You are supporting a Windows 10 computer that is used by three different users. The computer has the following volumes with default System Protection

Answers

Answer 1

The Windows 10 computer you are supporting has multiple volumes with default System Protection. System Protection is a feature in Windows that creates restore points, allowing you to revert your computer's settings to a previous state if needed.


1. To access System Protection settings, right-click on the "This PC" or "My Computer" icon on the desktop and select "Properties." Then, click on the "System Protection" link on the left side of the window.

2. The computer has multiple volumes, which are separate storage areas. Each volume can have its own System Protection settings.

3. System Protection creates restore points automatically on a regular basis, and also creates them when certain system changes occur, such as when you install a new program or driver.

4. The default System Protection settings allocate a certain amount of disk space for storing restore points. This space is shared among all the volumes on the computer.

5. When a restore point is created, it captures the current state of the computer's system settings and files. If any issues arise in the future, you can use these restore points to roll back your computer to its previous state.

6. Since the computer is used by three different users, each user's activities can affect the system settings and files on their respective volumes. System Protection provides a safeguard by allowing each user to restore their volume independently if needed.

In summary, the Windows 10 computer you are supporting has multiple volumes with default System Protection. This feature creates restore points to revert system settings and files to a previous state. Each user's volume can be restored independently if any issues arise.

Learn more about default System Protection: https://brainly.com/question/32804971

#SPJ11


Related Questions

1. Design a swap module that accepts two arguments of the Real data type and swaps them.

2. Validate understanding This was previous answer

PROGRAM: Swap_module
Input: two numbers

Step 1. INPUT number in variable argument[1]
Step 2. INPUT number in variable argument[2]
Step 3. Callswap(arugment[1],argument[2])
Step 4. Exit Program
This is my Code: is this correct

// the swap module accepts two integer arguments and swap the values.

Module swap (Integer Ref a, Integer Ref b)

Declare Integer a;

Declare Integer b;

Declare Integer temp;

Set temp = a;

Set a = b;

Set b = temp;

End Module

Answers

This code declares a module named swap that takes two arguments of the Real data type by reference. It then declares a temporary variable temp of the Real data type to store the value of one of the arguments during the swap. The values of the two arguments are swapped using the temporary variable temp, and the result is returned as output.

What the code for a swap module that accepts two arguments of the Real data type and swaps them?

The provided code is not correct because it declares variables a and b again, but they are already declared as arguments. Also, the data type specified in the problem statement is Real, not Integer. The correct code for a swap module that accepts two arguments of the Real data type and swaps them is:

Module swap (Real Ref a, Real Ref b)

Declare Real temp;

Set temp = a;

Set a = b;

Set b = temp;

This code declares a module named swap that takes two arguments of the Real data type by reference. It then declares a temporary variable temp of the Real data type to store the value of one of the arguments during the swap. The values of the two arguments are swapped using the temporary variable temp, and the result is returned as output.

Learn more about code

brainly.com/question/15301012

#SPJ11

explain the following types of storages


flash disk ​

Answers

Explanation:

a data storage device that uses flash memory specifically : a small rectangular device that is designed to be plugged directly into a USB port on a computer and is often used for transferring files from one computer to another. — called also thumb drive.

Answer:

storage module made of flash memory chips. Flash disks have no mechanical platters or access arms, but the term "disk" is used because the data are accessed as if they were on a hard drive. The disk storage structure is emulated.

The first flash disks were housed in Type II PC Cards for expanding laptop storage. Subsequently, flash memory disks have arrived in a variety of formats, including entire hard drive replacements (see SSD), memory cards for digital cameras (see flash memory) and modules that fit on a keychain (see USB drive

the three biggest newspapers in which state offered their final print editions this week?

Answers

It is not clear which specific week is being referred to in the question, as there have been several instances of newspapers ending their print editions in different states at different times.

Ohio: The Cleveland Plain Dealer, the largest newspaper in Ohio, announced in April 2021 that it would no longer print a daily newspaper, instead focusing on digital journalism.Louisiana: The Times-Picayune, the primary newspaper in New Orleans, printed its final daily edition in May 2019, becoming a three-day-a-week publication. The newspaper later announced in 2020 that it would no longer print a physical newspaper at all, moving to a fully digital model.Oregon: The Oregonian, the largest newspaper in Oregon, announced in August 2021 that it would no longer print newspapers on Mondays, Tuesdays, and Thursdays, instead focusing on digital content. However, the newspaper will still continue to print physical newspapers on Wednesdays, Fridays, and Sundays.

To learn more about print click the link below:

brainly.com/question/13889354

#SPJ4

If you can’t see the Assets panel, which of these three buttons do you press?

A) Plugins
B) Assets
c) Layers

Answers

Answer: B

Explanation:

The answer is B


Explanation

I did it

Research your choice and how they match your requirement and priorities. This is
called______________.
a) Requirement
b) Option analysis
c) Prioritising

Answers

It’s C basically if you need explanation ask me

the abuse of children is a symptom of

Answers

Mental issues such as anger issues
the abuse is a anger issue.

The technique that allows you to have multiple logical LANs operating on the same physical equipment is known as a _____.collision domain VLAN data link layer protocol

Answers

The VLANs provide a flexible and scalable way to manage network traffic and improve network performance and security.

The technique that allows you to have multiple logical LANs operating on the same physical equipment is known as a VLAN or Virtual Local Area Network.

VLANs are a way to divide a single physical network into multiple logical networks. This allows network administrators to segment traffic and improve network performance, security, and manageability.

With VLANs, devices on different VLANs can communicate with each other as if they were on the same physical LAN. However, traffic between VLANs needs to be routed through a router or Layer 3 switch.

By using VLANs, network administrators can create separate broadcast domains and isolate traffic between groups of users or applications. VLANs are implemented at the data link layer of the OSI model, using protocols such as IEEE 802.1Q or Cisco's proprietary Inter-Switch Link (ISL) protocol.

For such more questions on VLANs:

https://brainly.com/question/25867685

#SPJ11

Who designed the Analytical Engine in the 1930s?
Charles Babbage
Steve Wozniak
Alan Turing
Bill Gates

Answers

Answer:

Charles Babbage

Explanation:

Charles Babbage designed the Analytical Engine in the 1930s.

Thank you ☺️☺️

Answer:

Charles Babbage

Explanation:

Charles Babbage designed a general-purpose calculating machine, the Analytical Engine, which is considered to be the precursor of the modern-day computer. He was never able to finish it.

- Edge 2022

what are three ways to foster accountability on an agile release train

Answers

The three crucial program events of inspect, adapt, and test maintain the Agile Release Train on track. This activity comes after each PI planning activity.

All the individuals expertise required for the implementation, testing, deployment, and release of software, hardware, firmware, or other products are included in the Agile Release Train. Each ART is a virtual organization that plans, commits, develops, and deploys work collaboratively. It typically consists of 50–125 individuals. The main duties of the RTE are to help the teams deliver value and to facilitate ART events and processes. RTEs interact with stakeholders, deal with obstacles, assist with risk management, and promote constant improvement.

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

It is becoming more common in modern networks for users to enroll their personal devices into the enterprise network. Which policy defines these devices and their acceptable use

Answers

The policy that defines personal devices and their acceptable use in modern networks is known as Bring Your Own Device (BYOD) policy. The BYOD policy is a set of guidelines that governs how personal devices are allowed to access and interact with the enterprise network.

This policy is essential because it allows employees to use their personal devices for work-related tasks, which can increase productivity and convenience.

However, it also introduces security risks as personal devices may not be as secure as enterprise devices, and employees may not always adhere to the company's security policies.
A well-crafted BYOD policy should outline the acceptable use of personal devices on the network, including device types, operating systems, and security requirements.

It should also specify which data can be accessed from personal devices and which applications are allowed. Additionally, the policy should describe the procedure for reporting lost or stolen devices and how the company plans to secure the data on these devices.
For more questions on networks

https://brainly.com/question/28342757

#SPJ11

When programming the implementation for the ArrayBag, which strategy was recommended as the most efficient way to avoid gaps in the array when an element is removed? a. Shift all the entries beyond the gap back to the preceding slot in the array and then decrease the number of items in the bag. b. Shift all the entries in front of the gap forward to the next slot in the array and then decrease the number of items in the bag. c. Set the pointer in the entry before the gap to the entry after the gap and then decrease the number of items in the bag. d. Replace the entry being removed with the last entry in the array and then decrease the number of items in the bag. e. a and d are both efficient strategies

Answers

The recommended strategy to avoid gaps in the array when an element is removed from the ArrayBag is to replace the entry being removed with the last entry in the array and then decrease the number of items in the bag.

This strategy is considered efficient because it doesn't require shifting elements, which can be time-consuming, especially for large arrays. Instead, it swaps the element to be removed with the last element in the array, effectively filling in the gap. The other strategies mentioned, such as shifting entries or setting pointers, may also work but are not as efficient as the recommended strategy. It's worth noting that the efficiency of each strategy may depend on the specific implementation and the size of the array.

To know more about array visit:

https://brainly.com/question/30757831

#SPJ11

Choose a service or product currently in development. You may choose your own product or service for this discussion. Describe the prototype developed for that service or product

Answers

A prototype refers to the early version of a product that is created to examine and evaluate its various aspects, such as design, functionality, and user experience.

This is done in order to make changes and improvements to the product before it is put into production. A prototype is typically a rough and incomplete version of the final product, and it is used to test and refine its different components. Therefore, the prototype is an essential step in the development of any product or service.Let's consider a hypothetical example of a mobile app service that is being developed to provide users with personalized nutrition and fitness plans based on their body type and fitness goals.The prototype developed for this service would consist of a basic mobile app that users can download and use to input their body measurements, fitness goals, and dietary preferences. Once they have entered this information, the app would generate a personalized fitness and nutrition plan for them, which they can follow to achieve their goals.The prototype would be tested by a small group of users to assess its functionality and usability. Feedback from the users would be used to refine and improve the app before it is launched to the general public. This process of testing and refining the prototype would continue until the app meets the required standard for its intended users.

Learn more about prototype here :-

https://brainly.com/question/29784785

#SPJ11

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

Which of the following internet connection types is known to have a significantly higher latency than the others

Answers

What are the options?

Secondary storage is also known as the ‘main memory’

Answers

Answer:

False

Explanation:

The main memory is called RAM (Random Access Memory). This is where all programs and variables in the computer live, and also it is the fastest storage.

Secondary storage would be your hard drive, USB, CD, floppy disk.

What can be used to help identify mission-critical systems?
A. Critical outage times
B. Critical business functions
C. PCI DSS review
D. Disaster recovery plan

Answers

The term that can be used to help identify mission-critical systems is B. Critical business functions.

What is a critical business?

A critical business service is one that, if interrupted, might have a major negative effect on the organization's safety and soundness, its clients, or other organizations  that depend on it.

Any IT component such as software, hardware, database, process, ) that performs a function crucial to business operations is referred to as a "mission-critical system" or "mission-critical computing."

Learn more about business functions at;

https://brainly.com/question/14688077

#SPJ4

I need help ASAP
(What is done when Python compiles your program?)
It is converted into octal numbers.
It is converted into bytemap.
It is converted into hexadecimal.
It is converted into bytecode.

Answers

Answer:

It is converted into bytecode.

The answer would be letter d.bytecode

WHO SAYS BUP ALL THE TIME ​

Answers

Answer:

Mario

Explanation:

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

define the two types of linking in html

Answers

Image links(linking a picture) and web links(linking a website)

Given the following table called Dog, what is most likely the primary key?

dog_ID owner_ID name dob breed
1837 9847 Fido 1-4-2017 Sheltie
1049 4857 Fifi 5-3-2013 Poodle


A.
dog_ID

B.
owner_ID

C.
name

D.
dob

Answers

Given the following table called Dog, the  most likely the primary key is: "dog_ID" (Option A)

What is primary key?

A primary key is a precise choice of a basic number of properties that uniquely specify a tuple in a relation in the relational model of databases. Informally, a primary key is defined as "which attributes identify a record," and in basic circumstances consists of a single attribute: a unique ID.

A main key often focuses on the table's uniqueness. It ensures that the value in the particular column is distinct. A foreign key is typically used to establish a connection between two tables.

Learn more about primary key:
https://brainly.com/question/13437797
#SPJ1

In what year was the TED group created?

Answers

Answer:

1984

Explanation:

Pleaseee Help!!!!

What industry holds a significant place in the commercial phere of economies all over the world due to factors such as the growing variety of game hardware and peripheral devices, emerging markets, and increasingly diversified demographics?

A)The Medical software industry

B)The video game industry

C)The graphic artistry industry

D)The international travel industry

Answers

Answer: B
Hope this helps!!
And do you want an explanation?

Which part of the computer carries out instructions?
a. CPU
b. Monitor
c. Mouse
d. Printer

Answers

Option A:The part of the computer that carries out instructions is the CPU (Central Processing Unit).

The central processing unit (CPU) is the part of a computer system that carries out the instructions of a computer program. It's the central hub that operates on all the instructions sent to a computer's hardware and software. It's also known as the computer's brain since it receives information, interprets it, and performs actions based on it.The CPU is the most important part of a computer system since it performs all of the computing activities. The monitor, mouse, and printer are peripheral devices that interact with the CPU, but they do not execute instructions. As a result, option (a) is the correct response.Thus the correct option is A.

For such more question on CPU:

brainly.com/question/474553

#SPJ11

you have installed a new computer with a quad-core 64-bit processor, 6 gb of memory, and a pcie video card with 512 mb of memory. after installing the operating system, you see less than 4 gb of memory showing as available in windows. which of the following actions would most likely correct this issue?

Answers

The most likely action to correct the issue of less than 4 GB of memory showing as available in Windows would be to enable Physical Address Extension (PAE) in the operating system.

This will allow Windows to recognize and utilize memory beyond the 4 GB limit.  Enabling PAE allows a 32-bit operating system, such as Windows, to address more than 4 GB of memory. By default, a 32-bit operating system can only access up to 4 GB of memory due to address space limitations. However, enabling PAE extends the address space and enables the system to utilize more memory. In this case, with 6 GB of memory installed, enabling PAE would allow Windows to recognize and use the full 6 GB of memory. PAE can be enabled through the system's BIOS settings or by modifying the boot configuration in Windows. Once enabled, Windows should Windows the full amount of available memory.

Learn more about Windows here:

https://brainly.com/question/17004240

#SPJ11

Does Apple have an ethical duty to society to cooperate in law enforcement investigations and decrypt devices it makes when requested by law enforcement?
Does Apple have an ethical duty to its customers to refuse to cooperate in law enforcement investigations and decrypt devices it makes when requested by law enforcement?
In the Time article, the author offers his opinions as to why Apple challenged the court order. Are the author’s concerns valid?
One of the issues in this situation was that law enforcement wanted Apple to create a special operating system to make it easier to access the encrypted data and bypass encryption technology. Should Congress enact a law requiring technology companies like Apple to include a "backdoor"—a way to circumvent the encryption technology—in their products that would allow law enforcement to access encrypted data pursuant to a search warrant?
Please keep in mind that you must convince me that you have read the material and carefully considered the questions posed to receive full credit. You must answer each question separately (i.e., separate numbered paragraphs), and in answering each of the questions, you should be writing at least 4 to 5 sentences per answer to each question. You must cite to your sources to support your initial post—including the materials discussed above and any concepts discussed in this course. You may also consider and cite to outside sources.
SOURCES
Read the "This Is the Real Reason Apple Is Fighting the FBI" article from Time.
Read the "A Year After San Bernardino And Apple-FBI, Where Are We On Encryption?" story from National Public Radio (NPR).
Read the "FBI asked anew about pushing Apple to unlock San Bernardino shooter’s iPhone" article from the Mercury News.

Answers

Yes, Apple, just like any other tech company, follows the law and is supposed to help with legal investigations. But, the problem of decoding devices is difficult.

Yes, Apple should make sure it respects its customers' privacy and keeps their personal data safe because it is the right thing to do. Apple keeps its customers' privacy intact by not helping law enforcement with their investigations and unlocking devices.

.

The worries brought up by the author in the Time article are indeed important. One important worry is the possibility of people misusing their authority.

If technology companies like Apple are required to make secret entrances for law enforcement, it could set a precedent that weakens the basic right to privacy.

What is the  ethical duty to society

Apple and other companies say that if we create backdoors or make encryption weaker on purpose, it can harm user privacy and security. This can have serious effects. Finding a balance between law enforcement and user privacy is a difficult ethical problem.

Apple has a duty to safeguard its customers' privacy and security because these are important for user confidence. Choosing not to help the police in their investigations can be seen as doing the right thing to protect customers.

In all, it is complicated for Apple to decide if they should help law enforcement investigations and unlock devices for their customers. The worries mentioned by the writer in the Time article are important and show the possible risks of weakening encryption technology and individual privacy.

Read more about ethical duty here:

https://brainly.com/question/29871792

#SPJ1

Hi! I need help with a survey thing I'm doing I just need a few people and I have posted in a different place as well but I hoped someone could help me out her as well. here's te question.
give an example of previous experiences you've had that involved a model?(These can be school related or from your personal life.)
what was the setting and real-world use) ?
what were the basic components of the model ?
What assumptions are built into the model and what are the limits of the model, or what can the model fail to explain?
* DOESN'T HAVE TO BE RELATED TO ANY SUBJECT IN PARTICULAR I JUST SELECTED COMPUTER AND TECH CAUSE THATS THE CLASS I'M DOING THIS FOR.

Answers

Answer:

Explanation:

1. All Computer Science and tech courses rock. However, they won’t cover all the skills you might need in a job. For example, if you’re planning to go into software development, you might learn a considerable amount of programming languages, but you may need to go beyond that for work.

You may have to understand and get the hang of new programming languages on your own, without anyone to teach you. It might be a good idea to look for introductions.

So schedule your time properly and after completing your core assignments, hit G.o.o.g.l.e, and find out what type of computing skills are tech companies looking for. Particularly, look into further details on the exact requirements at those specific companies you dream of working for.

You could also make little websites or programs just for yourself, to test your abilities and push yourself further.

If want to study Information Technology at top-ranked universities, check programmes offered by some of the best universities ranked by The Times Higher Education.

2. Try to get your assignments done well in advance of deadlines, ideally have them ready a week in advance. Otherwise, you’ll just get tired, your code won’t work, and you’ll fail the assignment.

Computer Science and tech is one of those areas where it is absolutely necessary to keep working throughout the semester because sometimes you’ll need to take a break to get some clarity as to why something isn’t working. So do yourself a favour and work all the way through the semester.

That doesn’t mean you should spend every minute studying; it means you’ll have to be constant with your learning progress throughout the year. You’ll do far better this way.

3. What do you learn during Computer Science degrees? Most tech courses are not all theory compared to courses from other types of degrees. Even if Computer Science and Information Technology degrees include theoretical classes, their approach is far more practical.

For instance, right after a theoretical class, you will have to apply that knowledge through practical exercises in a computer laboratory.

Sure, you may have to work on essays, but they will always have to include practical work or projects – both successfully combined, with logical explanations for each step and chapter from your work.

4. Being able to work on your own and independently motivate yourself is great, and you’ll need that. But don’t forget that you’re not alone, and its’ highly unlikely you’ll be alone in the workplace as well. You’re likely to be part of a team.

And team work takes some skills you’ll need to brush up on and work constantly. Once you’ll find a good study group, you’ll surely enjoy to meet with your peers, share ideas and work on interesting projects. After all, that’s just the classical way innovation starts: with a few genius minds that come together and work on a new invention until it becomes trademark.

5. If you study a Computer Science degree, it may seem pretty daunting as you'll need to learn more, study more, do more. But don’t forget to live your life. Have fun, meet up with friends, go clubbing or travelling, get involved in some student activities.

Help me guys..
thankyou​

Help me guys..thankyou

Answers

Answer:

spoon

excess

level

1/2 cup

whatever dry ingredient u have

Explanation:

data mining is the extraction of hidden information from large databases to find statistical links blank______.

Answers

Data mining is the extraction of hidden information from large databases to find statistical links, patterns, or relationships.

Data mining is a process of analyzing large sets of data to discover patterns, correlations, and relationships that may not be readily apparent. It involves using various techniques and algorithms to extract valuable insights and knowledge from the data.

The goal of data mining is to uncover hidden information and make informed decisions or predictions based on the discovered patterns.

The process typically starts with data collection, where large volumes of structured or unstructured data are gathered from various sources.

This data is then preprocessed to remove noise, handle missing values, and transform it into a suitable format for analysis. Next, data mining algorithms are applied to identify patterns and relationships within the dataset.

Data mining techniques can include statistical analysis, machine learning, clustering, classification, regression, and association rule mining, among others.

These methods help to uncover meaningful insights, such as identifying customer buying patterns, predicting future trends, detecting fraud, optimizing business processes, or making personalized recommendations.

By uncovering hidden information and identifying patterns in the data, data mining enables businesses, researchers, and organizations to make data-driven decisions, gain a competitive edge, and extract value from their large datasets.

Learn more about Data mining at: https://brainly.com/question/2596411

#SPJ11

. Data mining methods for classifying or estimating an outcome based on a set of input variables is referred to as a. supervised learning. b. unsupervised learning. c. Interval estimating. d. data sampling.

Answers

Data mining methods for classifying or estimating an outcome based on a set of input variables is referred to as A. Supervised learning.

Supervised learning is a type of machine learning where the algorithm is trained on a labeled dataset. In this context, a labeled dataset contains both the input variables (also known as features) and the desired output, which is the target variable or class label. The goal of supervised learning is to create a model that can accurately predict the target variable for new, unseen data points.

Interval estimating and data sampling are not directly related to classifying or estimating outcomes based on input variables. Interval estimating is a statistical method for estimating an unknown population parameter within a given range or interval, while data sampling refers to the process of selecting a subset of individuals or data points from a larger population to draw inferences or make predictions about the entire population.

In summary, supervised learning is the data mining method for classifying or estimating an outcome based on a set of input variables, while unsupervised learning, interval estimating, and data sampling serve different purposes within the realm of data analysis and machine learning. Therefore, the correct option is A.

Know more about Supervised learning here:

https://brainly.com/question/29888372

#SPJ11

Other Questions
What does waves mean in the sentence, Around 1500 B.C. waves of new people began crossing the Hindu Kush into India? 1. How does the percent voting vary by state? the richest deposit of silver in south america that was mined by the spanish was located in the andes near ______ (in present-day bolivia). Lactose is a sugar, which macromolecule must it be? 5 divided by 555.25 Solve a) with Substitution and b) with Elimination (check attached picture) Is 6.7825.. reapeating or terminating for extra credit please help solve 5. (a) Interpret What does this excerpt suggest about the importance ofmemories? (b) Speculate What do you think the future might hold forthis community, even after the drought ends and the land heals? Explain. A common issue that can hurt a relationship is expecting A. your partner to change B. that your partner loves you C. physical and emotional intimacy D. that you can trust your partner Select the best answer for the question.Which of the following is not a step in the problem-solving procedure?A. Use trial and error to find an answer.B. Read the problem carefully.C. Check your work.D. Decide which operations to use. A car slows down uninformly from a speed of 28.0m/s to rest in 8.00s.How far did it travel in that time? 2. jacob undergoes an excision of a carotid body tumor. how is the procedure coded? are any modifiers attached? It is known that an investment of 100 will increase to 150 at the end of 5 years. Find the sum of the present values of three payments of 4649 each which will occur at the end of 5,10 and 15 years. Assume a constant annual effective interest rate. (nearest cent) Answer: The two sets of grandparents for a grandchild on their 10 nth birthday wish to invest enough money to pay $20,000 each year for four years toward college costs starting on their grandchild's 18 th birthday. Grandparents A agree to pay the first two payments, while grandparents B agree to pay the last two payments. If the effective interest rate is 6% annual compound interest, find the difference between the contributions of grandparents A and B. Answer: ii They They did the task. (Negative) iii Hari and his friends worked for the society (past continuous)iv Sarita went to the orchild (future continuous)v I haven't done my homework yet (affirmative) preferred stock dividends: can be deferred indefinitely. are only paid if common stock dividends are also paid. become a debt of the firm if unpaid. have priority over debt interest payments but not common stock dividends. are a tax-deductible business expense. Why would the people of medieval Europe want to hear stories about heroic knights? I think is A but Im not sure please help . In five sentences,one for each explain ways to avoid being kidnapped and held for ransom. why was a cheeks and balance system set up in the constitution?