

Answer 2

Answer: Bippity Boopity the answer is yesity

Explanation: No


Related Questions




Develop algorithm and flowchart;
1) To input two numbers and find
their average.
2) To calculate perimeter of a rectangle.
3) To print circumference of a circle.
4) To prepare a cup of coffee .​

Answers

Answer:

Question 2

A flowchart is a pictorial representation of a sequence of instructions that are required to solve a problem.

Write the names and the symbols of the boxes for the given statements

Statement Name of the Box Symbol

To assign a number Process Box Process Box Flowchart Class 8 ICSE Computer Studies

To display the result Input / Output Box Input Output Box Flowchart Class 8 ICSE Computer Studies

To start the process Start Box Start Box Flowchart Class 8 ICSE Computer Studies

To decide whether a number is smaller than the other Decision Box Decision Box Flowchart Class 8 ICSE Computer Studies

Complete the following flowcharts

Question 1

A flowchart to check whether a triangle is possible or not.

Flowchart to check if triangle is possible. Class 8 ICSE Computer Studies.

Question 2

A flowchart to display the greater of the two numbers.

Flowchart to check greater of two numbers. Class 8 ICSE Computer Studies.

Write algorithms for the following

Question 1

To go for a class picnic

Answer

Step 1: Start

Step 2: Decide the picnic venue, date and time

Step 3: Decide the picnic activities

Step 4: Hire a vehicle to reach to the venue and comeback

Step 5: Goto to the picnic venue on the decided date

Step 6: Do the activities planned for the picnic

Step 7: Come back to school in the hired vehicle

Step 8: Stop

Question 2

To celebrate New Year

Answer

Step 1: Start

Step 2: Prepare a guest list for New Year party

Step 3: Decide the venue, food menu, games and fun activities for the party

Step 4: Invite the guests for the party

Step 5: On New Year eve, get ready and enjoy the party

Step 6: Stop

Question 3

To make tea/coffee

Answer

Step 1: Start

Step 2: Boil water in a saucepan

Step 3: Add tea to boiling water

Step 4: Add sugar to boiling water

Step 5: Add milk to boiling water

Step 6: Boil this water with all the ingredients for 2 mins

Step 7: Sieve the tea in a cup

Step 8: Stop

Question 4

To celebrate Teachers' Day

Answer

Step 1: Start

Step 2: Decide the activities for teachers' day like dance performances, plays, etc.

Step 3: Form groups of students and assign the decided activities from step 2 to each group.

Step 4: Decide the practice timings for each group.

Step 5: Each group to practice as per the timings decided in step 4.

Step 6: Invite the teachers to Teachers' Day celebrations.

Step 7: Perform the activities planned in step 2 on Teachers' Day

Step 8: Stop

Answer the following questions

Question 1

What is a flowchart? What are the features of a flowchart?

Answer

A flowchart is a pictorial representation of an algorithm. It uses boxes of different shapes to represent different types of instructions. These boxes are connected with arrow marks to indicate the flow of operations.

The features of a flowchart are:

It is an easy method of communication.

It is independent of a programming language.

It is the key to correct programming.

It helps to plan and design a new system.

It clearly indicates the task to be performed at each level.

Question 2

What is an algorithm? What are its characteristics?

Answer

An algorithm is defined as the sequence of instructions written in simple English that are required to get the desired results. It helps to develop the fundamental logic of a problem that leads to a solution.

Some characteristics of an algorithm are as follows:

Each step of an algorithm must be precisely defined.

An algorithm must contain blocks that will help to solve problems more efficiently and logically.

It should accept a set of inputs and produce a defined output.

It must be terminated after a finite number of steps.

It should be independent from a computer programming language.

It should develop a platform for writing programs.

Question 3

Define the following and draw their symbols:

Algorithm

Step 1: Start

Step 2: Accept the length of the two line segments as l1 and l2.

Step 3: If l1 and l2 are equal, then display 'Line Segments are equal'.

Step 4: If l1 and l2 are not equal, then display 'Line Segments are not equal'.

Step 5: Stop.

Algorithm

Step 1: Start

Step 2: Accept the age of the person.

Step 3: If age is greater than or equal to 18, then display 'You are eligible to vote'.

Step 4: If age is less than 18, then display 'You are not eligible to vote'.

Step 5: Stop.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

Answers

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of the rectangle. Use methods for entering the values, performing the computations, and displaying the results. Results should be formatted with one position to the right of the decimal and printed number aligned in a tabular display.

Answers

Answer:

Explanation:

This code is written in Java. It creates a Rectangle class that contains variables for the height and width. It also contains constructor, methods for calculating perimeter and area, and a printInfo method to print out all the results. A test case has been created in the main method which creates a Rectangle object and prints out the printInfo which calls the area and perimeter methods as well. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

Son generalmente los objetos,personas o entidades que tienen vida por sí sola y no depende de ninguna otra para existir:


A)Tablas maestro

B)Tablas compuestas

C)Tablas complejas

D)ninguna de las anteriores.



AYUDAAAAAA!!!!

Answers

Answer:

La opción correcta es D. Ninguna de los anteriores, ya que la palabra que describe dicha situación es "autosuficiencia".

Explanation:

La autosuficiencia es una teoría o práctica de cómo los grupos o sociedades pueden mantenerse sin intercambiar bienes o dinero con el mundo exterior. La teoría está algo extendida en ciertos grupos anarquistas y especialmente dentro del anarquismo individualista. Algunos grupos ecologistas también están muy a favor de la autosuficiencia. La autosuficiencia se considera una forma de vida muy original.

Un ejemplo común de autosuficiencia es una persona o familia que vive en una pequeña granja. Aquí se cultiva y produce todo lo necesario para sobrevivir.

A driver that approaches a controlled intersection with a signal that is not working must:

Answers

You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.

Assume X and Y are indepndent. Assume that X has mean 10 and standard deviation 8. Assume Y has mean 12 and standard deviation 6. What is the standard deviation of the variable Z = X + Y. a. 8 b. 6 c. 10 d. 12

Answers

Answer:

[tex]\sigma_z = 10[/tex]

Explanation:

Given

[tex]\bar x = 10[/tex]

[tex]\sigma_x = 8[/tex]

[tex]\bar y = 12[/tex]

[tex]\sigma_y = 6[/tex]

[tex]z = x + y[/tex]

Required

[tex]\sigma_z[/tex]

This is calculated as:

[tex]\sigma_z = \sqrt{Var(x) + Var(y)}[/tex]

Calculate [tex]Var(x)[/tex]

We have:

[tex]Var(x) = \sigma_x^2[/tex]

[tex]Var(x) = 8^2[/tex]

[tex]Var(x) = 64[/tex]

Calculate [tex]Var(y)[/tex]

We have:

[tex]Var(y) = \sigma_y^2[/tex]

[tex]Var(y) = 6^2[/tex]

[tex]Var(y) = 36[/tex]

So, we have:

[tex]\sigma_z = \sqrt{Var(x) + Var(y)}[/tex]

[tex]\sigma_z = \sqrt{64 + 36}[/tex]

[tex]\sigma_z = \sqrt{100}[/tex]

[tex]\sigma_z = 10[/tex]

The Web 2.0: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. B. is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol. C. is a reference that points to a whole document or to a specific element within a document. D. is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.

Answers

Answer: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services.

Explanation:

Web 2.0 describes the changing trends regarding how World Wide Web technology is used which is used in enhancing creativity, increase collaboration, secure information sharing, as well as the improvement of the Web functionality.

Web 2.0 is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. Web 2.0 enables groups of individuals to simultaneously work on a document.

Therefore, the correct option is A.

if person is male their username is the last 3 letters of their surname and the first 2 letters of their first name if a person is female their username is the first 3 letters of their first name and the last 2 letters of their last name. write an algorithm to output a username (Could you answer in Python pls)​

Answers

gender = input("What's your gender? (`male` or `female`): ")

firstname = input("What's your firstname?: ")

surname = input("What's your surname?: ")

username = ""

if gender == "male":

   username += surname[-3:]

   username += firstname[0:2]

elif gender == "female":

   username += firstname[0:3]

   username += surname[-2:]

print(f'Your username is {username}')

Write an algorithm to convert lengh of your house from cm to meter​

Answers

Answer:

cm = 1000;

 

meter = cm / 100.0;

kilometer = cm / 100000.0;

 

print("Length in meter = " ,

              meter , "m");

print("Length in Kilometer = ",

            kilometer , "km");

Explanation:

This is in Python, hope you enjoy!

Write a program to find the largest and smallest numbers in a list.

Answers

Answer:

const arr = [14, 58, 20, 77, 66, 82, 42, 67, 42, 4];

const min = Math.min(...arr);

const max = Math.max(...arr);

Explanation:

This is javascript.

Math.min takes a variable number of arguments, so you use the spread operator (...) to turn the array into a list of arguments.

what is DMTS. Explain it​

Answers

Answer:

DMT — or N, N-dimethyltryptamine in medical talk — is a hallucinogenic tryptamine drug. Sometimes referred to as Dimitri, this drug produces effects similar to those of psychedelics, like LSD and magic mushrooms. Other names for it include: fantasia.

Explanation:

Answer:

DMT, abbreviation of Dimethyltryptamine, powerful, naturally occurring hallucinogenic compound structurally related to the drug LSD (lysergic acid diethylamide). DMT blocks the action of serotonin (a transmitter of nerve impulses) in brain tissue. It is inactive when taken by mouth and produces effects only when injected, sniffed, or smoked. The hallucinatory action

Explanation:

Major plant genera containing DMT include Phalaris, Delosperma, Acacia, Desmodium, Mimosa, Virola, and Psychotria, but DMT has been found even in apparently innocuous sources, such as leaves of citrus plants (Servillo et al., 2012), and in the leaves, seeds, and inner bark of mimosa tenuiflora

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device

Answers

Answer:

Change the default administrative user name and password.Use an SSH client to access the router configuration.

Explanation:

Remember, we are told the default username and password were simply, "admin" and "password". From a security perspective, both the password and username are weak choices. Hence, to increase the security of the notebook computer where the router configuration management interface is found, it is best you change the password.

Next, by using a Secure Shell Protocol (SSH) client to access the router configuration, the security is enhanced considering the fact the new Cisco router would connect several network segments in the organization.

Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive

Answers

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

What is binary number system? Why is it used in computer system?

Answers

Answer:

Computers depend mainly on binary because it’s more time efficient for them to so.

Explanation:

It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.

Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.

These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-

A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed

(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)

As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.

It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.

I nut bun is how binary liks bavlls

A company has enlisted the help of TDojo Consulting Co. to assist them in designing an AWS disaster recovery solution for their on-premises bare metal servers and SQL databases. The implementation has to be robust, fast, and simple to use. It should also prevent any type of data loss from occurring. The company would like to keep track of the status of the migration. Which tool should the team adopt for the DR solution

Answers

Answer: CloudEndure Disaster Recovery

Explanation:

The tool that the team should adopt for the DR solution is the CloudEndure Disaster Recovery.

CloudEndure Disaster Recovery is the tool that helps in minimizing downtime and data loss through the provision of a fast and a reliable recovery of the servers into the AWS Cloud.

It also allows the user recover the environment from an unexpected infrastructure, data corruption, or malicious attacks.

A. Fallacy B. Proposition C. Conditional Statement D. Assumption E. Logical Reasoning F. Variable An element of a situation that has the potential to change in value. A B C D E F An element of a situation that is accepted as true without proof. A B C D E F The process of analyzing and evaluating arguments to draw a valid conclusion. A B C D E F A statement that is either true or false. A B C D E F A statement with an if-then structure that is either true or false. A B C D E F An argument based on an error in reasoning.

Answers

Answer:

A,B

Explanation:

its in the question......,....,...

Analyze the following fragment:

double sum = 0;
double d = 0;
while (d != 10.0) {
d += 0.1;
sum += sum + d;
}
A. The program does not compile because sum and d are declared double, but assigned with integer value 0.
B. The program never stops because d is always 0.1 inside the loop.
C. The program may not stop because of the phenomenon referred to as numerical inaccuracy for operating with floating-point numbers.
D. After the loop, sum is 0 + 0.1 + 0.2 + 0.3 + ... + 1.9

Answers

I don’t know sorry just needed points

Sources are sets of instructions that may take parameters in order to answer a specific question within an API.

Answers

Answer:

True

Explanation:

API is application programming interface. APIs allow communication between applications/programs: they are basically "outside" data that can be accessed by an application by using it's code(example, how I may access go*gle fonts using it's API attached to my html stylesheet link).

The source is the code itself. Source code is the set of instructions that makes any program or application do whatever they do. An API is defined and works based on its source code.

Answer:

Methods

Explanation:

Methods, also called functions, are snippets of code that are meant to answer a specific question or perform a specific task. They will sometimes take parameters as input to provide more context for the question being asked, or task being performed.

cual es el procedimientos para asistir en el transporte publico a personas discapacitadas

Answers

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

write about storage
(should be in easy words)​

Answers

Answer:

Answer to the following question is as follows;

Explanation:

The process of storing digital information in a data storage media using computing technology is known as storage. Storage is a technique that allows a computer to keep data indefinitely or intermittently. Computer storage capacity and electronic data management are other terms for storage.

Someone knows a good compiler for iPad? It has to be an app

Answers

Jedona is a good one

Create a program that uses a separate module to calculate sales tax and total after tax.

Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.

Console

Sales Tax Calculator

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 35.99

Cost of item: 27.50

Cost of item: 19.59

Cost of item: 0

Total: 83.08

Sales tax: 4.98

Total after tax: 88.06

Again? (y/n): y

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 152.50

Cost of item: 59.80

Cost of item: 0

Total: 212.30

Sales tax: 12.74

Total after tax: 225.04

Again? (y/n): n

Answers

Answer:

I nor know this one oo abeg sorry

What should you do if your engine stalls while you are driving?

A: Hold your steering wheel tightly(power steering is difficult)

B: Shift your transmission to neutral

C: Try to re-start; if unable, stop off road, using four-way flashers

D: All of the above

Answers

Answer:

D

Explanation:

All of the above should you do if your engine stalls while you are driving. Thus option D is correct.

What is driving?

Driving, which includes operating and moving a vehicle in a controlled manner, includes using a car, scooter, truck, vehicle, or scooter. Drivers must abide by the local highway and traffic rules in order to be allowed to drive on city roads, which is contingent upon a number of requirements being completed.

In most situations, you'll lose auto steering whenever the engine shuts off, making it challenging to spin the wheel, as well as power brakes will shortly follow.

Although it takes significantly more pressure, you could still steer but instead, stop. Put the gearshift in neutral. If you can't restart, stop off the road and use your 4 blinkers. Therefore, option D is the correct option.

Learn more about driving, Here:

https://brainly.com/question/25351775

#SPJ2

List the difference between GIGO and bug ​

Answers

Answer:

A bug happens when a tool does not do what it should do. For example, the famous Y2K bug had the potential of showing the wrong time. GIGO, which stands for Garbage In Garbage Out, is a different situation in which the tool performs what it should do but it is applied in a place that does not make sense.

Explanation:

When test engineer find any error in the application they called it as bug. Bug is informal name to Defect which is flaws or misatkes in the Code or Design. Error is any mistake done by the user while using the Apllication or Software. Failure due to any error or defect if the software will not work properly .

I WILL GIVE BRAINLIEST!
PLEASE HELP ME DUE!!!

Answers

Answer:

AX=B

Explanation:

Write a method named isNumericPalindrome that accepts an integer parameter named num. If num is a palindrome the method must return true. Otherwise the method must return false. You can assume as a precondition that num has exactly 5 digits (i.e. it is between 10000 and 99999.) For example, 12321 is a palindrome while 12231 isn't because it's the same number if reversed. public boolean isNumericPalindrome(int num)

Answers

Answer:

Explanation:

The following code is written in Java. It is a method that reverses the number that is passed as an argument and compares it to its original version. Then it finally returns the results of the comparison as a boolean (either True or False). Two test cases have been created and can be seen in the attached image below.

   public static boolean isNumericPalindrome(int num) {

       String numString = Integer.toString(num);

       String reversed = "";

       for (int i = numString.length()-1; i >= 0; i--) {

           reversed += numString.charAt(i);

       }

       return numString.equals(reversed);

   }

Does anyone know how to fix this computer issue I have?

Answers

Answer:

ctrl +Alt+ upper arrow^ it make to fit your desktop

A is a distinctive characteristic of a virus or virus family.

Answers

Answer:

Assuming your talking about a computer virus(because your under the Computers and Technology section)

Also assuming you meant "What is a distinctive characteristic of a virus or virus family."

A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.

Explanation:

A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned

Answers

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

Other Questions
8. 15x - 10 = 80a. X= 2b. x=4c. X= 6 A loaf of bread costs $1.40 and the markup is 30% of the selling price. Find the selling price. what translation was the similarity moved through ? Basidia within a basidiocarp are obvious for mushrooms, but this may not be as obvious for other examples that you have observed. For each of the examples of basidiomycetes that you have observed, speculate about the location of structures analogous to the basidia observed in mushrooms. Think about the formation of spores by meiosis.a. bird's-nest fungi b. common puffballs c. earthstar puffball d. shelf fungi e. corn smut Identify the mood of the verb used in this sentence.Andy refused to attend the conference.O indicativeO imperativeO distinctiveO subjunctive Country A and Country B have had an informal trading arrangement for many years wherein merchants on the border of the countries may freely trade goods without the restriction of fees. Which of the following is true?a. The government of Country A may not arbitrarily begin to charge fees for items brought in from Country B.b. Country A and Country B have a binding agreement to this arrangement under customary international law.c. Country A and Country B have no binding agreement under customary international law.d. More than one response is correct. a grocery store buys boxes of cereal for $ 2.00 each and sells them for 50% more. what does the grocery store charge its customers for each box of cereal? drag the numbers to order them from least to greatest0.19 -2.86-0.370.911.46 Can you provide a solution or a formula? Grohl Co. issued 22 year bonds 2 years ago at a coupon rate of 5 percent. The bonds make semiannual payments. If the YTM on these bonds is 11 percent, what is the current bond price? Which method of separation would be most appropriate for separating a mixture of water and alcohol?A. evaporationB. chromatographyC. distillationD. filtration Products formed when chlorine is produced by the electrolysis of concentrated sodium chloride solution who was the first astronaut to be in space Which African American leader urged African Americans to fight actively against discrimination?Ida B. WellsGeorge Washington CarverW.E.B. DuBois Which of the following statements best describes Rome's expansion into theMediterranean region? A bicycle tire with a volume of 0.00210 m^3 is filled to its recommended absolute pressure of 495 kPa on a cold winter day when the tire's temperature is -14C. The cyclist then brings his bicycle into a hot laundry room at 32C.a. If the tire warms up while its volume remains constant, will the pressure increase be greater than, less than, or equal to the manufacturer's stated 10% overpressure limit?b. Find the absolute pressure in the tire when it warms to 32 degrees Celcius at constant volume. what represent the area of the rectangle in cm^2?? What adaptation do seeds dispersed through ballistochory have?a) sail-like structureb) smooth and aerodynamicc) hollow on the insided) pleasant smell and taste Select two choices that are true about the function f(x)=23x+14/x Identify the glide reflection rule in the given figure.Question 8 options:Translation: (x,y) (x 5,y); Reflection across y-axisTranslation: (x,y) (x,y 5); Reflection across y-axisTranslation: (x,y) (x,y + 5); Reflection across y-axisTranslation: (x,y) (x,y + 5); Reflection across x-axis