You want to copy a formula in a cell down the column into multiple other cells. What would be the best tool for the job?

answer choices
Spelling Checker
Find and Replace
Cut and Paste
AutoFill

Answers

Answer 1

You wish to move a formula from one cell in a column to several others. The ideal tool for both the job would be AutoFill.

What is a class 9 cell computer?

Each row and then a column come together to form a cell. An address that comprises of the data type and row number is used to identify a cell. For instance, its first cell is labeled as A1, indicating that it is located where row 1 and column A converge.

What does a cell range mean?

In Excel, a cell range is a group of selected cells. It can be used as a formula reference. With the connection of the top half cell serving as the range's minimum value and the ref of lower-right cell serving as the range's maximum value, this is specified in a spreadsheet.

To know more about Cell visit :

https://brainly.com/question/8029562

#SPJ4


Related Questions

What would be the answers? It multiple select so select more than one

What would be the answers? It multiple select so select more than one

Answers

Answer:

A,BC

Explanation:

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

After 4th collision in ethernet, find the maximum time that the adapter waits until sensing the channel again for a 100 mbps broadcast channel?

Answers

The maximum time that the adapter waits until sensing the channel again for a 100 mbps broadcast channel is 0.512 ms. When two devices on the same half-duplex Ethernet network try to send data at precisely the same time, it results in a collision.

What is a collision in Ethernet?On a half-duplex Ethernet network, a collision occurs when two devices on the same network attempt to communicate data at the same time. The network "collapses" the two transmitted packets, resulting in the network discarding both of them. Collisions are unavoidable on Ethernets.A collision is a brief interaction between two or more bodies that alters the motion of the bodies involved as a result of internal forces at work. Collisions necessitate the use of force (there is a change in velocity). When two devices on the same half-duplex Ethernet network try to send data at precisely the same time, it results in a collision.

A 100 Mbps broadcast channel has a waiting time of 0.512 ms.

Remember that the CSMA/CD protocol requires the adapter to wait K 512 bit times after a collision.

Where K is drawn randomly. For K = 100,

The one bit time for 10 Mbps is 1/10000000 s = 0.0001 ms

The one bit time for 100 Mbps is 1/100000000 s = 0.00001 ms

Waiting time for a 10 Mbps broadcast channel is

K × 512 × 0.0001 = 5.12 ms

Waiting time for a 100 Mbps broadcast channel is

K × 512 × 0.00001 = 0.512 ms

The maximum time that the adapter waits until sensing the channel again for a 100 mbps broadcast channel is 0.512 ms.

To learn more about Ethernet refer to:

brainly.com/question/14123270

#SPJ4

Dropdown
Complete the sentence
A good digital citizen is

Answers

Answer:

A good digital citizen is one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.

Explanation:

Answer:ethical

Explanation:

i got a 100 %

divisions of a keyboard​

Answers

Answer:

There are 4 SECTORS!

Explanation:

Alphabetical (Word keys, main function keys), Numeric (Number keys. which is the number pad to your right), The function keys (Like Num. lock, and the F keys that go through F1 to F12), and the Cursor keys (Which is LITERALLY just the arrow keys) But if you were a gamer like me, you'd know that WASD is better for gamers.

Another mention: Control Keys ( Includes your Windows Icon, Left Ctrl, Alt, Fn(If it's there) Your Tab key, your Caps, Shift, and Right Ctrl.)

With most forms of media, you can use up to _____% under “fair use” guidelines.

Answers

Answer:

With most forms of media, you can use up to 10% under “fair use” guidelines.

Seeing information on a computer screen is what type of output?

Answers

Answer:

Any information processed by and sent out from a computer or other electronic device is considered output. An example of output is anything viewed on your computer monitor screen, such as the words you type on your keyboard. Without some type of output that a human could see, feel, or hear, a human could not interact with the computer.

Explanation:

Any information processed by and sent out from a computer or other electronic device is considered output. An example of output is anything viewed on your computer monitor screen, such as the words you type on your keyboard. Without some type of output that a human could see, feel, or hear, a human could not interact with the computer.

Pls answer i will give 20 points

Pls answer i will give 20 points

Answers

Answer:

Penicilium roqueforti

what are the component of cyber law?​

Answers

Answer:

The very important component is "intellectual property".

Explanation:

Cyberlaw seems to be a component of the entire judicial process dealing with either the World wide web, virtual worlds as well as their corresponding legal problems. Intellectual property may also include locations such as technologies, literary criticism, songwriting, as well as industry. Nowadays it provides electronic products that are already offered mostly on the online platform.

Some countries are considering putting something in explosive materials to help track where they came from. What tool would be used to collect the evidence

Answers

Some countries are considering putting Color coded chips in explosive materials to help track them.

What is the tracker?

Trace evidence refers to the limited particles, fibers, or residues that maybe transferred all the while the production or handling of explosive matters.

The trace evidence collection kit usually includes parts such as unproductive swabs, tweezers, evidence bags, and vials for continuing and storing the samples. These finishes are used to collect and preserve trace evidence establish surfaces, clothing, and different materials that grant permission have come in trade the explosive material.

Learn more about tracker from

https://brainly.com/question/7791539

#SPJ1

Some countries are considering putting what in explosive materials to help track them? -GPS devices-Computer chips-Color coded chips-Location devices.

One definition of culture suggests that culture is everything you think, everything you do and
everything you possess. The drawing of a cultural system mirrors that definition. In the
drawing, everything you think is represented by:
Technology
Social
Institutions
Ideology
The rectangle

Answers

The drawing that usually represent culture is ideology. The correct option is D.

What is ideology?

An ideology is a set of beliefs or philosophies attributed to a person or group of people, particularly those held for reasons other than epistemic ones, in which "practical elements are as prominent as theoretical ones."

Ideology is a type of social or political philosophy in which practical as well as theoretical elements are prominent. It is an idea system that seeks to both explain and change the world.

Culture can be defined as all of a population's ways of life, including arts, beliefs, and institutions that are passed down from generation to generation.

It has been defined as "an entire society's way of life." As being such, it includes etiquette, dress, language, religion, rituals, and art.

Thus, the correct option is D.

For more details regarding ideology, visit:

https://brainly.com/question/24353091

#SPJ1

Please Help!

Choose all items that are characteristics of placing nested elements on a new line, using indentation.


A) makes HTML errors difficult to find

B) not required by a web browser

C) can cause web page display errors

D) makes HTML analysis and repair easier

E) done automatically by HTML authoring software

Answers

Answer:

Its B,D,E

Explanation:

Got it right on e2020

Answer:

B). not required by a web browser

D). makes HTML analysis and repair easier

E). done automatically by HTML authoring software

Btw cause this class can be a pain here are the answers to the rest of the assignment.

Slide 7/12:

The missing element is

C). <p></p>

Slide 9/12:

The missing tag is:

B). an end (closing) a tag

Slide 12/12:

The missing character is

D). an angle bracket

Explanation:

I just did the Part 3 on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

You are tasked with building a user application that will select sets of random numbers. Your application must use functions and pass values and pointers. Your program will pick sets of 6 random numbers with values of 1 to 53. The user should be able to choose how many sets to produce. The challenge will be to ensure that no number in a set of 6 numbers is a repeat. The number can be in another set just not a duplicate in the same set of 6. Your program should prompt the user and ask them how many number sets they wish to have generated. The program should not exit unless the user enters a value indicating they wish to quit

Answers

The task is to build a user application that generates sets of random numbers.  The challenge is to ensure that there are no repeated numbers within a set.

To build the user application for generating sets of random numbers, you will need to utilize functions and handle value and pointer passing. The program should prompt the user to input the number of sets they want to generate.

Inside a loop, the program should generate a set of 6 random numbers ranging from 1 to 53. To ensure no repeated numbers within a set, you can use a suitable algorithm such as shuffling an array of numbers and selecting the first 6 elements.

After generating a set, it can be displayed to the user. Then, the program should ask the user if they want to generate more sets or quit. This can be achieved using a conditional statement.

By organizing the code into appropriate functions and utilizing proper input and output handling, you can build a user application that meets the requirements. The application will allow the user to select the number of sets, generate sets of 6 random numbers without duplicates within a set, and continue running until the user decides to quit.

learn more about pointers here; brainly.com/question/31666192

#SPJ11

how do I write a python function that takes a list and returns a new list with unique elements from the first list?

Answers

Answer:

Explanation:

The following Python program is a function that takes in a list as a parameter. It then uses the built-in dict class in Python to turn the input list into a dictionary and we call the fromkeys() method to remove all duplicate values. Then we turn the dictionary back into a list and save it into the variable called uniqueList. Finally, we return uniqueList back to the user. A test case has been created and the output can be seen in the attached image below.

def removeDuplicates(inputList):

   uniqueList = list(dict.fromkeys(inputList))

   return uniqueList

how do I write a python function that takes a list and returns a new list with unique elements from the

Which statement about technology before the invention of the printing press is true?

Answers

Answer: See explanation

Explanation:

You didn't give the options to the question and I searched and couldn't find the particular question.

Here, are some of the things about technology before the invention of the printing press.

1. Before printing press, monks copied books such as bibles as they'll copy calligraphy and illustrations in order for them to spread the messages in the Bible across to people.

2. Before printing press, oral communication was the way that people communicated with each other.

3. Drawings and writings were done by hand before printing press.

4. Before the invention of printing press, in order to transcribe books, different materials that were used include wax, parchment, clay and papyrus.

An example of a credible site would be a. A cousin’s personal web page c. Your school’s site b. A site you saw on a commercial d. A site advertised in a magazine Please select the best answer from the choices provided A B C D.

Answers

The most suitable option in the given options is Your school’s site. This is because Your school’s site is a credible site that can be used for academic research and provides valid information. The reason for choosing Your school’s site is that it is the most reliable site where students can research various academic topics and get valid and reliable information.

This is due to the fact that a school website is designed to provide reliable and up-to-date information to students, teachers, and parents. Schools have a reputation to maintain, and therefore, their websites are designed to ensure that all information posted on the site is verified, factual, and up-to-date.

A cousin’s personal web page and a site advertised in a magazine are less credible sources of information, as they can be biased or contain false information. It is essential to evaluate the credibility of a site before using it as a source of information. This helps in ensuring that the information used is accurate, credible, and valid.

To know more about research visit:

https://brainly.com/question/24174276

#SPJ11

Como tomar captura en laptop?

Answers

Answer: En algunas laptops o PCs basta con presionar el botón Print Screen o Impr Pant, ubicado usualmente en la parte superior derecha del teclado. Se creará la carpeta de "capturas" automáticamente en Imágenes en PNG o JPG de tu ordenador. También puedes pulsar la tecla Windows junto a la tecla Impr Pant a la vez.

Explanation:

Answer:

para windows 10, encuentras el botón de windows, shift y s

Explanation:

Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?

O References
O Referential Integrity
O Autocorrect
O Data Source Binding

Answers

Answer:

B

Explanation:

edge :p

Imagine you have a friend who does not know much about programming or HTML, but wants to design his own web page. He has decided to use rapid development tools because he has heard that they are good for people who do not have a lot of experience or do not fully understand HTML. He has come to you for advice on the matter, as he knows you have studied the material. What would you tell him about what he can expect from rapid development tools? What questions might you ask him about what kind of website he would like to build so you can steer him in the right direction regarding how intensive his use of these tools should be?

Answers

Answer:

Tell Him to build a website about something HE likes... it will be much more fun that way and he wont be like "Dang I have to work on that project again" If he is a beginner I would say just use plain html dont use javascript or anything like that.

what is a defining characteristic of a bus topology based network?

Answers

A bus topology-based network's distinguishing feature is that devices were daisy-chained in a single line.

By topology, what do you mean?

Network topology describes the physical or logical configurations of nodes and links inside a network. One may argue that a network's topology defines how its physical connections are made and how its logical information flows.

What is ring vs star topology?

In a "star topology" network architecture, each node is connected to a single router or routers, which is how each node receives data. A sort of network design known as a "ring topology" has all nodes totally connected to one another via a dedicated link.

To know more about topology visit:

https://brainly.com/question/8972168

#SPJ4

I need help I have to do a essay about

What is photoshop ☹️ Help meeee

Answers

Answer:

Photoshop is Adobe's photo editing, image creation and graphic design software. The software provides many image editing features for raster (pixel-based) images as well as vector graphics. ... Photoshop is used by photographers, graphic designers, video game artists, advertising and meme designers. Explanation:

can_hike_to(List[List[int]], List[int], List[int], int) -> bool The first parameter is an elevation map, m, the second is start cell, s which exists in m, the third is a destination cell, d, which exists in m, and the forth is the amount of available supplies. Under the interpretation that the top of the elevation map is north, you may assume that d is to the north-west of s (this means it could also be directly north, or directly west). The idea is, if a hiker started at s with a given amount of supplies could they reach d if they used the following strategy. The hiker looks at the cell directly to the north and the cell directly to the south, and then travels to the cell with the lower change in elevation. They keep repeating this stratagem until they reach d (return True) or they run out of supplies (return False).

Assume to move from one cell to another takes an amount of supplies equal to the change in elevation between the cells (meaning the absolute value, so cell's being 1 higher or 1 lower would both cost the same amount of supplies). If the change in elevation is the same between going West and going North, the hiker will always go West. Also, the hiker will never choose to travel North, or West of d (they won’t overshoot their destination). That is, if d is directly to the West of them, they will only travel West, and if d is directly North, they will only travel North.


testcases:

def can_hike_to(m: List[List[int]], s: List[int], d: List[int], supplies: int) -> bool:

Examples (note some spacing has been added for human readablity)
map = [[5, 2, 6],
[4, 7, 2],
[3, 2, 1]]

start = [2, 2]
destination = [0, 0]
supplies = 4
can_hike_to(map, start, destination, supplies) == True

start = [1, 2]
destination = [0, 1]
supplies = 5
can_hike_to(map, start, destination, supplies) == False


this is my code:

from typing import List

def can_hike_to(arr: List[List[int]], s: List[int], d: List[int], supp: int) -> bool:
startx = s[0]
starty = s[1]
start = arr[startx][starty] # value
endx = d[0]
endy = d[1]

if startx == endx and starty == endy:
return True

if supp == 0:
return False

else:
try:
north = arr[startx-1][starty] # value
north_exists = True
except IndexError:
north = None
north_exists = False

try:
west = arr[startx][starty-1] # value
west_exists = True
except IndexError:
west = None
west_exists = False

# get change in elevation
if north_exists:
north_diff = abs(north - start)

if west_exists:
west_diff = abs(west - start)

if west_diff <= north_diff:
new_x = startx
new_y = starty - 1
supp -= west_diff
return can_hike_to(arr, [new_x, new_y], d, supp)

elif north_diff < west_diff:
new_x = startx - 1
new_y = starty
supp -= north_diff
return can_hike_to(arr, [new_x, new_y], d, supp)


# if north doesn't exist
elif not north_exists:
if west_exists:
new_x = startx
new_y = starty - 1
supp -= west_diff
return can_hike_to(arr, [new_x, new_y], d, supp)
if not west_exists:
return False

elif not west_exists:
if north_exists:
new_x = startx - 1
new_y = starty
supp -= north_diff
return can_hike_to(arr, [new_x, new_y], d, supp)
if not north_exists:
return False

print(can_hike_to([[5,2,6],[4,7,2],[3,2,1]],[2,2],[0,0],4)) # True
print(can_hike_to([[5,2,6],[4,7,2],[3,2,1]],[1,2],[0,1],5)) # False

it's supposed to return True False but it's returning True True instead. Could someone please respond fast, my assignment is due in less than 2 hours.

Answers

Based on the information, the corrected code with proper return statement is given below.

How to depict the program

from typing import List

def can_hike_to(arr: List[List[int]], s: List[int], d: List[int], supp: int) -> bool:

   startx = s[0]

   starty = s[1]

   start = arr[startx][starty] # value

   endx = d[0]

   endy = d[1]

   if startx == endx and starty == endy:

       return True

   if supp == 0:

       return False

   else:

       try:

           north = arr[startx-1][starty] # value

           north_exists = True

       except IndexError:

           north = None

           north_exists = False

       try:

           west = arr[startx][starty-1] # value

           west_exists = True

       except IndexError:

           west = None

           west_exists = False

       # get change in elevation

       if north_exists:

           north_diff = abs(north - start)

       if west_exists:

           west_diff = abs(west - start)

       if west_diff <= north_diff:

           new_x = startx

           new_y = starty - 1

           supp -= west_diff

           return can_hike_to(arr, [new_x, new_y], d, supp)

       elif north_diff < west_diff:

           new_x = startx - 1

           new_y = starty

           supp -= north_diff

           return can_hike_to(arr, [new_x, new_y], d, supp)

       # if north doesn't exist

       elif not north_exists:

           if west_exists:

               new_x = startx

               new_y = starty - 1

               supp -= west_diff

               return can_hike_to(arr, [new_x, new_y], d, supp)

           if not west_exists:

               return False

       elif not west_exists:

           if north_exists:

               new_x = startx - 1

               new_y = starty

               supp -= north_diff

               return can_hike_to(arr, [new_x, new_y], d, supp)

           if not north_exists:

               return False

print(can_hike_to([[5,2,6],[4,7,2],[3,2,1]],[2,2],[0,0],4)) # True

print(can_hike_to([[5,2,6],[4,7,2],[3,2,1]],[1,2],[0,1],5)) # False

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of research benefit her
most?
OA
getting recommendations from teachers
O B.
preparing for an interview
O C. upgrading her knowledge
O D.
building her brand profile

Answers

The way that this kind of research benefit her is by upgrading her knowledge.

What is research?

Research is known to  be a kind of making of new knowledge through the use of (or not) of previous knowledge in a novae and creative way.

Note that The way that this kind of research benefit her is by upgrading her knowledge as it will help her to have and get new concepts, methodologies and also have good understandings.

Learn more about research  from

om/question/968894

#SPJ1

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?

1. Hold down the Ctrl key while pressing the required key.
2. Hold down the Shift key while pressing the required key.
3. Hold down the key containing the character needed.
4. Hold down the Spacebar while pressing the required key

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow

Answers

Answer:

2

Explanation:

Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs

Answers

As, Ken is conducting threat research on Transport Layer Security (TLS), the best resource that would best meet his needs is internet RFC's.

What are Internet RFCs?

A Request for Comments (RFC) is known to be a kind of a formal document obtained from the Internet Engineering Task Force ( IETF ) and it is one that shows or tells  the outcome of committee drafting and review done by interested parties.

Note that as Ken is conducting threat research on Transport Layer Security (TLS), the best resource that would best meet his needs is internet RFC's.

See options below

A. ACADEMIC JOURNAL

B. INTERNET RFC's

C. SUBJECT MATTER EXPERT

D. TEXTBOOKS

Learn more about  internet RFC's from

https://brainly.com/question/12950573

#SPJ1

Which statement accurately describes microblogs? Multiple Choice They are a tool to configure the dashboard on a social software system. They are a collection of knowledge sharing pages that anyone can edit. They should not be used for broadcasting announcements. They contain just a few sentences per entry. They are individual entries on bigger blogs.

Answers

The statement that accurately describes microblogs is: "They contain just a few sentences per entry." So correct answer is D


Microblogs are a type of social media platform that allow users to share short and concise messages, typically containing just a few sentences per entry. These messages can be about a wide range of topics and can include text, images, or videos. Microblogs are often used as a way to communicate with a large audience in a quick and easy manner.
Out of the multiple-choice options provided, the statement that accurately describes microblogs is that they contain just a few sentences per entry. This is because microblogs are designed to be brief and to-the-point, making them ideal for sharing quick updates, thoughts, or ideas with others.
While microblogs can be used for a variety of purposes, they are typically not used for broadcasting announcements, as this type of content is often better suited for other social media platforms that allow for more detailed and comprehensive messaging.
Microblogs are also not a tool to configure the dashboard on a social software system, nor are they a collection of knowledge sharing pages that anyone can edit. These descriptions are more representative of other types of social media platforms, such as wikis or collaborative tools.

To know more about sentences visit:

brainly.com/question/15693700

#SPJ11

Which of the following statements is false?

Which of the following statements is false?

Answers

The last one is false.
the last one is the wrong one

viruses are programs that infect other software or files and require group of answer choices a large file size to spread. the computer to be shutdown to spread. an executable program to spread. a disk based operating system to spread. windows as an operating system to spread.

Answers

Viruses are programs that infect other software or files. They typically require a large file size to spread, as this allows them to hide within the file and avoid detection.

Viruses are programs that infect other software or files and typically require an executable program to spread. They can target various operating systems, including Windows, and do not necessarily need a large file size, computer shutdown, or a disk-based operating system to propagate effectively.Some viruses also require the computer to be shutdown to spread, as this allows them to infect other files while the system is rebooting. Additionally, viruses often require an executable program to spread, as this allows them to execute their code and infect other files. Some viruses are designed specifically to target disk-based operating systems, as these systems are more vulnerable to infection. Finally, Windows as an operating system is particularly vulnerable to virus infections, as it is one of the most widely used and targeted operating systems in the world.

Learn more about Windows here :

https://brainly.com/question/31252564

#SPJ11

Explain how command driven and menu driven user interface is in (a) function

Answers

In terms of function, a command-driven user interface is more efficient for experienced users who are familiar with the system and the available commands, but it can be less accessible for new or inexperienced users.

What is the user interface  about?

A command-driven user interface and a menu-driven user interface are both used to interact with computer systems, but they differ in their approach to input and interaction.

A command-driven user interface operates using text-based commands entered by the user in a terminal or command prompt. In this type of interface, the user is expected to have a certain level of knowledge about the system and the available commands.

Therefore, one can say that a menu-driven user interface, on the other hand, provides a graphical interface with a series of menus and options to choose from. The user selects options from the menus to interact with the system and initiate actions.

Learn more about user interface at:

https://brainly.com/question/17372400

#SPJ1

Which parts of the exposure triangle should the photographer manipulate so that all objects are in focus without any noise?

Answers

The three parts of the exposure triangle that should be manipulated to achieve an image with all objects in focus and no noise are aperture, shutter speed, and ISO.

What is the triangle ?

A triangle is a three-sided polygon with three angles. It is one of the basic shapes in geometry and is very versatile. A triangle can be equilateral, meaning all three sides and all three angles are equal; isosceles, meaning two sides and two angles are equal; or scalene, meaning all sides and angles are different. Triangles are used in many engineering and architectural designs, such as bridges, roofs, and airplanes.

To learn more about triangle

https://brainly.com/question/30224659

#SPJ1

Other Questions
McMahon Company on July 15 sells merchandise on account to Swift Co. for $3,000, terms 2/10, n/30. On July 20, Swift Co. returns merchandise worth $1,200 to McMahon Company. On July 24, payment is received from Swift Co. for the balance due. What is the amount of cash received? A $1,800 B $1,764 C $1,740 D $3,000 on this map of earthquakes near japan, why do shallow earthquakes occur to the east and deeper earthquakes occur to the west How many atoms of hydrogen are present in 10g of methane? Question 4 the owner of a skate shop notices that every time a certain employee has a shift, there are higher sales numbers at the end of the day. After some investigation, the owner realizes that since the employee was hired, the store earns 15% more each month. In this scenario, the manager used which quality of analytical thinking?. DuPONT ANALYSIS Hendersons Hardware has an ROA of 11%, a 6% profit margin, and an ROE of 23%. What is its total assets turnover? What is its equity multiplier? X - [2 0 5 -1 ] = [4 10 8 3] HELP ME OUT PLEASE!!! What does the slope represent? 10. A reduction of dopamine levels in thebrain causes which of the following?O An increase in acetylcholine levelsO A decrease in acetylcholine levelsO No change in acetylcholine levelsO A decrease in levodopa levels A(n) ______ is considered an external stakeholder of anorganization.employeeshareholdercustomerboard member 1. Pilihan ganda1 minute1 ptQ. In the ocean surrounding Antarctica, there are fish that survive the cold water by using a molecule made of glycoproteins that circulates the blood and keeps it from freezing. Certain kinds of worms that live in the Arctic ocean also make antifreeze proteins that help them live in icy water.Pilihan jawabanConvergentDivergentCoevolution cells of the body mainly use __________ for the selective endocytosis of most macromolecules. Bring out a scenario/ experience citing a case where the three reward problems mentioned in Chapter 3 were dealt by a company using different reward methodologies. I zultitude of reward problems can arise. To get a better handle on them, we can orgaazze them into the three basic types mentioned above: 1. failure to produce the desired behaviour, 2. production of the desired behaviour but with undesirable consequences, and 3. production of reward dissatisfaction. Inwhich passage is it clearest that the author is using diction to achievesome kind of effect? A. The dog barked as the mail carrier walked up the stairs andknocked on the front door.B. Themother gingerly tucked the blanket around her sleepy childand crept a like a mouse out the door.C. The shark's fin moved around the raft, which held fourshipwrecked survivors.D. The teacher stoodat the door smiling brightlyand welcomingeach student to her classroom on the first day of school. Which ideas are included in both documents? check all that apply. people should be able to speak freely. the rights of citizens must be protected. parliament should have greater authority. kings and lawmakers should share power. people must be free to assemble in peace. citizens can petition their government. What did Chinese know about romans In a trapezoid $ABCD$ with $AB$ parallel to $CD$, the diagonals $AC$ and $BD$ intersect at $E$. If the area of triangle $ABE$ is 50 square units, and the area of triangle $ADE$ is 20 square units, what is the area of trapezoid $ABCD$ A crate is 3/4 yard long and 2/3 yard wide. The crate is also 2 feet tall. What is the area of the top of the crate? Answer this please for 20 point PLEASE HURRY PLS PLS HELP: GRADE 7 MATH!!!!! What condition occurs when tendons become inflamed?Select one:a. bursitisb. sore feetc. tendonitisd. varicose veins