A database in which OS X saves encrypted passwords for a single computer. The first keychain, login, is created for each user and associated with the user's login password is called

Answers

Answer 1

OS X stores encrypted passwords for a single computer in a database. Each user receives a unique login keychain, which is known as a keychain and is connected to the user's login password.

What is database?Typically kept electronically in a computer system, a database is a well-organized collection of structured data. Database management systems typically have control over databases. (DBMS). People's personal data, including that of clients or users, is frequently stored in databases. For example, social media networks use databases to store user information, such as names, email addresses and user behaviour. In order to enhance user experience, the data is used to propose content to users. Software for spreadsheets, not databases, is Excel. It has significant limitations in that area, despite the fact that many users attempt to make it behave like a database. The most obvious limitation is that databases don't have such limitations, whereas Excel is limited to 1M rows of data.

To learn more about database, refer to:

https://brainly.com/question/28033296

Answer 2

The database in which OS X saves encrypted passwords for a single computer is called the keychain.

The first keychain, login, is created for each user and associated with the user's login password. The keychain acts as a secure repository for passwords and other sensitive information, allowing the user to access them without having to remember each individual password. The keychain is specific to each computer and user, ensuring that the passwords and other data are kept secure and private.
Hi! The database in which OS X saves encrypted passwords for a single computer is called the "Keychain." Specifically, the first keychain created for each user, named "login," is associated with the user's login password.

Learn more about database here:

https://brainly.com/question/30634903

#SPJ11


Related Questions

How can your web page design communicate your personal style

Answers

Answer:

Web design is very unique, you can express your feelings through creating a page.

Someone help me ASAP

Someone help me ASAP

Answers

Answer:

brought together at a single point (focused on the point)

ION KNOW TBH- LOOK IT UPPP

you have been tasked with deploying a security solution that will monitor activity related to a specific application server. the solution must be able to detect suspicious activity and take steps to prevent the activity from continuing. what should you deploy?

Answers

Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.

What is "International Society of Biomechanics in sports"?

The recently developed professional association in biomechanics is the "International Society of Biomechanics in sports".It is the professional association in bio-mechanics.

It is an international society which is dedicated to bio-mechanics to sports. The main purpose of the society is to understand and study the human movement and its relation to sport bio-mechanics. They provide information regarding  bio-mechanics in sports.

Therefore, Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.

Learn more about biomechanics on:

https://brainly.com/question/13898117

#SPJ1

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

D. Application-based questions. 1. Anand wants to rename layers in his Krita animation project. He is not sure about the location of the Layers panel. Help him find it. today i am free​

Answers

Answer:  The Layers docker in Krita contains all of the layer management settings and actions, including checkboxes to quickly rename each layer.

Explanation:

Krita has robust layer management features that include grouping, organizing, ordering, clipping, and blending artwork. The layer filtering button allows users to filter layers by labels and names, while the thumbnail button changes the thumbnail size and indentations.

Krita supports layers, allowing you to more easily manage certain areas and components of your painting. Consider a piece of art or a collage that was created using different stacks of papers, some of which were cut to reveal the paper beneath them and others to conceal it.

What about the location of the Layers panel?

Krita offers powerful layer management tools, including the ability to group, organize, order, cut, and blend artwork. While the thumbnail button modifies the thumbnail size and indentations, the layer filtering button allows users to filter layers by labels and names.

Therefore, All the layer management options and actions, including checkboxes to easily rename each layer, are contained in Krita's Layers docker.Layers are supported in Krita, giving you additional control over certain sections and elements of your painting.

Learn more about Layers panel here:

https://brainly.com/question/29731354

#SPJ2

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2

what is text formatting?​

Answers

Formatted text is any text that contains special formatting such as the font size, font color, style of emphasis, (bold, italic, etc.) or style of notation (superscript, strike through)

Formatting text refers to changing the appearance of text in a document. It can include changing the font style, size, color, and alignment, as well as applying bold, italic, or underline styles. Formatting text can help to emphasize important information, make the document easier to read, and make it look more professional.

goodluck!

what is text formatting?

Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1

Help now please

Answers

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

Subject me not to trials,shame not my human form. "Explain".​

Answers

A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

What is Human form?

This animated short is a commentary on plastic surgery and humanity's obsession with what is considered to be "beauty," where we frequently idolize appearances.

It are impossible to achieve naturally and judge natural appearances as not looking "good enough" (which makes everyone a potential "fixer-upper" and gives the beauty industry more and more profits).

And given that several Asian nations have absurd beauty standards, this South Korean short is the ideal commentary on everything.

Therefore, A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

To learn more about Human form, refer to the link:
https://brainly.com/question/8509952

#SPJ5

Answer:

The poet seems to be humiliated and condemns himself for being human just physically. He is sure if Allah subjects him to examination, he would not be successful in it because he cannot tolerate or withstand them like a perfect human being.

Explanation:

Hope it will help ...

5 minutes speech on computer and it's impact​

Answers

Answer:

used for inter eliptics

Answer:

Computers have affected our lives in a great deal in that almost every thing now is either run by or made by computers. for instance in large industries, cars and space exploration devices and machines are designed by the use of the computers, in hospitals where medical billing, patients admittance and other medical are run and made by computers. there are also benefits of computer. but it also right it also impact our life.

AI is not embraced everywhere in every industry because _______.

Answers

Answer:

See below:

Explanation:

AI is not embraced in every industry because of the type of industry and what it requires. In some situations, a human is needed since an AI cannot determine what to do and can sometimes even cause death.

AI isn't embraced everywhere because for some things we need a person, lets say for example, we need an AI to respond to 911 calls, that simply won't work due to the many situations and training the bot too will be a nightmare. For example, if a caller says a word that normal humans can understand, or a "code word" that every human knows but they haven't bothered to tell the bot, that will be the end of the line for them.

There are mutliple reasons to not use AI depending on the situation whether its life and death or just plain impractical.

When you use the Enter button on the Formula Bar to complete a cell entry , the highlight moves one row down.
True or false

Answers

When you use the Enter button on the Formula Bar to complete a cell entry, the highlight moves one row down is False. The formula bar in Microsoft Excel is a designated area located above the worksheet grid.

When you press the Enter button on the Formula Bar in Microsoft Excel, the active cell moves one cell down within the same column, not one row down. This behavior allows you to quickly enter data or formulas in a column and move to the next cell below.

If you want to move one row down, you can use the combination of the Enter button and the Shift key. Alternatively, you can change the default behavior of the Enter key in Excel options to move the selection one row down. Therefore, the statement is False.

To learn more about formula bar: https://brainly.com/question/30801122

#SPJ11

When checking for a no-start concern, you notice that an engine has no spark. Technician A says to turn on the ignition (engine off) and, using a DMM, find out how much battery voltage is available at the negative terminal of the ignition coil. Technician B says the DMM reading should fluctuate, indicating that the primary coil current is being turned on and off. Who is correct?


A. Neither Technician A nor B

B. Both Technicians A and B

C. Technician B

D. Technician A

Answers

Answer:

Option(C) is the correct answer to the given question.

Explanation:

Since overall the On-Board Diagnostics of the level 2 the computer systems need to evaluate the cause of the engine failures .The malfunction significantly increases in the fuel consumption, so that we can detecting the error code in the vehicle.

If we starting the engine as well as by using the DMM, we'll  see how much battery voltage it is at the negative ignition coil node.If the spark module is faulty and no ignition coils can fire so all the engines are working that's why all the other option are incorrect .

What it means to say media is a continuum, not a category?

Can someone help me with that real quick please?

Answers

It means that media exists along a spectrum with various degrees of characteristics, rather than being strictly defined by rigid categories.

What does such ideology of media being a continuum imply?

This perspective acknowledges the fluidity and overlapping nature of different media forms and their ever-evolving roles in communication, entertainment, and information dissemination.

As technology advances and media platforms continue to converge, the boundaries between traditional media categories (such as print, radio, television, and digital) become increasingly blurred. New forms of media often incorporate elements of existing forms, creating a continuous spectrum of media experiences.

Find more media related question here;

https://brainly.com/question/14047162

#SPJ1

the wireless technology that can be used to transmit data between 2 different network​

Answers

Answer:

most probably that's wifi.

Wifi is the correct answer

My monitor, every time I try to turn it on says this "reboot and select proper boot device or insert boot media in a selected boot device and press a key" I've already tried to press all the keys to enter BIOS but since before this problem happened I enabled ultra-fast boot so it doesn't give me time to press any of them and I don't know what to do I've seen so many videos and I just can't find any that could possibly help me

Answers

You may have a corrupt system or your hard drive may be loose. (it used to be a common issue for me when I upgraded my computer to SSD, that computer is only used for backup purposes)

pls solve the problem i will give brainliest. and i need it due today.

pls solve the problem i will give brainliest. and i need it due today.

Answers

Answer:

1024

Explanation:

by the south of north degree angles the power of two by The wind pressure which is 24 mph equals 1024

UNIT 1 ACTIVITY

Troubleshooting

Part A

When your friend DaJuan turns on his computer, he hears four beeps. The computer

won't fully boot. DaJuan has a Dell computer with a quad core processor and has

recently upgraded his RAM.

Apply the troubleshooting methodology to help DaJuan understand and resolve his

problem. The steps of the methodology are listed for you. You can write directly on

the write suggestions for DaJuan at each step.

1. Identify the Problem (beeps are key here)

2. Internet Research

3. Establish a Theory of Probable Cause

4. Test the Theory

5. Establish a Plan of Action

6. Implement the Solution or Escalate

7. Verify Full System Functionality

8. Document Findings

Answers

Answer:

all of the above

Explanation:

Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific concepts. STEM students are told to focus on a subject area and work within a certain specific field. STEM students are encouraged to blend and expand their knowledge of all four subject areas. STEM education prepares students to work in science- and math-related jobs.

Answers

Answer:

C). STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Explanation:

STEM education is characterized as a learning and development approach that focuses upon an amalgamation of four subject areas including science(S), technology(T), engineering(E), and Mathematics(M). Thus, each letter stands for a subject domain and this integration of four subjects primarily aims to 'blend and expand the knowledge of the students in these areas' integratively. It helps in developing and sustaining the interests of young learners through this integrated approach which also assists them with unique opportunities. Thus, option C is the correct answer.

The answer is:

D) STEM students are encouraged to blend and expand their knowledge of all four subject areas.

8. 2. 5: spell it out codehs

Does anyone know how to do that

Answers

The task of spelling out 8.2.5 in codehs can be achieved using the basic programming constructs of variables and print statements. Firstly, a variable can be created and assigned the value of 8.2.5. For example, we can declare a variable called "version" and set it equal to 8.2.5 using the syntax "version = 8.2.5".



Next, we need to output the value of this variable in a user-friendly format. This can be done using the print statement. We can simply use the syntax "print(version)" to display the value of the "version" variable.

Therefore, the complete code for spelling out 8.2.5 in codehs would be:

```
version = 8.2.5
print(version)
```

This code creates a variable called "version" and sets its value to 8.2.5. Then, it uses the print statement to output the value of this variable to the console.

In conclusion, spelling out 8.2.5 in codehs can be easily achieved by using variables and print statements. By following the steps outlined above, anyone can write a simple program to spell out this number in codehs.

For such more question on variable

https://brainly.com/question/29883906

#SPJ11

Please develop a Geoblockchain-based MIS project/solution/scenario regarding location-based information.
b.) Please explain the following concepts.
• geospatially enabled decentralized applications (GeodApps),
• Geoblockchain-as-a-service (GeoBaaS),
• decentralized map
c.) How can (geospatially enabled) smart contracts be used for spatiotemporal analyzes?

Answers

A Geoblockchain-based MIS project focusing on location-based information can leverage geospatially enabled decentralized applications, Geoblockchain-as-a-Service, and decentralized maps to provide secure and transparent access to geospatial data.

Geoblockchain-based MIS Project/Scenario: Location-Based Information

In this scenario, let's consider the development of a Geoblockchain-based Management Information System (MIS) that focuses on location-based information. The project aims to leverage blockchain technology and geospatial data to create a decentralized and secure platform for managing and analyzing location-related data.

The system would enable users to store, access, and analyze geospatial data while ensuring data integrity, transparency, and privacy through the use of blockchain technology. Users can interact with the system through geospatially enabled decentralized applications (GeodApps), which are specifically designed to leverage location-based information.

a) Geospatially Enabled Decentralized Applications (GeodApps):

GeodApps are decentralized applications that utilize geospatial data and functionality. These applications integrate blockchain technology to provide secure and transparent access to location-based information. GeodApps can facilitate various use cases such as location-based services, geospatial analytics, supply chain tracking, and environmental monitoring. By leveraging blockchain, GeodApps ensure data integrity, immutability, and decentralized control.

b) Geoblockchain-as-a-Service (GeoBaaS):

GeoBaaS refers to the provision of Geoblockchain infrastructure and services to developers and organizations as a service. It offers the necessary tools, protocols, and infrastructure for developing and deploying GeodApps. GeoBaaS platforms provide capabilities for storing geospatial data on the blockchain, executing smart contracts, and interacting with decentralized maps. These services enable developers to focus on building their GeodApps without the need to manage the underlying blockchain infrastructure.

c) Decentralized Map:

A decentralized map is a geospatial data layer that is distributed across multiple nodes in a blockchain network. It leverages the principles of decentralization and blockchain technology to provide a collectively maintained and verified map of locations and associated data. By distributing the map across multiple nodes, it enhances data integrity, prevents single points of failure, and allows for decentralized updates and additions to the map. A decentralized map can be accessed and queried by GeodApps to retrieve location-based information securely and reliably.

c) Geospatially Enabled Smart Contracts for Spatiotemporal Analysis:

Geospatially enabled smart contracts are self-executing agreements on the blockchain that incorporate location-based conditions or triggers. These contracts can include spatiotemporal analysis capabilities by integrating geospatial data and predefined rules or conditions. For example, a smart contract could be programmed to trigger a specific action when a vehicle enters a specific geographical boundary or when certain environmental conditions are met.

By utilizing geospatially enabled smart contracts, spatiotemporal analysis can be automated and executed on the blockchain. This enables the creation of self-executing and tamper-resistant analysis workflows that can process and analyze geospatial data in real-time. These smart contracts can provide valuable insights for applications such as urban planning, transportation management, disaster response, and environmental monitoring, among others.

In summary, a Geoblockchain-based MIS project focusing on location-based information can leverage geospatially enabled decentralized applications, Geoblockchain-as-a-Service, and decentralized maps to provide secure and transparent access to geospatial data. Additionally, geospatially enabled smart contracts can automate spatiotemporal analysis, enabling real-time insights and automated decision-making based on location-based conditions and triggers.

Learn more about decentralized here

https://brainly.com/question/31273670

#SPJ11

using a vpn while on a public wi-fi network will protect you from all of the following except?

Answers

Using a VPN on public Wi-Fi protects you from various risks except malicious websites or phishing attempts.

How does using a VPN on public Wi-Fi protect you?

Using a VPN (Virtual Private Network) while connected to a public Wi-Fi network provides several security benefits, but it does not offer complete protection against the risk of malicious websites or phishing attempts. A VPN encrypts your internet traffic, ensuring that your data is secure and preventing potential eavesdropping on the network.

It also masks your IP address, adding an extra layer of privacy and making it difficult for others to track your online activities. However, a VPN does not inherently block or filter out malicious websites or phishing attempts.

It is still important to exercise caution, use secure browsing practices, and rely on other security measures such as antivirus software and safe browsing habits to mitigate the risk of encountering such threats.

Learn more about VPN

brainly.com/question/31764959

#SPJ11

At the command prompt, type echo You have $4.50 and press Enter. What is displayed? Why? Which character needs to be protected in the previous command? What are two different ways that you can protect this character from interpretation by the shell?

Answers

At the command prompt, typing echo You have \$4.50 and pressing enter will display the text You have $4.50.

This is because the character '$' needs to be protected from interpretation by the shell in order to be displayed as part of the string. Two different ways to protect this character from interpretation by the shell are by either escaping it with a backslash (\$) or by enclosing it in single quotes (‘$’).

A command prompt is a type of user interface that allows a user to interact with a computer system by typing in commands using a text-based interface. It typically appears as a command line or console window, where the user can enter commands and receive feedback from the system in the form of text-based output. Command prompts are commonly used in operating systems such as Microsoft Windows, macOS, and Linux/Unix, and can be accessed via various methods such as the Start menu, the Terminal application, or by pressing specific keyboard shortcuts.

Learn more about command prompt: https://brainly.com/question/25808182

#SPJ11

Mention five(5) businesses that needs computer to apperate.

Answers

Answer:

1. Accounting

2. software developing

3. Website designing

4. Online transaction

5. Advertising

What is the difference between a displayed result and a formula?
The displayed result is always the same number, but the formula changes.
The formula is always the same as the displayed result, it will always be a simple value.
The displayed result changes as the formula dictates it; it may not be a simple value.
The displayed result and the formula are unrelated.

Answers

Answer:

The displayed result changes as the formula dictates it; it may not be a simple value.

Explanation:

Answer:

The displayed result changes as the formula dictates it; it may not be a simple value.

Explanation:

Format the Applications worksheet for printing. Select row 7 as the print titles to be repeated on each page. Change the top and bottom margins to 0.8 inch, and the left and right margins to 0.5 inch. Change the print area to the range A1:F60. 8. On the left side of the footer, add the text Class of 2025 Applications. On the right side of the footer, use Header \& Footer elements to insert the current page number, a space, the word of, arfother space, and the total number of pages. workbook should look like the Final Figures on the following pages. Save your changes, the workbook, and then exit Excel. Follow the directions on the SAM website to submit your bleted project.

Answers

To format the Applications worksheet for printing, row 7 should be selected as the print titles to be repeated on each page. The top and bottom margins should be set to 0.8 inch, and the left and right margins to 0.5 inch.

The print area should be changed to the range A1:F60. In the footer, on the left side, add the text "Class of 2025 Applications." On the right side of the footer, use Header & Footer elements to insert the current page number, the word "of," a space, and the total number of pages. The workbook should be saved and then exit Excel. To format the worksheet for printing, the first step is to select row 7 as the print titles. This ensures that the content of row 7 will be repeated on each printed page. Next, the margins need to be adjusted.

The top and bottom margins should be set to 0.8 inch, and the left and right margins should be set to 0.5 inch. This provides appropriate spacing for the printed content. The print area should be modified to the range A1:F60. This ensures that only the specified range will be included in the printout. By setting a specific print area, unnecessary content can be excluded from the printed version. In the footer, on the left side, the text "Class of 2025 Applications" should be added.

This provides additional information in the footer section of each printed page. On the right side of the footer, the Header & Footer elements should be used to insert the current page number, the word "of," a space, and the total number of pages. This provides pagination information for the printed document. Finally, the changes should be saved, and the workbook should be exited. By following these steps, the worksheet can be formatted for printing according to the provided instructions.

Learn more about Header & Footer here:

https://brainly.com/question/29793304

#SPJ11

HTML coding ......plz help​

HTML coding ......plz help

Answers

Answer:

<html>

<title=succes secrets>

<bg color="orange">

<body>

success...........all those text on isde

Type the correct answer in the box. Spell the word correctly.
Which document can help you reflect your identity, skills, and accomplishments while applying for a new job?

Your_______
is a reflection of your
identity, skills, and accomplishments.

Answers

Answer:

résumé

Explanation:

The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.

That question is for my photography class.

Answers

Answer:

72 dpi

Explanation:

72 DPI is standard for social media posts and others. It is not 300 DPI which is standard for print.

The standard dots per inch (DPI) used for blogs, social media, webpages, and emails can vary depending on the specific platform and device.

A common standard for these digital mediums is 72 DPI.

DPI refers to the resolution or sharpness of an image on a digital display. A higher DPI means more dots or pixels per inch, resulting in a clearer and more detailed image. On the other hand, a lower DPI means fewer dots per inch, resulting in a less sharp image.

For digital content displayed on screens, a DPI of 72 is often used because it strikes a balance between image quality and file size. This resolution is considered sufficient for viewing images online without causing excessive loading times or using excessive bandwidth.

It's important to note that when printing physical copies, a higher DPI is generally recommended to achieve better print quality. In print media, resolutions like 300 DPI are commonly used to ensure sharp and detailed prints.

Know more about dots per inch,

https://brainly.com/question/32108345

#SPJ3

Which of the following types of workbooks open in Protected View?a. workbooks from the webb. workbooks with macrosc. workbooks with ActiveX controlsd. all of the above

Answers

All of the above types of workbooks - workbooks from the web, workbooks with macros, and workbooks with ActiveX controls - can open in Protected View. Protected View is a security feature in Microsoft Excel that opens a workbook in a restricted mode to help prevent any potentially harmful content from running automatically. When a workbook is opened in Protected View, the user cannot make any changes to the file until they enable editing.

they are considered higher risk for containing malicious content or harmful macros. Workbooks from the web can be from an untrusted source, while workbooks with macros and ActiveX controls can execute code that may not be safe for the user's computer. Therefore, opening these types of workbooks in Protected View helps to protect the user and their device.


In Microsoft Excel, Protected View is designed to protect your computer from potentially harmful files. When you open a workbook in Protected View, it includes the following types of workbooks: Workbooks from the web: Files downloaded from the internet are opened in Protected View to prevent any malicious content from harming your system. Workbooks with macros: Macros can contain harmful code, so workbooks with macros will open in Protected View to ensure safety. Workbooks with ActiveX controls: Similar to macros, ActiveX controls can pose security risks, and thus workbooks with ActiveX controls open in Protected View. In summary, all of the above types of workbooks (a, b, and c) will open in Protected View to maintain security and protect your system from potential threats.

To know more about Protected View visit:

https://brainly.com/question/23028511

#SPJ11

Other Questions
15. Problem 4.15 (Return on Equity and Quick Ratio) Lloyd Inc. has sales of $350,000, a net income of $17,500, and the following balance sheet: if no other changes occur, by how much will the ROE change? Do not round intermediate calculations. Round your answer to two decimal places. ROE will by percentage points. What will be the firm's new quick ratio? Do not round intermediate calculations. Round your answer to two decimal places. how was the war on the frontier during the American revolution different from the rest of the fighting in the war? how many milliliters of 0.7513 m naoh standard solution are needed to neutralize 50.00 ml of 0.3442 m tartaric acid? Rights of American Crozena The ability to leave and return to the country Protection of the American government while abroad The ability to pass citizenship to one's children Protection from deportation. ?Which right completes the chart?A. Home ownershipB. Voting in electionsC. Protection from imprisonment WILL GIVE BRAINLIST for detailed information: who was Joan of Arc ___________ are related to deciduous forest biome.1. Cactus2. Grassland3. Tundra4. Seasons Simplify the expression:(10x2 -1 + 4x) + (3 + 5x2 - 4x) 67% of students in 7th grade claim to brush their teeth twice a day. If there are124 students in 7th grade How many brush their teeth twice a day? la suma de los polinomios es -2x + 4xy. Si uno de los polinomios es 3x-4x+y cul es el otro polinomio? which of the following foods contains the lowest amount of sodium? which of the following foods contains the lowest amount of sodium? a 4-ounce glass of tomato juice a medium fresh orange one cup of canned vegetable soup a hot dog A triangle has sides with lengths of 11 inches, 15 inches, and 18 inches. Is it a right triangle? May someone please help me on this question? Thank you so much Friction creates heat and lowers the _______ What is the most popular fruit in the USA? can the sides of a right triangle have the lengths 5 15 and 250. explain What is the sum of the interior angles of a decagon (10-sided polygon)? Read the sentence. The preschool teacher was shocked that a four-year-old child drew such an exquisite picture of a sunset. If y varies directly with x and y= 12 when x= 16, what is the value of x when y= 5? I only have a bout nine more minutes left does anybody know the answer to this question please help me if you do How do you factor an equation?