constructors cannot be overloaded which means a class can only have one constructor. question 57 options: true false

Answers

Answer 1

It is erroneous to say that a class can only have one constructor because constructors cannot be overloaded.

Can constructors be overloaded or not?

Constructor overloading is an option, similar to function overloading. Overloaded constructors have the same class name but varied in the number of parameters they accept. The corresponding constructor is invoked based on the quantity and type of arguments given.

What are an example and a constructor?

A specific form of member function known as a constructor is called immediately upon the creation of an object. In C++, a constructor is the same name as the class and lacks a return type. For instance, the class Wall's public constructor Wall() contains the following code:

To know more about constructors visit:

https://brainly.com/question/29999428

#SPJ4


Related Questions

which statement is true when using the allow command and deny command attributes when creating user permission?

Answers

The true statement is: If you allow and deny the same commands, the allow command permissions take precedence over the deny command permissions.

What is user permissions?

User permissions, also known as privileges, are special rights granted to user accounts on a computer system or network. These grants specify what activities the user is authorized to execute on the system; for example, gaining access to files, opening applications, and altering system parameters.

In most computing systems, access control measures are applied to administer user permissions. This process involves allotting each account with specific permission levels according to their roles, responsibilities, or security privilege heights.

Read more on user permissions here: https://brainly.com/question/30245801

#SPJ4

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

What are the benefits of writing functions that use parameters and return? Try to list at least two.

Answers

Answer:

Explanation:

Writing functions that use parameters and return helps improve code readability and manages complexity by reusing code.

By repeating code and creating methods that utilize arguments and return, you may increase readability of code and control complexity. Instead of creating two distinct functions, parameters may be used to mix the two.

Parameters and results of the tests enable us to build code that is more readable and adaptable to a wider range of contexts. However, we'll need to practice reading, developing, and troubleshooting code like this because it operates a little more than the programmed we're used to.

Learn more:

https://brainly.com/question/15260986?referrer=searchResults

4. Use the information under the Nutrients That the Human Body Needs title to create a multilevel list. Your list should meet these requirements.
a. The first level should be the name of the nutrient.
b. The second level should contain the subheadings “Uses” and “Sources.”
c. The third level should contain the specific information about the second level.











Nutrients That the Human Body Needs
Protein
 Uses
 Helps in the growth and development of the body
 Helps in the repair of cells and tissues
 Sources
 Nuts
 Beans
 Eggs
Carbohydrates
 Uses
 Provides energy for the body
 Helps prevent diseases
 Sources
 Milk products
 Fruit
 Milk
Fats
 Uses
 Provides energy for the body
 Helps maintain body temperature
 Sources
 Vegetable oils
 Soybeans
 Salmon

Answers

Answer: liquidnumber 1

food number 2

Explanation:sleep 3

Answer:

Eggs

Explanation: It is a milk product and provides energy for the body.

A third party asked a user to share a public key for secure communication. Which of the following file formats should the user choose to share the key?
A. .pfx
B. .csr
C. .pvk
D. .cer

Answers

The correct option is (B). The user should choose to share the public key in the .cer file format.

A public key is a cryptography method used in computer communication. It involves the exchange of private and public key files for the establishment of secure communication. A third party asked a user to share a public key for secure communication. In this case, the user should choose to share the public key in the .cer file format.A .cer file format is a public key file that is typically used to store and share digital certificates. These certificates often include information about the identity of the certificate owner and the public key that is used to verify digital signatures. Therefore, the .cer file format is ideal for sharing public keys for secure communication.

To learn more about public key please visit:

https://brainly.com/question/13954786

#SPJ11

in reference to operating systems, what is spooling? what does it stand for? chegg

Answers

Answer:

Spooling is a process in which data is temporarily held to be used and executed by a device, program or the system. Data is sent to and stored in memory or other volatile storage until the program or computer requests it for execution. "Spool" is technically an acronym for simultaneous peripheral operations online.

If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80

Answers

Answer: You said 40 Hours. So $40

So, Isn't it $48, Because How Do You Get 80?

Answer:

$80.

Explanation:

Just go with it.

Part 2: East Pacific Ocean Profile Uncheck all of the boxes. Check the box next to the East Pacific Ocean Profile Line under the heading Profile lines. Then, double-click on the text for the East Pacifec Ocean Profile Line. This line goes from the Pacific Ocean to South America. Under the Edit menu and select 'Show Elevation Profile. Last, check the box next to Terrain in the preloaded Layers section. Position the mouse along the profile and the specific depth/elevation information is displayed. Use the mouse to pinpoint the location of sea-level near the South American coast. Question 5 Which is the MOST prominent feature in this profile? midiocean ridge deep ocran trench Question 6 Using the coloced lines displayed by the Present Plate Boundaries layer, what tyde of plate boundaries borders South Arverica? Gverent conversent transfonl Using figure 9.16 from your textbook, what three plates interact with this profile? North American Plate South American Plate African Plate Eurasian Plate Australian Plate Pacific Plate Cocos Plate Caribbean Plate Nazca Plate Filipino Plate: Scotia Plate Question B Tum on the USGS Earthquikes tyer - to view the data, be sure to be roomed in to an Eye At of 4000 kim or less. Describe the depth of eartheaskes that occur in the vicinity of the two plate boundaries are the earthuakes deep (300−800 km, intermedate (70−300kini and / or athallow (0-70 km)? ichoose all that apply'd dee(300−000in) intermedute 50.790 km that 10 io-rokes

Answers

The most prominent feature in the East Pacific Ocean Profile is the Mid-ocean ridge.Question 6The type of plate boundaries that borders South America are Transform plate boundaries.

The three plates that interact with the East Pacific Ocean Profile are the North American Plate, Pacific Plate, and South American Plate.

Question BThe depth of earthquakes that occur in the vicinity of the two plate boundaries are:Intermediate (70-300 km)Shallow (0-70 km)Therefore, the depth of earthquakes that occurs in the vicinity of the two plate boundaries are intermediate and shallow.

To know more about East Pacific Ocean visit:

brainly.com/question/33795142

#SPJ11

__________ is the means of communication used to reach large numbers of people (examples include newspapers, radio, television, and the internet).

Answers

The means of communication used to reach large numbers of people is called mass media. Mass media includes various channels such as newspapers, radio, television, and the internet. These channels are utilized to transmit information, news, entertainment, and advertisements to a wide audience.

Newspapers have been a traditional form of mass media, providing written news and information to communities. They are typically published daily or weekly and contain a variety of sections covering topics such as politics, sports, business, and lifestyle.

Radio is another form of mass media that uses sound waves to transmit information and entertainment. It allows people to listen to news, music, talk shows, and other audio content. Radio broadcasts are accessible to a large audience and can cover a wide range of topics.

Television is a popular mass media channel that combines audio and visual elements to convey information. It broadcasts news programs, shows, movies, and documentaries. Television provides a more immersive and engaging experience compared to other media forms.

The internet is a relatively new and rapidly growing mass media platform. It enables the dissemination of information, news, and entertainment through websites, social media, blogs, and online videos. The internet allows for immediate access to a vast amount of content and has revolutionized the way we communicate and consume information.

Overall, mass media plays a crucial role in communication by reaching large numbers of people through various channels. It provides a platform for sharing information, shaping public opinion, and promoting cultural exchange.

To know more about ,  communication   visit:

https://brainly.com/question/28153246

#SPJ11

Marisol wants a data structure that is as flexible and controllable as possible. Which of these would be most appropriate?

A. primitive
B. Built-in
C. User-defined
D. String

Answers

Answer:

B. Built-in

Explanation:

You can modify built-in data structures like adding elements to an array and removing elements.

However, creating a data structure is more time-consuming such as manually sorting a list instead of using the built-in sort function.

what are the steps for using a gradient descent algorithm? calculate error between the actual value and the predicted value reiterate until you find the best weights of network pass an input through the network and get values from output layer initialize random weight and bias go to each neurons which contributes to the error and change its respective values to reduce the error

Answers

The steps that you can follow for using a gradient descent algorithm, are:

Choose a starting point (initialization). Calculate the gradient at this point. Create a scaled step in the opposite direction to the gradient (objective: minimize). Rerun points 2 and 3 until one of the criteria is met.

There are three kinds of gradient descent learning algorithms: batch gradient descent, stochastic gradient descent, and mini-batch gradient descent. Gradient Descent can be described as an optimization algorithm for finding a local minimum of a differentiable function. Gradient descent in machine learning can be used to find the values of a function's parameters (coefficients) that minimize a cost function as far as possible.

Learn more about a gradient descent algorithm at https://brainly.com/question/28234921

#SPJ4

Please pleas please help!!
What is an Error caused by trying to open a file that cannot be found.

exception

syntax error

logical error

Answers

Answer:

#404

Explanation:

logical

Well It's logical error

what type of balance will match a large image or element on one side with a smaller element on the other side of the page? group of answer choices

Answers

When a design is symmetrical, the elements used on one side are the same as those used on the other; The sides are different in asymmetrical balance, but they still look balanced.

What is balance?

When a design is symmetrical, the elements used on one side are the same as those used on the other; The sides are different in asymmetrical balance, but they still look balanced. The elements in radial balance may be similar and arranged around a central point.

When a person has multiple images on a design, but the image is still perceived as balanced, this type of balance is known to occur.

When the image's two halves aren't seen as the same, this is known to happen.

When a design has two sides that are different from one another and places visual weight in different places, it has asymmetrical balance. However, the design still feels balanced. It conjures up images of movement and modernism.

To learn more about Asymmetrical balance visit :

https://brainly.com/question/27961150

#SPJ4

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

Answers

Answer:

public key infrastructure

Explanation:

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet. PKI is built into all web browsers used today, and it helps secure public internet traffic. Organizations can use it to secure the communications they send back and forth internally and also to make sure connected devices can connect securely.

The most important concept associated with PKI is the cryptographic keys that are part of the encryption process and serve to authenticate different people or devices attempting to communicate with the network.

recording the voltage level of an audio signal at regular intervals is called what?

Answers

Recording the voltage level of an audio signal at regular intervals is called "sampling."Sampling is a fundamental concept in digital audio processing and refers to the process of capturing discrete points or samples of an analog audio waveform at specific time intervals.

These samples represent the amplitude or voltage level of the audio signal at those particular points in time. The collection of these samples can then be used to reconstruct the original analog audio waveform digitally, allowing for various forms of audio processing, storage, and transmission. The rate at which these samples are taken is known as the "sampling rate" and is typically measured in Hertz (Hz).

learn more about "sampling" here:

https://brainly.com/question/31523301

#SPJ11

you want to use a tool to scan a system for vulnerabilities, including open ports, running services, and missing patches. which tool should you use?

Answers

A system can be searched for port vulnerabilities using a port scanner. One such piece of software is the RADMIN port scanner.

Is Nmap able to identify open ports?

Because packet filtering prevents its probes from reaching the port, Nmap is unable to determine whether the port is open. A dedicated firewall device, router rules, or host-based firewall software could be used for the filtering. Since these ports provide so little information, they frustrate attackers.

What software do you use to check for services and open ports?

For developers, network engineers, and system administrators, NMap is the most widely used port scanner. Additionally, Angry IP Scanner is a well-liked tool for internet and local network scanning.

To learn more about port scanner here

https://brainly.com/question/10097616

#SPJ1

What is missing in this list of information needed to cite a book?
Author, title, date, publisher
A. page numbers
B. author’s name
C. city and state where it was published
D. author’s sources

Answers

Answer:

C. City and state where it was published

Explanation:

#CarryOnLearning

\({hope it helps}}\)

The one that is missing in the list of information given is author’s sources. The correct option is D.

What is citation?

A "citation" is the way you tell the readers that some of the information in your work came from another source.

It also provides your readers with the information they need to locate that source on the reference or Works Cited page. A citation must be enclosed by parentheses.

It properly credits the authors of the phrases or concepts that you used in your paper. It enables those reading your work to find your sources and learn more about the ideas you present in your paper.

In the given list to cite a book, i.e. Author, title, date, publisher, the one that is missing and should be incorporated is author's source.

Thus, the correct option is D.

For more details regarding citation, visit:

https://brainly.com/question/1272936

#SPJ2

Please help with this code!

Please help with this code!

Answers

import random

months = ["jan", "feb", "mar", "apr", "may", "june", "july", "aug", "sept", "oct", "nov", "dec"]

pick1 = random.choice(months)

pick2 = random.choice(months)

if months.index(pick1) < months.index(pick2):

   print(pick1)

   print(pick2)

else:

   print(pick2)

   print(pick1)

Since the months are already in chronological order in the list, we can compare their index and print the string with the smaller index first. I wrote my code in python 3.8. I hope this helps.

PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel

Answers

Answer:

The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????

Explanation:

perform the tasks in the activity instructions and then answer the question. which set of configuration commands issued on sw1 will successfully complete the etherchannel link between sw1 and sw2

Answers

To access the console of the switch, the console cable is connected to the switch port console and the other end to the serial port of the computer.

Step 1: Access the console of the switch and configure the hostname

Step 2: Configure the interfaces and ports

Step 3: Configure the channel group

Performing the above tasks will establish the ether channel link between sw1 and sw2. Below is a detailed explanation of each of the steps.

Step 1: Access the console of the switch and configure the hostname

Next, the configuration mode is entered and the hostname is configured using the following commands: Switch> enable Switch# configure terminal Switch(config)# hostname sw1

To configure the interfaces and ports, the interfaces to be used for the ether channel are identified and the interface mode is configured. Below are the commands: Switch(config)# interface range fast ethernet 0/1 - 2 Switch(config-if-range)# switchport mode trunk Switch(config-if-range)# channel-group 1 mode active.

To know more about visit:

https://brainly.com/question/28702732

#SPJ11

tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. she copies the files she has been working on (which contain phi) to a flash drive and drops the flash drive in her purse for later use. when tamara gets home, the flash drive is missing. is this a security breach?

Answers

On the way home from work, Tamara who works as an analyst decides she needs to do some advanced work at home tonight. The files that he had copied and worked on at the office were stored on the flash drive, but when he got home the flash drive was gone. The incident that Tamara experienced was not a security breach.

What is security breach?

A security breach is any incident or occurrence that results in unauthorized access to data on a computer, on an application, on a network, or on a device. This will result in information being accessed without involving authorization. This leads to unauthorized access to information.

Learn more about serious security breach occurred in your organization here https://brainly.com/question/23077661

#SPJ4

A student wants to share information about animals with a class. There are graphs, pictures, and descriptions. The student wants to be able to add the sounds the animals make.
Which type of software would this student find most helpful for showing this to the class?

presentation software



spreadsheet software

video-processing software


word-processing software

Answers

The student would benefit most from using presentation software because it enables the integration of different multimedia elements including graphs, photos, and sounds while presenting knowledge about animals.

Which multimedia presentation software is used?

Microsoft PowerPoint allows you to create simple multimedia presentations, but there are other, more advanced applications like Visme that may help you make presentations that are much better.

What benefits may learning multimedia provide? ways to incorporate it into a PowerPoint presentation to increase its effectiveness?

To illustrate your point, you can combine music, video, and graphics. Every slide in PowerPoint is an empty canvas. It merely needs your content to support your talking points.

To know more about software visit:-

https://brainly.com/question/985406

#SPJ1

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Please answer my question y'all!

Please answer my question y'all!

Answers

Answer:

Explanation:1000 mp3s

Answer: It would be 50 MP3s

Explanation: 1000MB equals 1GB. 50 X 20 = 1000.

should i use monster insightsto connect tag manager to wordpress site or just copy and paste code?

Answers

Use MonsterInsights to set up advanced GTM tracking. The most effective substitute for GTM is MonsterInsights. You don't need to spend hours studying the GTM interface.

With the help of simple code snippets added to a website or app,  GTM, a free tag management platform, allows marketers to deploy and track marketing data. Without the involvement of webmasters, it enables marketers to track conversions, website analytics, remarketing, and more.

The purpose of GTM was not to displace  Analytics. Instead, they complement one another to provide marketers with a simple, adaptable method for tracking different analytics. Users can use GTM to place tracking code on certain web pages, and  Analytics makes use of that code to track various metrics, including conversions. The ability to add, amend, or remove measurement tags without any hard coding made GTM a game-changing tool for marketing professionals.

Learn more about GTM here:

https://brainly.com/question/14806053

#SPJ4

which of the following is not an essential component of game theory? A.strategies B. payoffs C.players
D. money

Answers

Money is not an essential component of game theory because it is not required to model and analyze decision-making in various situations. Option D is correct.

Game theory is a mathematical framework used to model and analyze decision-making in situations where multiple players are involved, and their actions affect each other's outcomes.

However, in some specific applications of game theory, such as in economics, money can be used as a payoff or incentive to motivate players to take certain actions. But in general, game theory can be applied to any situation involving decision-making among multiple players, regardless of the presence of money or any other form of reward.

Therefore, option D is correct.

Learn more about game theory https://brainly.com/question/30999858

#SPJ11

Please solve in 5 mins very fast​

Please solve in 5 mins very fast

Answers

Answer:

a. virtual reality

b. Master Boot Records

c. Primary function of a router

d. zoom

Explanation:

The first one is gonna be B and the second is gonna be C

true or false: change context allows you to change your login department without requiring you to log out first

Answers

Changing context typically refers to switching between different contexts or environments within a software application or system. It does not specifically relate to changing login departments.The statement is false.

A software application, commonly referred to as an "app," is a program or set of programs designed to perform specific tasks or functions on a computer or mobile device. These applications can range from simple programs that perform basic functions to complex applications that offer advanced features and capabilities.

Desktop Applications: These applications are designed to run on personal computers or laptops. They provide a wide range of functionalities, such as word processing, spreadsheet management, graphic design, video editing, and more. Examples include Microsoft Office Suite (Word, Excel, PowerPoint), Adobe Photoshop, and VLC Media Player.

Therefore, The statement is false.

Learn more about Desktop Applications on:

https://brainly.com/question/31783966

#SPJ1

Display the full names and MONTHLY salaries of all employees, listing them in order of decreasing salary (i.e., the highest paid person goes first and so on down the line). (Hint: See pages 156-161 of the (SV) New Perspectives on Microsoft Access lab manual.) Do not worry if your display for the monthly salary column is not very nice, with lots of decimal places. But if you want to clean this up, right click in this column in Design View and then choose "Properties." You will get a "Property Sheet" pane on the right side of your screen. Select "Currency" as the "Format" and 0 for "Decimal Places."

Answers

To display the full names and MONTHLY salaries of all employees in order of decreasing salary, you will need to create a query in Microsoft Access.

Follow the steps in pages 156-161 of the (SV) New Perspectives on Microsoft Access lab manual to create the query.
Once you have created the query, you can right click on the monthly salary column in Design View and select "Properties" from the dropdown menu. In the "Property Sheet" pane on the right side of your screen, select "Currency" as the "Format" and 0 for "Decimal Places" to clean up the display.
The resulting query will list the full names and MONTHLY salaries of all employees in order of decreasing salary, with the highest paid person listed first and so on down the line.

If you want to format the monthly salary column with currency and no decimal places:
1. Switch to Design View.
2. Right-click on the monthly salary column and choose "Properties."
3. In the "Property Sheet" pane on the right side of the screen, select "Currency" as the "Format" and 0 for "Decimal Places."

This will display the full names and monthly salaries of all employees in order of decreasing salary.

To know more about  Microsoft Access, click here:

https://brainly.com/question/17154296

#SPJ11

Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector

Answers

Answer:

Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:

1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.

2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.

3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.

4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.

Answer:

hola

Explanation:

Other Questions
Among the needs that drive man to philosophize ,which is most relevant to you? Congress enacted a statute prohibiting discrimination in the rental of residential property anywhere in the United States on the basis of sexual orientation or preference by any person or entity, public or private.What provision of the Constitution is the strongest basis for Congress's authority to enact this statute? Edro, Lena, Harriet, and Yermin each plot a point to approximate StartRoot 0. 50 EndRoot. Pedro A number line going from 0 to 0. 9 in increments of 0. 1. A point is between 0. 2 and 0. 3. Lena A number line going from 0 to 0. 9 in increments of 0. 1. A point is between 0. 4 and 0. 5. Harriet A number line going from 0 to 0. 9 in increments of 0. 1. A point is at 0. 5. Yermin A number line going from 0 to 0. 9 in increments of 0. 1. A point is just to the right of 0. 7. Whose point is the best approximation of StartRoot 0. 50 EndRoot?PedroLenaHarrietYermin what kind of information do glacial striations reveal about past glaciers? describe how another politicla institution can influence the adv ancement of the federal legislation in the scenario what is the difference between a risk register with aggregationand a risk register without aggregation Cells are the basic unit of life true or false What was the major ideas of Abraham Lincoln ? A principal of $3000 wasinvested in a savings accountfor 3 years. If the interestearned for the period was$450, what was the interestrate?A=P+Prt What is the purpose of a binding death benefit nomination (BDBN)? Who can you make a beneficiary under a BDBN? What are the consequences and risks of having a non-binding death benefit nomination? Field hockey and ice hockey are fairly similar games. Both games require two teams to play against each other. The object of each game is to score the most points by using a hockey stick to maneuver an object into the opponents net. It is the job of a goalie to stop the object from going in. Each game, however, puts its own spin on the basic rules. For one thing, as the games names suggest, one sport is played on gravel, grass, or artificial turf, and the other sport is placed on ice. Field hockey sticks are J-shaped while ice hockey sticks are L-shaped. Additionally, field hockey is played with a small, hard ball whereas ice hockey is played with a puck, a disc-like object. The number of players also differs. In a game of ice hockey, there are twelve players, six from each team, on the ice during normal play. In a game of field hockey, there are twenty-two players, eleven from each team, on the field during normal play. 5 Which of the following structures was used to develop this paragraph? A. problem and solution B. description C. compare and contrast D. cause and effect integrateQ6.1 5 Points Sx - 3e + 21/1/1 dx Enter your answer here What is the solution of the system of equations X plus 3Y equals seven, 3X plus 2Y equals 083, to be -2, 3C2, negative3D -3, 28 -2 -3 NEED HELP!! 50 POINTS!!Tony uses an object-oriented programming language for data analysis. Tony might be using which of these languages?A. C++B. CC. FORTRAND. Pascal How much time will it take for an amount of Rs900 to yield Rs81 as interest at 4.5% per annum of simple interest which geographic features influenced the political borders and boundaries of china provides the reason for your point of view in my opinion There are 120 occupied seats and 20 empty seats 1) What is the ratio of the number of empty seats to occupied seats? on a commuter train. A) 6 B) IM e Look at image Please help me Im struggling If f(x) = 5x, what is f-1 (x)?F-1(x) = -5xF-1(x) =-1/5xF-1(x) =1/5xF-1(x) = 5x