When we create an object from a class, we call this: a. object creation b. instantiation c. class setup d. initializer

Answers

Answer 1

When we create an object from a class, it is called instantiation. It involves allocating memory, initializing attributes, and invoking the constructor method to set the initial state of the object.

When we create an object from a class, we call this process "instantiation." Instantiation refers to the act of creating an instance of a class, which essentially means creating an object that belongs to that class. It involves allocating memory for the object and initializing its attributes based on the defined structure and behavior of the class.

The process of instantiation typically involves calling a special method known as the "initializer" or "constructor." This method is responsible for setting the initial state of the object and performing any necessary setup or initialization tasks. The initializer is typically defined within the class and is automatically invoked when the object is created using the class's constructor syntax. Therefore, the correct answer to the question is b. instantiation.

When we create an object from a class, it is called instantiation. It involves allocating memory, initializing attributes, and invoking the constructor method to set the initial state of the object.

To learn more about instantiation click here

brainly.com/question/12792387

#SPJ11


Related Questions

Which of the following are relational operators? (Select all that apply)
(4 Points)
?=
=
!=
<
>=
==

Answers

The relational operators are used to compare two values are <, >=, !=

The following are the relational operators:
- "<" (less than)
- ">=" (greater than or equal to)
- "!=" (not equal to)
- "?=" (equal to)

The "=" operator is not a relational operator, but rather an assignment operator used to assign a value to a variable. The "?=" operator is not a standard relational operator in most programming languages, but rather a compound assignment operator used to perform a specific operation (such as addition or bitwise operations) on a variable and a constant, and then store the result back in the variable.
So, the correct answers are "<" (less than), ">=" (greater than or equal to), and "!=" (not equal to).
Answer: <, >=, !=

Learn more about relational operators here:https://brainly.com/question/28039937

#SPJ11

which permission does a user need to set security permissions for a folder that exists on an ntfs partition?

Answers

If a folder exists on an NTFS partition, the permission which a user need to set security permissions on the folder is: 2) full control.

what is a folder?

A folder is a document that is often used to store and organize a file on a computer system, according to computer technology.

NTFS: What is it?

The term "NTFS" stands for "new technology file system," and it is one of the file systems that Windows 10 computer systems advocate using on a local hard disk because it provides a high level of security by restricting unauthorized access to data based on a set of permissions.

To sum up, an end user would require full control access in order to be given the ability to set security permissions on a folder that already exists on an NTFS disc.

your question is incomplete, but most probably the full question was

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

1)read

2)full control

3)execute

4)write

Find out more about NTFS here: brainly.com/question/12212187

#SPJ4

A _____ (sometimes called an epic) is a simple, high-level statement of a requirement.

Answers

A Feature (sometimes called an epic) is a simple, high-level statement of a requirement.

Check more about features below.

What do you mean by feature?

A feature is known to be a kind of a distinctive attribute or a special attraction of a person or any thing. It is that which is  unique to a person or thing.

Note that the term Feature can also imply for one to give special attention to any thing.

Therefore,  A Feature (sometimes called an epic) is a simple, high-level statement of a requirement.

Learn more about Feature from

https://brainly.com/question/24416657
#SPJ1

It is not possible to nest Boolean logical functions for a logical test in the logical_test argument of the IF function in Excel.True/False

Answers

False. It is possible to nest Boolean logical functions for a logical test in the logical_test argument of the IF function in Excel.

What is logical test?

A logical test is a type of reasoning assessment used to measure a person's ability to think logically and solve problems. It is usually a multiple-choice test that presents a set of logical problems and requires the test taker to select the correct answer. Logical tests are commonly used in the recruitment process of many organizations to assess the cognitive skills of potential employees. In some cases, they are also used to evaluate the aptitude of students for certain courses or programs. Logical tests can involve topics such as problem solving, pattern recognition, and deductive reasoning.

To learn more about logical test
https://brainly.com/question/29455087
#SPJ1

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

E-mail communication is most suited for:

Answers

The most appropriate use of email communication is to provide routine information.

Internet users may use email as a communication tool to share information and find out more about topics that interest them. Here are some explanations on why email is crucial:

Frequently used Because so many people use email on a regular basis to connect with others and learn more about businesses, it is significant. For instance, a lot of individuals carry their phones and routinely check their email on their laptops, giving them easy access to their inboxes.

Accessibility: Almost everyone can have an email account because email is free and available on a variety of devices. For instance, a person can create an account at the library and access it from various devices including school computers.

Learn more about Email here:

https://brainly.com/question/13460074

#SPJ4

In python please !!!!!


You are working on a new


application for recording


debts. This program allows


users to create groups that


show all records of debts


between the group members.


Given the group debt records


(including the borrower name,


lender name, and debt


amount), who in the group


has the smallest negative


balance?


Notes:


-10 is smaller than -1


If multiple people have the


smallest negative balance,


return the list in alphabetical


order.


If nobody has a negative


balance, return the string


array ["Nobody has a


negative balance"]

Answers

To solve this problem, we can use a dictionary to store the balances of each group member. We can then iterate through the debt records and update the balances accordingly.

Finally, we can find the smallest negative balance and return the names of the group members with that balance in alphabetical order.

Here is the Python code to solve this problem:

```

def smallestNegativeBalance(debtRecords):

  # Create a dictionary to store the balances of each group member

  balances = {}

  # Iterate through the debt records and update the balances

  for record in debtRecords:

      borrower = record[0]

      lender = record[1]

      amount = record[2]

      if borrower not in balances:

          balances[borrower] = 0

      if lender not in balances:

          balances[lender] = 0

      balances[borrower] -= amount

      balances[lender] += amount

  # Find the smallest negative balance

  smallestNegativeBalance = 0

  for balance in balances.values():

      if balance < smallestNegativeBalance:

          smallestNegativeBalance = balance

  # If nobody has a negative balance, return the string array ["Nobody has a negative balance"]

  if smallestNegativeBalance == 0:

      return ["Nobody has a negative balance"]

  # Find the names of the group members with the smallest negative balance

  names = []

  for name, balance in balances.items():

      if balance == smallestNegativeBalance:

          names.append(name)

  # Return the names in alphabetical order

  return sorted(names)

```

This code should return the correct answer for the given problem.

Learn more about python:

brainly.com/question/28675211

#SPJ11

The component that does all the major processing inside the computer.

Answers

Answer:

CPU

Explanation:

I
What is a Watermark?

Answers

it is a way to show your brand or logo on a video is photo
A watermark is a little way of showing your logo of something

I need help if anyone is able to answer them for me

I need help if anyone is able to answer them for me

Answers

you just compare your highschool to possibly your middle or elementary school, or maybe a friend from another schools building. it’s not a hard assignment lol.

raid solution that offers redundancy over performance

Answers

If you need solid performance but also need a level of redundancy, RAID 10 is the best way to go.

Which RAID is the most performant?

A RAID 1 array is made up of two disk drives, one of which is a mirror of the other (the same data is stored on each disk drive).

RAID 10 is the ideal option if you want both high performance and redundancy. Remember that you will lose half of your available storage space, so plan appropriately! If redundancy is most essential to you, you’ll be OK with either a RAID 10 or a RAID 60.

RAID-10 provides the highest speed and redundancy features, but it reduces useable capacity by half, making it costly to implement at scale.

To learn more about RAID-10 to refer:

https://brainly.com/question/14669307

#SPJ4

why is life so boring and why can´t life just be fair and why is life so short and why do all these bad things happen to good ppl like why do bad things happen period

Answers

Answer:

To be honest i wonder the same thing all the time. I wish i knew the answer to all these questions as well.

Explanation:

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

If you set up a network in your home to share your internet connection with several laptops, what type of network have you create? p2p, client server, VPN, or firewall

Answers

Answer:

P2P

Explanation:

Originally stood for "Peer to Peer." The "colleagues" are computers in a P2P network that are linked via the Web to each other. By having a central server, files can be exchanged directly among devices on the network. In other words, any machine on a Distributed system becomes both a file server and a client.

Question 9 (Essay Worth 2 points)
(06.06 MC
Scientists use supporting evidence to create an explanation. Explain why using evidence to support your explanations is a good
practice.

Answers

Using evidence to support your explanations is a good practice because We currently believe that science is the best way to create trustworthy knowledge. It is a collective and cumulative process of evaluating the evidence that results in information that is more accurate and reliable.

Science is based on testable hypotheses and empirical data. Thus, Scientists requires supporting evidence for a scientific theory.

Using evidence to support your point:

In some cases, adding a reference at the end of your sentence is sufficient, but in other cases, you might need to do more. Evidence frequently needs to be analyzed, explained, and interpreted so that the reader can see how it supports your claim.

Although you may believe that the reader can figure it out on their own, it is your responsibility as the writer to do that work. After all, you might have different perspectives, and you want the reader to adopt your logic and frame of reference.

Hence, it's a good practice to always use evidence to support your explanations to make them more effective.

To know more about supporting evidence, visit: https://brainly.com/question/507522

#SPJ1

\what exception type does the following program throw? public class test { public static void main(string[] args) { system. Out. Println(1 / 0); } } a. Arithmeticexception b. Arrayindexoutofboundsexception c. Stringindexoutofboundsexception d. Classcastexception

Answers

ArithmeticException" is the output of the program.The above question has a class that holds the two functions one function is the main function which calls the other function in a try-catch block.

The method function holds one run time exception which is 1/0 which is an arithmetic exception. It can be handle by the help of an arithmetic class object which is defined in the first catch block.

ArithmeticException and not an ArrayIndexOutOfBoundsException. The second catch block will also not be executed since it is catching a RuntimeException and not an ArrayIndexOutOfBoundsException.

Hence the print function of this catch is executed and prints "ArithmeticException".

Learn more about program here:

brainly.com/question/14454937

#SPJ1

Missing Information in the question will be : The above question does not hold that "what is the output of the program".

Adding more RAM
Which of the following would resolve problems related to excessive paging and disk thrashing?

Answers

Adding more RAM would resolve problems related to excessive paging and disk thrashing.

Excessive paging and disk thrashing occur when a computer's physical memory (RAM) is insufficient to handle the workload, leading to the operating system swapping data between the RAM and the hard disk. This swapping process is time-consuming and can significantly slow down the system's performance.

By adding more RAM to the computer, the available physical memory is increased. This allows the operating system to store more data in RAM, reducing the need for frequent swapping with the hard disk. As a result, excessive paging and disk thrashing are mitigated, leading to improved system performance and responsiveness.

With additional RAM, the computer can hold a larger portion of the active data in memory, reducing the reliance on the slower hard disk. This enables faster access to data, as the CPU can directly retrieve information from RAM instead of waiting for it to be fetched from the disk. Consequently, programs load faster, multitasking becomes smoother, and overall system stability is enhanced.

Learn more about RAM:

brainly.com/question/31089400

#SPJ11

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

what is the behavior of an element with static positioning in regard to the page layout?

Answers

Answer:

The element is positioned according to the normal flow of the document.

The top, right, bottom, left, and z-index properties have no effect. This is the default value.

The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.

What does Static positioning implies?

Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."

Hence,  the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.

Learn more about page layout from

https://brainly.com/question/988590

Information security policies would be ineffective without _____ and _____.

Answers

Information security policies would be ineffective without audit and enforcement.

Information security, often known as InfoSec, refers to the methods and devices that businesses employ to safeguard their data. This includes setting up the appropriate policies to bar unauthorized users from accessing either personal or professional data. Network and infrastructure security, testing, and auditing are just a few of the many areas that infosec, a rapidly expanding and dynamic profession, encompasses.

Sensitive data is protected by information security from unauthorized actions such as interruption, destruction, change, scrutiny, and recording. It is important to protect the security and privacy of sensitive data, including financial information, intellectual property, and account information for customers.

Private information theft, data tampering, and data erasure are all effects of security events. Attacks have a real cost as well as the potential to interfere with business operations and harm a company's reputation.

Learn more about Information security here:

https://brainly.com/question/5042768

#SPJ4

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

(a) Contruct instruction to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and explain the difference between the two instructions. (5 marks)

Answers

Here are the instructions to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and an explanation of the difference between the two instructions: Instruction using LXI opcode: LD DE, 2036HLXI instruction is used to load 16-bit data into a register pair.

LXI opcode is used to initialize the registers BC, DE, and HL with 16-bit data. The instruction has a format of LXI RP, data16. Here RP represents register pair (BC, DE, HL or SP) and data16 represents the 16-bit data.Instruction using MVI opcode:LD E, 36HLD D, 20HMVI instruction is used to load 8-bit data into a register. The instruction has a format of MVI R, data8. Here R represents the destination register and data8 represents the 8-bit data that will be loaded into the register.

The difference between the two instructions is that the LXI opcode is used to load 16-bit data into a register pair while the MVI opcode is used to load 8-bit data into a single register. Additionally, the LXI opcode requires two bytes of memory to store the 16-bit data while the MVI opcode only requires one byte of memory to store the 8-bit data.

To know more about 16-bit data visit:

https://brainly.com/question/31325908

#SPJ11

PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!

Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.

He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.

You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.

What do you do?

Answers

Consider his point of view and apologize politely. Reason out the causes in a calm and orderly manner. Take deep breaths and listen to what he has to say.

Imagine you have a friend who does not know much about programming or HTML, but wants to design his own web page. He has decided to use rapid development tools because he has heard that they are good for people who do not have a lot of experience or do not fully understand HTML. He has come to you for advice on the matter, as he knows you have studied the material. What would you tell him about what he can expect from rapid development tools? What questions might you ask him about what kind of website he would like to build so you can steer him in the right direction regarding how intensive his use of these tools should be?

Answers

Answer:

Tell Him to build a website about something HE likes... it will be much more fun that way and he wont be like "Dang I have to work on that project again" If he is a beginner I would say just use plain html dont use javascript or anything like that.

you are tasked with enumerating an exploited machine using metasploit. the target system is already connected to the metasploit console, and you have executed the help command to see which options are available. which of the listed commands will give you the computer name, operating system, and hardware architecture?

Answers

The command that will give you the computer name, operating system, and hardware architecture is `sysinfo`.

How to enumerate an exploited machine using Metasploit?

Metasploit is a security tool that is used for security analysis and penetration testing. It provides a framework for penetration testing and security assessments by simulating attacks on target systems.In order to enumerate an exploited machine using Metasploit, follow these steps:

Launch the Metasploit Framework console by typing `msfconsole` on your terminal window.

Once the console is launched, you can connect to the target system by typing `use exploit` followed by the exploit that you want to use, and then set the relevant options for the exploit.

Next, execute the exploit by typing `exploit` or `run`.If the exploit is successful, you will gain a remote shell on the target system. At this point, you can run various commands to enumerate the target system and gather information about its configuration and architecture.

To view the available commands in Metasploit, you can type `help` at the console. This will display a list of available commands that you can use to enumerate the target system.

To get the computer name, operating system, and hardware architecture, you can use the `sysinfo` command. This command will give you detailed information about the target system, including the operating system, hardware architecture, and other system details. You can use this information to plan your attack and exploit the system further.

Learn more about framework: https://brainly.com/question/26516037

#SPJ11

Jose would like to have text with predefined styles that can flow around an image in a variety of shapes and sizes
Which object should he insert into his document?

WordArt

SmartArt

shapes

images

Answers

Answer:

A) WordArt

Explanation:

WordArt can be set to the predefined styles within Word and can be set to flow and wrap around images in word.

Answer:

Word art

Explanation:

If you were to create a game, what genres would it be, and why? What would that game look like?

Answers

Answer:

According to me, I would go for an adventure type of game that is open world and maybe online (like play with friends around the world) and make it like it has ebdless possiblities and wouldn't end quickly. It would look realistic with 4k graphics and art

Pie charts are best used for

Pie charts are best used for

Answers

Answer:B

Explanation:Showing parts of a whole.

what is a list in python? group of answer choices a series of strings a series of references or locations of data in memory a container that stores a collection of elements that are arranged in a linear or sequential order a series of numbers

Answers

The storage of numerous elements in a single variable is accomplished through lists. One of Python's four built-in data types for storing data collections is the list.

How does a list in Python give an example?In order to generate a list in Python, the list elements are encapsulated in square brackets, with commas separating each item. The first five even natural numbers, for instance, should be put into a list. Even= [2,4,6,8,10]. The entries in the list marked Even are listed here as [2,4,6,8,10].The storage of numerous elements in a single variable is accomplished through lists. One of Python's four built-in data types for storing data collections is the list; the other three are the tuple, set, and dictionary, each of which has a unique set of properties and applications.      

To learn more about Python refer to:

https://brainly.com/question/26497128

#SPJ4

Other Questions
Which of the following historical stages of capitalism came first? a. financial b. mercantile c. industrial d. state welfare. Integrated marketing communications must deliver company and brand messages that are ________.A. informative, persuasive, and distinctB. unique, current, and consistentC. clear, compelling, and controversialD. clear, consistent, and compellingE. relevant, humorous, and exciting Where is the electric field between a charged balloon and a charge piece of paper 0.04m away What is the measure of angle DCE? Use numbers only. What was the name of the land management systemin New France? a. Plantationb. Hacienda c. Seigneurial if no single location records all of earth's history how was the geologic column created How much freedom does Alejandro have? Explain. Do communist countries provide free education like high schools, College, etc? one of the bases of a trapezoid has length , and the height of the trapezoid is . if the area of the trapezoid is , then how long is the other base of the trapezoid? Explain the Diamond and Dybvig (1983) model and discuss how itpredicts the susceptibility of banks to runs I need definitions of theses now!!!!!!!!!!!!!!!!!!!!!!!!!!!!4. Adding and Subtracting Complex Numbers 5. Multiplying Complex Numbers 6. Solving Quadratic Equations with Complex Roots When should spelling be separated from phonics instruction to become a separate part of the curriculum? a. kindergarten b. first grade c. second grade d. fifth grade Which of the following cells is haploid? O Daughter spermatogonium O Primary spermatocyte O Secondary spermatocyte O Mother spermatogonium 4. Solid lead has a density of 11.34 g/cm. Molten (liquid) lead has a density of 10.66 g/cm. If youmelted a 510 g piece of lead, how much more volume will it take up? type a paragraph explaining how the atoms in sugar molecules can beused to form amino acids and other large carbon-based molecules?HELP PLS!!!!!!!! An asset with cost basis of $ 300,000 was sold for $ 400,000 . The book value for the asset at the time of sale was $ 100,000 . What are the net proceeds from this sale , assuming the capital gain tax rate is 40 % while the ordinary gain tax rate is 30 % ? What is Nondisjunctionand when does it happen? A slice of carrot cake from The Cheesecake Factory contains 1,560 calories. This represents 75% of the average daily calorie requirement for many adults. Find the average daily calorie requirement for these adults. if it takes 96 rocks to completely cover the triangular region, there are select one rocks per square foot in the triangular region. A US-based clothing manufacturer changed its advertising strategy as well as several of its in-country HR policies in order to conform to local cultural norms. This is an example of acculturation.TrueFalse