Star and peer-to-peer are types of

Star And Peer-to-peer Are Types Of

Answers

Answer 1
networks? i’m not sure, but i know peer-to-peer is a type of network. i’m not sure about lending though
Answer 2

communication network


Related Questions

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

Edhesive 4.6 lesson practice

Range is an example of a_______.

Answers

Answer:

Range is a example of a function

Answer: Function

Explanation: if you ever have trouble go look at the slide show for each presentation and theres your answer

You are tasked with building a user application that will select sets of random numbers. Your application must use functions and pass values and pointers. Your program will pick sets of 6 random numbers with values of 1 to 53. The user should be able to choose how many sets to produce. The challenge will be to ensure that no number in a set of 6 numbers is a repeat. The number can be in another set just not a duplicate in the same set of 6. Your program should prompt the user and ask them how many number sets they wish to have generated. The program should not exit unless the user enters a value indicating they wish to quit

Answers

The task is to build a user application that generates sets of random numbers.  The challenge is to ensure that there are no repeated numbers within a set.

To build the user application for generating sets of random numbers, you will need to utilize functions and handle value and pointer passing. The program should prompt the user to input the number of sets they want to generate.

Inside a loop, the program should generate a set of 6 random numbers ranging from 1 to 53. To ensure no repeated numbers within a set, you can use a suitable algorithm such as shuffling an array of numbers and selecting the first 6 elements.

After generating a set, it can be displayed to the user. Then, the program should ask the user if they want to generate more sets or quit. This can be achieved using a conditional statement.

By organizing the code into appropriate functions and utilizing proper input and output handling, you can build a user application that meets the requirements. The application will allow the user to select the number of sets, generate sets of 6 random numbers without duplicates within a set, and continue running until the user decides to quit.

learn more about pointers here; brainly.com/question/31666192

#SPJ11

Bluetooth LE ________. Bluetooth LE ________. assumes that transmissions will be infrequent has terse connection openings all of the above uses about 0.1 to 0.5 watts

Answers

Bluetooth Low Energy (LE) is a wireless communication technology designed for low-power and short-range data transmission. It is used for various applications such as smart homes, wearables, medical devices, and other Internet of Things (IoT) devices. Bluetooth LE is optimized for low energy consumption and has several features that distinguish it from traditional Bluetooth technology.

One of the key features of Bluetooth LE is that it assumes that transmissions will be infrequent. This means that devices can be in a low-power state most of the time, and only wake up when data needs to be sent or received. Additionally, Bluetooth LE has terse connection openings, which means that it can establish and maintain connections quickly, reducing the amount of energy used.

Another important feature of Bluetooth LE is that it uses about 0.1 to 0.5 watts, making it highly efficient compared to other wireless communication technologies. This low power consumption enables devices to run on small batteries for extended periods, reducing the need for frequent charging or replacement of batteries.

In summary, Bluetooth LE is a highly efficient and optimized wireless communication technology that assumes transmissions will be infrequent, has terse connection openings, and uses low power consumption. These features make it an ideal technology for IoT devices and other applications where energy efficiency and low power consumption are critical considerations.

Learn more about Bluetooth here:

https://brainly.com/question/13072419

#SPJ11

Networking software can be divided into three categories: security software, ____ software, and transport software.

Answers

A networking software can be classified into three categories and these are:

Security softwareConnection softwareTransport software

What is a networking software?

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

The types of networking software.

In Computer networking, there are three main types of networking software and these include:

Security softwareConnection softwareTransport software

Read more on software here: https://brainly.com/question/26324021

What should a web page designer consider when choosing between fixed positioning and absolute positioning?

Answers

Answer:

The answer is C I think.

Explanation:

What a web page designer should consider when choosing between fixed positioning and absolute positioning is that ;

the web page designer should know if the page can be found easily.

Since fixed positioning is relative to the browser window and  absolute positioning on the other hand  is been placed on specific place on a web page, then the web page designer should know if the page can be found easily.

Therefore, fixed positioning is relative to the browser window.

Learn more about positioning at;

https://brainly.com/question/15683939

Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, right, left again center, right, center, right center, right, left, center again

Answers

Answer:

left, center, right, left again.

Explanation:

Generally, in accordance with the highway traffic laws and regulations, it is important and necessary that when entering an intersection even with a green traffic light signal, all drivers should check left, center, right, then left again so as to do a confirmation that there isn't any danger from oncoming vehicles or anyone else. If this is strictly adhered to by road users such as drivers, there would be a great reduction in the number of road crashes or accidents.

In a nutshell, before entering an intersection, the safest searching process is to search left, center, right, then left again.

Safety is very important. Before entering an intersection, the safest searching process is to search Left, Center, Right, and Left.

There is a safe process to take when entering an intersection.  When you have obeyed or yield to the sign facing you on the Intersection , you must then slow down and maybe stop if possible to let the other vehicles or pedestrians cross first and later on you drive ahead.

An intersection is also know as at-grade junction. This is simply the junction where two or more roads converge, diverge or meet and they are often at the same height. Looking Left, Center, Right, and Left is important before crossing an intersection.

Learn more about Road intersection from

https://brainly.com/question/24945907

Based on the three-part model of memory storage, the sequence of memory storage is?.

Answers

Answer:

Sensory Memory, Short-Term Memory, and finally Long-Term Memory.

Charles Ives's large and varied output includes works in many genres, but not _______.
a. Songs
b. Symphonies
c. chamber music
d. operas

Answers

Charles Ives, an influential American composer, created a broad array of works across many musical genres, including songs, symphonies, and chamber music. However, he did not compose in the genre of operas.

Charles Ives, the renowned American composer, has left an indelible mark on the world of music with his extensive and diverse body of work. His output spans across various genres like songs, symphonies, and chamber music. However, one genre that is notably absent from his repertoire is opera. Despite his eclectic approach to composition and the broad spectrum of his musical experiments, Ives never ventured into the realm of operatic music. Thus, the correct answer to your question would be 'operas', as that is the genre Charles Ives did not contribute to during his prolific career as a composer.

Learn more about Charles Ives here:

https://brainly.com/question/32807514

#SPJ11

what unit is used to measure horizontal refresh rate (hrr)?

Answers

Answer:.

Explanation:

Horizontal refresh rate (HRR) is measured in units of Hertz (Hz).More than 100 words:The horizontal refresh rate, often abbreviated as HRR, is a measure of the number of times the horizontal image on a display is refreshed per second. This unit of measure, like the vertical refresh rate, is given in Hertz (Hz).

This refers to the number of times per second that the display changes the image on the screen. This is similar to the vertical refresh rate, which refers to how many times per second the display changes the image on the screen vertically.The horizontal refresh rate determines how fast the electron beam can scan horizontally across the screen's face to display an image. When the horizontal refresh rate is too low, the image may appear to flicker on the screen. Flickering can lead to eye strain, headaches, and other problems for users who spend a lot of time staring at computer screens.

This is particularly true for people who work with computers for extended periods, such as graphic designers, programmers, and others.Therefore, the horizontal refresh rate is a significant factor in a display's overall quality and usability. A higher HRR means a smoother image and fewer flickers, which is why it's critical to choose a display with a high refresh rate when using it for prolonged periods.

To know more about Horizontal visit:

https://brainly.com/question/29019854

#SPJ11

Please help with this code!

Please help with this code!

Answers

import random

months = ["jan", "feb", "mar", "apr", "may", "june", "july", "aug", "sept", "oct", "nov", "dec"]

pick1 = random.choice(months)

pick2 = random.choice(months)

if months.index(pick1) < months.index(pick2):

   print(pick1)

   print(pick2)

else:

   print(pick2)

   print(pick1)

Since the months are already in chronological order in the list, we can compare their index and print the string with the smaller index first. I wrote my code in python 3.8. I hope this helps.

Short response!

What is one way to prevent wardriving?

Answers

Answer:

Securing your wireless network with a strong password, encryption, and hiding your network's SSID can make it harder for unauthorized users to connect to your network, preventing wardriving. Monitoring your network and addressing security breaches can also help.

So, my mom was trying to unlock her old iPhone 7, and it said connect to iTunes, and so I did, following a tutorial, but when I opened the phone again, it said in white letters:iPhone is disabled, connect to iTunes. Now, It cant even go into recovery mode(Volume down and side button on iPhone 7). Unfortunately, because it is quite old, its not on the Find My app, and I don't know any other way to fix it. Can anyone help me?

Answers

Answer:

i would either go to the apple store, or try connecting it to your computer

Explanation:

Answer:

You can either call or go to your nearest apple store, or hit a hard reset on your iphone. I suggest going to their website for help because the iphone is an older model.

Please mark me as brainliest if this works for you.

Hope this helps! :)

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the following becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing

Answers

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at https://brainly.com/question/14793460.

#SPJ4.

Assume rand has been declared as an object of the random class. Consider the following statement:

int randomNum = rand. NextInt(5);

Which set or sets of integers represent possible values for randomNum? (3 points)

0, 1, 2, 3, 4

0, 1, 2, 3, 4, 5

0, 5

a. I only

b. II only

c. III only

d. I and III only

e. II and III only

Answers

Assume that rand has been specified as a random class object. Think about the following assertion: just II; int randomNum = rand. NextInt(5).

A pseudo-random number between 0 and RAND MAX is generated using the function rand(). RAND MAX has a default value that may vary between implementations, but it is always at least 32767. import the Java .util .Random class using an arbitrary class. Type Random rand = new to create an instance of the class Random. Random Use one of the following techniques for rand objects: In the range of 0 and upperbound-1, the function inextant generates random numbers. Additionally, a float between 0.0 and 1.0 is produced. The Math .random() function returns a floating-point, pseudo-random number that is bigger than or equal to 0 and less than 1, with an approximately uniform distribution throughout that range, which you can adjust to your desired range.

Learn more about random Num from

brainly.com/question/21660938

#SPJ4

In 3–5 sentences, describe how technology helps business professionals to be more efficient.

Answers

Answer:

data visualization

business professionals can use advance visualization to understand what needs to be done

building probabilistic models

business professionals can predict the future outcome of the business or any process by using technology and machine learning

business marketting

marketting uses technology to gain insight into who are the customers and what are the buying pattern to do more sales

Answer:

Business uses technology to gain insight into who are the customers and what are the buying pattern to do more sales.  Business professionals can predict the future outcome of the business or any process by using technology and machine learning. Business professionals can use advance visualization to understand what needs to be done.  Graphic software used by graphic designers to make what they envision come true.  

Explanation:

Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called ________. A. resource locking B. lost updating C. concurrent processing D. serialized reading E. block factoring

Answers

It is referred to as resource locking when the process of preventing several programmes from accessing copies of the same record when that record is about to be modified is carried out.

The solution that is accurate is option A, which is resource locking. When many applications or processes try to access or modify the same data at the same time, resource locking is a technique that ensures data consistency and prevents disputes. It is a part of concurrent processing, which is a type of computer programming. A lock is placed on the resource (in this case, the record) whenever a modification is about to be made to it. This prevents other programmes from accessing or modifying the resource until the lock is released. This prevents any data corruption or inconsistencies that could arise as a result of concurrent alterations from taking place, as only one programme at a time will be able to make changes to the record. It is usual practise to employ resource locking in database management systems and other multi-user contexts. This helps to preserve data integrity and steer clear of disputes in situations involving concurrent processing.

Learn more about programmes here:

https://brainly.com/question/31217497

#SPJ11

Secret materials may be transmitted by the same methodsa. Trueb. False

Answers

Because the statement "Secret materials may be conveyed using the same techniques" is unclear and incomplete, determining whether it is true or untrue is difficult. It is dependent on the specific techniques .

ands security concerns when used to send secret or sensitive information. As a result, it is critical to adopt suitable security procedures and protocols while communicating sensitive information. mechanisms in place to secure the transfer of sensitive information. There are safe techniques for transferring secret documents in general, such as encrypted email or secure file transfer protocols, that utilize powerful encryption and authentication procedures to protect the information from interception and unwanted access. Less secure techniques, such as unencrypted email, instant messaging, or file sharing services, on the other hand, might offer major security concerns when used to send secret or sensitive information. As a result, it is critical to adopt suitable security procedures and protocols while communicating sensitive information.

learn more about security   here:

https://brainly.com/question/28070333

#SPJ4

Express the following numbers in decimal: (a) * (10110. 0101) 2 (b) * (16. 5) 16 (c) * (26. 24) 8 (d) (dada. B) 16 (e) (1010. 1101) 2

Answers

Answer:

(a) To convert from binary to decimal, we can use the formula:

decimal = a_0 * 2^0 + a_1 * 2^1 + a_2 * 2^2 + ... + a_n * 2^n

where a_i is the i-th digit of the binary number.

Using this formula, we can convert (10110.0101)2 to decimal as follows:

(10110.0101)2 = 1 * 2^4 + 0 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0 + 0 * 2^-1 + 1 * 2^-2 + 0 * 2^-3 + 1 * 2^-4

= 22.3125

Therefore, (10110.0101)2 = 22.3125 in decimal.

(b) To convert from hexadecimal to decimal, we can use the formula:

decimal = a_0 * 16^0 + a_1 * 16^1 + a_2 * 16^2 + ... + a_n * 16^n

where a_i is the i-th digit of the hexadecimal number.

Using this formula, we can convert (16.5)16 to decimal as follows:

(16.5)16 = 1 * 16^1 + 6 * 16^0 + 5 * 16^-1

= 22.5

Therefore, (16.5)16 = 22.5 in decimal.

(c) To convert from octal to decimal, we can use the formula:

decimal = a_0 * 8^0 + a_1 * 8^1 + a_2 * 8^2 + ... + a_n * 8^n

where a_i is the i-th digit of the octal number.

Using this formula, we can convert (26.24)8 to decimal as follows:

(26.24)8 = 2 * 8^1 + 6 * 8^0 + 2 * 8^-1 + 4 * 8^-2

= 22.375

Therefore, (26.24)8 = 22.375 in decimal.

(d) To convert from hexadecimal to decimal, we can use the formula:

decimal = a_0 * 16^0 + a_1 * 16

^1 + a_2 * 16^2 + ... + a_n * 16^n

where a_i is the i-th digit of the hexadecimal number.

Using this formula, we can convert (dada.B)16 to decimal as follows:

(dada.B)16 = 13 * 16^3 + 10 * 16^2 + 13 * 16^1 + 10 * 16^0 + 11 * 16^-1

= 56090.6875

Therefore, (dada.B)16 = 56090.6875 in decimal.

(e) To convert from binary to decimal, we can use the formula:

decimal = a_0 * 2^0 + a_1 * 2^1 + a_2 * 2^2 + ... + a_n * 2^n

where a_i is the i-th digit of the binary number.

Using this formula, we can convert (1010.1101)2 to decimal as follows:

(1010.1101)2 = 1 * 2^3 + 0 * 2^2 + 1 * 2^1 + 0 * 2^0 + 1 * 2^-1 + 1 * 2^-3

= 10.8125

Therefore, (1010.1101)2 = 10.8125 in decimal.

What is the output of this program?
numA = 2
numB = 3
if numA == 2 or numB == 2:
print("yes")
elif numA == 2 and numB == 3:
print("no")
Output:

Answers

Answer:

Output: yes

Explanation:

First if statement is satisfied, since numA==2, so yes is printed.

The elif statement is skipped altogether, since elif statements are only evaluated, when the statement above if false, which it is not.

define a function mirrorvector() that takes an input integer vector parameter and an output integer vector parameter passed by reference. the function copies all the elements in the input vector to the output vector in reversed order.

Answers

The implementation of the mirrorvector() function in Python is as follows:

def mirrorvector(input_vector, output_vector):

   # Get the length of the input vector

   n = len(input_vector)

   # Copy the elements of the input vector to the output vector in reversed order

   for i in range(n):

       output_vector[i] = input_vector[n-1-i]

# Create input and output vectors

input_vector = [1, 2, 3, 4, 5]

output_vector = [0, 0, 0, 0, 0]

# Call the mirrorvector() function

mirrorvector(input_vector, output_vector)

# Print the output vector to verify that the function worked

print(output_vector)  # Output: [5, 4, 3, 2, 1]

Explanation:

The mirrorvector() function takes two vectors as input arguments: input_vector and output_vector. It copies the elements of input_vector to output_vector in reverse order, effectively "mirroring" the vector.The function first gets the length of the input_vector using the built-in len() function. It then iterates over the indices of input_vector using the range() function, from 0 up to but not including n (the length of input_vector). For each index i, the function sets the ith element of output_vector to the (n-1)-ith element of input_vector. Since i starts at 0, the (n-1)-ith element is initially the last element of input_vector, and as i increases, it moves backwards through input_vector. Finally, the function returns output_vector, which has been modified to contain the mirrored elements of input_vector.

To know more about range() function click here:

https://brainly.com/question/22291227

#SPJ11

Correct procedures must be followed when working with asbestos because it

Answers

Answer:

is harmful to humans when inhaled and can lead to asbestosis

Explanation:

Asbestosis is the long-term scarring and inflammation of the lungs due to asbestos fibers.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

which is an essential feature of a while loop having the following form? while (loopexpression) { loopbody } a. the loopexpression should be affected by the loopbody b. the loopexpression should not be affected by the loopbody c. the loopbody should get user input d. the loopbody should update at least two variables

Answers

The essential feature of a while loop having the form while (loopexpression) { loopbody } is that the loopexpression should not be affected by the loopbody.

The loopexpression is evaluated at the beginning of each iteration of the loop and determines whether the loopbody will be executed or not. If the loopexpression is true, then the loopbody will be executed, and if it is false, then the loop will terminate. It is important that the loopexpression is not changed within the loopbody, as this could lead to unexpected behavior and potentially infinite loops. Therefore, option B is the correct answer for this question. This is a long answer but it covers all the necessary information.
This is because the loop continues to execute as long as the loopexpression is true, and the loopbody should contain code that eventually modifies the condition, allowing the loop to terminate.

To know more about loop visit :-

https://brainly.com/question/29615994

#SPJ11

true or false? a non key column accepts null values by default.

Answers

True, a non-key column accepts null values by default. In a relational database, columns are defined to store specific types of data. Each column can be either a key column or a non-key column.

Key columns, such as primary keys or unique keys, have certain constraints to ensure the uniqueness and integrity of the data stored within them. These key columns do not accept null values, as they must contain a unique value for each row in the table.

On the other hand, non-key columns do not have such constraints and can accept null values by default, unless specified otherwise. Null values represent the absence of data or an unknown value. It is important to note that null is not the same as an empty string or a zero value; it is a distinct concept in databases.In some cases, you might want to restrict a non-key column from accepting null values. To do this, you can add a NOT NULL constraint to the column definition. This constraint ensures that every row in the table must contain a value for the specified non-key column.In summary, it is true that non-key columns accept null values by default. However, you can modify this behavior by adding appropriate constraints to the column definition if needed.

Know more about the Null values

https://brainly.com/question/31604083

#SPJ11

Please I have been having a problem with this assignment of mine but I have not gotten an answer. Idiot know if anybody could be of help to me.
Part 1

Write a Python program that does the following.

Create a string that is a long series of words separated by spaces. The string is your own creative choice. It can be names, favorite foods, animals, anything. Just make it up yourself. Do not copy the string from another source.

Turn the string into a list of words using split.

Delete three words from the list, but delete each one using a different kind of Python operation.

Sort the list.

Add new words to the list (three or more) using three different kinds of Python operation.

Turn the list of words back into a single string using join.

Print the string.

Part 2

Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source.

Nested lists
The “*” operator
List slices
The “+=” operator
A list filter
A list operation that is legal but does the "wrong" thing, not what the programmer expects
Provide the Python code and output for your program and all your examples
Thanks.

Answers

Answer:

ummm

Explanation:

your on your own it doesn't makes since

HURRY HURRY
HURRY HURRY

when designing a website whom do you need to consider

a. individuals
b. yourself
c. site owner
d. reviewer

Answers

Answer:

reviewer

Explanation: cause they will be the ones using the website

Which of the following is not an acceptable inventory costing method? a. Specific identification b. Last-In, First-Out (LIFO) c. First-In, First-Out (FIFO) d. Average cost e. Next-In, First-Out (NIFO)

Answers

e. Next-In, First-Out (NIFO) is not an acceptable inventory costing method.

The acceptable inventory costing methods commonly used in accounting are specific identification, Last-In, First-Out (LIFO), First-In, First-Out (FIFO), and average cost.

methods help determine the value of inventory and the cost of goods sold. However, "Next-In, First-Out" (NIFO) is not a recognized or commonly used inventory costing method. It is not considered an acceptable method in accounting practices. NIFO is not based on any standard accounting principles or widely accepted conventions. It is important to adhere to recognized and generally accepted inventory costing methods to ensure consistency, accuracy, and comparability in financial reporting.

Learn more about accounting  here:

https://brainly.com/question/32789402

#SPJ11

A talented student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. this is most related to which aspect of life?

Answers

Answer:

It is economy or culture.

Explanation:

because, it is related to which someones aspect of life.

Answer:

Ethics

Explanation:

List the steps to look it install and then run a program or mobile app

Answers

Answer:

1. Open a cloud installer (the source), which is usually Play Store, Aptoide, or UpToDown, in the case of Android phones.

2. Request the package from the server, which will be transmitted via an internet connection. Usually called "downloading".

3. Allow the package provider (mobile store) to install the app on the system, this being the "install" part, where it's put together.

4. Run the app by, usually, pressing the icon in the app drawer.

Other Questions
Suppose Y is a dichotomous dependent variable, and the data-generating process for Y can be expressed as: Yi=0.1+0.03X1i0.02X2i+Ui, Interpret the coefficients on X1 and X2 Instrucciones Cada oracin contienepor lo menos un error. Haz clic en las palabrasentre parntesis paracorregir los errores.Si se (1. eliminar) la discriminacin por gnero, segn UNICEF mejoraria lavida de los nios.Si (2. haber) problemas de pobreza o hambre en mi comunidad, quieroayudar.Los nios (3. prosperar) ms si ms mujeres llevaran vidas productivas.Habra ms felicidad en el mundo si todos os padres (4. sostener) a sushijos.Tambin yo hathia combatido el crimen si yo (5. ser)durante estos aosel presidenteSi tu compaero de trabajo te (6. acosar) otra vez, dime.Si nosotros tuviramos metas planteadas, nuestros jefes nos (7. poder) darms dinero para el presupuesto.Algunos nios tendran mejores oportunidades si sus padres (8. tener) vidasms completas y productivas.Si yo me hubiera enfrentado con problemas asi en mi comunidad,(9. mudarse)Qu habras hecho t, si tu jefe te (10. decir)esto en frente de todos? A limerick always has ____ lines. a physically active 19-year-old primigravida attends the prenatal clinic for the first time. she asks the nurse whether she may continue playing tennis and riding horses while she is pregnant. how would the nurse reply? A state set a minimum grade point average requirement for students receiving financial aid starting in 2005. A researcher compared college graduation rates before and after 2005 in both that state and other states in the region. This type of research is Melinda makes the same number ofcupcakes, c, each week. Her totalnumber of cupcakes she makes eachweek is less than 55. Write an inequalityto represent how many cupcakesMelinda makes each week 3) A tolley of mass 4kg, moving with a velocityof 4 m/s collides with a trolley of mass 3kg movingwith a velocity of 3 m/s in opposite direction. If bothstick together after collision, Calculate the commonvelocity explain how the nuclear atom differe from thr unifotm sphere model of the atom help please and can someone explain what they mean Which situation can be represented by y = 6x? when a startup wants to offer stock on the stock market, they go from a private to a public company. t/f Un mvil se encuentra en la posicin inicial x0 = 22 m, y se mueve con velocidad 5 m/s. Calcula la posicin en la que se encuentra en el instante t = 30 s. What theorems apply to equilateral triangles? A sample of glucose, C6H12O6 contains 1.250 x 10^21 carbon atoms how many atoms of hydrogen does this sample contain Betty picks 4 random marbles from a bowl containing 3 white, 4 yellow, and 5 blue marbles.The probability that exactly 1 of the 4 marbles drawn is yellow is [Select]Theprobability that at least 1 of the 4 marbles drawn is blue is [Select]RI99+ Which statement best explains how the author's use ofevidence supports the text's purpose?O The author explains that carrot-breeding has onlybeen done for the past 50 years.O The author directly quotes research scientists whohave been studying the carrots.The author states that red, yellow, and purple carrotseach provide specific health benefits.The author writes that the use of differently coloredcarrots in diets dates back over 1,000 years. 15/18-7/36 explain in stepwise The graph below could be the graph of which exponential function? A. f(x)= 2(1.1)^xB. f(x)= 2^x C. f(x)= 2(2)^xD. f(x)= 2(0.5)^x 7.1.84 g of magnesium is bumed in a bomb calorimeter. The temperature of the calorimeter rose from 21.30 oc to 28.56 oc. The heat capacity of the calorimeter is 6.27 kJ/OC. How many joules of heat were produced by the reaction? Change the following sentence into negative and interrogative :a)We need a teacher .b) She can speak 5 languages.c) I work in Bristol .d)You can play tennis