Answers

Answer 1

Answer: C00CHIE MAN

Explanation:  Ok So this is more of a complicated problem, if you add 6i and 7i you clearly Get 13i thats simple but when you start doing something like (7i^17+42.628%*1037)(437^2-281i)^19

Anyways once you distribute you should get C00CHIE MAN


Related Questions

Tori needs to turn her Turtle to the left 90 pixels. Which line of code should Tori use?

A tina(90)
B tina.back(90)
C tina.left(90)
D tina.right(90)

Answers

Answer: D tina right (90)

Explanation:

right

Answer:

D tina.right(90)

Explanation:

At which layer of the osi model does a router function?

Answers

A router functions at the Network Layer (Layer 3) of the OSI model. It is responsible for selecting the best route for data to travel from its source to its destination.

A router functions at the Network Layer (Layer 3) of the OSI model. This layer is responsible for routing packets between different networks and systems. A router inspects the header of a packet to determine its source and destination address and then decides the best route for the packet to travel from its source to its destination. It also performs network address translation (NAT) and can filter packets based on the source or destination address. Furthermore, a router can be used to connect networks of different types, such as a LAN and WAN. It can also be used to connect different networks that use different protocols. By performing these tasks, a router helps facilitate communication between different systems and networks.

Learn more about functions here-

brainly.com/question/28939774

#SPJ4

using the internet library or any other available resources answer the following questions about the different types of drug tests

Answers

Different types of drug tests are used to detect the presence of drugs in a person's system. These tests can vary in terms of the sample collected, the drugs they can detect, and the detection window.
   Urine Test: This is the most common type of drug test. It detects the presence of drugs or their metabolites in urine samples. Urine tests can detect a wide range of drugs, including marijuana, cocaine, opioids, amphetamines, and benzodiazepines. The detection window for urine tests is typically 1-3 days for most drugs, but can be longer for certain substances.
    Blood Test: Blood tests are more invasive and are usually used in situations where recent drug use needs to be determined. They can detect drugs directly in the bloodstream and provide a more accurate snapshot of recent drug use. Blood tests can detect a wide range of drugs, including alcohol, but the detection window is shorter compared to urine tests, typically a few hours to a few days.
    Hair Test: Hair tests are less common but have a longer detection window. They can detect drug use over a period of several months. This type of test measures the presence of drug metabolites that are deposited in hair follicles. Hair tests are often used to detect long-term drug use, and they can detect a wide range of substances.
    Saliva Test: Saliva tests are non-invasive and can detect recent drug use. They are often used in roadside drug testing. Saliva tests can detect the presence of drugs within a few hours to a few days of use. They are commonly used to detect marijuana, cocaine, amphetamines, and opioids.
     Sweat Test: Sweat tests are less common and involve collecting sweat samples from the skin. This type of test is used to detect drug use over a longer period, typically a week or more. Sweat tests can detect a wide range of drugs, including cocaine, amphetamines, and opioids.
     It's important to note that each type of drug test has its advantages and limitations. The choice of test depends on factors such as the purpose of testing, the detection window required, and the resources available. It's always best to consult a medical professional or testing facility for accurate and specific information regarding drug testing.

To know more about bloodstream visit:

https://brainly.com/question/13537877

#SPJ11

A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing

Answers

The type of certificates that the network administrator is currently importing is Root.

What do root certificates  mean?

Root certificates are known to be the backbone of any form of authentication and security in the area of software and also usually in  the Internet.

Note that they are often  issued by the certified authority (CA) and can also be  verified by its owner and as such it is the best for the network administrator  to use.

Learn more about certificates from

https://brainly.com/question/24931496

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Need help ASAP
Thanks+ BRAINLIST only for correct answer

What is the importance of protecting other’s personal information and privacy?

Answers

It is important to protect yours and others personal informations because some people might try to take advantage of them and use them for no good such as fraud, charging your card, taking your passwords, and so on

Hey,

So there are so many reasons to protect yours and others personal info online but  here are just a few.

1. Help stop credit card fraud. this is one of the biggest types of fraud in the internet.

2 stop identity theft.

3  prevent your social media accounts getting compromised .

Some fine advise.

change your login in info  more then not. it is more likely that someone will find your login info  online or thought a software then just guessing it.

-scav

A tropical storm has been moving at 15 miles

Answers

where’s the rest of the question?

Choose the correct numbers in order to have the following output.

3 1
3 2
4 1
4 2

for numx in [3, _]: (4 or 2)
for numy in [1, _]: (4 or 2)
print (numx, numy)​

Answers

To have the desired output, the correct numbers to fill the blanks are as follows:

for numx in [3, 2]:

for numy in [1, 2]:

print (numx, numy)

Explanation:

The first line iterates over the values 3 and 2. Choosing 4 would break the pattern and not produce the desired output.

Similarly, the second line iterates over the values 1 and 2. Choosing 4 would again break the pattern and not produce the desired output.

The print statement simply outputs the current values of numx and numy, resulting in the desired output of:

3 1

3 2

4 1

4 2

Learn more about produce the desired output here:

https://brainly.com/question/32248151

#SPJ11

Standard form
Expanded for
Unit Form
95.7
9.10 - 541-701
9.057
9x150.0172 0.001
0.957
9401 - 50.0172 0.001
9 tenths 5 hundredths 7 thousandths
9 tens 5 ones 7 tenths
9 ones 5 hundredths 7 thousandths
9 ones 5 tenths 7 thousandths

Answers

I need help on this too

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

JAVA CODE.


Write a method that takes a Rectangle as a parameter, and changes the width so it becomes a square (i.e. the width is set to the value of the length).

This method must be called makeSquare() and it must take a Rectangle parameter.

Answers

Solution :

public class Rectangle  

{

int len,bre;

Rectangle(int l,int b)

{

setLength(l);

setBreadth(b);

}

void setLength(int l)

{

len=l;

}

void setBreadth(int b)

{

bre=b;

}

int getLength()

{

return len;

}

int getBreadth()

{

return bre;

}

void makeSquare(Rectangle r)

{

r.setBreadth(len);

System.out.println("Square Parameter");

System.out.println("Length:" +r.getLength() + " Length: ".getBreadth());

}

public static void main(String[] args){

Rectangle r=new Rectangle(10,5);

System.out.println("Rectangle Parameter");

System.out.println("Length:"+r.getLength()+" Breadth:"+r.getBreadth());

r.makeSquare(r);

 }

 }

}

For questions 2-4, consider the following code:

if (month ==9):
if (day > 15):
print ("Second half of the month")
else:
print ("First half of the month")
else:
print ("Not in September")
What is the output if month = 9 and day = 14?

Answers

Answer:

First half of the month

Explanation:

Given

The above lines of code

Required

Determine the output if month = 9 and day = 14

The first if statement: if (month ==9):  checks if month equals 9.

This statement is true, so the next statement is executed.

The next executable statement:

if (day > 15):

checks if day is greater than 15.

This statement is false, so the else statement is executed

else:

print ("First half of the month")

The above statement is executed and the string "First half of the month" is printed

Answer:

e

Explanation:

you have an azure subscription that includes a virtual machine named vm1. you need to protect vm1 by using azure backup. which azure resource should you create first?

Answers

To protect my virtual machine named vm1 using azure backup, the azure resource to be created first is the recovery services vault.

What is Azure?

Azure is a cloud-based computing service provided by Microsoft Corporation. Services provided include computing, storage, analytics, and networking services. To do this, an Azure subscription is required. The subscription provides a logical container that holds the details of all your resources like virtual machines (VMs), databases, and more.

In using Azure back up. The following steps are as follows:

Create a recovery services vault.Modify storage replication.Apply a backup policy.Create a custom policy.Trigger initial backup.Verify backup job status.

Learn more about Azure from:

https://brainly.com/question/28446952?referrer=searchResults

#SPJ4

True or False In general, a variable name must begin with either a letter or an underscore (_).

Answers

True. In general, a variable name must begin with either a letter or an underscore (_). Variable names are used to represent data in a program and are essential for organizing and managing the code. They help store, modify, and retrieve data values efficiently.

A variable name follows certain rules depending on the programming language being used. Typically, these rules include starting the variable name with a letter (a-z or A-Z) or an underscore (_). This allows the compiler or interpreter to differentiate between variables and other elements in the code, such as functions or reserved words.

Additionally, variable names should not include spaces or special characters (with the exception of the underscore). In most programming languages, variable names can include alphanumeric characters (letters and numbers), but they must not start with a number.

Following these guidelines ensures that the code is easier to read, maintain, and debug. A well-chosen variable name also improves code readability and helps other developers understand the purpose and usage of the variable.

In conclusion, the statement is true that, in general, a variable name must begin with either a letter or an underscore (_). This rule is commonly followed across various programming languages, helping to maintain consistency and organization within the code.

Learn more about variable here:

https://brainly.com/question/29583350

#SPJ11

every department can now edit their own portion of the university's web site. the editing software prevents someone from editing another department's content and also permits authorized editors to edit only a portion of the department's pages. this kind of software is called what?

Answers

A program known as a content management system (CM) allows users to create, edit, collaborate on, publish, and save digital information.

Meaning of management system?

A management system is the method an organization uses to coordinate the various aspects of its operations in order to accomplish its goals. The content areas of your website are completely under the authority of users with the editor position in WordPress. They have the ability to add, modify, publish, and delete any post on the website, even those published by other people. A comment can be moderated, edited, or deleted by an editor. A management system is a crucial tool for streamlining your company's operations and increasing productivity. The right management system implementation and certification for your company's operations boost business performance and incorporate safe and sustainable practices.

To learn more about management system refer to

https://brainly.com/question/24998003

#SPJ4

On

June

​15,

2023​,

Wonderful

Furniture discarded equipment that had a cost of

$10,000​,

a residual value of​ $0, and was fully depreciated. Journalize the disposal of the equipment. ​(Record debits​ first, then credits. Select the explanation on the last line of the journal entry​ table.)

Date

Accounts and Explanation

Debit

Credit

Jun. 15

Answers

The accumulated Depreciation account is debited with $10,000. The Equipment account is credited with $10,000.

Journal entry for the disposal of equipment with a cost of $10,000, residual value of $0, and fully depreciated:

Date               Accounts and Explanation      Debit   Credit

Jun. 15         Accumulated Depreciation         $10,000

                    Equipment                                    $10,000

In this journal entry, the Accumulated Depreciation account is debited with $10,000, representing the accumulated depreciation on the equipment. The Equipment account is credited with $10,000 to remove the equipment from the company's books.

When equipment is fully depreciated and discarded with no residual value, it means that the company has used up the entire cost of the equipment through depreciation and no longer considers it as an asset. Therefore, the disposal of the equipment requires recording the removal of its accumulated depreciation and eliminating its cost from the books.

By debiting the Accumulated Depreciation account, the company recognizes that the equipment's total accumulated depreciation is no longer applicable. This reduces the accumulated depreciation balance on the balance sheet. On the other hand, the Equipment account is credited to remove the equipment's cost from the balance sheet entirely. This ensures that the financial statements reflect the disposal of the fully depreciated equipment accurately.

It's important to note that the specific accounts and amounts used in the journal entry may vary depending on the company's accounting policies and practices. Additionally, consulting with an accounting professional or referring to the company's specific financial reporting guidelines is recommended for accurate recording of such transactions using newer technology.

Learn more about technology here:

brainly.com/question/9171028

#SPJ11

Why the hierarchical perspective information systems or functional perspective information systems does not meet today’s business environment ?
What are differences between ‘data warehouse’ and ‘operational database’.
Briefly discuss your understanding of ‘system integration’ using an example (hint: use ERP or else)
What Knowledge Management System is and why it is necessary in today’s business environment ?

Answers

Hierarchical perspective information systems and functional perspective information systems have some limitations that do not meet today's business environment.

Hierarchical perspective information systems have an organizational structure that is designed as a pyramid, where the highest levels make decisions, and the lower levels carry them out. However, today's business environment needs a flatter organizational structure to accommodate a broader range of activities

.Functional perspective information systems, on the other hand, have an organizational structure that is based on departments, and each department performs its unique functions. This structure can create a functional silo, where each department focuses on its operations, and communication is limited to within the department.

To know more about communication visit:

https://brainly.com/question/33631954

#SPJ11

cursors are held in a reserved memory area in the client computer. T/F

Answers

True. Cursors are temporary objects used to manipulate and traverse the result sets returned by database queries, and they are typically held in memory on the client computer until they are closed or the connection to the database server is terminated.


Cursors are temporary objects used by database applications to manipulate and traverse the result sets returned by database queries. They are held in a reserved memory area in the client computer until they are closed or the connection to the database server is terminated. Therefore, the statement that cursors are held in a reserved memory area in the client computer is true.


Cursors are commonly used in database programming to navigate and manipulate the data retrieved by a query. They are created in the client application and executed on the database server. When a cursor is opened, a result set is created, and the cursor is positioned on the first row of the result set. The client application can then use the cursor to fetch and process each row of data in the result set one at a time. Cursors are typically held in a reserved memory area in the client computer until they are closed or the connection to the database server is terminated. This allows the client application to maintain a persistent connection to the database server and perform operations on the result set without having to re-query the database each time.

To know more about database queries visit :-

https://brainly.com/question/30367131

#SPJ11



1. Copy the file secret.txt (Code Listing 9.3) from the Student CD or as directed by your instructor. This file is only one line long. It contains 2 sentences. 2. Write a main method that will read the file secret.txt, separate it into word tokens. 3. You should process the tokens by taking the first letter of every fifth word, starting with the first word in the file. Convert these letters to uppercase and append them to a StringBuilder object to form a word which will be printed to the console to display the secret message.

Answers

Answer:

In Java:

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

public class FP {

 public static void main(String[] args) {

   try {

     File myObj = new File("secret.txt");

     Scanner scr= new Scanner(myObj);

     while (scr.hasNextLine()) {

       String data = scr.nextLine();        

       String[] tokens = data.split(" ");  

       for(int i =0;i<tokens.length;i+=5){

        tokens[i] = tokens[i].substring(0, 1).toUpperCase() + tokens[i].substring(1);        }

       StringBuilder newstring = null;

       newstring = new StringBuilder();  

        for(String abc:tokens){newstring.append(abc+" ");     }  

         System.out.print(newstring);      }

     scr.close();      

   } catch(Exception ex){

     System.out.println("An error occurred.");    }

 }

}

Explanation:

See attachment for complete program where comments were used to explain each line

Which of the following statements about malware are accurate? Select 2 options.


There are just two types of malware: viruses and worms.
pls help anyone

The purpose of malware is always to steal money.


Malware does not target mobile devices.


Malware is a type of cyberthreat that attempts to intentionally attack a system.


In 2019, malware collectively cost individuals and organizations 2 trillion dollars a year.

Answers

Answer:

4,5

Explanation:

Those to describe what malaware is

The statements about malware that are accurate:

Malware is a type of cyberthreat that attempts to intentionally attack a system. In 2019, malware collectively cost individuals and organizations 2 trillion dollars a year.

What Is Malware?

Malware attacks is known to be a type of attack to a system that tends to crack weak passwords, bore through the systems, spread via networks, and also disrupt the day to day operations of business.

There are different types of malware that can lock up important files, spam a person with ads, slow down your computer and others. Note that  Malware as a type of cyberthreat often tries  to deliberately attack a system.

Learn more about Malware from

https://brainly.com/question/399317

Catherine purchased dried herbs from the grocery store. Which structure would she use if wanted to create a mixture of powdered herbs by pounding them repeatedly using a mortar and pestle?

A.

looping structure

B.

selection structure

C.

sequence structure

D.

conditional structure

Answers

Answer: C. sequence structure

Explanation:

Catherine would use the sequence structure to achieve her results of powdered herb after pounding the herbs.

In a sequence structure, an action, or event, tends to lead to the next action in an order which has been predetermined. The sequence can contain any number of actions, but no actions can or must be skipped in the sequence.

This means she has to go through the pounding process to achieve the powdered state.

Answer:

A. Looping structure

Explanation:

I just took the test

Can someone pls help with this (20 points)

Can someone pls help with this (20 points)

Answers

Answer:

1. A

2. D

3. C

4. B

Explanation:

Hope this helps! Not sure if this is correct but im pretty sure the answers I gave are accurate. If Im wrong about any of the answers i put someone please correct me in the comments! :)

What should you point out when demonstrating the confident cornering of a 2023 murano awd through a sweeping curve? choose only three.

Answers

The things that one need to  point out when demonstrating the confident cornering of a 2023 murano awd through a sweeping curve is that

The quick response to steering inputHow level Murano stays during cornering

Is a  Murano a good car?

The  Murano is known to be a good SUV that is said to possess a very powerful engine, as well as a gentle ride, and straightforward kind of  infotainment controls.

Therefore, The things that one need to  point out when demonstrating the confident cornering of a 2023 murano awd through a sweeping curve is that

The quick response to steering inputHow level Murano stays during cornering

Learn more about murano  from

https://brainly.com/question/25794485

#SPJ1

Maia wants to highlight the word mob in her first paragraph. Choose the steps that Maia will need to do to complete this process.

Answers

Answer: Step 2: Go to the font command group

Step 3: click on the text highlight color button

Step 4: Click on the color

Explanation:

Mala should do this by selecting her paragraphs and choosing Line and Gap from the Paragraph command group.

What are paragraphs?

A paragraph is a standalone section of writing that discusses a single subject or argument. One or more sentences make up a paragraph. Although they are not needed by any language's syntax, paragraphs are typically taken for granted in professional writing and are employed to break up the lengthier text.

The space between her paragraphs can be rapidly and simply adjusted by Maia. She should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this. From the drop-down menu, she should be able to select Add Space Before Paragraph.

The paragraph spacing has to be adjusted. She can choose the Line Spacing option from the same drop-down menu. The dialog box for paragraphs will then open. She will be able to choose the amount of space she wants before and after the paragraph using this option. These two choices are situated and displayed underneath the dialog box for paragraphs.

Therefore, she should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this.

To know more about paragraphs follow

https://brainly.com/question/11600913

#SPJ2

The accompanying dataset provides the closing prices for four stocks and the stock exchange over 12 days. Complete parts a through c. Click the icon to view the closing prices data. a. Use Excel's Data Analysis Exponential Smoothing tool to forecast each of the stock prices using simple exponential smoothing with a smoothing constant of 0.3. Complete the exponential smoothing forecast model for stock A. (Tama intanaro ar danimale muinded to two decimal places as needed.) Complete the exponential smoothing forecast model for stock B. (Type integers or decimals rounded to two decimal places as needed.) Complete the exponential smoothing forecast model for stock C. unded to two decimal places as needed.) Closing Prices

Answers

To complete the exponential smoothing forecast model for each stock, you would need the historical data for each stock's closing prices and apply the steps mentioned above. Then, you can evaluate the accuracy and performance of the forecasts based on the actual values.

Exponential smoothing is a forecasting technique that uses weighted averages of past observations to predict future values. The smoothing constant, also known as the alpha value, determines the weight given to the most recent observation.

To apply exponential smoothing, you would follow these steps:

Start with an initial forecast for the first period.

Calculate the forecast for the next period using the formula:

Forecast(t) = Forecast(t-1) + α * (Actual(t-1) - Forecast(t-1))

where α is the smoothing constant and Actual(t-1) is the actual value of the previous period.

Repeat step 2 for each subsequent period.

By adjusting the value of the smoothing constant, you can control the level of responsiveness to recent data. A higher alpha value gives more weight to recent observations, making the forecast more sensitive to changes. On the other hand, a lower alpha value places more emphasis on past data, resulting in a smoother forecast.

Learn more about exponential  here

https://brainly.com/question/29160729

#SPJ11

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

what did Ada lovelace do

Answers

Answer: Ada Lovelace is often considered to be the first computer programmer!

Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.

A speed limit sign that says "NIGHT" indicates the _____ legal speed between sunset and sunrise.

Answers

Answer:

Maximum

Explanation:

Speed limits indicate the maximum speed you are legally allowed to drive.

Which computer use microprocessor as its CPU ?

Answers

Microcomputer

Microcomputer was formerly a commonly used term for personal computers, particularly any of a class of small digital computers whose CPU is contained on a single integrated semiconductor chip. Thus, a microcomputer uses a single microprocessor for its CPU, which performs all logic and arithmetic operations.

What is one pass of a coding sequence called? a return a loop an iteration an infinite loop.​

Answers

Answer: an iteration

Explanation:

Edge

Answer:

C

Explanation:

Other Questions
These toys] wash up along the whole island.... Where did all of these things come from? Who lost them? Why did they end up at Clipperton? It's like the island of lost toys... . What brings this old horse 700 miles (1,100 kilometers) from shore? Hance Milbrand,, "Island Castaway Describes His Self-Imposed Exile," in National Geographic News Lance Milbrand, a filmmaker, spent 41 days on remote Clipperton Island in the Pacific Ocean. Which view of geography do his remarks on the island best support? a. All parts of the earth are connected. b. Geography is full of garbage. C. Islands are separate from the rest of the earth. d. Geography tells you what places are called. There are 8 soccer teams for the 110 players in the league. The league wants the same number of players on each team. Which explains whether or not it is possible? CarrascoCapThere are two questions on this slide. Please answer both to the best of your ability.6. What is the measure of angle AED? How do youknow?50B7. What is the measure of angle DEB? How do youknow? samantha invests a total of $10,500 in two accounts. the first account earned a rate of return of 10% (after a year). however, the second account suffered a 7% loss in the same time period. at the end of one year, the total amount of money gained was $-140.00. how much was invested into each account? Which part of the drum vibrates when it produces sound? Lactase and carbonic anhydrase are examples of what type of substance?substratereactantproductenzyme how does healthy environment helps to keep us healthy ICY WATER SETUP:What was the average for the INTERNAL temperature change? Question 2 options:18 degrees F.05 degrees F4.6 degrees F.95 degrees F Study the "Case Formulation and the Diagnostic Process" media piece. Now, summarize the process of assessment, diagnosing, and treatment in your own words. What are some implications for not including the client in the creation of an effective treatment plan? How does the therapist support the client for beneficial behaviors to progress towards treatment goals? calculate the slope of the line. Use points that clearly cross the intersections of the graph paper B) write the equation for the line shown in the graph. Give your answer in slope intercept form Y=mx+b Choose the best answer. PLSS HELP MEEE1. They spent 2 hours how to make Chung Cake.A. to learn B. learn C. learning D. to learning2. Vietnam is a country with 54 ethnic groups.A. bilingual B. ethnic C. diversified D. multi cultural3. Country children play on streets than city children.A. more free B. freelier C. freer D. more freely4. He enjoys the movement of clouds on the sky.A. lie and watch B. lying and watching C. to lie and to watch D. to lie and to watch5. Parents often prevent their children the computer games.A. from playing B. to play C. to playing D. playing6. Storms most of the crops, which affects peasants' life.A. destroy B. destructive C. destruction D. destroying7. My sister and I often help my parents the buffaloes when we come back home from school.A. herd B.herds C.to herding D. herded8. Teenagers enjoy to music and out with friends.A. listen - hang B. to listen to hang C. listening - hang D. listening - hanging9. Do you mind the air-conditioner? It is too cold.A. turn on B. turn off C. turning on D. turning off10. Sitting too long in front of the computer makes your eyes _ .A. tired B. harm C. boring D. relax11. She prefers TV to books.A. watching/reading B. watch/read C. watching/read D. watch/reading12. I hate _ up late to do homework.A. staying B. stay C. get D. getting13. His brother is very . He takes part in many school activities.A. sociable B. society C. social D. reserved14. Some parents are thinking of banning children from the computer.A. to using B. to use C. use D. using15. He regrets school early. It is the biggest mistake in his life.A. left B. leaving C. to leave D. leave16. Mark gets the first in IOE contest.A. present B. prize C. price D. president17. To Tet, Vietnamese people often make many tasty traditional foods.A. celebrate B. make C. have D. create18. Using computers too much may have harmful effects your minds and bodies.A. on B. to C. with D. onto19. People in the countryside live than those in the city.A. happy B. more happily C. happily D. less happy20. We to the countryside two months ago.A. go B. have gone C. went D. will go21. What will you do if you the final examinations?A. will pass B. would pass C. pass D. passed23. I wish my summer holiday longer.A. will be B. is C. were D. has been24. The streets in cities are than those in the countryside.A. crowded B. more crowded C. crowdeder D. less crowded25. It rained hard. , my father went to work. A. Therefore B. However C. Because D. So26. How much do you want? A. bananas B. eggs C. candies D. sugar27. We anything from James since we left school.A. havent heard B. heard C. dont hear D. didnt hear28. This newspaper everyday.A. is publishing B. publish C. published D. is published29. the bad weather, farmers still work on their fields.A. In spite of B. Although C. Because of D. However30. Life in a small town is than that in a big city.A. peaceful B. much peaceful C. less peaceful D. much more peaceful Which three options below describe legislative fuctions? find the area of the Shaded sector. round to the nearest hundreds placeHELP!!! ASAP which department ensures that all new sales contracts comply with the ethical standards of the company when enough customers have bought the product so it begins to draw the attention of the general public, the product is entering the Summarize the Ice making process below. How many 1/6 cup servings are in 3/4 cups of popcorn? (in simplest fraction form)A 3/2 B 5/2C 7/2D 9/2 What is your next step when a patients vital sign reading is abnormal? Put the events in chronological order that led to Gerald Ford becoming the firstpresident to have never been elected to the vice presidency or presidency.VNixon appoints Ford as his vice president after the resignation of VicePresident Spiro Agnew.Ford is sworn in as president following the line of succession laid out bythe 25th amendment.Nixon resigns from the presidency to avoid impeachment.Ford is sworn in as vice president. describe in detail how a do/s protects a file from access or modification by an unauthorized user. compare it to nos file protection.