What type of instructions does a computer need in order complete an action?
o a. general
o b. abstract
oc. short
o d. specific

Answers

Answer 1

The type of instruction that a computer need in order complete an action is: D. specific.

What is an instruction?

In Computer technology, an instruction can be defined as a set of finite steps containing the information that are required by a computer system, so as to enable it know how to operate, process data, perform a task, and maintain other software or hardware.

Generally, a specific instruction is a type of instruction that a computer need in order complete an action or perform a task.

Read more on instruction here: https://brainly.com/question/22533059

#SPJ1


Related Questions

Explain any three views of the presentation

Answers

Normal View is the main editing view, which is used to write and design a presentation.

Slide sorter view is an exclusive view of the slides in thumbnail form.

Slide show view takes up the full computer screen, like an actual slideshow presentation.

Hope this helps, pls mark as brainliest.

con Arrange the following steps in conducting preventive maintenance of compentylook
by wing the number in the blank provided
Secure a borrowers slp from your teacher
Perlombricating procedure
out the splom conectly intended for the needed to
Read and analyze the use of preventive Maintenance Schedule form
Apply thin coat of oil on the parts for a long period of time
Open the bearing cover and opply rose
Determine the types of tools and machines needed to be caled
Determine the parts of the machine needed to be lubricated
ou requisition splor in releasing the lubricants needed
Perform the task according to the prescribed schedule and the signed machine​

Answers

Dhdhdirhhdieneyneynsys subsided dumdudnydb dundudnydb udndundyb. Dundundybd dundundyou did not have urge

You are a network technician for a small corporate network that has recently upgraded to Gigabit Ethernet. The company owner has asked you to connect a new workstation to the network while a new employee is in an orientation meeting. In this lab, your task is to complete the following: 1. Connect the workstation in the Support Office to the local area network. 2. Statically configure the IP address for the Local Area Connection on the workstation to meet the following requirements: • Use the last available host address in the 172.25.0.0/16 subnet with the appropriate subnet mask. . For the Default Gateway, use the address of the router shown in the exhibit For the Preferred DNS server, use the address of the external DNS server shown in the exhibit Note: If you complete the tasks correctly, you will see that the Support workstation in the Network and Sharing Center has a connection to the local network and the internet.

Answers

To connect the new workstation, physically plug it into an available port on the network switch, then configure its IP address using the last available host address in the 172.25.0.0/16 subnet.

To connect the new workstation to the network and configure its IP address, proceed as follows:

1. Physically connect the workstation to the local area network using an Ethernet cable. Ensure that the cable is securely plugged into both the workstation's Ethernet port and an available port on the network switch.

2. On the workstation, open the network settings or Network and Sharing Center. Locate the Local Area Connection corresponding to the Ethernet port.

3. Right-click on the Local Area Connection and select "Properties" to access the network adapter properties.

4. In the Properties window, select "Internet Protocol Version 4 (TCP/IPv4)" and click on the "Properties" button.

5. In the IPv4 properties, select the option to use a static IP address. Enter the last available host address in the 172.25.0.0/16 subnet. Ensure that the subnet mask is set correctly to match the subnet.

6. Set the Default Gateway to the address of the router shown in the exhibit. Enter the address of the external DNS server shown in the exhibit as the Preferred DNS server.

7. Click "OK" to save the settings and close the windows.

After completing these steps, the workstation should be connected to the local area network and have the appropriate IP configuration.

You can verify the connection by checking the Network and Sharing Center, where the workstation should show a connection to the local network and the internet.

Learn more about IP address:

https://brainly.com/question/14219853

#SPJ11

many people shop online. Dicuss the benefits and drawbacks to the customer of shopping online.

Answers

Answer:

Explanation:

Shopping online has become increasingly popular in recent years due to the convenience it offers. There are several benefits and drawbacks to shopping online for customers.

Benefits:

Convenience: Online shopping allows customers to shop from the comfort of their own home, eliminating the need to travel to a physical store.

Time-saving: Online shopping saves time, as customers can easily find and purchase products without having to navigate through crowded stores or wait in long checkout lines.

Access to a wider variety of products: Online shopping provides customers with access to a wider variety of products, including rare and hard-to-find items.

Better prices: Online retailers often offer lower prices than physical stores due to lower overhead costs.

Easy price comparison: Customers can easily compare prices of similar products from different retailers, which helps them make informed purchasing decisions.

Drawbacks:

Unable to see or touch the product before purchasing: Customers cannot physically examine the product before purchasing, which may result in receiving a product that is different from what they expected.

Delivery delays: Delivery times may vary and sometimes take longer than expected.

Shipping costs: Shipping costs can add up, especially for larger and heavier items.

Risk of online fraud: There is a risk of online fraud, such as stolen credit card information or identity theft.

Lack of personal interaction: Online shopping lacks the personal interaction that customers may receive in physical stores, such as the ability to ask questions or receive recommendations from sales associates.

Benefits of Online Shopping:


1. Greater Selection: Online shopping allows customers to access a wider range of products than they might find in a physical store. This is particularly true for niche or specialty products that might not be available locally.

2. Competitive Pricing: Online retailers often offer lower prices than physical stores, due to lower overhead costs. Customers can also easily compare prices across different retailers to find the best deal.


Drawbacks of Online Shopping:


1. Shipping Costs: Depending on the retailer and the product, shipping costs can add a significant amount to the total cost of a purchase.

2. Delayed Gratification: Unlike physical stores, where customers can take their purchases home immediately, online shopping often requires a waiting period for shipping.

place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
highlight the text.
open the paragraph dialogue box,
select keep with text.
select the line and page break, click OK.

Answers

Answer:

1.highlight text and the graphic

2.open the paragraph dialog box

3.select the line and page breaks tab

4.select keep with text

5.click ok

Explanation:

Answer:

Highlight the text and the graphic

Open the paragraph dialogue box

Select the line and page breaks tab

Select keep with test

Click ok

Explanation:

research shows that standardized, integrated, and networked technology enhances decision making and performance management.

Answers

Research shows that standardized, integrated, and networked technology enhances decision making and performance management.

Standardized technology refers to the use of consistent and uniform technology platforms, tools, and systems across an organization. This allows for efficient data sharing, compatibility, and ease of use. Integrated technology refers to the seamless integration of various systems and processes, enabling the flow of information and collaboration across different departments or functions. Networked technology refers to the connectivity between devices, systems, and people, facilitating real-time data sharing, communication, and access to resources.

When these three elements are combined, organizations can benefit from improved decision making and performance management. Standardized technology ensures consistency and accuracy in data, integrated technology enables the holistic view of information for better insights, and networked technology enables timely communication and collaboration, leading to more informed decision making and effective performance management. Overall, the synergy of standardized, integrated, and networked technology enhances organizational efficiency, productivity, and outcomes.

Learn more about Standardized here:

https://brainly.com/question/29772686

#SPJ11


Bundlr is an example of gatekeeper technology.
Group startsTrue or False

Answers

Answer:

False

Explanation:

what are the four ansi transaction isolation levels? what type of reads does each level allow?

Answers

Each ANSI transaction isolation level provides a different level of consistency and concurrency control, and each level allows different types of reads. It is important to choose the appropriate isolation level based on the requirements of the application to ensure transaction consistency and avoid concurrency issues.

The four ANSI transaction isolation levels are read uncommitted, read committed, repeatable read, and serializable. Each isolation level provides a different level of transaction consistency and concurrency control.

The read uncommitted isolation level allows transactions to read data that has been modified by other transactions but not yet committed. This level allows dirty reads, meaning that transactions can read uncommitted data that may be rolled back later.

The read committed isolation level ensures that transactions can only read data that has been committed by other transactions. This level does not allow dirty reads but allows non-repeatable reads, meaning that a transaction may see different values for the same record if it is updated by another transaction during the transaction.

The repeatable read isolation level ensures that a transaction can read data consistently during the transaction. This level prohibits dirty reads and non-repeatable reads, but allows phantom reads, meaning that new records may appear during the transaction if other transactions have inserted new data.

The serializable isolation level provides the highest level of consistency and prohibits dirty reads, non-repeatable reads, and phantom reads. This level locks all records accessed by the transaction until the transaction is completed, ensuring that no other transaction can modify the data during the transaction.

In summary, each ANSI transaction isolation level provides a different level of consistency and concurrency control, and each level allows different types of reads. It is important to choose the appropriate isolation level based on the requirements of the application to ensure transaction consistency and avoid concurrency issues.

Learn more about ANSI here:

https://brainly.com/question/30229875

#SPJ11

i) What are Chronic Micro Traumas, and other physical injuries that gamers have faced?
ii) What are the mental/cognitive/emotional challenges that are mentioned in the article?
iii) Imagine a close friend of yours shares with you that they are facing the physical/cognitive/emotional challenges related to gaming/over usage of technology, what would you recommend for them to improve all forms of their health?

Answers

Some common physical injuries that gamers may face include:

Carpal Tunnel SyndromeEye StrainBack and Neck PainRepetitive Strain Injuries (RSIs)

ii) The mental/cognitive/emotional challenges are:

Addiction:Social IsolationPoor Sleep PatternsAttention and Concentration Issues

What are the mental/cognitive/emotional challenges

Chronic micro traumas are caused by excessive gaming/tech use, leading to repetitive stress injuries. Gamers may face physical injuries like Carpal Tunnel Syndrome, which causes pain, numbness, and tingling in the hand and arm due to repetitive wrist.

Common challenges related to gaming or excessive technology use include addiction, which interferes with daily life. Excessive screen time may cause social isolation. Late-night gaming or excessive screen time before bed can disrupt sleep, causing insomnia or poor sleep quality.

Learn more about   emotional challenges from

https://brainly.com/question/26162044

#SPJ1

Which of the following statements is
TRUE?
A. You must be connected to the Internet to compile
programs.
B. Not all compilers look the same.
C. All machines have a built in compiler.
D. All compilers contain a file browser.

Answers

Answer: B / Not all compilers look the same.

Explanation: Depending on the language you are programming in, would determine which compiler you use.

Please help with this error message

Please help with this error message

Answers

This likely has nothing to do with your for loop. Before we get into the error, let's discuss arguments.

Your methods are given arguments when you declare them. For instance, your shuttle method has two arguments.

public void shuttle(int spaces, int beepers){

}

spaces and beepers are the two arguments. When you call these methods, for instance,

shuttle();

You must include the arguments.

shuttle(1,2);

You have these errors because you're not supplying the methods with arguments.

(3 pts) you are considering removing the forwarding paths from your processor because they are too expensive. how will removing the forwarding paths qualitatively affect the 3 terms in the cpu performance iron law equation? for each term, explain why it will increase, stay the same, or decrease. if it depends on other factors, explain those too. you can assume your processor is pipelined with full forwarding (initially) and it is executing a generic workload.

Answers

Removing forwarding paths from the processor will have a negative impact on the CPU's performance.

This is because the processor will have to spend more time waiting and stalling, which will slow down the execution of instructions.

3 terms in the CPU

If forwarding paths from your processor are removed, it will qualitatively affect the 3 terms in the CPU performance iron law equation as follows:

Instruction throughput

It will decrease because without forwarding paths, there will be more stalling and waiting cycles. Hence, the overall number of instructions that can be executed in a unit of time will decrease. This is because stalling cycles reduce the throughput of the instruction execution rate.

Programming cycle

It will increase because the lack of forwarding paths will increase the stall cycles which are responsible for extending the pipeline cycle. As a result, the pipeline cycle increases, and hence, the programming cycle also increases.

The CPU time required for the task

It will increase because of the reduced instruction throughput and increased programming cycle. There will be more waiting cycles and stalling cycles, which will increase the overall time required for the task to complete. The waiting cycles occur when there is a data dependency, and the required data is not yet available. The stalling cycles occur when there is a control hazard, and the processor is waiting for the correct control instruction to execute.

Overall, removing forwarding paths from the processor will have a negative impact on the CPU's performance. This is because the processor will have to spend more time waiting and stalling, which will slow down the execution of instructions.

Learn more about processor at

https://brainly.com/question/30255354

#SPJ11

2 On the night of April 14, 1912, Titanic hit an iceberg and began sinking. On that same night, the Carpathia's wireless operator, received the distress call from Titanic. Carpathia sailed to the site and rescued 705 survivors. Sadly, Carpathia sank in July 1918 during WWI. In the year 2000 , the Capathia was found upright on the salty seabed at about 120 miles off the coast of Ireland at a depth of 500ft. . What is the absolute pressure (Pa) on the deck of the Carpathia?

Answers

Without specific information about the depth and conditions, it is not possible to determine the absolute pressure on the deck of the Carpathia.

What is the absolute pressure on the deck of the Carpathia at a depth of 500ft in seawater?

To calculate the absolute pressure (Pa) on the deck of the Carpathia,

additional information is needed, such as the depth at which the deck is

located and the specific conditions (e.g., temperature) at that depth.

Without these details, it is not possible to provide an accurate answer.

Learn more about conditions

brainly.com/question/29418564

#SPJ11

What is APA 7 format for writing a paper?

Answers

Answer:

Title page (also known as a cover page).

Font options: sans serif fonts such as 11-point Calibri, 11-point Arial, or 10-point Lucida Sans Unicode.

Double-spaced.

References page always starts on a new page.

Page numbers.

Margins.

Citations and reference list.

Explanation:

APA 7 style is the seventh edition of the American Psychological Association's style guide for writing academic papers.

What is academic papers?

Academic papers are documents, typically written by students, faculty, or researchers, that present original research on a specific topic. These papers are often published in academic journals, and are usually required to be written in a particular writing style, such as APA or MLA. Academic papers typically include an introduction, body, and conclusion, and can include graphs, charts, and tables. Academic papers are designed to provide evidence and support for a particular argument or point of view, and must be carefully researched and written in order to be effective. Academic papers must also be properly cited, in order to give credit to the sources used.

To learn more about academic papers

https://brainly.com/question/20837448

#SPJ4

The question above pls answer quickly

The question above pls answer quickly

Answers

Answer:

B

Explanation:

What is BASIC programming language?​

Answers

BASIC (Beginner’s All-purpose Symbolic Instruction Code) is a programming language designed by John Kemeny and Thomas Kurtz in 1964 and popularized by Microsoft in the 1970.

BASIC,

in full (Beginner's All-purpose Symbolic Instruction Code,) computer programming language developed by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in the mid 1960s.

FORTRAN

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to do

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to doplease make me brainalist and keep smiling dude I hope you will be satisfied with my answer

1.
Desmond is buying a new computer for editing photos and videos. A friend says that he
will need a large amount of primary and secondary storage.
(a) Define what is meant by 'primary storage'.
Define what is meant by ‘primary storage’

Answers

Answer:

Primary storage is the component of the computer that holds data programs and instructions that are currently in use

Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list

PLEASE HELP THANK U!!

Answers

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

An incident response plan should be created be for a software system is released for use.

a. True
b. False

Answers

The answer is choice “a. True”.

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

how do you make branly have easy questions for you to answer because i need more points to ask questions but i don't know any answers to the questions you ask so please help me thank you.

Answers

Answer:

you can chose a different level to be on when you come on brainly

Explanation:

you can now mount /dev/sda2 to a location on the file system to start accessing files on it. mount it on the directory /home/my drive.

Answers

Now you can navigate to the /home/my drive directory and access the files on /dev/sda2.

To mount /dev/sda2 to the /home/my drive directory and access files on it, follow these steps:
1. Create the /home/my drive directory if it doesn't already exist:
  - Open a terminal.
  - Type `sudo mkdir /home/my\ drive` and press Enter.
  - Enter your password if prompted.
2. Mount /dev/sda2 to the /home/my drive directory:
  - Type `sudo mount /dev/sda2 /home/my\ drive` and press Enter.
  - This will make the files on /dev/sda2 accessible in the /home/my drive directory.
3. Verify the mount:
  - Type `mount | grep /dev/sda2` and press Enter.
  - If you see a line that includes "/dev/sda2 on /home/my drive", the mount was successful.
Now you can navigate to the /home/my drive directory and access the files on /dev/sda2.

To know more about directory visit:

https://brainly.com/question/32255171

#SPJ11

an engineer is designing a database for college course information and wants to create a one-to-many relationship between major records and class records, since one major can have many classes associated with it.

Answers

In designing a database for college course information, an engineer can establish a one-to-many relationship between major records and class records. This relationship allows for the association of multiple classes with a single major, accommodating the fact that a major can have numerous classes associated with it.

To create a one-to-many relationship between major records and class records, the engineer can utilize a relational database model. In this model, the major record would serve as the "one" side of the relationship, while the class records would represent the "many" side. The major record would act as the parent entity, while the class records would be linked to the major record through a foreign key.

By setting up this relationship, each major can be associated with multiple class records. The foreign key in the class records would reference the primary key of the corresponding major record, establishing the connection between them. This design allows for efficient organization and retrieval of course information based on majors, facilitating tasks such as querying for all classes related to a specific major or analyzing course distribution across different majors.

In summary, by creating a one-to-many relationship between major records and class records in the database design for college course information, the engineer enables the association of multiple classes with a single major. This relationship accommodates the fact that majors can have numerous classes associated with them and provides a structured approach to organize and access course information based on majors.

To learn more about database; -brainly.com/question/30163202

#SPJ11

Which tool allows users to share code and also serves as a social networking
site for programmers?
A. Dropbox
B. Scratch
C. Kezmo
O D. GitHub

Answers

Answer:

D. GitHub

Explanation:

A P E X

The tool that allows users to share code and also serves as a social networking site for programmers is GitHub. Thus, option D is correct.

What is GitHub?

A GitHub is a type of tool that has been used quickly fix an issue or bug in the main branch of a repository.

The main purpose of GitHub is to quickly fix an issue without disrupting the ongoing development work in the main branch. This has been allow for more efficient as well as streamlined workflow, as the main branch can continue to be updated while the hotfix branch has been used to address any urgent issues.

The hotfix branch has been created from the main branch and has used to make necessary changes to the code. Once the changes are made, the hotfix branch then merged back into the main branch to update the code and fix the issue.

Thus, option D is correct.

Learn more about GitHub on:

https://brainly.com/question/29316401

#SPJ7

Which of the following should be considered when implementing a DMZ?

A DMZ can only monitor a web server.
A DMZ has no power after a network has been penetrated.
A DMZ can be used to monitor only internal traffic.
A DMZ can only monitor one computer at a time.

Answers

A DMZ (de-militarized zone) is a segmented network that discriminates between an organization's internal infrastructure and its externally connected units, such as the Internet.

If decided to implement a DMZ, certain conditions must be considered including:

Type of servers placed in the zone, i.e. web or email servers;

The strategical structuring and layout of the network, considering that it must include properly placed firewalls and other security hardware;

The degree of external user access required to both the interior network and the surrounding area of the DMZ;

Security policies and practices adopted to manage and vigilantly observe the DMZ;

The necessity for redundant provisions and failover ways to guarantee the continuous operation of sizable systems within the region of the DMZ.

Contrary to popular belief, a DMZ does not simply oversee one single computer or even just a web server.

Furthermore, DMZs are not unavoidably exempt from assaults, but they can prove to guarantee pivotal optimality and provide added layers of security to protect essential devices and data.

Read more about DMZ here:

https://brainly.com/question/23318736

#SPJ1

Complete the sentence about creating a storyboard.



Adding ground [ Blank ] helps to identify the position of the subject as well as the camera

Answers

Adding ground lines to a storyboard helps to identify the position of the subject as well as the camera.

Ground lines are used to indicate the horizon and the placement of objects in the frame. They can also help to show depth and perspective in the scene. By adding ground lines to a storyboard, the artist can more accurately plan out the composition of each shot and ensure that all elements are placed correctly. This can be particularly helpful when creating storyboards for complex scenes or action sequences. Overall, ground lines are an important tool for creating clear and effective storyboards that accurately convey the director's vision for the film or television show.

To know more about storyboard visit :

https://brainly.com/question/31574537

#SPJ11

Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.

Answers

It should be noted that combining a desktop's power with a clean look, all in one computers are popular with companies.

When a computer has a good desktop's power it will be easier to operate fast and deliver output at fast rate.

What is a computer desktop's power?

This is the the power that makes the computer to be excellent in performing the required task for better operation.

Learn more about computer at;

https://brainly.com/question/9759640

Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT

Answers

Answer:

A language that instructs a computer how to carry out functions

Explanation:

The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.

This is a longer answer to the question just without "language" in it.

Answer:

B. A language that instructs a computer how to carry out functions

Explanation:

A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.

High-performance video graphics cards often use ________ memory.
GDDR6

GDDR5

GDDR4

GDDR3

Answers

Answer:

GDDR5

Explanation:

prove that this function is uncomputable with a reduction using python programs.

Answers

An example of how to prove that the halting problem is uncomputable using a reduction in Python is given below.

How to explain the information

# Establishing the Halting Problem Function

def halts(program, input):

   try:

       exec(program)

       return True

   except:

       return False

# Structuring Reducing the Halting Problem to a New Function

def reduce_halts_to_f(program):

   def f(input):

       return halts(program, input)

   return f

# Building a Calculable Function

def computable_function(input):

   # Crafting A Sequence That Produces a Program of Null Activity

   program = 'pass'

   return reduce_halts_to_f(program)(input)

# Calling computable_function with Any Calculable Input

# If computable_function returns True, then we have a program that halts on that input, which is contradictory towards the halting problem

# and if computable_function produces False, then a program that does not halt on that input, which abides with the halting problem

input = 'arbitrary_input'

result = computable_function(input)

assert result == False, "An Irreconcilable Contradiction: The Halting Problem Is Incompetible"

Learn more about Python on

https://brainly.com/question/26497128

#SPJ1

Other Questions
Solve for x.. Who discuss the amendments allowed: house or senate? What is the equation of the line that passes through the point (-2,-5) and has aslope of -1?No HELLLLPPPPPPPWhich of the following is the correct term for the chemical reaction that forms polymers?A. DisplacementB. OxidationC. PolymerizationD. Monomerization What is a Compost? helphelphelp basal metabolism represents a person's largest expenditure of energy, followed by physical activity and the thermic effect of food.T/F Assume that military aircraft use ejection seats designed for men weighing between 138.5 lb and 204 lb. If women's weights are normally distributed with a mean of 161.3 lb and a standard deviation of 42.7 lb, what percentage of women have weights that are within those limits? Are many women excluded with those specifications? Technician A says that a pre-2010 Cummins ISX uses a dual OHC design. Technician B says that a post-2010 Cummins ISX uses a single OHC design. Who is correct? In a party of 60 people, 35 had vanilla ice-cream, 35 had chocolate ice-cream. All the people has at least one ice cream then how many of them had i) both vanilla and chocolate ice-cream ii) only Vanilla ice-cream iii) Only chocolate ice-cream Three people are trying to move a box. Which set of forces will result in a netforce on the box of 20 N to the left? 7. Total Cost for SavingsPiggy bank with cashDean is planning to purchase a new Nissan Altima which costs $26,865. He has saved up $3,200 to put toward it. He is thinking about getting a loan for it from his credit union, but he could also keep driving his beat-up old car for a while longer and save up cash for the new one.Dean would like to get the car soon, but he wants to at least look into the option of saving up and paying cash for the car so he doesn't have to pay so much for interest. Possibility Two: Saving UpAssume Dean puts his $3,200 in his savings account, which has an APR of 1.2%. You've already determined how much he needs to add to the account every month in order to have all $26,865 saved up to pay cash for the car in five years. If Dean decides to do this, how much of his own money will he have put into the savings account to pay for his car? Don't forget the initial deposit as well as the monthly payments. ANSWER ASAP PLEASE I GIVE BRAINLIEST Write a short paragraph describing one of the Constitutional duties of the president and evaluating the principle(s) of government behind that duty. Based on the passage, what kind of source does it represent?BRAINLIST if correct Has anyone seen my friend she is called Queen Kayla 123 pleaasse help:( Identify the graph of (x+3)^2 - 4y for T(-7,2) and write and equation of the translated or rotated graph in general form. An idea before Hitlers National Socialist (Nazi) Party took power in 1933. since all clams have shells of calcium carbonate, if we find one in the fossil record composed of silica, the preservation process must have been Given: m1. Find x if the angles are vertical. 2. Find x if the angles are linear pair. (Imagine included) What do ISO 27006 entail? how is duplicating an angle different to a line segment