Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box

Answers

Answer 1

Answer: apply heading styles to text.

Explanation:


Related Questions

how would i change this:
" try:
userChoice = input("Would you like to Add or Multipy?(A/M): ")
except:
print("Please enter 'A' or 'M'") "

so it only allows me to put "A" or "M" so that it runs the except part

Answers

You wouldnt use a try and except statement. Use a loop.

how would i change this:" try: userChoice = input("Would you like to Add or Multipy?(A/M): ") except:


\( \tt{Define \: hardware.}\)

Answers

Answer:

The vital components of a computer system , which can be seen and touched , are called hardware .

examples

keyboard monitormouse

hope it is helpful to you

Answer:

Hardware is the collective term for the internal and external hardware that enables you to carry out key operations including input, output, storage, communication, processing, and more.

___________________

Hope this helps!

Write a method to add/subtract two matrices. The header of the method is as follows:

public static double[][] addMatrix(double[][] a, double[][] b or public static double[][] subtractMatrix(double[][] a, double[][] b

In order to be add/subtract, the two matrices must have the same dimensions and the same or compatible types of elements.

Answers

Answer: A

Explanation:

Which of these are examples of an access control system? Select all that apply.

Answers

Some examples of access control systems are: Card-based access control systems, Biometric access control systems, Keypad access control systems, Proximity access control systems

Access control systems are used to limit or control access to certain areas or resources by determining who or what is authorized to enter or exit. In modern-day society, access control systems are widely used in both commercial and residential settings to enhance security and safety. Some examples of access control systems are discussed below.

1. Card-based access control systems- These are the most common types of access control systems. In card-based systems, authorized personnel are issued an access card that contains a unique code or number. When the person swipes the card through a reader, the system checks if the card is valid and then unlocks the door.

2. Biometric access control systems- In this system, the user's unique physical characteristics are used to identify them, such as fingerprints, voice, face, or retina scans. Biometric systems are highly accurate and provide enhanced security.

3. Keypad access control systems- Keypad systems use a secret code entered through a keypad. The code can be changed frequently to prevent unauthorized access.

4. Proximity access control systems- Proximity systems use a small chip or key fob that emits a radio signal to a reader mounted near the door. When the signal is received, the door unlocks. These are just a few examples of access control systems. There are other systems like security guards, smart cards, RFID-based systems, and more.

For more such questions on Proximity access, click on:

https://brainly.com/question/30733660

#SPJ8

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column

Answers

Answer:

D. summarize by row and by column

Answer:

D.

Explanation:

The Binder Prime Company wants to recognize the employee who sold the most of its products during a specified period. Write a query to display the employee number, employee first name, employee last name, email address, and total units sold for the employee who sold the most Binder Prime brand products between November 1, 2017, and December 5, 2017. If there is a tie for most units sold, sort the output by employee last name

Answers

The answer will be one month

open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program shown in the figures below

Answers

Using the knowledge in computational language in python it is possible to write a code that open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator.

Writting the code:

Class TaxCalculator(EasyFrame):

   def __init__(self):

       """Sets up the window and the widgets."""

       EasyFrame.__init__(self, title="Tax Calculator")

       # Label and field for the income

       self.addLabel(text="Income", row=0, column=0)

     

       # Label and field for the tax

   # The event handler method for the button

   def computeTax(self):

       """Obtains the data from the input fields and uses

   

See more about python at brainly.com/question/18502436

#SPJ1

open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program
open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program

Wider channel bandwidth ________. increases transmission speed allows more channels to be used in a service band both increases transmission speed and allows more channels to be used in a service band neither increases transmission speed nor allows more channels to be used in a service band

Answers

Wider channel bandwidth decreases transmission speed.

What is Wider channel bandwidth?

Wider WiFi channel widths is known to be a bandwidth that is made up  of 40 MHz and 80 MHz width.

They are known to be used often in the 5 GHz frequency band. In this type pf band, there are said to have a lot of WiFi channels and also less overlapping channels and as such, Wider channel bandwidth decreases transmission speed.

Learn more about bandwidth  from

https://brainly.com/question/4294318

i need simple app ideas for basic problems

Answers

Answer: - scan and convert to pdf app.

- timetable managing app.

- color seeing app (for color-blind people.)

- virtual clothing/jewelry try on.

Explanation:

Threads can only be added to cylindrical faces.
O True
O False

Answers

Answer:

I would say false

Explanation:

Threads can be add to anything there is no say in where you should add the thread and into what

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

int counter = 0;
String userInput = "";
while (userInput != "stop") {
print "What pet do you have? ";
userInput = readInputLine();
if (userInput != "stop" ){
counter = counter + 1;
print "\nYou have one ";
print userInput;
print ". Total # of Pets: ";
print counter;
}
}

Explanation:

not sure what programming language you use, therefore the answer is pseudocode but it should give you an idea how to implement a piece of code for this problem.
Also, from the way you described the exercise I'm not sure if you always are supposed to reply with "you have one" + the pet or if you should count how often the same pet was entered.

Java Eclipse homework. I need help coding this

Project Folder: Lesson 03
package: challenge3B
Class: ChallengeProject3B

Complete the code challenge below.

(You will need to use escape sequences to print the \ and “ characters )

Write a program that displays the following:

1. Write code that displays your name inside a box on the console screen, like this:

+-----------------+

­­| Your Name |

+-----------------+

2. Write code that prints a face, using text characters, hopefully better looking than this one:

//////

| o o |

(| ^ |)

| \_/ |

-------

3. Write code that prints a tree:

/\

/ \

/ \

/ \

--------------

“ “

“ “

“ “

Answers

public class ChallengeProject3B{

   public static void main(String [] args){

       System.out.println("+-----------------+");

       System.out.println("|   YOURNAME      |");

       System.out.println("+-----------------+");

       System.out.println("\n//////");

       System.out.println("| o o|");

       System.out.println("|\\_/|");

       System.out.println("-----");

       System.out.println("\n/\\");

       System.out.println("/\\");

       System.out.println("/\\");

       System.out.println("/\\");

       System.out.println("--------------");

   }

}

I hope this helps!

Define the missing member function. Use "this" to distinguish the local member from the parameter name.
#include
using namespace std;
class CablePlan{
public:
void SetNumDays(int numDays);
int GetNumDays() const;
private:
int numDays;
};
// FIXME: Define SetNumDays() member function, using "this" implicit parameter.
void CablePlan::SetNumDays(int numDays) {
/* Your solution goes here */
return;
}
int CablePlan::GetNumDays() const {
return numDays;
}
int main() {
CablePlan house1Plan;
house1Plan.SetNumDays(30);
cout << house1Plan.GetNumDays() << endl;
return 0;
}

Answers

Answer:

Here is the complete member function:

void CablePlan::SetNumDays(int numDays) {   //member function of class CablePlan which take numDays as parameter

this->numDays = numDays;   // refers to the fields numDays of CablePlan  class using this keyword

return;  }

Explanation:

The complete program is:  

#include <iostream>  //to use input output functions

using namespace std; //to identify objects like cin cout

class CablePlan{  //class

public:  //public methods of class

void SetNumDays(int numDays); //method of class CablePlan that takes numDays as parameter to set the days

int GetNumDays() const;  // method of class CablePlan to get no of days

private:  //private data member of class CablePlan

int numDays;  //private data member of class CablePlan that holds no of days

};

// FIXME: Define SetNumDays() member function, using "this" implicit parameter.

void CablePlan::SetNumDays(int numDays) { /

this->numDays = numDays;     // used to refer to numDays variable of CablePlan class using this keyword

return;}  

int CablePlan::GetNumDays() const {  //define member function GetNumDays

return numDays;}  

int main() {  //start of main function

CablePlan house1Plan;  //creates object of CablePlan class

house1Plan.SetNumDays(30);  //uses object to call member function of  CablePlan passing value 30 to it in order to set no of days

cout << house1Plan.GetNumDays() << endl;  //uses object to call member function of  CablePlan to get the no of days (numDays)

return 0;}

Here this keyword is used to refer to the field i.e. numDays of CablePlan class. This distinguishes local member numDays  from parameter numDays using this with -> symbol.  

'this' pointer retrieves the object's numDays  which is hidden by the local variable numDays . The output of this program is:

30

Define the missing member function. Use "this" to distinguish the local member from the parameter name.#include

Answer:

this.numDays = numDays;

Explanation:

You just need one line of code.  "this." to access the class member, and the "." is the member access operator.

What is a soulmate sketch

Answers

A picture of what you think you soulmate might look like

Marissa has recently accepted a job as a transcriptionist that will require several hours of typing a day. What are two pieces of advice you would give her to make sure her workstation is set up ergonomically? You need to answer the prompt in full to receive it.

You need to have at least five complete sentences.

You need to use proper grammar, capitalization, and punctuation.

Answers

Additionally, Marissa can take frequent breaks to stretch her hands, arms, and neck and perform exercises to prevent stiffness.

What is transcriptionist?

The field of transcription offers a variety of prospects and good income. An advanced transcriptionist makes between $25 and $30 per hour, while a transcriptionist normally makes around $19.02 per hour. If you labour 2.5 hours every day for 24 days, you could easily earn an average of $1141.2 per month at this pace.

requirements for transcribers:

diploma from high school.

There can be a need for a degree, an associate's degree, or other training.

knowledge of Express Scribe, and other programmes.

a quick typing speed and superior reading comprehension.

High professional standards and a strong work ethic.

An excellent second job for someone with additional time is transcription. Despite the fact that it's crucial to only take on tasks you can do in the allotted amount of time.

Read more about transcriptionist:

https://brainly.com/question/25703686

#SPJ1

The concept of the value chain focus on

Answers

Answer:

The overarching goal of a value chain is to deliver the most value for the least cost in order to create a competitive advantage.

Your Welcome:)

At what point will a while loop stop repeating in Python? (5 points)

When the condition registers as false
When the condition registers as true
When the end value in the range is a value less than one
When the start value begins with a value greater than one

Answers

A while loop stop repeating in Python When the condition registers as false.

The condition statement of a while loop is evaluated at the beginning of each iteration. If the condition evaluates to true, the code block inside the loop is executed. After executing the code block, the condition is evaluated again. If the condition still evaluates to true, the code block is executed again, and the process continues. However, when the condition finally evaluates to false, the loop stops repeating, and the program moves on to the next line of code after the loop.

It is important to ensure that the condition statement eventually evaluates to false; otherwise, the loop will continue indefinitely, resulting in an infinite loop. This can cause the program to hang or become unresponsive.

The end value in the range or the start value in the loop is not directly related to when a while loop stops repeating. The condition statement dictates the termination of the loop based on its truth value, regardless of the values used in the loop's initialization or range.

In summary, a while loop in Python will stop repeating when the condition specified in the loop's condition statement registers as false. This condition statement is evaluated at the beginning of each iteration, and once it evaluates to false, the loop terminates, and the program proceeds to the next line of code.

For more questions on Python

https://brainly.com/question/26497128

#SPJ11

What happens when text is added to grouped objects that is larger than an object ?

Answers

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

Present an example that uses correctly a local variable inside a function to mask (hide) it from a global variable. Explain the purpose of masking the variable, how it should be declared, and how it is used. Show as much C/C++ code as needed to explain your example.

Answers

The code example that uses correctly a local variable inside a function to mask (hide) it from a global variable is:

int i = 5;

void function (){

...

for(int i = 0; i < 13; i++)

}

What are local and global variables?

Local variables are variables that have the scope only inside the function that it was declared.

Global variables are variables that have an entire program as a scope.

If a global variable is "re-declared" inside a function, then the scope is only the function, meaning that the local variable inside the function hides it from the global variable.

This is the case in the code we gave for this problem, in which:

The global variable i is declared with a value of 10.Inside the function function(), another variable i is declared, this time with a scope only inside the function f, masking it from the global variable.

More can be learned about local and global variables at https://brainly.com/question/13109296

#SPJ1

Help me find the output please

Help me find the output please

Answers

Answer:

16

Explanation:

it find biggest number

How to use the screen mirroring Samsung TV app

Answers

If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:

Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.

What is  screen mirroring

The step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.

The  screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.

Learn more about  screen mirroring from

https://brainly.com/question/31663009

#SPJ1

In this question, you’ll set up your program with the general structure and canvas layout that you need, and start
by converting any number from 0 to 9 (1 digit) into Cistercian numerals.
The program should initially prompt the user to enter a number that will be converted. For this question, you can
assume that only numbers 0 to 9 will be entered. To use the input dialog, you must add
import javax. swing.JOptionPane;
as the very first line in your program. Then, when you want to obtain user input, a line of code such as
user text = JOptionPane.show an input dialog("Please enter text:");
will display the dialog. The String parameter contains the text displayed for the user, and a String is returned. The
returned String should be stored for converting the number. You mustn't convert the String
into an int or other number format, this is particularly important when you get to Q3.
Once the program accepts the input, it must convert the number into a Cistercian numeral. To start, you’ll draw an
empty, vertical stave taking up most of the canvas (looks like 0, below). Then, depending on the number that was
entered, you must draw one or two strokes off the stave that represents the number, as follows:
(empty
stave)
0 1 2 3 4 5 6 7 8 9
Your code should follow these requirements:
• Avoid duplicating code. Note that there are only five types of strokes,
and some glyphs use a combination of strokes: use this to your
an advantage to shorten your code. If you are careful every one of your
lines of code will be doing something different, you will not have any
duplicate code.
• Again, avoid duplicating code. You can assume that the strokes all
have their endpoints at the corners of an invisible square: two points
are on the stave, two are off the stave, and all points are equidistant.
If you store these four points somewhere, you should be able to use
them to draw any stroke you want with minimal effort.
• Keep in mind that you are storing the input number as a String, so you should be comparing it to chars of
digits (e.g., ‘1’, not 1).
• Hint: You do not need to use functions for each individual digit/stroke! If you do, you may run into
problems with Q2 and Q3, unless you read Unit 14, which is about functions (Week 9).
In addition to drawing the glyph, your canvas should display the original number, contain a button that will ask the user for new input, and erase the existing number and glyph(s) (this will also be useful to you
when testing different numbers). Make changes to default parameters to make the output more appealing (e.g.,
background color, text color, glyph color, stroke widths...).

Answers

Answer: Just download the answer.txt to get the answer. i cant paste here due to the inappropriate words

1.what are the function of os
2.what is an is
3.explain the different between Windows os, Android os, and Los os
4.what is a letility software​

Answers

Operating system, IS, Differences, Utility Software  - Explore key concepts in computing, including operating systems, information systems, platform differences, and utility software functionalities.

How is this so?

1. OS functions -  manage hardware/software, provide interface, control access, schedule tasks, and facilitate communication between software/hardware.

2. IS -  Information System collects, processes, stores, and disseminates information within an organization.

3. Differences -  Windows for PCs, Android for mobile, iOS for Apple; user interface, applications, underlying technologies vary.

4. Utility software -  enhances system management, optimization, and maintenance; includes antivirus, disk cleanup, file compression, and backup tools.

Learn more about Operating system at:

https://brainly.com/question/22811693

#SPJ1

application of computer in insurance​

Answers

Answer:

To keep a list of insured members in the offices.

Explanation:

Compunters can be used to keep records of insured individual and their details

What does a list code block do?

Question 2 options:

stores many pieces of information


stores a single piece of information


completes a set algorithm when a condition is met


repeatrepeats a process a set number of times

Answers

Answer: stores many pieces of information.

Explanation:

Write a program that creates a login name for a user, given the user's first name, last name, and a four-digit integer as input. Output the login name, which is made up of the first five letters of the last name, followed by the first letter of the first name, and then the last two digits of the number (use the % operator). If the last name has less than five letters, then use all letters of the last name. Hint: Use the to_string() function to convert numerical data to a string.

Answers

Answer:

In C++:

#include <iostream>

#include <string>

#include <sstream>

using namespace std;

int main(){

   string lname, fname,stringnum;    int num; string login, pwd;

   cout<<"Last Name: ";    cin>>lname;

   cout<<"First Name: ";    cin>>fname;

   cout<<"Four-digit integer: ";    cin>>num;

   stringnum = to_string(num).substr(0,4);

   stringstream geek(stringnum);    geek>>num;

   num = num%100;

   pwd = to_string(num);

   if(lname.length()<5){ login = lname+fname.substr(0,1);    }

   else{ login = lname.substr(0,5)+fname.substr(0,1);    }

   cout<<"Login Name: "<<login<<endl;

   cout<<"Password: "<<pwd<<endl;

   return 0;

}

Explanation:

This declares all necessary variables

   string lname, fname,stringnum;    int num;     string login, pwd;

This prompts the user for last name

   cout<<"Last Name: ";    cin>>lname;

This prompts the user for first name

   cout<<"First Name: ";    cin>>fname;

This prompts the user for a four digit integer

   cout<<"Four-digit integer: ";    cin>>num;

This converts the input number to string and gets only the first four integer

   stringnum = to_string(num).substr(0,4);

This converts the string back to an integer

   stringstream geek(stringnum);    geek>>num;

This gets the last two of the four digit integer

   num = num%100;

This gets the password of the user

  pwd = to_string(num);

This gets the login name of the user.

This is executed if the length of the first name is less than 5

   if(lname.length()<5){ login = lname+fname.substr(0,1);    }

This is executed if otherwise

   else{ login = lname.substr(0,5)+fname.substr(0,1);    }

This prints the login name

   cout<<"Login Name: "<<login<<endl;

This prints the password

   cout<<"Password: "<<pwd<<endl;

Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)

Answers

Answer:

D

Explanation:

Based on the information given, the correct option will be:

D. findMin(-1,1)

findMin(1,-1)

findMin(1,1)

It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.

In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.

In conclusion, the correct option is D.

Learn more coding on:

https://brainly.com/question/22654163

consider the following prolog program using the predicates haspet(a, b) to represent that person a owns a pet b and doesnoteat(a, b) to represent that

Answers

Prolog languages are logics that are used when creating programs that require artificial intelligence.

The prolog rule to define the predicate grandfather(x, y) is grandfather(X,Y) :- mother(M,Y), father(X,M); father(F,Y), father(X,F)

How to determine the prolog rule ?

From the question, we have the following definitions:

mother(m, y): m is the mother of yfather(f, x): f is the father of x

For x to be the grandfather of y, then either of the following definitions must be true

m is the mother of y, and x is the father of mf is the father of y, and x is the father of f

Using the above highlights, the prolog rule would be

grandfather(X,Y) :-

mother(M,Y), father(X,M);

father(F,Y), father(X,F)

To learn more about prolog program refers to;

https://brainly.com/question/26566158

#SPJ4

where are for teypes of I .c.t

Answers

ICTs can be divided into four primary groups: internet, telecommunications, broadcasting, and computing and information technology.

ICT definition and kinds?

Any communication equipment, including radio, television, cell phones, computer and network hardware, satellite systems, and so on, as well as the various services and tools associated with them, such video conferencing and distant learning, falls within the broad definition of ICT.

What are the four ICT functions?

Creating, safeguarding, and storing the organization's electronic data, as well as assisting all functional areas of the business with the use of software and data management, are all included in the design and management of operational applications.

To know more about teypes I .c.t visit:-

https://brainly.com/question/14613945

#SPJ1

Other Questions
is impeachment strictly political? Explain The idea that human beings separate their world into categories like "safe" and "dangerous" in order to manage the messiness of life can be attributed to __________________. Write a word problem that can be solve using anequation of the form ax + b = c.Include at least one decimal or fraction.please help its due soon I need to do it in a photosystem, chlorophyll a molecules are found in a matrix of ______. Which conelusion is best supported by the map? A) The Gobi Desert is located in southem China B) Many mineral resources are located along the East China Sea The least populated areas in China are found in the north and west. D) Beijing is one of China's busiest seaports. in order to appease competing views regarding how to select the chief executive, it was agreed at the constitutional convention that Public schools that provide innovative or specialized programs to attract students from all parts of a district.Magnet SchoolsNormal SchoolsMiddle SchoolsOld Deluder Satan Act Solve the equation for y.x = 4y-2y= a ____ processing model is one in which data is processed on a centrally located computer. when light crosses the boundary between media the characterisitc of the light that remains unchanged is if the cost of a type i error is high, a smaller value should be chosen for the . a. level of significance b. confidence coefficient c. test statistic d. critical value PLEASE HELP how do you find the thickness of a foil when youre given the density, mass, length and width? please explain with detail! also how will the units look during the process because my length and width are cm, density is g/cm^3, and mass is g. bogetz jf, bogetz al, rassbach ce, gabhart jm, blankenburg rl. caring for children with medical complexity: challenges and educational opportunities identified by pediatric residents. acad pediatr. 2015;15(6):621-625. doi:10.1016/j.acap.2015.08.004. how far from a 1.00 c point charge will the potential be 100 v? at what distance will it be 2.00 102 v? Which of the following statements is the most accurate about choosing guidelinesfor buying a home?Any guidelines are OK. They are all probably written by mortgageprofessionalsOB.As long as the guidelines are easy to understand, they must containinformation that will really help me.OA.OcOD.Ask yourself this question about any guideline: Does the person or companyproviding the guideline make more money if I follow their guideline? If theanswer is yes, be careful. Question the guideline and compare it to otherguidelines.Guidelines are only used for first time home buyers who do not understandmortgage rules. in prokaryotic cells, are responsible for attachment to surfaces, while are responsible for transfer of plasmid dna from a donor to a recipient cell. Please help!!If one pound is equal to 453.592 grams, how many grams are there in one ounce?1. 1002. 103. 28.34954. 283.495 What sets Shakespeare apart from all other famous poets and writers of world literature, and how is this seen as a fulfillment of Ben Jonsons prophecy? acob stores, a retail outlet, pays hide corp., a leather goods manufacturer, for the supply of 1000 units of a product. however, some of the goods that are delivered are damaged. when jacob stores threatens to sue hide, the latter offers compensation for the inconvenience caused. it also offers to waive the charges for the damaged goods. jacob stores agrees to this deal. this scenario is an example of a(n) newspaper editors, gossips, and computer wizards are all examples of people in communities whose access to ______ gives them power.