Which of the following are some of the composite scores that make up the Weschler Intelligence Scales?
Verbal Comprehension
Working Memory
Processing Speed

Answers

Answer 1

The composite scores that make up the Weschler Intelligence Scales are: A; Verbal Comprehension, B; Working Memory, and C; Processing Speed.

In the field of psychology, the Wechsler Intelligence Scale is an IQ test. The WISC, WAIS, and WPPSI are the three versions of the Wechsler Intelligence Scale. David Wechsler developed them in the 1940s and 1950s to provide a more detailed measurement of human intellectual abilities than the Stanford-Binet Intelligence Scale.

The Wechsler Intelligence Scale is a collection of individually administered IQ assessments, created by psychologist David Wechsler. In order to give a more nuanced understanding of an individual's cognitive ability, these tests incorporate several subtests that assess different cognitive abilities, such as verbal comprehension, working memory, and processing speed.

The Verbal Comprehension Index (VCI) of the Wechsler Intelligence Scale includes subtests that assess verbal reasoning, knowledge, and vocabulary. The Working Memory Index (WMI) includes subtests that assess the ability to hold and manipulate information over short periods of time. Finally, the Processing Speed Index (PSI) includes subtests that assess the ability to quickly and accurately perform cognitive activities.

Options A, B and C are correct answers.

You can learn more about Wechsler Intelligence Scale at

https://brainly.com/question/5669472

#SPJ11


Related Questions

Michelle just learned she was passed over for a promotion because the management team thought she was too young. This is an example of which of the
following?

Answers

Answer:Promotion Discrimination:Age discrimination

Explanation:

Wrongful failure to promote is illegal.

Michelle should have been taken into consideration for a promotion.

She should not have been passed over, because age discrimination is illegal, and she could claim damages against the company if she wants.

Write a section of code that asks the user for their last name and then will create A new string produced by randomly splitting their name into two parts and reversing their order.
Example: "computer" may produce the result "utter comp".

Answers

import random

name = input("Enter your last name: ")

w = random.randint(0,len(name)-1)

txt = name[0:w]

txt1 = name[w:]

print(txt1+" "+txt)

I hope this helps!

compare and contrast the typewriter with that if the computer keyboard pls help omg​

Answers

Answer:

Typewriters use  paper and ink

and computers keyboards is an electroic typing

Explanation:

In general, mainframe or server production programs and data are adequately protected against unauthorized access. Certain utility software may, however, have privileged access to software and data. To compensate for the risk of unauthorized use of privileged software, IT management can:______________

a. Keep sensitive programs and data on an isolated machine.

b. Restrict privileged access to test versions of applications.

c. Prevent privileged software from being installed on the mainframe.

d. Limit the use of privileged software

Answers

Answer:

a. Keep sensitive programs and data on an isolated machine.

Explanation: In general, mainframe or server production programs and data are adequately protected against unauthorized access. Certain utility software may, however, have privileged access to software and data. To compensate for the risk of unauthorized use of privileged software, IT management can:______________

5. find all positive integers less than 50 that are relatively prime to 50 (showing the gcd is optional. you can list all the numbers.) (10 pts).

Answers

All positive integers less than 50 that are relatively prime to 50 are 1, 3, 7, 9, 11, 13, 17, 19, 21, 23, 27, 29, 31, 33, 37, 39, 41, 43, and 47.

To identify all positive integers less than 50 that are relatively prime to 50, we need to determine the numbers that share no common factor with 50 other than 1. Such integers are known as co-primes or relatively prime to 50. The numbers which share a factor other than 1 with 50 are 2, 5, 10, 25, and 50. Hence, we need to exclude these numbers from the list of positive integers less than 50.

To obtain the list of integers relatively prime to 50, we follow these steps:

1: We first list down all the positive integers less than 50.

2: Next, we remove the numbers 2, 5, 10, 25, and 50.

3: We obtain the following list of numbers that are relatively prime to 50: 1, 3, 7, 9, 11, 13, 17, 19, 21, 23, 27, 29, 31, 33, 37, 39, 41, 43, 47.

You can learn more about integers at: brainly.com/question/490943

#SPJ11

A company hires Brandon, a software engineer. Brandon is asked to work on a project with others in order to meet a tight deadline. He finds himself in weekly meetings to discuss the direction and status of the project, but most of his time is spent creating code. What is Brandon's specialization?

system management
system support
system collaboration
system development

Answers

Answer:

System developement

Explanation:

he is creating code, which is devloping the system.

A numbering system such as identifiers for control and sub accounts is superior to the text based system of names, because .................
it is cheaper to implement.
it results in fewer errors and avoids duplication, making it easier to generate unique identifiers.
it is required by the Accounting Principles Board.
is understood better as it has been a long comvention and was used even before the advent of computer based accounting systems.

Answers

A numbering system such as identifiers for control and sub accounts is superior to the text-based system of names because it results in fewer errors and avoids duplication, making it easier to generate unique identifiers.


Implementing a numbering system for control and sub accounts offers several advantages over a text-based system. Firstly, it reduces the likelihood of errors and duplication. With numbers, it is easier to ensure uniqueness and avoid confusion compared to relying on names, which may be subjective, ambiguous, or prone to spelling mistakes.

Secondly, a numbering system simplifies the process of generating unique identifiers. By following a consistent numerical pattern, it becomes easier to assign and manage account codes. This promotes efficiency and accuracy in accounting processes, such as record-keeping, analysis, and reporting.


While a numbering system is not necessarily required by the Accounting Principles Board, it is widely adopted and recommended in the field of accounting. The convention of using numerical identifiers predates computer-based accounting systems and has stood the test of time due to its practicality and effectiveness. Therefore, the use of a numbering system for control and sub accounts is considered superior to a text-based system, as it offers cost-effectiveness, minimizes errors and duplication, and aligns with longstanding accounting practices

To know more about unique identifiers,visit:
https://brainly.com/question/14439455
#SPJ11

A(n) _____ goal is connected to and has bearing on a situation.

Answers

Hi :)

Answer:

relevant

Explanation:

Hope this helps :) !!!

A relevant goal is connected to and has bearing on a situation. A relevant goal is one that is related to the situation at hand and can help to achieve a desired outcome. It is important to set relevant goals in order to focus one's efforts and resources on the most important tasks and objectives. Relevant goals help to ensure that one's actions are aligned with the desired outcomes and can increase the likelihood of success.

In my 4.3 Code practice: Question 1.
Every time I enter an age, it just continues to print **HUG**
What is wrong with my code?

In my 4.3 Code practice: Question 1.Every time I enter an age, it just continues to print **HUG**What

Answers

Answer:

you have the (while) code in whenever it is greater than 0, print hug. if less than, then nothing so flip the inequality thing around again.

Hope this helps plz hit the crown

you want to create a high-performance windows laptop with both a 2-tb hard drive and a 1-tb ssd drive. which of the following are data storage recommendations for your high performance system? (select two.) answer automatically back up important data on the hard drive to the ssd drive. store heavily used information on the ssd drive. store data that requires high performance on the ssd drive. store data that requires high performance on the hard drive. store heavily used information on the hard drive.

Answers

For a high-performance Windows laptop with a 2-TB hard drive and a 1-TB SSD drive, here are some suggestions for data storage: Operating System, Commonly Used Programs, Data, and Backup.

Which hard disc is utilised to increase system speed performance?

The newest and fastest data storage technologies are SSDs. They can store terabytes of data, much like HDDs, but unlike HDDs, every bit of data on an SSD may be retrieved immediately.

What kind of disc will you use to retrieve data more quickly and enhance your computer's performance?

SSDs perform the same fundamental tasks as a hard drive and are used in place of conventional hard disc drives (HDDs) in computers. SSDs, however, are much speedier in comparison.

To know more about Windows visit:-

brainly.com/question/28525121

#SPJ1

list 3 compounds of a computer.
list the 4 compounds of a computer system.
The central component system houses, the processer, memory and what else?
What are the 2 types of memory on a computer?
What does RAM stand for?
Name the other type of storage besides a floppy disk.
Name 3 output devices.
What are 2 examples of common software applications?
Name 2 symptoms of bugs in my computer
Name as many do's and don'ts of computer use. (more than 2)

Answers

Answer:

look up this question on here it comes up but do it one-by-one

Explanation:

Three compounds of a computer: Silicon chips, Printed circuit boards, and Plastics and metals.

What is central component system?

A computer's central component system typically refers to the central processing unit (CPU), motherboard, and memory (RAM).

A computer system is made up of four components:

Hardware Software Data User

The processor, memory, and motherboard are all housed in the central component system.

On a computer, there are two types of memory:

RAM stands for Random Access Memory (RAM)Memory That Can Only Be Read (ROM)

Other types of storage besides a floppy disk include hard disk drives, solid-state drives, and optical disks.

Three output devices are:

MonitorPrinterSpeakers

Two examples of common software applications are:

Microsoft Office Suite (Word, Excel, PowerPoint)Adobe Creative Suite (Photoshop, Illustrator, InDesign)

Two symptoms of bugs in a computer are:

Slow performanceUnexpected shutdowns or freezes

Do's of computer use:

Regularly back up important files.Install antivirus and security software.Keep software up to date.

Don'ts of computer use:

Don't download or open suspicious files or emails.Don't use weak passwords.Don't share personal information online.

Thus, this can be concluded regarding the given scenario.

For more details regarding CPU, visit:

https://brainly.com/question/16254036

#SPJ7

True/False. malware is malicious software, such as a virus, worm, or trojan program, introduced into a network.

Answers

True. Malware is a type of malicious software that is designed to harm or exploit computer systems or networks. This includes viruses, worms, trojan horses, spyware, adware, and other types of harmful programs.

Malware can be introduced into a network through various means, such as email attachments, infected websites, or software downloads. Once it has infiltrated a network, malware can cause significant damage, including stealing sensitive information, disrupting operations, or damaging computer systems. To protect against malware, it is essential to regularly update antivirus software, use strong passwords, and be cautious when opening emails or downloading files from unknown sources. Additionally, it is important to regularly back up important data to avoid losing it in the event of a malware attack.

Know more about Malware here;

https://brainly.com/question/14276107

#SPJ11

Which file attribute identifies the file as having been modified since the last backup?.

Answers

Archive file identifies the file as having been modified since the last backup.


Archive file understanding

 The meaning of the word Archive in the Online Computer Dictionary is used to make a copy of a backup file with the aim of protecting the original copy from damage.


 How to Archive Files Into 1 File

 If you want to send a large number of files, you can make the file into 1 archive file format with .zip, .tar, or .rar format first.  This method is also quite easy and fast.

First, make sure your computer has programs such as winzip, winrar.  This program is needed to archive files.

•  Second, you can select the file you want to archive, then right-click on the file.  The example below shows 2 files to be archived

• The third step
, you can directly select Add to “folder name.rar” to directly create archive files automatically.  If you want to do some settings, it can be done by selecting the Add to archive option.

 The Add to archive option allows you to choose the save format of the file, divide or create the archive into several parts (part 1, part 2, etc.), to create a password.  With the password, before the file can be extracted, it is necessary to enter the password first.

 In addition to files, you can also archive folders directly along with the contents of the files in it.  Keep in mind, how fast the process of archiving this file will depend on how many or large files to be archived.


 Learn more about archive files at https://brainly.com/question/15355917.

#SPJ4

which of the following features allows you to edit an individual object in a group while dimming all other non selected objects

Answers

While authorization puts up restrictions around a resource, authentication allows users access past them.

A user logging into the network using a smart card is an illustration of authentication in networking. An employee entering a building with a badge serves as an example of physical security authentication. Authentication is the process of confirming a person, device, or system's identity when it comes to network security and the two physical access restrictions. This usually entails asking the user for some kind of identification to prove their identities, such as a login and password, a smart card, or a biometric identifier. The process of providing or refusing access to resources based on the verified identification of the person, device, or system is therefore referred to as authorization.

Learn more about Authentication here:

https://brainly.com/question/30091109

#SPJ4

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

Create two sample HTML pages that include a DOCTYPE statement and a title. Include at least one example of each of the following:

a standard paragraph of text
a left-justified headline (like a title)
a centered headline (like a title)
a sub headline (like a subtitle)
a section of colored text (not all text, just a segment or headline)
an image (from a URL)
an image (from a local source)
an image with a size adjustment (maintaining the aspect ratio)
hyperlinks
a hyperlinked image
a split line (empty element)
one page that has a background color

Extra Credit:
Include a sample of Italic text.
Include an email address link that does not spell out the address on the web page (HINT: mailto).
Create a hyperlink to a local page on your computer.

Answers

Answer:

<!DOCTYPE html>

 <html>

   <head>

     <title>Hello</title>

   </head>

     <body style="background-color:pink;">

<h1 style="text-align:center">The Centered Headline</h1>

<h1 style="text-align:left">Left</h1>

         <h2>Sub headline</h2>

 <p>This is the paragraph.</p>

<h1 style="color:purple;">colored word</h1>

<img src="flower.jpeg" alt="Flower" width="460" height="345">

htmlimg2.jpeg

     </body>

 </html>

Explanation:

phishng comes from a metaphor describing how early computer criminals used e-mails to lure fish for passwords and:

Answers

Phishing comes from a metaphor describing how early computer criminals used emails to lure fish for passwords and personal information.

The term "phishing" in the context of cybercrime refers to a malicious technique where attackers attempt to deceive individuals into revealing sensitive information such as passwords, usernames, credit card details, or other personal information. The analogy of "phishing" is derived from the concept of luring fish with bait. In a phishing attack, cybercriminals send deceptive emails that appear to be from legitimate sources, such as banks, social media platforms, or online services, with the intention of tricking recipients into clicking on malicious links or providing their confidential information. These attackers rely on social engineering tactics, exploiting human psychology to manipulate unsuspecting individuals into divulging their sensitive data. Phishing attacks can have severe consequences, including identity theft, financial loss, and unauthorized access to personal accounts. Therefore, it is crucial to be vigilant and cautious when interacting with emails or messages to protect oneself from falling victim to phishing scams.

Know more about Phishing here:

https://brainly.com/question/24156548

#SPJ11

discuss your favorite cyberspace model and why it is of interest to you.

Answers

Cyberspace models are representations of the structure, behavior, and dynamic nature of cyberspace. Among different cyberspace models, my favorite one is the abstraction model.

About abstraction models

This model is of particular interest to me because of its simplicity and ability to convey complex ideas in a simple way.

The abstraction model is based on the principle of reducing complex systems to their essential components, thereby making it easier to understand and manage.

This model involves abstracting complex systems to their underlying structure and behavior, which can then be used to model and understand the system's overall behavior.

For instance, the abstraction model is widely used in network security to identify vulnerabilities in a system's underlying structure and behavior. By abstracting the network's structure and behavior, security experts can identify potential weaknesses and develop strategies to prevent attacks.

In conclusion, the abstraction model is my favorite cyberspace model because of its simplicity and effectiveness in modeling complex systems. It is of interest to me because of its wide range of applications in various fields, including network security and artificial intelligence.

Learn more about cyberspace at

https://brainly.com/question/30881566

#SPJ11

Animations in an html5 page are created by defining ________________ properties for a specific css selector.

Answers

Animations in an HTML5 page are created by defining animation properties for a specific CSS selector. These animation properties include:


1. `animation-name`: This property specifies the name of the animation. It refers to the keyframes that define what happens during the animation.
2. `animation-duration`: This property sets the duration of the animation in seconds or milliseconds.
3. `animation-timing-function`: This property defines the timing function used for the animation. It determines how the animation progresses over time.
4. `animation-delay`: This property specifies the delay before the animation starts.
5. `animation-iteration-count`: This property sets the number of times the animation should repeat. You can specify a finite number or use `infinite` to make it repeat indefinitely.

To know more about Animations visit:

https://brainly.com/question/29996953

#SPJ11

Which tool is available in the management web interface to help you migrate from port-based policy rules to application-based policy rules?

A. Candidate Checker
B. Policy Optimizer
C. Preview Changes
D. Validate Commit

Answers

Policy Optimizer tool is available in the management web interface to help you migrate from port-based policy rules to application-based policy rules

The Policy Optimizer tool is a feature available in the management web interface of Palo Alto Networks' security products that helps organizations migrate from port-based policy rules to application-based policy rules.

In traditional port-based policy rules, network traffic is allowed or denied based on the specific network port or protocol being used. However, this approach is no longer sufficient to protect against modern threats, where attackers can easily disguise their activities and evade port-based filters.

Application-based policy rules, on the other hand, allow organizations to control access to network applications based on their actual behavior, regardless of the ports or protocols being used. This approach provides a more granular and effective way of controlling network access and reducing the attack surface.

To know more about management web interface,

https://brainly.com/question/31845387

#SPJ11

Why didn’t social media become popular when the first cell phone hit the market in the late 1990s and early 2000s?
a.
using phones for communication was a cultural shift.
b.
the first cell phones were not connected to the internet.
c.
people often ignorde call from individuals they do not know.
d.
it was very unusual for individuals to have access to cell phones.

Answers

Answer:

b. the first cell phones were not connected to the internet.

Explanation:

Social media has only risen in popularity in the last decade. Additionally,  the first cell phones were not touch screens as they are nowadays. On some, you only called people you couldn't even text. Some did not even have caller ID's let alone other apps

The first cell phones were not connected to the internet. The correct option is B.

What is social media?

Online platforms and tools that enable individuals and groups to create, share, and exchange user-generated content, as well as participate in online communication and social networking, are referred to as social media.

People use social media for communication, entertainment, news consumption, and social interactions, and it has become an increasingly important part of their daily lives.

The first cell phones did not have internet access. Early cell phones were primarily used for voice calls and text messaging and had limited functionality.

With the introduction of smartphones and the expansion of cellular data networks, widespread use of social media on mobile devices became possible.

Thus, the correct option is B.

For more details regarding social media, visit:

https://brainly.com/question/30326484

#SPJ2

write a Python function that join the two string and print it ​

Answers

Answer:

string1 = "this is string 1"

string2 = " this is string 2"

print(string1 + string2)

Explanation:

the string1 variable is assigned with a string value(aka. str)

string2 is also a variable assigned with a slightly different string value

the 3rd line then prints string 1 and 2 to the console.

Answer:

Nothing complicated

See attached images

write a Python function that join the two string and print it

you have two classes, a crow class that inherits from a bird class. what is the correct class declaration for crow?

Answers

Assuming that the Bird class has already been defined, the correct class declaration for Crow that inherits from Bird would be:

class Crow(Bird):

   def __init__(self, name):

       super().__init__(name)

       # additional initialization if needed

In this example, the Crow class is defined as a subclass of Bird using the syntax class Crow(Bird):. This means that Crow inherits all the methods and attributes of Bird, and can also define its own methods and attributes.

The __init__ method is also defined for Crow, which takes a name parameter and passes it to the __init__ method of the Bird class using the super() function. This ensures that the name parameter is properly initialized in the Bird class before any additional initialization is performed in the Crow class.

Of course, the specific implementation details of the Crow class will depend on your specific use case and requirements.

The correct class declaration for a crow class that inherits from a bird class in object-oriented programming is:

class Crow(Bird):

class definition

In object-oriented programming, inheritance is a mechanism that allows a subclass to inherit properties and behaviors from its superclass. In the context of the given question, the crow class is a subclass of the bird class. The bird class serves as the superclass, which means that the crow class inherits all of the properties and methods defined in the bird class.

To declare the crow class, the class keyword is used, followed by the name of the class, which in this case is Crow. The name of the superclass, which is Bird, is included in parentheses after the name of the subclass. This indicates that the crow class inherits from the bird class.

The class definition for the crow class can then be included within the body of the class declaration, which may include properties, methods, and other attributes specific to the crow class. By inheriting from the bird class, the crow class automatically has access to all of the properties and methods defined in the bird class, which can be extended or overridden as needed within the crow class definition.

You can learn more about class declaration at

https://brainly.com/question/22100033

#SPJ11

After reading chapter four of your textbook, use a browser to research workflow models. Answer the following questions: Is it a good idea to include diagram (s) of the application you are building, and if so, why?

Answers

It is definitely a good idea to include diagrams of the application that you are building. This is because it gives your a concise framework to manage things accordingly.

What do you mean by Workflow models?

Workflow models may be characterized as the sequential series of tasks and decisions that correspondingly constructs a business process.

The process of designing a workflow model lets business users observe how a process works and helps them streamline and optimize it for the best results and high efficiency.

There are three types of workflow models that typically exist. They are sequential, state-machine, and rules-driven workflows. An understanding of each will help you decide which one best suits your business processes.

Therefore, it is definitely a good idea to include diagrams of the application that you are building. This is because it gives your a concise framework to manage things accordingly.

To learn more about Workflow models, refer to the link:

https://brainly.com/question/28523445

#SPJ1

a lw is to load register $5 from location 0x0040000c in memory. register $10 contains 0x00400000. write the assembly language instruction:

Answers

Assembly-language enables programmers to write code that corresponds to the machine instructions that a given processor may execute.

What kinds of instructions can you write in assembly language?

In an assembly language, program operations are defined by one of three types of instruction statements: Opcode abbreviations. Definitions of data. assembly resolutions.

What are the four fundamental components of instruction in assembly language?

Label, mnemonic, operand, and comment are its four component parts; not all of these are found in every line. The first component, in this case LOOP, is a label—a term the programmer created to designate this place in the program. The value of the address at which this instruction is stored will be used to set it.

To know more about Assembly-language visit:-

https://brainly.com/question/14728681

#SPJ4

What is the full form of UNIVAC, QBASIC?​

Answers

UNIVersal Automatic Computer (UNIVAC)

Quick Beginner's All-Purpose Symbolic Instruction Code (QBasic)

Explanation:

UNIVAC:Universal Automatic Computer

QBASIC:Quick Beginner's All-Purpose Symbolic

Instruction Code

Keep smiling and hope u r satisfied with my answer.Have a great day :)

>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

&gt;What is the output of the following code:list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]print (list1[1]

part 1 1. convert 1001011 from binary to decimal. 2. convert 1101110 from decimal to binary. using arrays write functions to convert values from binary to decimal and decimal to binary.

Answers

First, we must add the first digit of the binary number and multiply 0 by 2. Step 2: Add the second binary digit to the result of the previous step after multiplying it by two.

Once there is no digit remaining, process 2 is repeated once more. The resultant decimal number will be the outcome. Accordingly, 0000 is 1, 0001 is 2, 0010 is 3, etc., till 1001 is 9, but from 1010 to 1111 of binary, the hexadecimal employs letters from A to F, and when it reaches the value of 16, it turns into 10 since the two groups of four binary digits are 0001 0000.

Learn more about digit

https://brainly.com/question/26856218

#SPJ4

what buttons do you need to keep on pressed on the pendant while jogging the robotic arm or running a program function?

Answers

SHIFT and JOG keys are the buttons you need to keep on pressed on the pendant while jogging the robotic arm or running a program function.

The process of manually moving the industrial robot using the teach pendant is known as "jogging" the robot. There are typically four different ways to move the robot manually: joint mode or axis in which just one axis is driven, either positively or negatively.

For autonomous task execution, robot software is employed. There are many software frameworks and techniques that have been suggested to make programming robots simpler. Some robot software seeks to create mechanically intelligent devices. Feedback loops, control, pathfinding, data filtering, data location, and data exchange are typical tasks.

To learn more about Software click here:

brainly.com/question/18994353

#SPJ4

An effective systems proposal report should: O make vague recommendationsO provide detailed and specific, covering every aspect of the analysis O be written clearly and concisely to convey key points O be written for any potential reader 1

Answers

The report for a successful systems proposal report should be written concisely and clearly to convey the main points

How should a proposal report be formatted?

It should outline the project's aims, intended outcomes, approach, and expected effects. Objectives must be specific, measurable, and in line with the project's declared need and purpose. They also need to be measurable.

What do you write a proposal report for?

The written proposal's two main objectives are to save you time: (1) defining a clear goal and demonstrating why pursuing it is valuable; and (2) formulating a detailed plan for achieving those goals and confirming that the plan truly achieves the stated objectives.

To know more about  proposal report visit:
https://brainly.com/question/4025229

#SPJ4

Other Questions
Union City Bakery uses a chocolate chip muffin recipe that yields 1/2 cup of milk for every batch of 12 chocolate chip muffins. Based on the recipe: How much milk is needed to make each muffin? How much milk in needed to make 24 chocolate chip muffins? please need help with #8 & 9, need urgent help,thank you!8. Suzanne told her friend Johnny that he needed to know for the calculus test that the derivative of a cubic function will always be a quadratic function. Is Suzanne correct? Explain why or why not. why did the Mississippian culture decline after contact with Europeans Means that more then half of people agree with an idea Which function has zeros at x = 10 and x = 2?f(x) = x2 12x + 20f(x) = x2 20x + 12f(x) = 5x2 + 40x + 60f(x) = 5x2 + 60x + 100 15 POINTS HELP I WILL GIVE BRAINLIEST!!!!Which linear functions represent a slope of 4? Check all that apply. A 2-column table with 4 rows. Column 1 is labeled x with entries 3, 6, 9, 12. Column 2 is labeled y with entries negative 11, 1, 13, 25. On a coordinate plane, a line goes through points (0, 3) and (5, 4). A 2-column table with 4 rows. Column 1 is labeled x with entries negative 5, negative 1, 3, 7. Column 2 is labeled y with entries negative 32, 24, 16, 8. On a coordinate plane, a line goes through points (2, 0) and (3, 4). Which of the following is NOT an advantage of the corporate form of business organization? a. unlimited lifeb. transferability of ownershipc. unlimited personal liability for shareholders d. limited liability of shareholders How can employees use a code of ethics?OA. By using it to learn how to negotiate a pay increaseB. By using it to develop new legal responsibilitiesC. By referring to it for examples of how to apply ethical standardsOD. By using it to write computer programs that make ethical choices What does the Krebs cycle use to make NADH?Answer Options are: CO2, Glucose, or Pyruvate(Solved... the answer is Pyruvate) THE NEXT THREE (3) QUESTIONS ARE BASED ON THE FOLLOWING INFORMATION: Consider a monocentric city in which every household occupies one-fifth of an acre of land ( =0.20). Suppose that the cost of commuting is $50 per mile per month for a round trip ( t=$50 ). Finally, suppose that a 0.20-acre lot 10 miles from the city centre (d=10) rents for $1,000 per month. 3. What is the slope of the household bid rent function? (1) 1,000 (2) +50 (3) 250 (4) 50 4. What is the bid rent per acre at a distance of 5 miles? (1) 1,250 per acre (2) 5,500 per acre (3) 6,250 per acre (4) 7,500 per acre Partnership XYZ distributed a piece of land in a nonliquidating distribution to Bob, a 50% partner, during the current taxable year. The land had an adjusted basis of $50,000 and a FMV at the date of the distribution of $180,000. Bob has been a partner for 10 years. He had contributed the land to the partnership at formation when its FMV and basis were both equal. He has a basis in the partnership of $40,000 at year end, without taking into consideration the effects of the distribution. Calculate the following:a. Partnership XYZ's recognized gain (loss)b. Bob's taxable gain (income)c. Bob's basis in the propertyd. Bob's basis in the partnership Whats the significance of the division of the Czech Republic and Slovakia? PLEASE ANSWER!!!! Which of the following would make the oxygen-hemoglobin curve shift right?A) increased H+ concentrationB) increased pHC) decreased temperatureD) decreased CO2E) None of the answers are correct you find that the delta h of a solution is 105.2kj/mol and the delta s of the same solution is found to be 54.1kj/mol*k at 254k. what is the solnG of the solution? Is the reaction exothermic or endothermic? Are the reactants or products favorable? Which equation represents the perpendicularbisector of AB whose endpoints are A(8.2) andB(0,6)?1: y = 2x - 42: y=-1/2x+23: y=-1/2x+64: y = 2x - 12 Use the information given below to find cos(-) (4.5 x 10^9) + (4.5 x 10^-4) Show me How much is 1 5/6 as a mixed fraction Please help me... ill give u 5 stars and a heart if u help me, and its correct HELPP MEEE PLEASEEEEE IM GIVING BRAINLIEST !!!!!