Sketch the various components using different tools and
techniques of the Submarine with proper explanation on the features
in a step-by-step method of the designing process of each component
used in

Answers

Answer 1

Designing a submarine requires different tools and techniques to produce the various components needed. The design process starts with a sketch, and the components' size and shape are determined based on the submarine's intended use.

Designing a submarine requires the use of different tools and techniques to produce the various components needed. These components include the hull, propellers, ballast tanks, periscope, and engine. Here is a step-by-step method of designing each component used in a submarine:1. Hull design: The hull is the body of the submarine, which provides the internal and external shape. The design process starts with a sketch, and the sketch is then translated into a 3D model using computer-aided design (CAD) software. The shape and size of the hull depend on the intended use of the submarine.2. Propeller design: The propellers are the most critical components of the submarine as they provide the necessary propulsion.

The design process starts with a sketch, which is then refined using software simulations to determine the optimal shape and size.3. Ballast tanks design: Ballast tanks are used to control the submarine's buoyancy. The design process starts with a sketch, and then the size and number of tanks are determined based on the submarine's intended use.4. Periscope design: The periscope is used for the submarine's observation above the waterline.

The design process starts with a sketch, and then the optics and the mechanical systems are determined.5. Engine design: The engine provides power to the submarine, and the design process starts with a sketch. The size and type of engine are determined based on the intended use of the submarine.CAD software is used to create 3D models and software simulations to optimize the design of the components.

To know more about different tools visit :

https://brainly.com/question/31832144

#SPJ11


Related Questions

n macOS, what launch point provides access to almost all the settings needed to administer a macOS system?

Answers

Answer:

System preferences.

Explanation:

MacOS is the primary operating system designed and developed for Apple computers (MacBook).

In macOS, system preferences is a launch point that provides access to almost all the settings needed to administer a macOS system. The system preferences allow users to change various settings on their Mac computers such as changing the desktop layout, desktop picture (wallpaper), size and location of the dock, font size, appearance, energy saver etc.

1. What are the two types of checkpoints supported by Hyper-V running on Windows Server 2016 host?

2. True or False. You can edit the first virtual hard disk of a guest virtual machine with checkpoint or snapshot enabled.

Answers

1. There are two types of checkpoints supported by Hyper-V running on Windows Server 2016 host namely, Standard Checkpoints and Production Checkpoints. The standard checkpoint captures the state, data, and hardware configuration of the running VM. A standard checkpoint provides a quick and easy way to restore a VM to its previous state or to troubleshoot a VM.

The production checkpoint, on the other hand, uses backup technology inside the VM to create a VM checkpoint. A production checkpoint saves the memory state, configuration files, application data, and other information, including the state of all of the virtual machine disks. Production checkpoints are primarily intended for VMs that are running a supported OS and are used for application-aware backup and restore scenarios.

2. False. Once a virtual machine has a checkpoint or snapshot enabled, the first virtual hard disk of a guest virtual machine is write-protected. The reason behind this is that Hyper-V creates a differencing disk that stores all write operations on the VM’s disk that was made during the checkpoint or snapshot. The differencing disk is chained to the parent virtual hard disk of the VM, and so the parent virtual hard disk is read-only and cannot be changed, thus providing a virtual machine consistent with the state it was in when the snapshot or checkpoint was taken.

To know more about Windows Server visit:

https://brainly.com/question/29482053

#SPJ11

List six characteristics you would typically find
in each block of a 3D mine planning
block model.

Answers

Answer:

Explanation:

In a 3D mine planning block model, six characteristics typically found in each block are:

Block Coordinates: Each block in the model is assigned specific coordinates that define its position in the three-dimensional space. These coordinates help locate and identify the block within the mine planning model.

Block Dimensions: The size and shape of each block are specified in terms of its length, width, and height. These dimensions determine the volume of the block and are essential for calculating its physical properties and resource estimates.

Geological Attributes: Each block is assigned geological attributes such as rock type, mineral content, grade, or other relevant geological information. These attributes help characterize the composition and quality of the material within the block.

Geotechnical Properties: Geotechnical properties include characteristics related to the stability and behavior of the block, such as rock strength, structural features, and stability indicators. These properties are important for mine planning, designing appropriate mining methods, and ensuring safety.

Resource Estimates: Each block may have estimates of various resources, such as mineral reserves, ore tonnage, or grade. These estimates are based on geological data, drilling information, and resource modeling techniques. Resource estimates assist in determining the economic viability and potential value of the mine.

Mining Parameters: Mining parameters specific to each block include factors like mining method, extraction sequence, dilution, and recovery rates. These parameters influence the extraction and production planning for the block, optimizing resource utilization and maximizing operational efficiency.

These characteristics help define the properties, geological context, and operational considerations associated with each block in a 3D mine planning block model. They form the basis for decision-making in mine planning, production scheduling, and resource management.

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the images. Which images could she print along with the mans interview?

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial

Answers

Answer: The last picture it looks better.

Explanation: Welcome!

Answer:

4

Explanation:

a file extension of .xlsx means that the file contains what?

Answers

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Answer:

Explanation:

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

can someone help me answer this, I can’t fail tysm :)

can someone help me answer this, I cant fail tysm :)

Answers

Don’t know what the answer is but do you, I have the test for that today

what technology uses radio waves to transmit data between two devices, allowing people to use their cell phones hands-free in automobiles?

Answers

The technology that uses radio waves to transmit data between two devices, allowing people to use their cell phones hands-free in automobiles is called Bluetooth.

What technology is this?

Bluetooth is a wireless communication technology that allows devices, such as smartphones, laptops, headphones, and car audio systems, to exchange data and communicate over short distances without the need for physical connections.

It operates in the frequency range of 2.4 to 2.485 GHz and uses radio waves to establish a wireless connection between devices, enabling them to transmit and receive data, including voice calls, audio, and other types of information. Bluetooth technology is commonly used for hands-free calling in cars, wireless audio streaming, and various other applications where short-range wireless communication is required.

Learn more about radio waves at:

https://brainly.com/question/69373

#SPJ1

b)what information is kept in the process table? how many areas of the operating system are using the process table to store data?

Answers

System monitoring utilities and tools also use the process table to show users data about active processes.

What details are stored in an operating system's process table?

Each item in the table, which is frequently referred to as a context block, provides details about a process, including its name, state (described below), priority (discussed below), registers, and any pending semaphores (discussed later). Depending on the operating system, a context block's precise contents will vary.

Which information is kept in the process tables?

The Linux kernel has a data structure called the process table that contains details about every process that is currently active. Process IDs, memory use statistics, and file descriptor usage are all listed in the process table process IDs, memory use, file descriptor usage, and other information are all contained in the process table.

To know more about data visit:-

https://brainly.com/question/29555990

#SPJ4

Please help!!!
I'm confused as to what I'm doing wrong! When the dog wrap around the third corner, it doesn't turn left, instead right. Could someone please help me out?

Please help!!!I'm confused as to what I'm doing wrong! When the dog wrap around the third corner, it

Answers

The most probable reason why your code for the dog turning right instead of is because your conditional statements are not satisfied.

What is Debugging?

This refers to the identification and removal of errors in a given code or hardware component.

Hence, we can see that you should note that you are using teh ifElse conditional statement to execute your code and you stated that the dog would turn right if:

The left side is blocked If there are balls present.

Therefore, there are balls present and also the left side is blocked which causes your dog to turn right because it is executing the else statement.

Read more about debugging here:

https://brainly.com/question/16813327

#SPJ1

Describe a recent data communication development you have read
about in a newspaper or magazine (not a journal, blog, news
website, etc.) and how it may affect businesses. Attach the URL
(web link).

Answers

One recent data communication development is the emergence of 5G technology. With its faster speeds, lower latency, and increased capacity, 5G has the potential to revolutionize various industries and transform the way businesses operate.

The deployment of 5G networks enables businesses to leverage technologies and applications that rely on fast and reliable data communication. For example, industries such as manufacturing, logistics, and transportation can benefit from real-time data exchange, enabling efficient supply chain management, predictive maintenance, and autonomous operations. Additionally, sectors like healthcare can leverage 5G to facilitate remote surgeries, telemedicine, and the Internet of Medical Things (IoMT), enabling faster and more reliable patient care.

Moreover, the increased speed and capacity of 5G can enhance the capabilities of emerging technologies such as augmented reality (AR), virtual reality (VR), and the Internet of Things (IoT). This opens up new opportunities for businesses to deliver immersive customer experiences, optimize resource utilization, and develop innovative products and services.

Overall, the deployment of 5G technology has the potential to drive digital transformation across industries, empowering businesses to streamline operations, enhance productivity, and deliver enhanced experiences to customers.

Learn more about technology here: https://brainly.com/question/11447838

#SPJ11

You want to replace all forms of the word "puppy" in your document with the word "dog." Which do you choose?

Answers

In order to replace all forms of the word "puppy" in your document with the word "dog" you need to use the "Find and Replace Tool".

What is the importance of the Find and Replace Tool?

Find and Replace allows you to search for words or formats in a document and replace all instances of a term or format. This is very useful in long papers. To utilize Find and Replace, use Ctrl+H or go to the Home tab on the ribbon and select Editing, then Replace.

The Find and Replace tool automates the process of looking for text within a document. You may use wildcards and regular expressions to fine-tune a scan in addition to locating and replacing words and phrases. Search for and replace particular formatting.

Learn more about Find and Replace:
https://brainly.com/question/28985879

#SPJ1

In the hierarchical network model, which layer is responsible for fast transport? a. Network layer b. Core layer c. Distribution layer d. Access layer

Answers

In the hierarchical network model, the layer that is responsible for fast transport is the Core layer.

what is  hierarchical network model?

The Core layer, also known as the backbone or high-speed switching fabric, is designed to provide a high-speed transport of data between different network segments, without any delay or bottleneck.

It is responsible for fast and efficient transport of large amounts of data, without any concern for the individual endpoints, applications, or user data.

The core layer uses high-speed switches, routers, and fiber-optic links to provide fast, reliable, and scalable connectivity between different parts of the network.

On the other hand, the Distribution layer is responsible for routing and filtering traffic between different network segments, while the Access layer provides end-user access to the network, including connectivity to workstations, servers, and other network devices.

The Network layer is responsible for logical addressing and routing of data between different networks, and it works in conjunction with the other layers to provide end-to-end communication.

To know more about network model, visit: https://brainly.com/question/29214810

#SPJ4

how to make all characters lowercase in a string assembly langauge

Answers

To convert all characters in a string to lowercase in assembly language, you can use the ASCII values and some conditional branching.

Here's an example implementation in x86 assembly language:

```assembly

section .data

   string db "Hello, World!", 0

   length equ $ - string

section .text

   global _start

_start:

   ; Iterate through each character in the string

   mov ecx, length

   mov esi, string

   xor eax, eax

convert_lowercase:

   ; Load the current character into AL

   lodsb

   

   ; Check if the character is an uppercase letter (ASCII range 65-90)

   cmp al, 65

   jb skip_conversion

   cmp al, 90

   ja skip_conversion

   

   ; Convert uppercase to lowercase by adding 32 (ASCII value difference)

   add al, 32

   

   ; Store the lowercase character back into the string

   stosb

   

skip_conversion:

   ; Continue to the next character until the entire string is processed

   loop convert_lowercase

   

   ; Terminate the string with a null character

   mov byte [esi], 0

   ; Exit the program

   mov eax, 1

   xor ebx, ebx

   int 0x80

```

In this example, the program iterates through each character in the string using the `lodsb` instruction to load a character into the `AL` register. It then checks if the character is within the ASCII range of uppercase letters (65-90) using `cmp` instructions. If the character is uppercase, it converts it to lowercase by adding 32 to its ASCII value. The lowercase character is then stored back into the string using the `stosb` instruction.

The loop continues until all characters in the string have been processed. Finally, the program terminates the string with a null character and exits.

Learn more about strings here:brainly.in/question/2521714

#SPJ11

Need the answer ASAP PLZ!!!! I’ll mark brainliest if it’s correct

Select the correct answer.
Suzanne, a project manager, wants to change the style and font of the text in the document. What documentation standards should Suzanne
follow?

OA
interchange standards
ОВ.
identification standards
OC.
update standards
OD
process standards
OE.
presentation standards

Answers

Answer:

update standards

i think this is correct

don't be afraid to correct me if im wrong

Explanation:

mrk me brainliest

Which of the following is the best example of an installation issue?
A computer can’t find the file that it needs to perform an operating system function.
A computer displays error messages, and then the Blue Screen of Death appears.
A user made an error while trying to set up a software program.
A software program is not compatible with the computer’s operating system.

Answers

a computer cant find the file that it needs to perform an operating system function

The option that is the best example of an installation issue is A computer can’t find the file that it needs to perform an operating system function.

What is installation issue?

This is known to be a kind of situation in terms of computing where one is unable to carry out a task as a result of missing item or code.

Note that The option that is the best example of an installation issue is A computer can’t find the file that it needs to perform an operating system function.

Learn more about installation  from

https://brainly.com/question/10012411

#SPJ2

What term is used to describe the process of monitoring operating results and comparing actual results with the expected results

Answers

Answer:

controlling

Explanation:

hope this helps

a computer processor stores numbers using a base of _____. group of answer choicesA. 16B. 8C. 10D. 2

Answers

A computer processor stores numbers using a base of 2. Your answer is D. 2.

In digital electronics, binary is the primary numbering system used by computers to store and process data. The binary system uses two symbols, typically 0 and 1, to represent numbers, letters, and other characters. The binary digits are called bits, and groups of 8 bits form bytes, which are the basic units of storage used by computers.

When a computer processor stores a number, it first converts it into binary representation. This process is called binary encoding. The binary representation of a number is a series of 0s and 1s that correspond to the values of the digits in the number's binary expansion. For example, the decimal number 5 can be represented in binary as 101, where the first digit represents 2^2, the second digit represents 2^0, and the third digit represents 2^0.

The use of binary allows computer processors to easily perform arithmetic and logical operations, as the basic operations of addition, subtraction, multiplication, and division can be implemented using simple circuits that operate on binary digits. Binary also allows for efficient storage and retrieval of data, as it can be represented using electrical signals that are either on or off, corresponding to 1s and 0s.

Therefore, the correct answer to the question "A computer processor stores numbers using a base of _____" is D. 2, as binary is the base system used by computers to store and process data.

Know more about the binary system click here:

https://brainly.com/question/2824068

#SPJ11

Something UNEXPECTED that happens while a
program is running

What is the word for this definition?

Answers

Answer:

Explanation:

An exception (short for "exceptional event") is an error or unexpected event that happens while a program is running

platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

Answers

Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

social networking sites.

What is a social networking site?

A social networking site is sometimes referred to as social network and it can be defined as a collection of Internet software applications and websites (platforms) which are designed and developed in order to avail end users with similar interests, an ability to connect, add, share, and discuss different information, as well as enhance remote connection, collaboration and debates (discussions) between community members over the Internet.

Additionally, some examples of a social networking site include the following:

Twi-tterFace-bookTi-kT-okInst-agr-amHangoutYou-tube

In this context, we can reasonably infer and logically deduce that social networking sites can help connect users such as employees to other employees with similar professional interests.

Read more on social networks here: brainly.com/question/28072110

#SPJ1

Complete Question:

Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

____________ _____________ sites.

a client pc has two simultaneous connections to the same webserver application program on a webserver. (yes, this is possible, and in fact, it is rather common.) what will be different between the tcp segments that the client sends on the two connections? (hint: consider all the fields in a tcp segment.)

Answers

When a client PC has two simultaneous connections to the same webserver application program on a webserver, the TCP segments that the client sends on the two connections are different in terms of sequence and acknowledgement numbers and ports used.  

TCP segments on two connections are differentiated by using different port numbers to distinguish different applications. Sequence and acknowledgment numbers are used by TCP to identify whether a packet has been dropped during transmission, which is used to request retransmission of the lost packet. When one of the connections loses packets during transmission, this distinction is critical. So the client PC sends TCP segments with different sequence and acknowledgment numbers on the two simultaneous connections.

Learn more about simultaneous here:

https://brainly.com/question/30116321

#SPJ11

PLEASE HELP !!!!!! INTERNET SAFTEY



Which of the following is a
place where cyberbullying doesn't occur?
O chat messages
O online groups
O on the football field
O cyberspace

Answers

On the football field

Answer:

C

Explanation:

If your on the foot ball field you cannot cyber bully there, for cyber bullying is online. Hope this helps :)

True or False: Microsoft makes a comprehensive list of Event ID numbers available to its users.

Answers

False. Microsoft does not provide a comprehensive list of Event ID numbers to its users.

Microsoft does not publish an exhaustive list of Event ID numbers that cover all possible events and errors in their products. Event IDs are unique identifiers assigned to different events and errors that occur within the Microsoft operating systems and applications. While Microsoft does provide some documentation and resources to help users troubleshoot specific Event IDs, there is no single, comprehensive list available.

To diagnose and troubleshoot specific Event IDs, users typically rely on various sources of information such as Microsoft's official documentation, community forums, knowledge bases, and third-party resources. These sources offer guidance on understanding and resolving specific Event IDs based on their known causes and recommended solutions. Additionally, system administrators and IT professionals may leverage their experience and expertise in analyzing Event IDs to identify and address issues in their Microsoft-based environments.

Learn more about Microsoft here:

https://brainly.com/question/2704239

#SPJ11

HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
A rock band is a type of

ensemble
metronome
time signature
treble clef

Answers

Answer:

A. ensemble.

Explanation:

A musical ensemble can be defined as a group of people who play instrumental and vocal music. It is also known as a music group and carries a distinct name. The word ensemble is derived from the Middle French ensemblée, meaning together at the same time.

A rock band will come under the category of a musical ensemble as it is also a group of people performing instrumental music or vocal music.

Therefore, option A is correct.

why is it important to write something in the subject line of emails?

Answers

so the person can know what you want and it helps keep better track of emails and subject matters

Answer:To provide a topic for whatever is in your email

Explanation: without something in the subject line the email will most likely be inferred as a spam.

10 effects that you can find in Audacity.

Answers

Answer: Distortion.

Echo.

Limiter.

Paulstretch (extreme stretch)

Phaser.

Reverb.

Reverse.

Truncate Silence.

etc

Explanation: this is it

For kids who feel like they dont belong, i fell you, i really do. We are all connected. We’re in this together believe it or not. You are not alone. No matter what happens, you should never give up. Happiness is not limited, if you can’t find any happiness then i will lend some of my happiness to you. People can help you move forward, to a life that is full of happiness. One where you are not so depressed in. Your life is shaped by YOU. So if you choose to be depressed than that is how your life will be. If you choose to be happy than you will live a happy life. That goes for all the other emotions. You may say you dont belong but you do belong. It may be a place in your imagination for now but sooner or later or will find a place in the real world that you belong. If you give this world a chance it can show you that you do belong in this world. You’ll never know if you make a difference if you dont give yourself a chance to make a difference. Your world will open up in ways that you thought were never possible if you just believe in yourself. When that happens you’ll be so happy you held on for as long as you did. Let’s show the world what makes us unique, lets show the world that you matter too. Let’s refuse to let the haters dictate your life. Let’s make a difference in this world STARTING NOW

Answers

Answer:

ok lil sharty

Explanation:

girl anyways follow kdlorr on ig

2) To move the camera toward or away from an object is called:
A) Arc
B) Dolly
C) Pan
D) Tilt

Answers

It is C pan because you can move it towards or away an object

What part of an experiment contains the data tables and graphs?


Analysis
Conclusion
Hyphothesis
Materials

Answers

The results section is a crucial component of any experiment as it provides evidence to support or reject the hypothesis being tested

The part of an experiment that contains the data tables and graphs is the results section. This section is where the researcher presents the findings of their study in a clear and organized manner.

The data tables provide a summary of the numerical data collected during the experiment, while the graphs visually represent the trends and patterns observed in the data.

It is important for the results section to be well-organized and easy to understand so that readers can easily interpret the data presented. This section should also include any statistical analysis that was performed on the data, such as t-tests or ANOVA, to support the conclusions drawn from the results.

Overall, the results section is a crucial component of any experiment as it provides evidence to support or reject the hypothesis being tested. By presenting the data in a clear and concise manner, researchers can effectively communicate their findings to others in the scientific community.

To Learn More About component

https://brainly.com/question/28498043

SPJ11

in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running.

Answers

In most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running is a true statement.

What is Label Control?

A label is known to be a form of a graphical control tool that is often used to show text on a form.

It is known to be used a lot in a static control. It is on that do not have no interactivity. A label is one that is often seen as a tool that is used to know a close by text box or other kinds of widget.

Windows Forms Label controls are said to be tools or elements that are often used to show text or images that is one a person is unable to edit.

Note that they are said to be tool that are often used to know objects on a form so as to give a description of what a certain control will  act as.

Therefore, in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running is a true statement.

Learn more about label controls from

https://brainly.com/question/14327891

#SPJ1

in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running.True/false

What are limitations of AI

Answers

Explanation:

Limitations of artificial intelligence. One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale.

Answer:

Risks and limitations of artificial intelligence in business

Businesses are increasingly looking for ways to put artificial intelligence (AI) technologies to work to improve their productivity, profitability and business results.

However, while there are many business benefits of artificial intelligence, there are also certain barriers and disadvantages to keep in mind.

Limitations of artificial intelligence

One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale. To overcome this, you should have a clear strategy from the outset for sourcing the data that your AI will require.

Another key roadblock to AI adoption is the skills shortage and the availability of technical staff with the experience and training necessary to effectively deploy and operate AI solutions. Research suggests experienced data scientists are in short supply as are other specialised data professionals skilled in machine learning, training good models, etc.

Cost is another key consideration with procuring AI technologies. Businesses that lack in-house skills or are unfamiliar with AI often have to outsource, which is where challenges of cost and maintenance come in. Due to their complex nature, smart technologies can be expensive and you can incur further costs for repair and ongoing maintenance. The computational cost for training data models etc can also be an additional expense.

Software programs need regular upgrading to adapt to the changing business environment and, in case of breakdown, present a risk of losing code or important data. Restoring this is often time-consuming and costly. However, this risk is no greater with AI than with other software development. Provided that the system is designed well and that those procuring AI understand their requirements and options, these risks can be mitigated.

See also Industry 4.0 challenges and risks.

Other AI limitations relate to:

implementation times, which may be lengthy depending on what you are trying to implement

integration challenges and lack of understanding of the state-of-the-art systems

usability and interoperability with other systems and platforms

If you're deciding whether to take on AI-driven technology, you should also consider:

customer privacy

potential lack of transparency

technological complexity

If you're considering writing a tender document to procure AI, you can seek help from the Northern Ireland Artificial Intelligence Collaborative Network(link is external).

AI and ethical concerns

With the rapid development of AI, a number of ethical issues have cropped up. These include:

the potential of automation technology to give rise to job losses

the need to redeploy or retrain employees to keep them in jobs

fair distribution of wealth created by machines

the effect of machine interaction on human behaviour and attention

the need to address algorithmic bias originating from human bias in the data

the security of AI systems (eg autonomous weapons) that can potentially cause damage

the need to mitigate against unintended consequences, as smart machines are thought to learn and develop independently

While you can't ignore these risks, it is worth keeping in mind that advances in AI can - for the most part - create better business and better lives for everyone. If implemented responsibly, artificial intelligence has immense and beneficial potential.

Other Questions
What is 66+12+32=??? QUESTION 1 1.1 Simplify the following expressions: 1.1.1 (2-)(3-) 1 11273 +P+1-P-2P-3 1.2 Selve the following equations: 1.2.1 2x-8x=0 1.2.2 (x-3)(x+2) = 14 123 +3 2 P+1 pl-2P-15 (2) (5) (5) Find , , and if and terminates in quadrant . how do you know which magnitude is higher or how do you compare them? What volume will 3.50 mol of ammonia gas occupy at conditions of standard temperature pressure?A 5.41LB 10.5 LC 78.4LD 7,940L tickets to a play cost $ll each. there is also a service charge of $4 per order. write an equation for the relationship that gives the total cost y in dollars for an order of x tickets Find the standard devotation of this sample of monthly salaries -4+6p+18+3p=9(p+1)+5 What is the answer? What causes toothache without decay? read this sentence like a giant broom, the current swept her across the ocean and dumped her on a beach in the netherlands. paragraph 2 how does the world choice in this sentence affect the tone of the passage? A.it indicates the painful nature of Johnny's injures. B.it emphasizes the dramatic nature of Johnny's journey C.it indicates the chaotic state of johnny's original habitat D.it emphasizes the overwhenlming aspect of jonny's return home. List 4 types of molecules important for cell processes. FILL IN THE BLANK. Overall, available research suggests jurors exposed to pretrial publicity are ________________ to favor the ________________. A client with Parkinson disease presents with bradykinesia and an altered gait. These symptoms arise in response to the progressive deterioration of which structure in the brain g(x) = 182 What is the domain of g? AgCl is found to have 78.1% ionic character, and its gas phase dipole moment is 11.5 D. What is the distance between the Ag and Cl atoms in gaseous AgCl?please explain how as well Is this grammatically correct?"Impulsive woman" An infinitive is a blank before it is blank look at image......... 30 POINTSS How do you think the splitting of the empire into two parts helped it survive for another 200 years? Think about: the differences between the eastern and western halves of the empire, the advantages of a smaller empire. hiis it right?"I think there is a small mistake in the quotation(second not first)"