You can move the insertion point into the next text placeholder by pressing the ____ keyboard shortcut keys.

Answers

Answer 1

Answer:

Ctrl+Enter (as far as I know)

Explanation:


Related Questions

What should be included in a publication or website after obtaining the right to use a graphic, text, or other item found on the Internet

Answers

Based on computer and media applications, the thing that should be included in a publication or website after obtaining the right to use a graphic, text, or other item found on the Internet is known as Reference

What is a Reference?

Reference is the act or action of mentioning it alluding to something. Usually, reference to literary or artistic work is considered a source to the origin of the work.

References do not cover unauthorized access. However, when a right to use work like publication, text, graphics, etc., is given, it is expected that the individual should provide references to the sources.

Hence, in this case, it is concluded that the correct answer is "Reference."

Learn more about Reference here: https://brainly.com/question/6260792

A company notices their software is prone to buffer overflow attacks. They choose a popular development environment, Microsoft Visual Studio, to help avoid future attacks. What development environment feature would most help the company avoid future buffer overflows

Answers

Answer:

Compiler Option

Explanation: These help prevent buffer overflow attacks

Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choices leap frogging. express package services. satellite telephones. fiber-optic telephones. voice over internet protocol (VOIP) services.

Answers

Answer:

a. leap frogging

Question:

Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choices leap frogging. express package services. satellite telephones. fiber-optic telephones. voice over internet protocol (VOIP) services.

write the sql code to delete the row for william smithfield, who was hired on june 22, 2004, and whose job code is 500.

Answers

To delete the row for William Smithfield, who was hired on June 22, 2004, and has a job code of 500, you can use the following SQL code:

sql

DELETE FROM your_table_name

WHERE employee_name = 'William Smithfield'

   AND hire_date = '2004-06-22'

   AND job_code = 500;

In this code, replace your_table_name with the actual name of your table where the data is stored. Adjust the column names accordingly based on your table schema.

The DELETE FROM statement is used to remove rows from a table. The WHERE clause specifies the conditions that must be met for a row to be deleted. In this case, it checks for the employee name, hire date, and job code to match the values provided. Only the row that satisfies all the conditions will be deleted from the table.

learn more about "code ":- https://brainly.com/question/28338824

#SPJ11

Portraits should not ever include any objects other than the person.
True
False

Answers

Answer:

False

Explanation:

Took the test and that is what i got

Portraits should not ever include any objects other than the person is false.

What is portrait?

Portrait is defined as a representation of a person in art where the face and its expressions are emphasized, such as a painting, photograph, sculpture, or other medium. We can learn a lot about ourselves via portraiture. Portraits frequently depict a person's appearance, but they can also convey a person's character or their values.

A self-portrait is one that the artist has painted of themselves. By the late Middle Ages, there are many more clearly identifiable cases. However, if the term is broadened, the first was created by the sculptor Bak for the Egyptian pharaoh Akhenaten, who around 1365 BC carved a likeness of himself and his wife Taheri.

Thus, portraits should not ever include any objects other than the person is false.

To learn more about portrait, refer to the link below:

https://brainly.com/question/3903196

#SPJ2

WHERE CAN I FIND HOW MANY POINTS I EARNED!
BE SPECIFIC PLS

EXACT LOCATION

Answers

Answer:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Explanation:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Custom-built mini-programs that can execute a complicated series of commands in a tool like microsoft word or excel are called.

Answers

Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros.

What is a macro program?

Macros are known to be a type of programs that functions by automating some commonly used processes or tasks that are found in the Excel.

Note that Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros as a often  records day to day operations through the use of keystrokes or a mouse.

Learn more about  mini-programs from

https://brainly.com/question/24833629

#SPJ1

A framework for studying memory that uses the computer as a model of human cognitive processes defines the?

Answers

A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

What is information processing theory?

The information processing theory explains how human bras also works like a computer by converting various thought, observation to meaningful information.

The human brain is said to works in a sequential way. It receives input such as picture and processes the information to give a result.

Therefore, A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

Learn more on information processing  below

https://brainly.com/question/11610994

#SPJ1

A combination of the three main services in cloud computing

Answers

Answer:

: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).

Explanation:

Cloud computing can be broken up into three main services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). These three services make up what Rackspace calls the Cloud Computing Stack, with SaaS on top, PaaS in the middle, and IaaS on the bottom.

I NEED ANSWERS!! HELP!

I NEED ANSWERS!! HELP!

Answers

Answer: before: 44%
after:26-27%

Explanation:

The bar graph shows the percentages, you can estimate how much percentage each one is at.

Answer:

Tienes que antes 44% y despues 26-27%

Write the code to create the following table. You need only write the code for the table. You need not write the code for the entire HTML 5 document.You need to add a little CSS to the table. Note that the formatting does not appear in the table that follows:Apply a yellow background to the first row.Make sure to collapse the borders.The cell content in the first row should be centered. The cell content in the other rows should be left-justified.You can use inline styles or you can use embedded styles.IMPORTANT. YOUR ANSWER SHOULD SHOW ME THE HTML - NOT THE FORMATTED HTML.Column 1 Column 2 Column 3Data 11 Data 22 Data 33Data 12 Data 22 Data 33

Answers

To create a table with the specified CSS formatting, the following HTML code can be used:

Html Code:

<!DOCTYPE html>

<HTML>

<HEAD>

 <TITLE>TABLE</TITLE>

 <style type="text/css">

  /* embedded styles */

  /* collapse the borders table */

  table {

   border-collapse: collapse;

  }

  /* he cell content in the other rows should be left-justified */

  tbody {

   background: #ffff;

   text-align: left;

  }

  /* yellow background to the first row and content should be centered */

  thead {

   background: #ffe135;

   text-align: center;

  }

 </style>

</HEAD>

<BODY>

 <TABLE BORDER>

  <thead>

   <TR>

    <TH>Column 1</TH>

    <TH>Column 2</TH>

    <TH>Column 3</TH>

   </TR>

  </thead>

  <tbody>

   <TR>

    <TD>Data 11</TD>

    <TD>Data 22</TD>

    <TD>Data 33</TD>

   </TR>

   <TR>

    <TD>Data 12</TD>

    <TD>Data 22</TD>

    <TD>Data 33</TD>

   </TR>

  </tbody>

 </TABLE>

</BODY>

</HTML>

For more information on css and html see: https://brainly.com/question/13603029

#SPJ11

Write the code to create the following table. You need only write the code for the table. You need not

Match the pictures with the type of camera angle the photographer used in each of them.​

Match the pictures with the type of camera angle the photographer used in each of them.

Answers

Answer:

Check pdf

Explanation:

which comparison operator matches a pattern that includes wildcards?

Answers

The LIKE operator is a comparison operator that is used to selected records by comparing field values to a pattern that contains one or multiple wildcard characters.

In computer programming, an operator is a symbol that often denotes an act or process. These symbols were modified from logic and mathematics. A specific value or operand can be manipulated by an operator.

The fundamental building block of every program, operators are used for anything from extremely basic tasks like counting to sophisticated techniques like security encryption. An operator manipulates a mathematical , logical value, or operand, exactly a given way to produce a specific result, depending on the kind of operator.

To know more about operator on:

brainly.com/question/28238572

#SPJ4

Select all the steps needed to create a maintenance schedule. Identify individuals to perform the maintenance. Document or log maintenance that has been performed. Take an inventory of the equipment. Obtain test equipment if necessary. Define maintenance tasks. Review the manufacturers' manuals. Establish frequency of tasks. Run the defragmentation utility. Develop a reminder system.

Answers

Answer:

Maintenance planning and scheduling, arguably the most neglected functions of modern asset management, are at the heart of an effective maintenance management system. Through the use of work orders and a CMMS, maintenance planning covers the daily or weekly planning, scheduling and control activities to ensure that scheduled work is undertaken, and that available resources are being used optimally. Yet many organizations still struggle to make their maintenance planning and scheduling as effective as it should be.

Maintenance planning

Without planning and scheduling, the wrench-on time for a company is on average only 35%. That means that for every technician working an 8-hour day, only 2.8 hours of that day is spent working on assets. Implementing proper maintenance planning and scheduling, however, can increase the wrench time from 35% to 65%. At this level of efficiency, a technician working an 8-hour day will complete 5.2 hours of actual work. With 65% of the engineer’s time being used efficiently, only 35% of their time is wasted. This improvement would enable an organization to move away from a reactive (firefighting) state of maintenance, and improve overall workforce efficiency.

Explanation:

1. Identify the problem

The need for maintenance can be triggered by a failure, a noisy bearing or an oil leak. Once identified, the problem must be reported to the maintenance department. This is normally done through a work request so that planning and scheduling can take place.

2. Plan the maintenance task

‘Planning’ involves deciding on what exactly needs to be done, determining priority, and defining the sequence of activities and skills required. Ensure that all the resources, material, labor, contract services, specialist equipment, tools and information are available. There may even be a need for outside contractors, items to be purchased or work permits to be obtained, all of which must be arranged in advance.

A maintenance planning function is a critical tool for reducing downtime and maximising the value of preventive maintenance. The maintenance planner must therefore have the technical skills and equipment knowledge to do this planning.

3. Schedule the work

‘Scheduling’ involves deciding when to do the work. This will depend on the priority level of the task, and the availability of both the resources and the equipment to be repaired. Many organizations schedule maintenance for a specific period during the working week or month. Weekend maintenance is never desirable because, in many cases, suppliers are not available and personnel are expensive.

The legal requirements with regard to statutory inspections are generally quite rigid, so try and devise a 52-week maintenance plan at the beginning of each year. Review this plan periodically to improve the accuracy and quality of the information. Communicate the preventive and corrective maintenance requirements to production so that they fully understand the need for the maintenance window.

4. Allocate the task to specific people

Although this will depend on organizational arrangements, consider the following:

Allocate your maintenance personnel to specific areas or pieces of equipment

Ensure the allocated person has the skills to perform the task

Be very clear about the type of work that will be allocated to outside contractors

Where necessary, undertake hazard analyses to identify risks and formulate action plans to control access to high-risk areas; your plans should include hot work permits, confined space permits and lockout procedures.

5. Ensure the work is executed properly

It is usually the responsibility of the maintenance supervisor to confirm that the maintenance work meets the required quality standards, usually through selected planned job observations. The planner (or, in some instances, a maintenance scheduler) should monitor outstanding schedules or work requests to ensure that the planned work was actually done.

6. Analyze the problem and decide how to prevent it from happening again

Analyze the root cause of major failures and take corrective action to prevent recurrence. Corrective action could include training, a change to the preventive maintenance programme or equipment redesign. Breakdown or failure of the management process is often overlooked in a major failure. In those cases, corrective action may be a systems upgrade.

When all six of these foundational steps are implemented and combined correctly, maintenance planning can attain much greater levels of efficiency. This leads to important asset-related data and information being shared across the plant, and even across multiple plants. It’s not an overnight process though, so don’t give up if you think it might take too long. The benefits are well worth it.

Identify and eliminate problems quickly and effectively with How-to Guide: How to use a problem-solving A3 Report, an essential guide to compiling an A3 report

How to use color picker CSS?

Answers

To emphasize a color on the right, use the color generator by click and dragging your mouse inside the picker box.

Is CSS a kind of programming?

CSS, which stands for Cascading Style Sheets, is a stylesheet language that tells the browser how to display our HTML; it is not a software program. Today, CSS is used to determine the design of further than 95% of all websites available on the internet, making it incredibly important.

What CSS is most popular?

Bootstrap. The most widely used CSS framework for creating flexible and mobile-first websites is without a doubt Bootstrap. It provides a variety of vocabulary for template layouts and includes HTML, CSS, plus Java scripts for diverse web design features.

To know more about CSS visit:

https://brainly.com/question/29580872

#SPJ4

Assume the Accumulator register (AC) is holding a value of 0. Find the value stored in the AC after executing the following MARIE instructions: Load X
Subt Y Skipcond 800 Load Z
X, Dec 100
Y, Dec 2
Z, Dec 3

Answers

After executing the given MARIE instructions, the value stored in the Accumulator register (AC) is 3. The AC goes through the transformations: 0 → 100 → 98 → 3.

In the given MARIE instructions, the following steps are executed:

1. Load X: This instruction loads the value of X (100) into the Accumulator register (AC). Now AC = 100.

2. Subt Y: This instruction subtracts the value of Y (2) from the Accumulator register (AC). AC = AC - Y = 100 - 2 = 98.

3. Skipcond 800: This instruction checks the value in the Accumulator register (AC). If the value is negative or zero, it skips the next instruction. In this case, AC (98) is positive, so it doesn't skip the next instruction.

4. Load Z: Since the Skipcond instruction did not skip the next instruction, the Load Z instruction is executed. It loads the value of Z (3) into the Accumulator register (AC). Now AC = 3.

Therefore, after executing the given MARIE instructions, the value stored in the Accumulator register (AC) is 3.

The given MARIE instructions are executed in sequence. Initially, the Accumulator register (AC) holds a value of 0. The first instruction, Load X, loads the value of X (100) into the AC, resulting in AC = 100. The second instruction, Subt Y, subtracts the value of Y (2) from the AC, giving AC = 98.

The Skipcond 800 instruction does not skip the next instruction since AC (98) is positive. The third instruction, Load Z, loads the value of Z (3) into the AC, giving AC = 3.

In summary, the AC goes through the following transformations: 0 → 100 → 98 → 3. Thus, after executing the given MARIE instructions, the value stored in the Accumulator register (AC) is 3.

Learn more about MARIE

brainly.com/question/31677215

#SPJ11

please use R to answer the questions. present or attach relevant R outputs used to answer the questions

Answers

R is a popular programming language for statistical analysis and data manipulation, with a wide range of tools and libraries available.

What are the key features and advantages of using R for statistical analysis and data manipulation?

R is a programming language and environment widely used for statistical analysis, data visualization, and data manipulation.

It provides a comprehensive set of tools and libraries for data analysis and is popular among data scientists, statisticians, and researchers.

R supports a wide range of statistical techniques, such as linear regression, hypothesis testing, clustering, and machine learning algorithms.

With its extensive library ecosystem, R enables users to easily access and manipulate data, create visualizations, and perform advanced statistical analyses.

It also has a vibrant community that contributes packages and resources, making it a powerful tool for data analysis and research.

Learn more about popular programming

brainly.com/question/13382447

#SPJ11

How do you think smartphones will have changed in 5 years?

Give 3 features that you think smartphones will have in 5 years that it does not have right now.

Answers

Answer:

Hope this helps :)

Smartphones will have changed in 5 years becuase they will become more advance and useful than now.

1. The phone will have a hologram feature for us to use to look at pictures/images, etc.

2. The phone will be able to fold into fourths, so it will be small for storage.

3. The phone will have advance camera(s) that can take extremely clear and bright photos from close and very far distances.

The statement int[ ] list = {5, 10, 15, 20};
O initializes list to have 5 int values
O initializes list to have 20 int values
O initializes list to have 4 int values
O declares list but does not initialize it
O causes a syntax error because it does not include "new int[4]" prior to the list of values

Answers

Option 3 is correct ( initializes list to have 4 int values) The syntax here implies direct setup of integer array named list with 4 initial values. there is no need to mention size for this kind of syntax.

Describe an array.

An array is a group of related data items kept in close proximity to each other in ram. The sole way to retrieve each data element direct is using its index number, making it the most basic data structure.

How do arrays function?

A linear data structure called an array contains elements of the same data type in contiguous and nearby memory regions. Arrays operate using an index with values ranging from zero to (n-1), where n is the array's size.

To know more about array visit :

https://brainly.com/question/15048840

#SPJ4

Can you predict what changes will come to data storage in the next decade? 

Answers

Answer:

Explanation:

More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes

Parts of a Computer

Question 3 of 9

Which part looks like a TV screen and lets you see your work and your

3

files?

Computer Case

Printer

Mouse

Monitor

Submit Answer

Please help I’m incredibly confused

Answers

Answer:

Monitor Sorry If I’m wrong!

Explanation:

Answer:

Maybe files I think I'm wrong

How is peace circulated?​

Answers

Answer:

Peace is when people are able to resolve their conflicts without violence and can work together to improve the quality of their lives. 

When people are able to refill to their conflicts

Which statement is true with respect to Java?

A.
Java programs are not compiled, only interpreted.

B.
Intermediate bytecode is created by the JIT.

C.
Bytecode is platform independent.

D.
The JVM creates object code after compiling.

Answers

Java is a high level programming language.

The true statement is (c) Bytecode is platform independent.

First, java programs are compiled and interpreted

This means that (a) is not true

Secondly Just-In-Time (JIT) does not create intermediate bytecodes, and Java virtual machine (JVM) does not create object codes.

However, java programs are compiled to an instruction set for the JVM; this instruction set is referred to as the byte code.

And the byte code is platform-independent.

Hence, the true option is (c)

Read more about java programming language at:

https://brainly.com/question/2266606

Answer:

C) Bytecode is platform independent

Explanation:

Just got it right on ASU

How do you delete data from a cell?
O press the delete key
O the d key
O the enter key
O F5 key

How do you delete data from a cell?O press the delete keyO the d keyO the enter keyO F5 key

Answers

Answer:

press the delete key is the way to delete the data from a cell

BREIFLY (4 sentences) describe why cybersecurity is a necessary career field

Answers

Answer:

Whenever there are rules or general etiquettes that must be followed, there is no doubt that there will be humans to break them. Like how Laws and law enforcement was made to deter humans from breaking rules in the physical world. Cyber security is a necessary career field in society that will help prevent people from breaking rules in the cyber space.

the purpose of ___ is to hold data permanently, even when the computer is turned off.

Answers

the purpose of storage is to hold data permanently, even when the computer is turned off

give me rationale about brake system???

Answers

The brake system in a vehicle plays a critical role in ensuring safety, control, and efficient operation.

Here are some rationales for the importance of a well-designed and functioning brake system:

1)Safety: The primary purpose of the brake system is to provide reliable and efficient stopping power, allowing the driver to slow down or bring the vehicle to a complete stop when necessary.

A properly functioning brake system is crucial for avoiding accidents, preventing collisions, and protecting the driver, passengers, and others on the road.

2)Control and Handling: A well-designed brake system enhances the driver's control over the vehicle.

It enables smooth deceleration and allows for precise modulation of braking force, providing better handling and maneuverability.

This allows the driver to respond to changing road conditions, traffic situations, and emergencies effectively.

3)Energy Conversion: The brake system converts kinetic energy into thermal energy through friction, allowing the vehicle to reduce its speed or stop.

This energy conversion process is essential for managing the vehicle's speed and preventing excessive heat buildup in the braking components.

4)Performance and Responsiveness: An efficient brake system ensures prompt response and reliable performance, allowing the driver to trust the brakes when needed.

It should provide consistent braking force, even under different driving conditions such as wet or slippery surfaces.

A well-designed brake system improves the overall driving experience by instilling confidence and predictability in the braking process.

5)Maintenance and Longevity: Regular maintenance of the brake system, including inspections, pad and rotor replacements, and fluid flushes, is crucial for its longevity and optimal performance.

A properly maintained brake system minimizes the risk of component failure, extends the lifespan of brake components, and reduces the chances of costly repairs.

For more questions on brake system

https://brainly.com/question/30262553

#SPJ8

what is one of the things that has set siri apart from other digital assistants?

Answers

The numerous Easter eggs the program's designers have incorporated are one of the features that have distinguished Siri.

What is a good illustration of a digital assistant?A sophisticated computer programme that simulates a dialogue with its users, generally online, is referred to as a digital assistant, sometimes known as a predictive chatbot.The digital voice assistants from Apple and Amazon, Alexa and Siri, are more than simply practical tools; they are also very real applications of artificial intelligence, which is permeating more and more of our daily lives. Abstract. Voice assistants are computer programmes that can comprehend human speech and give voice-like responses. Alexa from Amazon, Cortana from Microsoft, and Assistant are the voice assistants that are most commonly used today. They can be used as discrete home speakers or as voice assistants included into smartphones.

To learn more about digital assistants, refer to:

https://brainly.com/question/29647392

When logging into a website that uses a directory service, what command authenticates your username and password?.

Answers

Answer: Bind

Explanation: When you log into a website that uses a directory service, the website will use LDAP to check if that user account is in the user directories and that the password is valid.

Find out how to print the below pattern in python and also come up with pseudocode,
you have to use for loop for this, you can use a for loop inside the outer for loop.
You can't use operator like " *" in python , only use print statement to print the below pattern. Find out how to print in 5 lines one by one in python , there is a way to print one line then next
X

XXX

XXXXX

XXXXXXX

XXXXXXXXX

Answers

Answer:

for i in range(5):

   for j in range(2*i + 1):

       print("*", end="")

   print()

Explanation:

for row index going from 0 to 5
           for column index going from 0 to 2*row index + 1
                      print * suppressing new line

          print a new line to move to next row

Other Questions
pat's total utility after eating 100 reese's peanut butter cups was less than his total utility after eating his ninety- ninth. therefore, pat's marginal utility for the 100th peanut butter cup was brainly how many grams of co2 are produced when 88g of o2 are reacted with an excess of butane Question 3Calculate the down payment and amount financed on an installment loan.Katie Burns is buying a new guitar for $635.88. She made a 15% down payment and willfinance the remainder. How much did she finance?Question 41 pI1 F A receptionist named Alec spends 4 minutes routing each incoming phone call. If he routes4 phone calls, how much time will Alec have spent on the phone in total? PLZ HELP!!!!! DUE TODAY! 50 POINTS & BRAINLIEST FOR SOMEONE WHO CAN EXPLAIN TO ME WHAT I DID WRONG!!!!!!p.s. thank you in advance! Solve for x. 2.5/10 = x/35 How did Democratic-Republicans react to the Alien and Sedition Acts? They supported the acts by voting for them in Congress. They created resolutions to speak out against the acts. They remained neutral about them, ignoring them until they expired. Solve 2(x + 1) + 4 = 8 Little's Law: Flow Rate 3 points possible (graded) 5. Which of the following clearly defines the Flow Rate (R) of a process? The time taken for a flow unit to go from the beginning to the end of the process The number of flow units in the process at a given moment in time The number of flow units going through the process per unit of time 6. A paper mill has on average 7200 quires of paper in production at any particular time (I = 7200). (A quire of paper is a measure of paper quantity. The usual meaning is 25 sheets of the same size and quality: 20 of a ream of 500 sheets.) A quire takes 40 minutes of paper production and 20 minutes for final packaging. How many quires of paper does the paper mill produces per minute (include the packaging as part of the total production flow)? (The answer are in quires/minute not per hour!) 120 quires/min 50 quires/min 5 quires/min 2 quires/min 7. The paper mill wants to improve its production. The mill has installed new machines, which reduces the production time by 20%, and has hired, more employees, which reduces the packaging time by 30%. The mill still has on average 7200 quires of paper in production at any particular time. What is the new number of quires that the paper mill can produce per minute? 2.61 quires/min 5 quires/min 156 quires/min the rate stays the same A metal rectangular loop (heighth and width w) with resistance R is fixed in place with one third of its length located inside a region of space where there is a time-varying magnetic field B = Bo - bl pointing out of the page. h w B0 B=0 A. Determine the magnitude and direction of the current I(t) induced in the loop. B. If the loop were not fixed in place, it would move due to the magnetic force exerted on it by the external magnetic field. What is the magnitude of the magnetic force felt by the loop? What direction would the loop move towards, if it were not fixed in place? Which of the following is true about Stock dividends distributable. Select ONLY correct statements, do not select all statements, incorrect answers are penalized." A) They aAre stock dividends that have been declared but have not been distributed to stockholders B) They are reported in the Balance Sheet in Stockholders Equity C) They are reported in the Balance Sheet as a long-term liability C) they are Reported in the Income Statement in Other Losses and Expenses D) They are reported in the Balance Sheet in Current Assets. Find and correct the mistakes in five of thesentences. Use short forms. I am not believing Zoe lost my favourite jacket.___________ Is she really needing another new handbag?__________Are these flowers for me? Oh, Jack! I'm not knowing what to say!__________ What's happening over there? What are all thosepeople looking at?_______________I'm not wanting to wear a suit. I hate formal clothes.____________Laura isn't hating Maths, she just finds it difficult._____________Are you seeing the bracelet with the three diamonds?That's the one I want.________________ Chemistry zinc tetraoxosulphate vi solution was electrolyzed in such a way that is 0.5A flowed for 32min 10 sec, deposited 0.325g of zinc at the Cathode Calculate 1. The number of moles of zinc deposited (2) The number of Coulombs of electricity required to deposit I mole of zine (3) The charge on a zinc ion (IF = 96500C, zn=65) Air America has a policy of booking as many as 15 persons on an airplane that can seat only 14. (Past studies have revealed that only 85% of the booked passengers actually arrive for the flight.) Find the probability that if Air America books 15 persons, there will be enough seats will be available. All editions of the dsm have been published by the _____ and reflects a _____ model. a bag holds 13 marbles. 6 are blue, 2 are green, and 5 are red. you select a marble from the bag. what is the probability that the marble you select is either blue or greena. 5/26b. 8/13c. 5/13d. 8/26 ally completed part b of experiment iht. they labeled their system as the dissolution of salt and their surroundings as water. if ally recorded a increase in temperature after adding salt, was the reaction endothermic or exothermic in regards to their system? how do we know whether it was endothermic or exothermic? Which sequence of transformations does not map a figure onto a congruent figure? Explain.A. Rotation of 180 about the origin, reflection across the x-axis, horizontaltranslation (x, y) (x + 4, y)B. Reflection across the y-axis, combined translation (x, y) (x -5, y + 2)C. Rotation of 180 about the origin, reflection across the y-axis, dilation(x, y) (2x, 2y)D. Counterclockwise rotation of 90 about the origin, reflection across they-axis, combined translation (x, y) (x -11, y - 12) whats 12% in a fraction and decimal Hello everybody, in class we are going over tissues, but all Iknow is that there are four Connective, Epithelial, Muscle, andNervous. What are the subcategories? is there an easy way toremember the