configure an attribute selector for the submit button. place this in the second column with the grid-column property. set width to 9em

Answers

Answer 1

To configure an attribute selector for the submit button, you can use the following CSS code:

input[type="submit"] {
 grid-column: 2;
 width: 9em;
}

This will select any input element with a type attribute of "submit" and apply the specified properties to it. The grid-column property will place the button in the second column of the grid layout. The width property will set the width of the button to 9em.

It's worth noting that this code assumes you have a grid layout in place. If you don't, you'll need to add some additional CSS to define your grid before this code will work.

In summary, the attribute selector for the submit button can be configured using CSS code that selects the input element with a type attribute of "submit", and sets the grid-column property to 2 and the width property to 9em.


Related Questions

Prompt:

Using your favorite browser, search for a definition of proprietary information and then search for how it is used in interior design. Find two sources that discuss that term. In your discussion board post, explain your position on proprietary information in interior design. Do you or do you not feel that it is important? Be sure to provide two good reasons for your position. Since there are no right or wrong answers here, make your reasons count! Also, be sure to provide the sources of your information.

Answers

Answer

safari

Explanation:

yes

Answer:

Proprietary information also known as a trade secret is information a company wishes to keep confidential. This can include recipes, processes and methods used in production. My position on proprietary information in interior design is I support it. This is because a lot of the time interior designers make custom made products or antique for which a duplicate does not exist anymore. Another reason why I support proprietary information is if the interior designer supplied the client with the clients and someone has a bad experience with the vendor, that can reflect poorly on the interior designers.

In conclusion, I support proprietary information because it discloses certain information that the client/customer does not need to know and protects the Vendors from any liability / mismatched expectations.

Nathan is working in a graphics program and he can't remember how to select an item. What should Nathan do?

Visit the application's Help files and search for the answer.

Go to the Start menu and select Instructions.

Look in the taskbar for the user’s manual.

Call the customer service number.

Answers

Answer:

The answer is option B : "Go to the Start menu and select Instructions".

I NEED HELP!!! BRAINLIEST!!!
Drag each function to its protocol name.
Classify the functions of DHCP and DNS protocols.

assigns an IP address to each host

translates domain names into IP addresses

makes it easy to create English or language names for IP addresses

eliminates manual errors in setting up IP addresses

Answers

Answer:

DHCP Dynamic Host Configuration Protocol:

Is a network service that automatically assigns IP addresses and other TCP/IP configuration information on network nodes configured as DHCP clients. Server allocates IP addresses to DHCP clients dynamically. Should be configured with at least one DHCP scope. Scope contains a range of IP addresses and a subnet mask, and can contain other options, such as a default gateway and Domain Name System. Scope also needs to specify the duration of the lease and usage of an IP affects after which the node needs to renew the lease with the SHCP server. Determines the duration, which can be set for a defined time period or for an unlimited length of time.

DNS Domain Name Service: Is a TCP/IP name resolution service that translates FQDNs into IP addresses. System of hierarchical databases that are stored on separate DNS servers on all networks that connect to the Internet. DNS servers store, maintains and update databases, they respond to DNS client name resolution requests to translate host names into IP addresses.

DNS Components

DNS database is divided logically into a heieratchical grouping of domains. Physically into files called zones. Zone files contain the actual IP-to-host name mapping for one or more domains. Zone files is stored on the DNS server that is responsible for resolving hot names for the domains contained in the zone. Each network node in that domain will have a host record within the domain's zone files. Includes the node's host name, FQDN, and assigned IP address.

DNS Servers

*If you are configuring static IP addresses, including the IP address of the default DNS servers as you configure each client.

*If you are using DHCP, use the DHCP scope options to specify the IP Explanation:

dhcp provides an ip addrrss

dns creates language names for ip addresses

dns translates domain names into ip addresses

dhcp eliminates errors

im pretty sure

cui documents must be reviewed according to which procedures?

Answers

CUI documents and materials will be formally reviewed in accordance with DODI 5230.09 and DODI 5200.48, before approved disposition authorities are applied, including destruction. Access the Course Resources for access to the regulatory guidance for destruction and records management procedures.

Define CUI documents?CUI is information created or owned by the government that requires safeguarding or dissemination controls in accordance with applicable laws, regulations, and government-wide policies.CUI Basic is a subset of CUI for which no specific handling or dissemination controls are specified in the authorizing law, regulation, or government-wide policy. CUI Basic is handled by agencies in accordance with the uniform set of controls outlined in DODI 5200.48 and the DOD CUI Registry.CUI is defined as unclassified information that must be safeguarded and disseminated in accordance with law, regulation, or Government-wide policy, as listed in the CUI Registry.CUI must be kept in secure locations that prevent or detect unauthorized access.

To learn more about CUI documents   refer to:

https://brainly.com/question/29963620

#SPJ4

a typical ipv6 address has the following format: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx. what does each x represent?

Answers

A typical IPv6 address has the following format: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx. In this format, each 'x' represents a hexadecimal digit, which can range from 0-9 and A-F. There are 8 groups of 4 hexadecimal digits, separated by colons, making up a total of 128 bits in an IPv6 address.

An IPv6 address is structured in the format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, where each 'x' represents a hexadecimal digit ranging from 0 to 9 and A to F. The address consists of 8 groups, each comprising 4 hexadecimal digits, separated by colons. In total, an IPv6 address is made up of 128 bits, providing a much larger address space compared to the 32-bit IPv4 addresses. This expanded addressing scheme allows for a virtually limitless number of unique addresses, accommodating the growing demand for connected devices and ensuring the continued growth of the internet.

Learn more about IPv6 address: https://brainly.com/question/31103106

#SPJ11

In this Cluster you help businesses sell products. What Career Cluster is this

Answers

Answer:

Marketing, Sales, and Service.

Explanation:


How do news organizations primarily create revenue?
O A Thosch public press releases
B. Through pract advertisements
C.Through bookstore sales
D. Through customer subscriptions

Answers

Answer:

through product advertisements

Explanation:

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Well-designed _______________, including detection, deterrence, delay, denial, and notification, are accomplished through the development of a plan outlining who will do what, where, when, and how

Answers

Well-designed security measures are crucial to protecting assets, people, and information from harm or unauthorized access. These measures typically include several components, such as detection, deterrence, delay, denial, and notification.

To implement effective security measures, it is important to develop a comprehensive plan that outlines the various actions to be taken and the roles and responsibilities of those involved. This plan should cover all aspects of the security measures, including the deployment of technology, the training of personnel, and the establishment of procedures and protocols.

The plan should identify potential threats and vulnerabilities and describe the specific measures that will be taken to address them. This may include installing security cameras and alarms, implementing access controls, using security personnel or guards, and establishing response plans for different types of emergencies.

Effective security plans must be regularly reviewed and updated to ensure that they remain relevant and effective in the face of changing threats and technologies. By developing a well-designed security plan and regularly reviewing and updating it, organizations can help ensure the safety and security of their people, assets, and information.

Learn more about Well-designed here:

https://brainly.com/question/14272824

#SPJ11

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Boost-Sector Viruses

Explanation:

The viruses of such types are known as boot sector viruses.

What is computer virus?

A computer virus is a form of malware that accompanies another program (such as a document) and has the ability to multiply and propagate once it has been run on a machine.

When the drive's VBR is read, an infected floppy disk or USB drive connected to a computer will transfer, modify, or replace the preexisting boot code. The virus will load and start right away as part of the master boot record the following time a user attempts to boot their desktop.

Hence, the virus that can be loaded when computer is turned on is boot sector virus.

To know more about computer virus click on,

https://brainly.com/question/29446269

#SPJ12

which of these is an aggregator?
a. a browser plug-in b. a widget
c. an RSS reader d. a utility

Answers

Answer:

Answer is C. an RSS reader

This is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase.

Select one:
Adware
Worm
Phishing
Malware

Answers

Answer:

Adware

Explanation:

Adware is software designed to display advertisements on your screen, most often within a web browser.

Hope that helps.

A software that used to track a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase is: A. Adware.

An adware is also referred to as an advertisement-supported software and it can be defined as a software application (program) that is designed and developed to automatically display advertising materials such as banners or pop-up adverts (ads) on the graphical user-interface (GUI) of a user's computer system or mobile device.

The main purpose for the development of an adware is to automatically display popup banner adverts (ads), in order to lure or convince an end user into making purchase of the advertised product or service.

In conclusion, an adware is a software that is typically used to track and gather information about a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase.

Read more on adware here: https://brainly.com/question/9692296

The mode that allows the kernel to take care of low-level tasks requiring unlimited access to the hardware is called what

Answers

Answer:

Supervisor mode is used by the kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is accessed, and communicating with devices such as disk drives and video display devices. User mode, in contrast, is used for almost everything else.

Explanation:

Which mode specifier will open a file but not let you change the file or write to it?.

Answers

'r' is  mode specifier will open a file but not let you change the file or write to it.

What is mode specifier ?

An individual word value known as a mode specifier is used to specify a screen mode. This is how it is handled: It is presumed that a number in the range of 0 to 255 is a mode number. Otherwise, it is presumed to be a Sprite Mode if the bottom bit is set. Word (describing a RISC OS 3.5 or RISC OS 5 format sprite) (describing a RISC OS 3.5 or RISC OS 5 format sprite) 2

Which technique returns the contents of the file as a string?

In Java, reading material into a specified file is done using the readString() method of the File class. Value Returned The file's content, in String format, is returned by this method.

Learn more about mode specifier

brainly.com/question/16364860

#SPJ4

Apple has positioned itself as a top-tier manufacturer within the
technology market, aiming to offer its customers high quality hardware
and software, for a considerably lower price than most of the
competition. )True or false )

Answers

Answer:

false

Explanation:

Apple over the years has used a marketing method called Value Selling which they initially for the sake and name of the brand market their newest products initially at a higher cost than what they usually just need to be such as the fact that the iPhone 11 was initially marked at $1,000 then later down the line a few months it then was marketed at $750. this marketing method targets people who just want the newest stuff as soon as it comes out rather than being patient you know five or six months and getting it at a more reasonable price.

how to create a variable that stores floating point number

Answers

To create a variable that stores a floating point number, you can use the float data type.

In many programming languages, including Python, Java, C++, and others, you can use the float data type to create a variable that stores a floating-point number. In Python, for example, you can create a float variable by assigning a number with a decimal point to a variable name, like so:

```
my_float = 3.14
```
Alternatively, you can use the float() function to convert a number or string to a float:

```
my_float = float(3)
my_float2 = float("3.14")
```
Both of these methods will create a variable that stores a floating point number.

Learn more about floating point number:https://brainly.com/question/30645321

#SPJ11

Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?

A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.

Answers

Answer:

B. Ask her friend for permission.

Explanation:

Answer: B ask her friend for permission

hope you do good on the test or quiz.. it would mean alot to be brainlEst

Can anyone please help me on these two questions it would really help xxx

Can anyone please help me on these two questions it would really help xxx

Answers

Answer: No one can interpret or hack it.

Explanation:

Because there is nothing to hack.

take it from someone who hack their teachers laptop as a dare. It was so easy.

P2. Explain the need of having both MAC Addresses and IP Addresses. What is the purpose of having two distinct identifiers?
P5. Why are acknowledgments used in Wi-Fi but not in Ethernet (wired)?

Answers

P2. The need for both MAC addresses and IP addresses arises from the layered architecture of modern computer networks, specifically the TCP/IP protocol suite.

MAC (Media Access Control) addresses are unique identifiers assigned to network interface cards (NICs) at the hardware level. They operate at the Data Link layer (Layer 2) of the OSI model and are used for communication within a local network (LAN). MAC addresses are essential for devices to communicate directly with each other over Ethernet or other similar network technologies. They provide a means to identify devices within the same physical network and are used for addressing and delivering data frames.

IP (Internet Protocol) addresses, on the other hand, are logical addresses assigned to devices at the network layer (Layer 3) of the OSI model. IP addresses are used for communication across networks, including local and wide-area networks (WANs) connected via routers. They provide a means to identify devices globally on the internet and enable routing of data packets between different networks.

The purpose of having two distinct identifiers, MAC addresses and IP addresses, is to facilitate efficient and reliable communication in computer networks. Each identifier serves a specific purpose:

1. MAC addresses are used for local network communication and provide a unique identifier for each network interface card. They allow devices within the same network to communicate directly without relying on routers or IP addressing. MAC addresses ensure the delivery of data frames to the intended recipient within the same LAN.

2. IP addresses are used for network-wide communication and enable devices to communicate across different networks. IP addresses are hierarchical and allow for efficient routing of data packets through routers to reach their destination. They provide a way to identify devices globally and enable internet connectivity.

Having both MAC addresses and IP addresses allows for the separation of local network communication (based on MAC addresses) and global network communication (based on IP addresses). This separation allows for more efficient routing, scalability, and flexibility in network design.

P5. Acknowledgments are used in Wi-Fi networks but not in Ethernet (wired) networks due to the inherent differences in their underlying technologies.

In Wi-Fi networks, which operate based on the IEEE 802.11 standard, acknowledgments (ACKs) are used to ensure reliable transmission of data packets. When a device (e.g., a wireless client) receives a data packet, it sends an acknowledgment frame back to the sender to confirm successful receipt of the packet. If the sender does not receive an acknowledgment within a certain timeframe, it assumes that the packet was lost or corrupted and retransmits it.

The need for acknowledgments in Wi-Fi networks arises from the inherent characteristics of wireless communication. Wireless signals can be affected by various factors such as interference, signal attenuation, and obstacles, which can lead to packet loss or errors. The use of acknowledgments helps to detect and recover from such issues, ensuring reliable transmission.

In contrast, Ethernet networks operate over wired connections, where the physical medium is generally more reliable and less prone to interference or signal degradation. The use of acknowledgments in Ethernet is not necessary because the wired connections provide a more stable and reliable communication channel. Ethernet networks rely on other error detection and correction mechanisms, such as CRC (Cyclic Redundancy Check), to ensure data integrity.

Therefore, while acknowledgments are an essential part of Wi-Fi communication, they are not needed in Ethernet networks due to the inherent differences in the reliability of the communication medium.

Learn more about  IP addresses:

brainly.com/question/28256854

#SPJ11

host-attached storage is . a. a special purpose storage system that is accessed remotely over a data network b. accessed via local i/o ports c. not suitable for hard disks d. not suitable for use in raid arrays

Answers

Network-attached storage was designed to improve user collaboration and data sharing. Distributed teams that require remote can benefit from it.

What is direct-attached storage?

A type of storage known as direct-attached storage (DAS) is connected to a computer directly, bypassing a network. Local I/O ports are used to access host-attached storage. These ports employ a variety of technology. Network-attached storage (NAS), often known as IDE or ATA, allows several users and a variety of client devices to access data from a centralised disc capacity. A typical Ethernet connection is used by users on a local area network (LAN) to access the shared storage. most desktop PCs employ a bus architecture. With this configuration, there can be two drivers per bus.

To learn more about LAN from given link

brainly.com/question/13247301

#SPJ4

in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​

Answers

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

power supply, keyboard, monitor, mouse,ROM,CPU are belongs to Output, Input or Storage device​

Answers

Answer:

Keyboard :Input

Monitor: Output

Mouse:Input

ROM:Storage

CPU: Processing device

how to explain if the following is a valid set of java instructions: int mygrade = (assignment1 * 10); int assignment1 = 10;

Answers

Yes, this is a valid set of Java instructions. The first line declares a variable called mygrade' and assigns it the value of the product of the two variables 'assignment1' and 10. The second line declares a variable called 'assignment1' and assigns it the value of 10.

What is Java ?

Java is a programming language and computing platform first released by Sun Microsystems in 1995. It is used to develop and run programs on a variety of hardware, including desktop computers, servers, and mobile devices. Java has become one of the most popular programming languages due to its versatility, allowing developers to write code that can be used on different platforms. Java is a class-based, object-oriented language,

which means it is composed of classes that define objects and the methods that can be used to manipulate them. It is an interpreted language, meaning that the code is compiled into bytecode and then executed by the Java Virtual Machine (JVM). Java also has features such as garbage collection and memory management, which make it easier for developers to create reliable, efficient applications. Java is used in many applications, from web applications to enterprise software to Android apps.

To learn more about Java

https://brainly.com/question/26789430

#SPJ1

12.1 Two versions of the process creation hierarchy
Project objective
Compare the performance of process creation and destruction when
implemented with and without linked lists.
Description
Version 1

Answers

Two versions of the process creation hierarchy are being compared in terms of performance, with one version implementing linked lists and the other version not.

The project aims to compare the performance of process creation and destruction with and without linked lists.

The project involves comparing two versions of the process creation hierarchy. One version, referred to as Version 1, implements linked lists, while the other version does not. The objective is to analyze and evaluate the performance of process creation and destruction in both versions.

The project likely includes implementing and testing the two versions to measure their efficiency and effectiveness in terms of process creation and destruction. This comparison will provide insights into the advantages and disadvantages of utilizing linked lists in the process creation hierarchy.

By conducting a performance comparison between the two versions of the process creation hierarchy, the project aims to assess the impact of linked lists on the efficiency of process creation and destruction. The findings will help determine the benefits and drawbacks of using linked lists in this context, providing valuable insights for further improvements and optimizations in process management.

To know more about Process Creation Hierarchy visit-

brainly.com/question/31831579

#SPJ11

Describe three computer system problems that could harm people and propose ways to avoid the problems

Answers

Three computer system problems that could harm people are data breaches, system failures, and software bugs.

To avoid data breaches, organizations should implement strong cybersecurity measures such as encryption and access controls. System failures can be mitigated by implementing redundant systems and disaster recovery plans. Software bugs can be minimized through thorough testing and code reviews. Regular maintenance, monitoring, and user education are essential to prevent and address these issues proactively. By prioritizing security, reliability, and best practices, the potential harm to people can be significantly reduced, ensuring the safety and well-being of individuals who interact with computer systems.

learn more about computer system problems  here:

https://brainly.com/question/24094064

#SPJ11

A networking instructor is demonstrating the use of a device that, when making a connection to the Internet, issues a series of alternating tones, and is used to translate the digital signals from computers to analog signals used on traditional telephone lines. Although the name is familiar to the students, this particular device is no longer in common use. What is the instructor demonstrating

Answers

The networking instructor is demonstrating a modem, a device that converts digital signals from computers into analog signals used on traditional telephone lines for connecting to the Internet. While the name is familiar to the students, modems are no longer commonly used due to advancements in technology.

The instructor is demonstrating a modem. In the early days of the Internet, modems played a crucial role in connecting computers to the Internet through telephone lines. A modem is short for "modulator-demodulator," and it translates digital signals from computers into analog signals that can be transmitted over telephone lines. The series of alternating tones generated by the modem is known as "dial-up" or "handshake" tones. These tones were used to establish a connection with the Internet Service Provider (ISP) by dialing a phone number and negotiating the connection parameters.

However, with the advent of broadband technologies such as DSL, cable, and fiber optics, the use of modems has significantly declined. These technologies provide faster and more reliable Internet connections without the need for analog signal conversion. While modems are no longer commonly used, they played a crucial role in the early days of Internet connectivity, and their demonstration serves as a historical reference to showcase the evolution of networking technologies.

Learn more about Internet here: https://brainly.com/question/28342757

#SPJ11

Which code is easier to learn, Python or C++. And which one is better than the other in your opinion

Answers

Okay so I’m terms of easiest to learn it depends on the person for me it is Python and python is better because it can be used for lots of purposes

Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)


Answers

Answer:

I think it's (login security)

why is prioritization a critical task for disaster recovery? a.integrity of the data will need to be checked before access is re-enabled. b.services may have dependencies that make restoring them in the wrong order futile. c.system demand will need to be monitored after rebuilding to verify stability. d.network cabling should be designed to allow for multiple paths between the various servers.

Answers

Prioritization is a critical task for disaster recovery because it ensures the integrity of the data, helps identify and restore services based on their dependencies, and allows for system stability monitoring.

a. Prioritizing tasks in disaster recovery ensures that the integrity of the data is checked before access is re-enabled. This is important to prevent further issues and data corruption.

b. Services may have dependencies that make restoring them in the wrong order futile. Prioritization helps to identify these dependencies and restore services in the correct order to minimize downtime and ensure a smooth recovery process.

c. System demand will need to be monitored after rebuilding to verify stability. By prioritizing tasks in disaster recovery, you can allocate resources efficiently and ensure that the system is stable after restoration.

d. Although network cabling is not directly related to prioritization, designing it to allow for multiple paths between servers can improve the overall disaster recovery process.

You can learn more about disaster recovery at: brainly.com/question/29479562

#SPJ11

Explain how there can be different pathways in one career cluster. Use two examples from the text.

Answers

Answer:

...

Explanation:

Career Clusters identify the knowledge and skill learners need as they fellow a pathway toward their career goals. Pathways are grouped by the knowledge and skills required for the occupations in these career fields.

Other Questions
write a letter to your younger brother who has gained admission to the shs the need for him to study hard in which type of reflection an image is formed? Vocabulario y Gramatica un uso? 9. find the second decile of the following data set 24, 64, 25, 40, 45, 34, 14, 26, 28, 24, 58, 51 d2 Suppose the company uses a Q system with a lot size of 200 and carries 500 units in safety stock. What are the annual ordering costs using this policy at the age of 16, walt dropped out of high school to do what? an ant walks along a straight path. After traveling for 1 meter it stops, turns through an angle of 90 degrees in an anticlockwise direction and sets off in a straight line covering a distance of half a meter. Again, the ant turns through an angle of 90 degrees in an anticlockwise direction and sets off in a straight line covering a quarter of a meter. The ant continues in this manner indefinitely. a) How many turns will the ant have made after covering a distance of 63/32 meters? b)How far will the ant "eventually" travel? Which number line shows point A at 3, point B at 1.5, point C at 1 and 1 over 2, and point D, which is the opposite of point A? A number line from negative 5 to 0 to positive 5 is shown. There are increments of 1 over 2, and only the whole numbers are labeled on either side of 0. A point A is shown on 6 places to the right of 0, A point B is shown on 3 places to the left of 0, and a point C is shown on 3 places to the right of 0. D is shown 6 places to the left of 0. A number line from negative 5 to 0 to positive 5 is shown. There are increments of 1 over 2, and only the whole numbers are labeled on either side of 0. A point A is shown on 6 places to the left of 0, A point B is shown on 3 places to the left of 0, and a point C is shown on 3 places to the right of 0. D is shown 6 places to the right of 0. A number line from negative 5 to 0 to positive 5 is shown. There are increments of 1 over 2, and only the whole numbers are labeled on either side of 0. A point A is shown on 6 places to the right of 0, A point B is shown on 3 places to the right of 0, and a point C is shown on 3 places to the left of 0. D is shown 6 places to the left of 0. A number line from negative 5 to 0 to positive 5 is shown. There are increments of 1 over 2, and only the whole numbers are labeled on either side of 0. A point A is shown on 6 places to the left of 0, A point B is shown on 3 places to the right of 0, and a point C is shown on 3 places to the left of 0. D is shown 6 places to the right of 0. Full moon Its a common belief that people behave strangely when theres a full moon and that as a result police and emergency rooms are busier than usual. Design a way you could find out whether there is any merit to this belief. Will you use an observational study or an experiment? Why? the weight of the frame, body, and engine is supported by the springs is called what? Consider the following set of equations:Equation A: y = 2x + 4Equation B: y = 3x + 1Which of the following is a step that can be used to find the solution to the set of equations? 2x + 4 = 3x + 1 2x = 3x + 4 2x + 4 = 3x 2x + 1 = 3x + 4 In a small business, 40 of the employees are men and 30 of the employees are women. What is the ratio of women to men? Please answer this plz... Find the center of a circle with the equation:x + y + 2x -20y 20 = 0 20 POINTS! SELECT ALL THAT APPLY. The Turkish invader Akbar did what? allowed Hindus to hold government postsinvaded the Ottoman Empire encouraged Mughal's to be engaged in government established his empire as the seat of Sunni Muslims lifted a tax on non-Muslims true or false? companies seek to monitor employee email usage to safeguard against malware, viruses, sensitive information, and data leakage protection (dlp). 8. About A.D. 870, the Vikings sailed westward and discovered an island west ofNorway called: What techniques can you use to present solutions to workplace problems to stakeholders? Complete the following sentence. Our BLANK develops through life based on our relationships, roles, and profession. A hair dryer uses the energy from the plug in order to power a small fan that blows air. When a hair dryer is being used, which is one of the energy transformations that takes place?.