Hey guys I have a quick question about computer science I WILL MARK BRAINLIEST (crown )

Hey Guys I Have A Quick Question About Computer Science I WILL MARK BRAINLIEST (crown )

Answers

Answer 1

Answer:

Explanation:

pixbay license=Pixabay is a vibrant community of creatives, sharing copyright free images and videos. All contents are released under the Pixabay License, which makes them safe to use without asking for permission or giving credit to the artist - even for commercial purposes.

public domain=Works in the public domain are not subject to any restrictions and may be freely used without permission for commercial and non-commercial purposes. It is important for access to knowledge and must be accessible for the benefit of creators, inventors, universities and research centres

GFDLThe GFDL is meant as a way to enlist commercial publishers in funding free documentation without surrendering any vital liberty.

my brother got the same questions so im giving you the answers i got

hope it helps you out

Answer 2
Pix ya lisins ........

Related Questions

One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You will need to communicate with one another as you coordinate this event. Pretend you have been given $650 to develop this hunt.

Research the costs of various mobile computing devices.
Write, in a report of at least 250 words, your mobile device purchase recommendations that will best suit the student communication needs of your assignment.

Upload a 250-word report about the geocache treasure hunt that includes the following:

In light of your budget, which device is the best buy for communicating with your fellow student in the coffee shop?
Which device is the best choice for communicating with your fellow student located at your school?
What trade-offs do you need to consider, such as the size of the device vs. features?

Answers

Answer:

A LG K92 5G titan Gray that also uses cricket wireless network

Explanation:

It cost 160 bucks plus tacks.

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

What are the different types of software? Give one example

Answers

microsoft, apple, acer
Application Software, System Software, Programming Software, Shareware, Open Source Software

Which device would help someone train for a marathon?

Drone
Navigation system
Smart watch
VR headset

Answers

i think a smart watch because it can help track you steps and it can tell you how many calories and fat you burn.
i hope this is correct and i hope it helps

I think Smart watches will be good as it will track your breathing, heartbeat, and steps. VR head set will not make you go so far, drones can look at the track you are running but it is not helping you run, and i don’t know about navigation systems.

Please help I need some one that knows about the article Disney Imagineer because I wasn't in school today so please help me write 2 paragraphs about it please. Help this is due at 11:59 PM

Read the article (Disney Imagineer) in class and write 2 paragraphs.​

Answers

Answer:

I don't know much but I looked up some stuff about the Article.

River of the light-

When park-goers swarm Walt Disney World's Animal Kingdom later this month, Joe Rohde will be paying close attention.

The executive designer and vice president of Walt Disney Imagineering Creative has spent the last eight years overseeing the expansion of Disney's Animal Kingdom park, including its soon-to-be unveiled evening spectacle, "Rivers of Light." Rohde, a Disney veteran who said he started “at the bottom of the design ladder” in 1980, has also been leading the charge on Disney's "Avatar"-themed land, based on James Cameron's 2009 top-grossing film, which is slated to debut in 2017. The first of four planned sequels to Cameron's movie based on the fantastical world of Pandora will hit theaters a year later.

Rohde has overseen the development of Disney's "Avatar"-inspired land, seen in this illustration, which is scheduled to open at Animal Kingdom in 2017.-

Rohde likened the process of developing and constructing a major attraction to filming a major blockbuster film. The whole investment -- from "the morning of conceptualization to opening day" can take anywhere from four to five years, Rohde told ABC News. And in the case of Animal Kingdom, incorporating live animals can lead to other challenges.

"The inclusion of live animals changes design standards ... but it brings realism to design," he said in a phone interview. "Nature is a supreme, immutable value."

The millions of visitors who travel to Disney’s theme parks around the world -- more than 134 million in 2014, according to the Themed Entertainment Association (TEA), an industry trade group -- are not privy to the trials and tribulations of what it takes to bring an idea to fruition at Disney. Imagineers, as they're referred to at Disney, prefer it that way.

"We try to be invisible," Theron Skees, executive creative director for Walt Disney Imagineering, said in an interview.-

Skees started his Disney career painting artificial grottos and tunnels at Disneyland Paris' Pirates of the Caribbean attraction. Skees, who previously worked as a sculptor and set designer in film and commercials, has lived on three continents as a Disney imagineer, tasked with bringing the visions and interpretations of Disney characters and stories to life. The imagineering division, one of the most competitive and challenging practices within the Disney universe, has the sole responsibility of delivering "the magic" that visitors seek year after year. There are at least 1,500 imagineers currently in the company, according to a Disney spokesperson, with 140 disciplines within the group.

"There's the technical know-how, the creative vision, the planners and the operators," Skees said. "Imagineering is a pretty specialized group that requires a specialized mindset."-

And loners need not apply.

"You have to communicate and get an idea out there, whether that's painting, building or drawing models," Rohde added. "The ability to collaborate as a group is a must."

Skees reiterates that every imagineer is encouraged to submit ideas -- whether that’s for a new roller coaster, a live performance or costume design at one of the theme parks, hotels or Disney cruises.

“All ideas go through a process and it’s not exclusive to one person,” he noted.

Ideas can come from anywhere. Rohde immerses himself in books -- non-fiction, art history, neurology -- and vows to plow through the 35 stacked next to his bed, soon-to-be additions to his personal library of 5,000 books.

To be successful in this career “you need to find smart people to work under you and to read a lot,” he explained. Traveling the world? A necessity.

“We’re not making two-dimensional products. You need to know what places are really like,” he added.

Disney is the parent company of ABC News.

Hope you can get your work in on time.

Thank you for your answer!

Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST

Answers

send it through the mail

Answer:  Be prepared to provide the following information:

1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)

2.Name of restaurant

3.Location/address of the restaurant

4.Date of incident

5.Nature of complaint

If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.

Explanation

Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.

Answers

Answer:

1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.

Explanation:

1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.

I hope that my answer helped you. Thank you, and good luck.

The three examples of ethical or legal issues that an IT professional may encounter are:

Privacy violationsCybersecurity breachesIntellectual property violations

What are the  negative consequences of the issues with IT professional?

In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.

In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.

Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.

Learn more about IT professional from

https://brainly.com/question/6947486

#SPJ1

How do the text feature help on the text?

Answers

Answer:

Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.

Explanation:

Here is your answer
How do the text feature help on the text?

PLZ HELP DUE IN 20 MINUTES!
What is the last step when designing an algorithm?


A. Think about what could go wrong.

B. Consider changes that might happen.

C. Look at the big picture.

D. Look at what steps will be repeated.

Answers

Answer:
B - consider changes that might happen
B. Consider changes that might happen

How to implement switch statement in Python?

Answers

Answer:

Switch-case statements are a powerful tool for control in programming. In this article, Sreeram Sceenivasan goes over you can use a switch-case statement in Python.

Explanation:

Python doesn’t need a switch statement. You can do exactly the same thing with if/elif/else statements.

Make sure there is a function/method to handle the default case. Next, make a dictionary object and store each of the function beginning with the 0th index. After that, write a switch() function accepting the day of the week as an argument.

Emily wishes to work in print media. What career would she choose for this purpose?
a
architect
b
textile designer
c
photographer
d
fashion designer

Answers

Architect (A) is the answer
The answer is A (it said my answer wasn’t long enough )

Riley receives an email containing several grammatical errors with a link to sign a petition. Which of the following strategies should he use to make sure the email is trustworthy? (5 points) Evaluate source credibility. Fact check. Listen to his gut. Look for authenticity.

Answers

The Answer:

Explanation:

He should evaluate the source credibility.

Carina's computer is turning off without warning. Which of the following steps should she take to troubleshoot the problem?
A: Try several fixes at once.
B: Uninstall the anti-virus software.
C: Check the cable connections.
D: Remove devices.

Answers

C

The reason why it’s c is because maybe a cord is loose which is most likely the reason why it turning off all of a sudden (this has also happened to me in real life so trust me on this)
It is c I know because I did the test and got 100 hope this helped thank you for your time

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

what plugs into this?

Answers

Into what ????????????

Huh plugs into what ?

lol one day i forgot how to say tan and i told my sis i want to be the color teal.... lol i meant to say tan

Answers

Answer:
Funny

Explanation:

one day i woke up and realized how ugly and lonely i am

and told myself "lol my guy you really are ugly"

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω

Answers

Answer:

just get banned by spamming random stuff

Explanation:

If you need help, there are tutors in this application that can help you get verified answers!

shar is thinking about the amount of time she spends connected to technology, on her studies, and on personal preferences and relaxation. What is her best strategy for accomplishing all of these tasks?
She should focus more on technology
She should avoid all extremes and seek a balance
She should avoid personal time and focus on her studies
she should put all her emphasis on being connected to technology

Answers

Answer:    The second one :)

She should avoid all extremes and seek a balance

Explanation:

The other options only cover 1 or a few of the answers.

The best strategy for Shar would be to avoid all extremes and seek a balance.

What is technology?

Technology refers to the tools, systems, and methods used to create, process, and store information.

It encompasses a wide range of devices and systems, including computers, smartphones, tablets, software applications, social media platforms, and more.

The best strategy for Shar would be to avoid all extremes and seek a balance.

It's important to recognize that technology is a valuable tool, but it's also important to ensure that it doesn't consume all of your time and energy.

Shar should allocate time for her studies and personal preferences and relaxation while also using technology as a means to support those activities.

Thus, this will help her maintain a healthy balance between her academic and personal life while utilizing technology as a useful tool.

For more details regarding technology, visit:

https://brainly.com/question/9171028

#SPJ2

Your friend Tegan is designing a game that involves cats taking over the world. She wants to use obstacles that are difficult at first, and then use simpler obstacles as the game progresses. Would you try to change her approach? Why or why not?

(game design)

Answers

Answer:

I would put levels ranging for level 1 to 50, and start off simple and easy but the game becomes hard during the player plays.

Explanation:

You would start of simple for users to understand what is going on then gets harder as the game progresses

how do you disable goguardian on a school chromebook?

Answers

I don’t think you can but you can ask someone if something you need is blocked

Answer:

Navigate to Filtering > Configuration > Advanced Config > Scheduling.

Disable the Enable Out of School Mode toggle.

Explanation:

Or just factory reset, but that will get rid of everything.

Impact of A.I in solving global issues?

Answers

The impact of A.I in solving global issues advances society and technological advancements. As humans use technology more and more job become obsolete and we move towards a smarty society
This allows a.I tho help humans in situations were it’s most important

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

What are the pros and cons of doing research for homework projects online over using offline resources like libraries?

Answers

Here is my answer






Pros: like you’re phone it could be portable and easy to use unlike a library you can’t take a while library with you like in your pocket



Con: the stuff you could be trying to find out could be wrong or there is millions of answers that are not all the same
Distractions are everywhere online although it’s quick and easy, but offline sources encourage reading and a variety of answers

Place the following events in sequence: A) Feynman challenges people to build "nano-things;" B) The first nano-motor is built; C) The structure of DNA is discovered

Answers

Answer: C, A, B.....I think

Explanation:

The correct sequence of events is:

C) The structure of DNA is discovered.

A) Feynman challenges people to build "nano-things".

B) The first nanomotor is built.

What is nano-motor?

A molecular or nanoscale device capable of transferring energy into movement is known as a nanomotor. It is capable of producing forces on the order of piconewtons.

The novel DNA-based nanomotor is made up of three parts: a base, a platform, and a rotor arm. The base is around 40 nanometers high and is attached to a glass plate in solution via chemical bonds. A rotor arm with a length of up to 500 nanometers is attached on the base and can rotate.

Nanomotors are molecular devices that use chemical energy to cause molecules to move. Virus genomes are packaged in preformed capsids or procapsids using nanomotors.

Therefore, the correct sequence of events is: C, A, and B.

To learn more about nano-motor, refer to the link:

https://brainly.com/question/15307678

#SPJ2

How do you print "Hello World" in the console with Python? Wrong Answers Only.

Answers

Explanation:

with keyboard........

CODE

print("Hello world")

OUTPUT

Hello world

EXPLANATION

Python's print() outputs a given message. Python's print function displays strings on a screen.

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

The abbreviation “px” stands for

A.
perimeter x.

B.
pixels.

C.
point x.

D.
parts of x.

Answers

Answer:

c

Explanation:

the answer will be c

Consider the following algorithm:

Step 1: Start with a list of the positive integers from 2 to 100, inclusive (meaning you include 2 and 100 in your list).

Step 2: For each $n$ from 2 to 50, inclusive, do the following: Remove all multiples of $n$ greater than $n$ from the list.

Step 3: Output all of the numbers remaining in the list.

What is the tenth number in the list that gets output?

Answers

Answer:

The tenth number in the list that gets output is 29

Explanation:

To get this done, the algorithm has to be implemented using a programming language;

The algorithm is translated to Python Programming Language as follows (Comment explains difficult lines);

#Declare an empty list

mylist = []

#Input n = 2 to 100 to list

for n in range(2,101):

    mylist.append(n)

#Iterate from 2 to 50

for n in range(2,51):

#Initialize first multiple of n

    k = 0

#Iterate multiples of n

    for j in range(n,51,n):

         k = k + 1

#Check if item exist

         if j in mylist:

#Print multiples of n greater than n

              if not k == 1:

                   mylist.remove(j)

#Print All List

print("List: ",mylist)

#Print 10th element of the list

print("10th Element: ",mylist[9])

After running the program, the output is as follows:

List:  [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100]

10th Element:  29

Other Questions
what might you conclude about the clarity of the water from 1950 to 1980 based on this correlation? (10 points) When the liquid is poured through a filter, the remaining salt water is heated until___________ Please :/ 38 in scientific notation T/F: in general, tax planners prefer to defer income. this is an example of the conversion strategy. The expression 3 (number of students + number of adults) represents the cost indollars for another group to go to the dolphin show at the aquarium. Describe howthe cost compares to the total number of students and adults. Most moral decisions that Gwen makes are based on ethical principles surrounding justice, dignity, and equality. Gwen is MOST likely in the _____ level of morality. HELP ME AND ILL MARK U BRAINIEST Answer must be as long as possible*2* . Alternative financial reporting framework of AAOIFI (Accounting and Auditing Organization for Islamic FinancialInstitution) A fourth allele that contributes to coat color in rabbits is chinchilla, which can be represented as Cch. This allele is recessive to the wild-type allele but dominant to the alleles for Himalayan and albino colors. What would be the possible genotypes of a chinchilla rabbit Explain in details the basic steps of the scientificmethod? What constitutes successful research proposal? Identify itselements in details. [05 Marks] HelpBriefly explain to me how and why teams are important. Has there ever been a successful person who had no help at all? A person who has ever taught themselves everything without the help of others. If not, explain why it is impossible but if so, explain why it is impossible (10-14 complete sentences) In the space below, rewrite the following statement. Your goal is to eliminate all unnecessary words:At the time when the parties entered into the agreement of purchase and sale it is important to note that neither of them had knowledge of contents of the dresser drawer. Because of the fact that previous to the contract the seller did not own the dresser and the sellers mother had not had many valuable pieces of jewelry despite having a large income, the seller had made the assumption that the dresser did not contain anything. Due to the fact that the seller had made a statement to the buyer of the fact that his mother did not own any jewelry in the buyers thinking, he had no purpose to make any further investigation or inspection of the drawers as he might otherwise have considered making. For these reasons, there was no provision in the contract for an upward modification in the payment to be made by the buyer to the seller in the event that the dresser drawer later proved to be filled with jewels. in some animals, the sex is not fixed but can change during life span of an individul. what is a possible trigger Which of the following statements is not true regarding a 95% confidence interval for the mean of a population? a. In 95% of all samples, the sample mean will fall within 2 standard errors of the true population mean. b. If you add and subtract two standard errors to and from the sample mean, in 95% of all cases, you will have captured the true population mean. c. In 95% of all samples, the true population mean will be within 2 standard errors of the sample mean. d. 95% of the population values will lie within 2 standard errors of the sample mean. What mass of Sodium Iodide (NaI) will react with 7.82 grams of Chlorine (Cl2)? 2NaI + Cl2 -------------> 2NaCl + I2 Major Nineteenth-Century InnovationsAgriculture:Mechanical reapersCombine harvestersSteel plowsGrain drillsIndustry:Interchangeable partsPower loomsSteam enginesBessemer processThese innovations in agriculture and industry resulted in A. higher consumer costs B. decreased profits for investors C. less consumer choice D. more efficient production of goods What was the purpose of the continental association created at the first continental congress? John Proctor has a change of heart about confessing because _____.- his wife is expecting a child- he no longer cares about land- his children will never forgive him- he's concerned about his reputation in the community describe the relationship between per capita msw generation in the high-income nations versus the low-income nations. a medication order reads: acetaminophen syrup 120 mg po q 6 hrs. how much acetaminophen syrup (160 mg/5 ml) is required for each dose