(ATRCKALLB) __________is an input device that contains a movable ball on the top.​

Answers

Answer 1

Answer:

trackball

Explanation:

A trackball can be seen on a mouse.


Related Questions

what is the address of the first SFR (I/O Register)​

Answers

Answer:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Explanation:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Reason -

A Special Function Register (or Special Purpose Register, or simply Special Register) is a register within a microprocessor, which controls or monitors various aspects of the microprocessor's function.

Perform the following for each 8 bit binary addition:

add the two binary numbers

interpret all there 8 bit binary numbers as a signed number (2’s complement)

interpret all three 8 bit binary numbers as unsigned numbers



Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

01111001




Number 2

00011110



Sum







Binary Number

Signed Decimal Value

Unsigned Decimal Value


Number 1

00011011



Number 2

00010100



Sum








Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

11110110




Number 2

10000011



Sum

Answers

Answer:

Where are options?

Explanation:

what percent of records are temporary, if you are not in the OSD?​

Answers

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

Find the following series of 8,88,888,8888,88888​

Answers

the sum to n terms of the sequence 8, 88, 888, 8888,..... is 80/80(10ⁿ-1) -8/9n

How is this so?

The nth terms is solved as follows

Sⁿ =8+88+888+8888+......+n terms

= 8/9  [9+99+999+9999+....to n terms]

= 8/9  [(10−1)+(10² −1+(10³ −1)+(10⁴ −1+....to n terms]

= 8/9  [(10+(10²+(10³ .....n terms) - (1 + 1 + 1 + ....n terms)

= 8/9 [(10(10ⁿ-1))/(10-1) - n] [Sun of GP= a(rⁿ-1)/(r-1) when r > 1]

= 8/9 [ 10 (10ⁿ -1)/9) -n]

= 80/81(10ⁿ -1) -8/9n

Thus, it is correct to state that 80/81(10ⁿ -1) -8/9n

Learn more about Series:
https://brainly.com/question/26263191
#SPJ1

Full Question:

Find the sum to n terms of the sequence 8, 88, 888, 8888,

could someone teach me how to program it? Thanks you

Answers

Answer:

Did you read the pdf? Also I only know JAVAscript and scratch not Verilog

Explanation:

_____ is responsible for packet forwarding. Group of answer choices Internet Protocol Transmission Control Protocol User Datagram Protocol Extensible Authentication Protocol

Answers

Answer:

Networklayer is the correct answer

Internet Protocol is responsible for packet forwarding. Hence, option A is correct.

What is packet forwarding?

The fundamental technique for distributing data among systems on a network is packet forwarding. Typically on two distinct systems, packets are transmitted between a source interface and a destination interface.

In the data plane, forwarding is the process of deciding the path packets will take from source to destination. In the control plane, routing is the process of transporting packets from a router's input to the correct router output.

When uIP gets a packet with a destination IP address that does not match any of the node's IP addresses, packet forwarding is carried out. A node often has several addresses, including at least one broadcast or multicast address and one or more unicast addresses.

Thus, option A is correct.

For more information about packet forwarding, click here:

https://brainly.com/question/20813972

#SPJ6

You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!

Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.

Answers

Confidential Computer Forensics Investigation Report

Case Number: 2023-4567

Date: June 22, 2023

Subject: Computer Forensics Investigation Findings

I. Introduction:

The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.

II. Computer Information:

The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.

III. Access and Usage:

During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.

IV. Forensic Tools and Findings:

Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.

Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.

File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.

Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.

V. Conclusion:

Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.

The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.

Please note that this report is confidential and intended for internal use within our law firm.

Sincerely,

[Your Name]

Computer Forensics Investigator

[Law Firm Name]

I hope this helps. Cheers! ^^

Order the steps to successfully create a data table.
Answer: Write the formula used to create table values
Select the range
Select the Data tab and What-If Analysis
Select Data Table
Select the values for row/column input.

Answers

Here are the steps to successfully create a data table:

Select the range.Select the Data tab and What-If Analysis.Select Data Table.Write the formula used to create table values.Select the values for row/column input.

How to create the data table

For achieving the desired outcome of generating a data table, it is suggested to adhere to the following measures:

Choose the cells group in which you intend to generate the data table. Include both the cells for input and presentation of results in the specified range.

Provide the equation that you intend to apply for computing the figures enlisted in the data chart. This equation must refer to the designated cells and yield the intended outcome.

Access the What-If Analysis feature by navigating to the Data tab within your spreadsheet program. To access the menu, simply click on it.

Choose the Data Table option from the What-If Analysis menu. This action will trigger the appearance of a dialog box or prompt that will require you to input the required details.

Determine the desired input values for either the row or the column in the data table dialogue box. The table's outcomes will be computed based on these values.

By adhering to these guidelines, you can produce a chart of data that exhibits computed figures derived from various input situations, aiding you in scrutinizing and comprehending the ramifications of different factors on your data.

Read more about data tables here:

https://brainly.com/question/32534586

#SPJ1

Consider a parent process P that has forked a child process C. Now, P terminates while C is still running. Answer yes/no, and provide a brief explanation. (a) Will C immediately become a zombie? (b) Will P immediately become a zombie, until reaped by its parent?

Answers

(a) No, C will not immediately become a zombie when P terminates while C is still running. (b) No, P will not immediately become a zombie when it terminates while C is still running. The operating system will assign the parent of P to be the init process

Zombie processes do not take up any system resources other than memory and process table entry. When a parent process forks a child process, it creates a new process with its unique process ID. When the child process finishes executing, it returns a status value to the parent process through the wait system call, and the parent process reaps it by calling the wait system call. When the parent process terminates before the child process, the child process becomes an orphan process, and it is adopted by the init process. The init process reaps all orphan processes and prevents them from becoming zombie processes.In the given scenario, parent process P forks a child process C. When parent process P terminates before child process C, child process C becomes an orphan process, and it is adopted by the init process. The init process reaps child process C and prevents it from becoming a zombie process. Thus, no, child process C will not immediately become a zombie. However, parent process P will not become a zombie until reaped by its parent. Since parent process P does not have any parent process, it remains in the process table until the system is shut down.

Learn more about child process here;

https://brainly.com/question/14988724

#SPJ11

Which example best demonstrates an impact computing has had on the arts?
OA. A student bullies another student on social media by posting
embarrassing pictures.
OB. A group of friends who have never met each other in person play
an online game together.
OC. A music producer searches for samples of Caribbean percussion
instruments to add to a song.
OD. A teacher uses a computer-scored test to grade assignments
more quickly.

Answers

Answer:

the answer is C because music is art

What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain

Answers

It should be noted that a primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

What is a workstation domain?

The Workstation Domain simply means an individual user's computer where his or her work takes place. It should be noted that computers operating systems have vulnerability which can be susceptible to hackers.

A primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

Learn more about workstation on:

https://brainly.com/question/26097779

which of the following is a free, open-source scriptable screen reader that works with the gnome desktop?

Answers

Orca is a free, open-source scriptable screen reader that works with the gnome desktop.

What is Orca?

Orca is a free, open-source, adaptable, and extendable screen reader that gives graphical desktop access through user-configurable combinations of speech, braille, and/or magnification.

Orca works with applications and toolkits that support the AT-SPI, which is the core assistive technology infrastructure for Unix-like systems such as Linux, OpenBSD, and Solaris. The GNOME GTK+ toolkit, the Java platform's Swing toolkit, SWT, OpenOffice/LibreOffice, Mozilla, and WebKitGtk are among the applications and toolkits that support the AT-SPI. AT-SPI compatibility for the KDE Qt toolkit is being worked on.

Orca has been translated into many of the world's languages thanks to the amazing contributions of volunteers on the GNOME Translation Teams, with support for new languages being added on a daily basis.

To know more about screen readers, visit:

https://brainly.com/question/29537943

#SPJ4

How to do brainliest

Answers

If the reply that someone put has a blue crown you click it and it will give them brainliest but it usually won’t work unless there are two answers

Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the case of a tie, draw more cards. Repeat until someone wins the round. The function has two parameters: the name of player 1 and the name of player 2. It returns a string with format ' wins!'. For instance, if the winning player is named Rocket, return 'Rocket wins!'.

Answers

Answer:

Here you go, Change it however you'd like :)

Explanation:

import random as r

def play_round(p1, p2):

   cards = [1,2,3,4,5,6,7,8,9,10,"J","Q","K","A"]

   play1 = r.choice(cards)

   play2 = r.choice(cards)

   

   while play1 == play2:

       play1 = r.choice(cards)

       play2 = r.choice(cards)

   

   if cards.index(play1) > cards.index(play2):

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p1}"

   else:

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p2}"

print(play_round("Bob","Joe"))

You are a Junior IT Technician in your organisation. One of the duties is to demonstrate and explain how the computer works to the new intern staff. Discuss how you would demonstrate and explain

Answers

Recognizing the way computational modeling are utilized is just as important as employing technical knowledge about computer or laptop.

What is a demonstration?

Providing verifiable evidence to demonstrate that maybe something real or is correct.

You are a Junior IT Technician in your organization. One of the duties is to demonstrate and explain how the computer works to the new intern staff.

I'll describe how and when to install and set up computer networks, examine computer issues, and resolve technical and application issues over the phone or face to face as an IT specialist.

Based on the scale of the company for which you work, how would you represent particular maybe more knowledge and expertise? A technical IT support team is commonly separated into both first support, with both the second-line support workers answering more specialized inquiries that the first support staff couldn't handle.

More about the demonstration link is given below.

https://brainly.com/question/15070998

#SPJ1

You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications. What are some sample questions you would ask the loan manager at a bank?​

Answers

As a knowledge engineer, it should be noted that some of the questions that should be asked include:

What do you expect in the loan application process?How is the loan going to be processed?What do you expect from the applicant to fund the loan?

A knowledge engineer simply means an engineer that's engaged in the science of building advanced logic into the computer systems.

Since the knowledge engineer has been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications, he should asks questions that will be vital for the loan process.

Learn more about engineers on:

https://brainly.com/question/4231170

Which of the following policy guidelines specifies the restrictions on user access
regarding access to read, write, execute, or delete permissions on the system?
Least privilege
Accountability
Default use
Specific duties

Answers

The policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

What is the Least Privilege Principle?

The least privilege principle can be described as a concept in information security and policy guidelines that gives a user minimum permission or levels of access that they are needed to execute a tasks.

Therefore, the policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

Learn more about least privilege on:

https://brainly.com/question/4365850

You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?

Answers

The communication systems that are said to be used at help desks are:

Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing System

What is the communication systems?

In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication  that is often used as help desks.

It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.

Hence the choice of communication  the the person who is help desk wants to use can depend on a lot of factors.

Learn more about   communication systems from

https://brainly.com/question/30023643

#SPJ1

Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.

Question 6 options:

An SHG entity depends on a Campaign entity

A Campaign entity is a depend on the SHG entity

A Country is not dependent on the Campaign entity

An SHG entity is dependent on a Country entity

A Campaign is an Independent entity

Answers

Based on the given information, the following statements are true:

An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.

What is a country entity?

In the context of database design, a country entity refers to a logical representation of a country within a database system.

It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.

The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.

Learn more about Entity at:

https://brainly.com/question/29491576

#SPJ1

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

Looking at the code below, what answer would the user need to give for the while loop to run?

System.out.println("Pick a number!");
int num = input.nextInt();

while(num > 7 && num < 9){
num--;
System.out.println(num);
}


9

2

7

8

Answers

The number that the user would need for the whole loop to run would be D. 8.

What integer is needed for the loop to run ?

For the while loop to run, the user needs to input a number that satisfies the condition num > 7 && num < 9. This condition is only true for a single integer value:

num = 8

The loop will only run if the number is greater than 7 and less than 9 at the same time. There is only one integer that satisfies this condition: 8.

If the user inputs 8, the while loop will run.

Find out more on loops at https://brainly.com/question/19344465

#SPJ1

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

twentieth century music has adopted the sounds of the modern period which include synthesizers electronics and computers​

Answers

Answer: True

Explanation:

The 20th century (1900s) saw an increase in the kind and variety of music available. This was down to many innovations in the musical industry in the 20th century such as multitrack recording that made music much more accessible and easier to produce.

With these innovations as well as the advent of the age of computers, musicians and composers were able to included synthesizers and electronics in their music as well as using computers such that new sounds enveloped the world from jazz to rock to jazz fusion.

Computers were originally invented to
Group of answer choices
A.to share information on the Internet.

B.make complex mathematical calculations possible and make tasks easier for humans.

C.to play video games.

Answers

Answer:

B

Explanation:

It's B because why would it me made to play video games

Answer:

B

Explanation:

A, the internet didnt exist yet, so it cant be this

C, video games would require computers, so its ruled out on a similar basis as the previous

what are 5 computer cable connectors


Answers

Answer:

VGA cable, DVI cable, Ethernet Cable, PS/2 Cable, 5mm Audio Cable and USB cables

Explanation:

im in cumputers class

help on my homework, on c++, I'm new to this what do I do.

help on my homework, on c++, I'm new to this what do I do.

Answers

The program based on the information is given below

#take amount in quarters, dimes, nickels and pennies as input and store it in variables

quarters = int(input())

dimes = int(input())

nickels = int(input())

pennies = int(input())

#calculate amount in cents

cents = (quarters*25 + dimes*10 + nickels*5 + pennies)

#convert cents to dollars

# 1 dollar = 100 cents

# n cents = n/100 dollars

dollars = cents / 100.00

#Print the amount in dollars upto two decimal places

print("Amount: $"+"{:.2f}".format(dollars))

What is the program about?

It should be noted that the following weekend as illustrated:

1 quarter = 25 cents

1 dime = 10 cents

1 nickel = 5 cents

1 penny = 1 cent

1 dollar = 100 cents

Using the above data, the code to convert the given amount to dollars is shown above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Edhesive quiz 11.4 lesson practice

Answers

The answers to the questions are given as follows

1A. Hyper Text Markup Language

2A. Translate HTML code to a webpage we see on the screen

Why is HTML Code Important?

HTML, or Hypertext Markup Language, is a computer language that is used to describe the organization of content on a webpage.

HTML, CSS, and JavaScript are the fundamental building elements of websites globally, with CSS regulating the appearance of a page and JavaScript scripting its functionality.

It is the underlying technology that powers everything you see in a web browser, and it is used to create everything from simple web pages to complex online apps and services.

Learn more about HTML  at:

https://brainly.com/question/24065854

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

1Q. HTML Stands for __________ __________ __________ __________

2Q. A browser’s job is to ______________.

What is the correct command to shuffle the following list? import random people= ["Peter", "Paul", "Mary', 'Jane'] O shuffle (people) Opeople.shuffle() random.shuffle (people) random.shufflelist(people)​

Answers

Answer:

import random

people = ["Peter", "Paul", "Mary", "Jane"]

random.shuffle(people)

Explanation:

What is the maximum ream size on an agile project?

Answers

Most Agile and Scrum training courses refer to a 7 +/- 2 rule, that is, agile or Scrum teams should be 5 to 9 members. Scrum enthusiasts may recall that the Scrum guide says Scrum teams should not be less than 3 or more than 9

Explanation:

A UI text element must be added to ______.an empty background container game objecta prefaba slot game objecta tray objecta canvas

Answers

Answer:

canvas

Explanation:

The answer to this question is that A UI text element must be added to a canvas. The canvas is that area that all the unity items (UI) have to be inside.

We insert the Text UI element when we move to the hierarchy of the scene from create we move to UI and then to text.

After all these have been done, we will get a text element which have been added in the Canvas region.

Other Questions
HELP PLEASE SUE TODAY 1. Compare Netherlandish art to Renaissance art. What are the similarities and differences?2. What was a "Renaissance man"? How did the Renaissance artists fit into this?3. What are the characteristics of Renaissance art?4. Many art scholars have called the High Renaissance one of the greatest art periods inhistory. Do you agree or disagree? Why?5. Choose one art piece from the High Renaissance period and write a two-paragraph artcritique on the piece.BLE Grading Rubric Given the curve R(t)=2sin(5t)i+2cos(5t)j+3k (1) Find R(t)= (2) Find R(t)= (3) Find the curvature = Mary read 2/5 of a book in 15 minutes. How much of the book can she read per hour? book per hour. People who booked a tour with a company in Alaska before COMID-19 can request a cash refund or a credit that they can use later meaning the company will still have the money. If too many people ask for cash refunds, the company will go out of business. Their customers, who are all around the world and do not know each other, prefer that the company stays in business while they receive a cash refund. No one wants the company to go out of business while they still have trip credit (so they would lose their money. Based on what you know about game theory, what is the most likely outcome?A. Everyone will cooperate, take trip credit, and the company will stay in business. B. Everyone will honor sunk costs, take the cash refund, and the company will go out of business. C. Everyone will honor sunk costs, take trip credit, and the company will stay in business. D. Everyone will follow their self-interest, request a cash refund, and the company will go out of business. E. None of these. 1. Which of the following expressions when evaluating yields 5?a. 10x3 + 6b. 5 -5 x 6c. 24 - 6 - 12 Why is the C-14/C-12 ratio used to date once-living organisms?A. C-12 becomes radioactive when an organism dies.B. The amount of C-12 changes when an organism dies.C. The half-life of C-14 changes when an organism dies.D. An organism stops taking in carbon when it dies. What is the process of eliminating a product from the product mix when consumer preferences shift significantly, causing a product to decline what did mosa figure out? how did mosas mesurement prove that the ball was moving to gravity You conduct a quasi-experiment to assess the impact of raising the speed limit from 55 to 65 miles per hour. You find that there are more accidents in the 6-month period following the speed limit change than in the 6-month period before the speed limit change. Although it is tempting to say that raising the speed limit caused higher accident rates, you must be careful because prepare the income statement for cornhusker company on december 31, 2021. cornhusker company income statement for the year ended december 31, 2021 expenses: total expenses There are 8 fluid ounces in one cup.Write this as a unit rate.Hint: use per, every, or each. Kara's family is thinking about renting an SUV that can travel 6 2/3 miles on 1/6 gallon of gas. Kara wants to know the gas mileage of the SUV. Use the information provided to write the standard form equation of each parabola. opens up or down, vertex: (-6,5), passes through: (-5,4) You ride your bike along a straight line from your house to a store 1704 m away. On your way back, you stop at a friend's house which is halfway between your house and the store.a. What is your displacement?b. What is the total distance traveled?c. After talking to your friend, you continue to your house. When you arrive back at your house, what is your displacement?d. What is the total distance you have traveled since first leaving your house? The standard unit for measuring mass is the 12 - 3t t2 -10872t 9t t>2 where t is measured in seconds. 0 6 Let s(t) be the position (in meters) at time t (seconds). Assume s(0) = 0. The goal is to determine the **exact** value of s(t) for Operant conditioning would be rather limited if every new situation required learning a new response. However, this is not the case because of _________, which allows us to "spread" learning from one situation to another.partial reinforcementgeneralizationdiscriminationsecond-order conditioning PLEASE PLEASE HELP!!!! In a 6 card deck of 21 find the probability that your two cards will be greater then 16. Show all work The tort that arises when a business uses another person'slikeness or voice for business or commercial purposes isA.fraudulent misrepresentation.B.commercial exploitation.C.coversion.D.identity