Date
transactions
may 2 1. juanita ortega transferred an additional $53,250 from
her personal savings account into the business checking
account.
6 2. bought hiking equipment for $550, check 367.
7 3. bought rafting equipment on account from peak
equipment inc. for $2,675.
11 4. juanita ortega transferred her own computer, valued at
$850, to the business.
16 5. bought a cash register for the office on account from
premier processors for $1,250.
19 6. sold the computer on credit for $850 to mary johnson.
22 7. paid $500 on account to peak equipment inc., check 368.
24 8. purchased shelves for the office for $650, check 369.
28 9. paid $1,250 on account to premier processors, check 370.
31 10. bought rafting oars for $175, check 371.
analyze calculate the ending balance in the computer equipment
account.

Answers

Answer 1

To calculate the ending balance in the computer equipment account, we need to analyze the transactions related to computer equipment throughout the month. Here are the relevant transactions:

1. Juanita Ortega transferred her own computer, valued at $850, to the business on May 11th.
2. The computer was sold on credit to Mary Johnson for $850 on May 19th.


To calculate the ending balance in the computer equipment account, we need to consider the initial balance and the changes made to the account during the month.

The initial balance is $0 because there were no computer equipment transactions before May.

1. On May 11th, Juanita Ortega transferred her own computer, valued at $850, to the business. This increases the computer equipment account by $850.

2. On May 19th, the computer was sold on credit to Mary Johnson for $850. This decreases the computer equipment account by $850.

Since there were no other computer equipment transactions, the net change in the computer equipment account is $0 ($850 increase - $850 decrease). Therefore, the ending balance in the computer equipment account remains at $0.

In summary, the ending balance in the computer equipment account is $0.

Learn more about  the computer equipment account: https://brainly.com/question/33122788

#SPJ11


Related Questions

Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:

#1: You entered _____
When DONE is entered, the total number of words entered should be printed in this format:

A total of __ words were entered.
Sample Run
Please enter the next word: cat
#1: You entered the word cat
Please enter the next word: iguana
#2: You entered the word iguana
Please enter the next word: zebra
#3: You entered the word zebra
Please enter the next word: dolphin
#4: You entered the word dolphin
Please enter the next word: DONE
A total of 4 words were entered.

Answers

Answer:

def main():

   word = input("Please enter the next word: ")

   count = 0

   while word != "DONE":

       count += 1

       print("#{}: You entered the word {}".format(count, word))

       word = input("Please enter the next word: ")

       print("A total of {} words were entered.".format(count))

       

main()

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

A peripheral device communicates with your computer through:.

Answers

A peripheral device communicates with a computer through an interface or a connection.

Some common methods of communication

Wired connections: Many peripheral devices use wired connections to communicate with computers. This includes connections such as USB (Universal Serial Bus), Ethernet, HDMI (High-Definition Multimedia Interface), DisplayPort, and Thunderbolt.

Wireless connections: Some peripheral devices utilize wireless connections to communicate with computers. This includes technologies like Bluetooth, Wi-Fi, and infrared.

Device-specific interfaces: Certain peripheral devices have their own specialized interfaces for communication with computers. For example, printers may use parallel ports or USB connections, while scanners may use TWAIN (Technology Without An Interesting Name) interfaces.

Learn more about peripheral device at

https://brainly.com/question/18994224

#SPJ4

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

how long would it take to send a file of 640,000 bits from host a to host b over a circuit switched network if all links are 1.28 mbps and each link is shared by 20 users and 500 ms to establish end-to-end circuit? from all the options given below, choose the most relevant answer according to you.

Answers

The transmission rate for each circuit is (1.536 Mbps)/24, or 64 kbps. The transmission time for the file is (640,000 bits)/(64 kbps) = 10 seconds. We add the circuit setup time to this 10 seconds, giving us 10.5 seconds to transfer the file.

In TDM, the frame rate times the number of bits in a slot equals the transmission rate of a circuit. The transmission rate of a circuit, for instance, is 64kbps if the link transmits 8,000 frames per second and each slot has 8 bits. The link will stay active even when the two devices are not sharing data, resulting in large amounts of memory waste, is one of the fundamental drawbacks of circuit switching. Since two hosts must be connected before exchanging data, it is significantly slower than packet switching.

To learn more about circuit click the link below:

brainly.com/question/27206933

#SPJ4

3.1.1 What type of goods are car radio and remote control.​

Answers

Answer:

Radio Controlled cars .

write a program that adds each of the numbers stored in memory locations d through e, inclusive, and stores the result in register r2. assume that address d can be found in register r3 and address e can be found in register r4. to receive credit, you can only modify the contents of r2, r3, r4, r5, and no other registers, and your solution should have no more than 12 lines of code. note: you do not need to consider the case when d is greater than e.

Answers

If the address in the MAR points to a device register, the output is a 1. (KBSR, KBDR, DDR, DSR). The address control logic handles this.

MANDATORY ADDITIONAL POINTS is referred to as MAR. This is a measure that MAKAUT probably launched in 2018–19 to encourage students to participate in extracurricular activities. The extracurricular activities ranged widely, from taking part in and organizing campus events to creating new initiatives and even studying things that weren't on the course syllabus through MOOCs system.

The main objective was to make sure that the students developed their skills and gained some first-hand experience with social work. MAKUT sought to make the students' involvement in the aforementioned activities voluntary. Its grading system, however, contradicted that. Currently, each student from the first to fourth years must receive 100 marks in order to receive the certificate of course completion.

To know more about system click here:

https://brainly.com/question/27148473

#SPJ4

plz answer the following ​

plz answer the following

Answers

Answer:

it trojan

Explanation:

what is the question asking

a leased line with the hdlc protocol creates a wan link between what two devices on the attached lans?

Answers

The two devices on the attached LANs to creates a WAN link from a leased line with the HDLC protocol is routers.

What is HDLC protocol?

The HDLC protocol or high-level data link control is a protocol for data link layer. HDLC protocol will provide the encapsulated means for network layer packet.

The means which is provided by leased line is a physical means that can transmit the bits with this way a routers can forward bit packets onto the LANs that connecting them.

So, the LAN connection will be forward by routers with leased line as transmitter of bits and HDLC protocol will encapsulated that to network layer packet and create WAN link.

Learn more about LAN here:

brainly.com/question/8118353

#SPJ4

Write a pseudocode that takes a number as input from user and searches for that number in the array"
You can assume the array already exists and has numbers stored in it. The array is called "Numbers" and it's size is 15.

Answers

Using the codes in computational language in pseudocode it is possible to write a code that takes a number as input from user and searches for that number in the array" You can assume the array already exists and has numbers stored in it.

Writting the code:

Set sum to zero

Set count to zero

DOWHILE count < 15

Read number from user

sum = sum + number

increment count

ENDDO

Print sum

What is a number array?

An array is formed by arranging a set of objects into rows and columns. Each column must contain the same number of objects as the other columns, and each row must have the same number as the other rows.

See more about pseudocode at brainly.com/question/18502436

#SPJ1

Write a pseudocode that takes a number as input from user and searches for that number in the array"

suppose that you have a message consisting of 1024 bits. design a method that will extend a key that is 64 bits long into a string of 1024 bits, so that the resulting 1024 bits can be xored with the message, just like a one-time pad. is the resulting cipher as secure as a one-time pad? is it possible for any such cipher to be as secure as a one-time pad?

Answers

The method to extend a 64-bit key into a 1024-bit string is to use a key-derivation function (KDF).

What is key-derivation function?

A key-derivation function (KDF) is a cryptographic algorithm used to derive a cryptographic key from a set of inputs such as a password, a random number or some other form of input. KDFs are used to transform user-chosen passwords into cryptographic keys that can be used to encrypt and protect data.

A KDF is a cryptographic algorithm that takes an input (in this case a 64-bit key) and produces an output with a longer length (in this case 1024 bits). The KDF will take the 64-bit key and generate a 1024-bit string by stretching it out with random numbers, algorithms, and/or calculations.

The resulting cipher may not be as secure as a one-time pad, as it is not truly random. Depending on the KDF used, it is possible for an attacker to figure out the KDF used and then reverse the process to determine the key.

It is not possible for any such cipher to be as secure as a one-time pad, as one-time pad encryption relies on a truly random key (which is impossible to reverse engineer).

To learn more about key-derivation function
https://brainly.com/question/13086223
#SPJ4

PLEASE HELP!!!

If you try to ______
PowerPoint while there are unsaved changes, you will be
asked whether you want to save them.
fill in the blank.

Answers

leave (i'm pretty sure this is the answer)

If you try to close PowerPoint while there are unsaved changes, you will be asked whether you want to save them.

What is a PowerPoint presentation?

You may create projects, write text, and create presentations online using the software called PowerPoint Presentation. Slides may be created, transitions can be included, and ideas can be presented to friends or professors.

A businessman can present what he thinks or has to say by using a PowerPoint to keep his thoughts and ideas organized. Yes, I am aware. PowerPoint is something I've been using for a while now.

Basically, you press the home button in the upper-left corner of your screen, and an option that says "create a new slide" should appear there.

Therefore, if you attempt to close PowerPoint with modifications that have not been saved, you will be prompted to do so.

To learn more about PowerPoint presentations, refer to the link:

https://brainly.com/question/14498361

#SPJ5

flexibility
user control
mouse-free input
text alternatives
balance
enabling the user to change the font
and other elements on the page
enabling navigation for visually
impaired users who may rely
only on keyboards for pointing
and clicking
allowing blind users to understand
website images and video
allowing a web page to adjust
to different devices and screens

flexibilityuser controlmouse-free inputtext alternativesbalanceenabling the user to change the fontand

Answers

Hello!

The answers are:

-User control: enabling the user to change the font and other elements on the page.

-Mouse-free input: enabling navigation for visually impaired users who may rely only on keyboards for pointing and clicking.

-Text alternatives: Allowing blind users to understand website images and video.

-Flexibility: Allowing a web page to adjust to different devices and screens.

I hope that this helps you out!

mention some of the codes of conduct of Information Technology (IT)​

Answers

Answer:

Below! ;)

Explanation:

Computer Science:

Binary

Morse code

Computer Programming:

Java

Python

etc.

Hope this helps!

Have a nice day!

If you find my answer helpful

Pls consider marking my asnwer as Brainliest! It would mean a lot!

____ is a term for software that is run directly from the internet.

Answers

Web-based software is a term for software that is run directly from the internet.

The term for software that is run directly from the internet is "web-based software." Web-based software, also known as cloud-based software or software as a service (SaaS), allows users to access and utilize applications or programs through a web browser without the need for installation on local devices.

It operates on remote servers, and users can interact with the software and perform various tasks online. Web-based software offers several advantages, including easy accessibility from any device with internet connectivity, automatic updates without user intervention, centralized data storage and management, and collaboration capabilities. Popular examples of web-based software include email services, project management tools, customer relationship management (CRM) systems, and document editing applications.

The rise of web-based software has contributed to the increasing popularity of cloud computing and the shift towards remote work and online collaboration.

To learn more about “software” refer to the https://brainly.com/question/28224061

#SPJ11

How can random numbers in a range be generated in Java?.

Answers

Answer:

Java oh Na Na my  

Explanation:

which of the following is true about a null attribute? group of answer choices if the column is not null, entering the data for that field is optional if the column is null, entering the data for that field is required. it indicates whether or not the value of the column can be null. a primary key can be null

Answers

A null attribute value is often the same as nothing, it indicates whether or not the value of the column can be null.

What is a null attribute?

However, since there are several ways to describe nothing, it's critical that we utilize exact language: There is a value for a property that represents emptiness (null) Despite existing, a characteristic is worthless (empty) A property doesn't exist (missing)

A certain condition of an attribute denotes emptiness (null) A certain value of an attribute denotes emptiness (for example, -999). it indicates whether or not the value of the column can be null.

Therefore, the null attribute value is often the same as nothing, it indicates whether or not the value of the column can be null.

Learn more about null, here:

https://brainly.com/question/25997106

#SPJ1

What type of AWS Systems Manager document can take a snapshot of an Amazon Elastic Compute Cloud (Amazon EC2) instance

Answers

An AWS Systems Manager document that can take a snapshot of an Amazon Elastic Compute Cloud (EC2) instance is a 'Automation document.'

The AWS Systems Manager is a management service that assists in viewing operational data from various AWS services and automating recurring operational tasks. Users can make the most of their infrastructure management, improve security, and make more educated decisions using this integrated interface. It also simplifies the process of patching, updating, and automating compliance by utilizing Amazon EC2 system manager capabilities.

AWS Systems Manager enables IT operations teams to create and run System Manager documents, which are workflows that contain a sequence of actions to execute on a specified instance or a fleet of instances. Systems Manager documents help simplify the process of provisioning instances, deploying applications, and running tasks across your infrastructure.

The Automation document is one of the AWS Systems Manager documents types that is utilized to automate tasks that can be initiated on an EC2 instance, either on-demand or on a schedule. It enables users to define a collection of actions, known as steps, that AWS Systems Manager executes in order. The Automation document is then associated with one or more targets, which can be Amazon EC2 instances, on-premises machines, or other resources.The automation document is a unique AWS Systems Manager document type that is designed to be utilized in conjunction with the Systems Manager Automation service. The Automation service provides a fully managed service that enables users to automate manual, long-running, error-prone, and often repeated IT tasks.

Learn more about AWS :

https://brainly.com/question/30176139

#SPJ11

The web lab consists of which elements. Select all that apply. Group of answer choices Files Inspector Tool Preview Hints Work Space Instructions

Answers

Answer:

Inspector Tool

Preview

Work Space

Instructions

Explanation:

Web Lab is a function that incorporates HTML in web development. It has functions such as Workspace where the developer writes the body of the website. Preview helps the developer take a look at the final product of what he is creating. Instructions panel provides a list of the different types of html packages that the developer can chose from.

All of these options help the developer produce a website that is up to standard.

If a Windows system crashes or has a corrupted OS, it can be restored to its previous state from a previously created _______________.

Answers

“Screenshot” or backup
Screenshot means a backup in this scenario, but I’d go with backup as your answer to this question

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines

Answers

Answer:

VoIP gateway

Explanation:

A VoIP stands for the voice over IP. The VoIP gateway is defined as a hardware device which is used to convert the telephony traffic into the packets of data that is used for transmission over the internet. It acts as the bridge and connects the VoIP with the worlds of the legacy telephony.

In a VoIP setup, the signals form the analog phone of the campus equipment  are converted to the IP data which can travel over the analog telephone lines of the phone company.

a ______ is a program that sets up a database and provides tools to enter, edit, and retrieve data from a database.

Answers

A database management system (DBMS) is a program that sets up a database and provides tools to enter, edit, and retrieve data from a database.

A database management system (DBMS) is computer software for designing, storing, retrieving, and managing data in a database. DBMSs provide users and programmers with a systematic way to manage data. A DBMS is used to control and administer data access, store and organize data, and manipulate data in a database.Some common database management systems are Microsoft Access, MySQL, Oracle, and SQL Server. Each DBMS uses a slightly different syntax to operate databases, but most offer a graphical user interface (GUI) that lets users access and manipulate data in a more accessible way than text-based interfaces, such as command-line interfaces. The goal of a database management system is to help organize data so that it can be used efficiently. Organizations use DBMSs to create, update, delete, and read records in a database. DBMSs also provide users with a range of tools to manage and use the data stored in a database.

More on database management system: https://brainly.com/question/24027204

#SPJ11

When do you not have to cite information you put on your website?

Answers

Answer:

You do not have to cite information you put on your website if the information is considered to be common knowledge. Common knowledge is information that is widely known and accepted by the general public, and does not require a citation because it is not original to the person presenting it.

Examples of common knowledge include well-known facts, such as the date of the Declaration of Independence, the capital of the United States, and the laws of physics. These facts are widely known and accepted, and do not require a citation because they are not original to the person presenting them.

However, if you use information on your website that is not considered to be common knowledge, you must provide a citation. This includes original research, ideas, data, or other information that is not widely known or accepted. By providing a citation, you are giving credit to the original source of the information and allowing others to verify the accuracy of the information.

Overall, you do not have to cite information you put on your website if the information is considered to be common knowledge, but you must provide a citation for any information that is not widely known or accepted.

what is the minimum and maximum number of nodes at depth d in a perfect binary tree? be sure to list the nodes at depth d. do not include nodes at depth d-1 or d 1 or other depths.

Answers

In a perfect binary tree, each internal node has exactly two children, and all leaf nodes are at the same level. Therefore, the minimum and maximum number of nodes at depth d in a perfect binary tree can be calculated as follows:

At depth d=0, there is only one node, which is the root of the tree.

At depth d=1, there are two nodes, which are the children of the root.

At depth d=2, there are four nodes, which are the grandchildren of the root.

More generally, the minimum number of nodes at depth d in a perfect binary tree is 2^d, and the maximum number of nodes is 2^(d+1) - 1.

For example, at depth d=3, the minimum number of nodes is 2^3 = 8, and the maximum number of nodes is 2^(3+1) - 1 = 15. The nodes at depth d=3 are the great-grandchildren of the root.

Learn more about Binary tree here:

https://brainly.com/question/13152677

#SPJ11

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: Hacker crackdown Digital surveillance Honey pots Computer entrapment

Answers

The correct term for web sites that are designed to attract hackers for monitoring purposes is "Honey pots." Honey pots are intentionally created to appear vulnerable or attractive to hackers.

These systems or websites are closely monitored and logged to capture the activities and techniques employed by hackers. The purpose is to gather valuable information about their tactics, tools, and motivations to improve cybersecurity measures and enhance threat intelligence. Honey pots act as a decoy or trap, diverting hackers' attention away from real systems or sensitive data while allowing security professionals to analyze their actions and gather insights to strengthen defenses. It is an effective strategy to study hacker behavior, identify vulnerabilities, and enhance overall cybersecurity.

learn more about  web sites    here:

https://brainly.com/question/31804124

#SPJ11

11. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
12. When would a business use mobile computing or web-based information systems in their operations? Discuss an example of a business function that could be implemented on each platform, and explain why that platform would be preferred over the other platform.
13. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.

Answers

A knowledge worker is an individual who works primarily with knowledge, particularly in a professional context.

11. A knowledge worker's job requires a high degree of expertise, education, and skills, as well as the ability to think critically and creatively. If you work in a field that involves research, analysis, or other knowledge-based activities, you are likely to be a knowledge worker. Many jobs require knowledge workers, including scientists, engineers, doctors, lawyers, and accountants. If you are interested in pursuing a career as a knowledge worker, you will need to develop your knowledge, skills, and expertise in your chosen field.

12. Businesses would use mobile computing or web-based information systems in their operations when they require to streamline their processes and improve their efficiency. An example of a business function that could be implemented on each platform is given below:

Mobile Computing: A business can use mobile computing to track employees' location and send notifications. This can be useful for delivery companies, food delivery, and transportation companies that require to keep track of their employees' movement and scheduling. In addition, mobile computing can be used to make sure that customer-facing businesses like restaurants and retail stores can take payments on the go.

Web-based Information Systems: Businesses that manage a large number of clients may benefit from using web-based information systems to store customer data and track orders. This can be useful for businesses that require to manage customer relationships like e-commerce stores or subscription services. In addition, web-based information systems can be used to make sure that customer-facing businesses like restaurants and retail stores can take payments on the go.

13. Boundaries in the context of TPS are the points at which the system interacts with the external environment. For example, when a transaction occurs, the boundary is where the data is entered into the system and then passed on to other systems or applications. The boundaries of an organization can be physical, such as the walls of a building or geographical boundaries. They can also be conceptual, such as the separation between different departments within a company. The three examples of boundaries are as follows: Physical Boundaries: The walls of a factory or office building are examples of physical boundaries. In addition, a shipping company might have to deal with geographical boundaries when transporting goods between countries or continents. Conceptual Boundaries: Different departments within a company might have different conceptual boundaries. For example, the sales department may have different priorities and objectives than the finance department. External Boundaries: These are the points at which the system interacts with the external environment. An example of an external boundary is when a transaction is initiated by a customer or a vendor.

To learn more about knowledge workers: https://brainly.com/question/15074746

#SPJ11

which plant has a black stem with white flowers and can counteract enchantments

Answers

Answer:

Moly

I hope this helps...

Please mark me Brainliest.

Have a nice day! <3

The trio theme is not very long: [Beginning of trio].
You have just heard it in its entirety, and it makes up the first section of the trio.

Which best describes the music you hear after the first statement of the trio theme? [First statement of theme + next phrase]

Answers

The best description of the music heard after the first statement of the trio theme is that it is the second section of the trio. based on general musical conventions, the music following the initial statement of a theme in a trio could vary widely depending on the composer's intention and the overall structure of the piece.

The given statement, suggests that the trio theme has only one section and it has been completed in the beginning of the piece.

However, the music that is heard after the first statement of the trio theme is different from the trio theme, and it is considered as the second section of the trio.

Based on the clarification, the correct answer would be "Second section of the trio."

To learn more about music: https://brainly.com/question/26591304

#SPJ11

Write a program code in the python programming language to find simple interest given the
formula SI = (P*R*T)/100.
Read P(Principal), R (Rate), T (Time) from the keyboard and Calculate Simple Interest (SI).

Answers

Answer:

p = float(input('Principal: '))

r = float(input('Rate: '))

t = float(input('Time: '))

si = (p * r * t) / 100

print(si)

The "float" before the input in the first 3 lines is so you're able to input decimals. If you're not using decimals, you can switch the "float" to "int". However, if you input a decimal number after you switched to int, you will receive an error

The Bureau of Labor Statistics forecasts that the number of computer and network support specialist positions in the US will grow at about ____% over the next 10 years.
Answers: a. 1-2
b. 5
c. 50
d. 20

Answers

The Bureau of Labor Statistics forecasts that the number of computer and network support specialist positions in the US will grow at about 5 % over the next 10 years. This b is the correct answer.

This means that b. 5 is the correct answer.

Computer and network support specialists are technology experts who provide support, troubleshooting, and advice to users who need assistance with their computer hardware, software, or peripherals. They can work for a range of businesses, organizations, and institutions, including government agencies, non-profits, and private companies. They are also known as computer support specialists, help desk technicians, or technical support specialists.

The Bureau of Labor Statistics forecasts that the number of computer and network support specialist positions in the US will grow at about 5% over the next 10 years. This is due to the increasing need for businesses to have reliable technology systems and infrastructure to support their operations. As a result, computer and network support specialists will continue to be in high demand to help maintain and troubleshoot these systems

Learn more about  Computer and network support specialists:https://brainly.com/question/28432242

#SPJ11.

Other Questions
QUICKThe figure shows the outline of a new pier that is going to be built at the ocean. What is the area of the pier? Use 3.14 for pi. What is the perimeter of square EFGH?Perimeter = ____ units 1/3x7 ............... Coming to America Unit Test Use the texts Designed to Detain and In Their Own Words to answer the question. Designed to Detain In Their Own Words How is Nick Friesen's perspective in In Their Own Words different from the perspective in Designed to Detain? (1 point) O He was very happy there. O He felt the guards asked too many questions. He wanted to come to the United States. O He thought the food was bad. tuberculosis may be diagnosed using a(n) on sputum (lung fluid) samples. group of answer choices immunochromatographic assay viral hemagglutination test neutralization test direct fluorescent antibody test what is the far point in m of a person whose eyes have a relaxed power of 53.3 d? (assume a lens-to-retina distance of 2.00 cm.) How many grams of Cu (63.55 g/mol) may be deposited from a Cu2+ solution during electrolysis by a current of 3.00 A for 7.0 hours? Please report 1 decimal place. F = 96485 C/mol______ The price of a stock, which pays no dividends, is $30 and the strike price of a one year European call option on the stock is $25. The risk-free rate is 4% (continuously compounded). Which of the following is a lower bound for the option such that there are arbitrage opportunities if the price is below the lower bound and no arbitrage opportunities if it is above the lower bound? A. $5.00 B. $5.98 C. $4.98 D. $3.98 E. $5.34 Two trains leave towns 566 kilometers apart at the same time and travel toward each other. One train travels 11 km/h slower than the other. If they meet in 2 hours, what is the rate of each train? estionKenneth has a bird feeder which gets visited by an average of 15 birds every 2 hours during daylight hours. What is theprobability that the bird feeder will be visited by at most 5 birds in a 45 minute period during daylight hours? (Round youranswer to three decimal places.) 12345373737269943773884= This type of synovial joint has two flat bone surfaces that allows for the bones to slide over one another creating tiny movement in all directions. this joint is called:_______. At what temperature does ice melt at 101kPa? for the dehydrohalogenation (e2) reaction shown, draw the zaitsev product, showing the stereochemistry clearly. you might find it helpful to make a model of the starting material. the substrate consists of two chiral carbons bonded together. the left carbon has an in plane bond to hydrogen pointing to the lower left, a wedged bond to ethyl pointing to the upper left and a dashed bond to methyl pointing to the upper left. the right chiral carbon has an in plane bond to ethyl pointing to the upper right, a wedged bond to chloride pointing to the lower right and a dashed bond to hydrogen pointing to the lower right. the substrate reacts with k o h in ethanol and heat to give the products. Solve the equation below by factorising.2x^2- 10x= 0 kileau corp., a calendar tax-year s corporation, terminated its s corporation status on september 22, 2018 when it failed the shareholder requirements. what is the first date on which kileau can re-elect s status? The Mongol conquests resulted in all of the following developments EXCEPT? Which has higher freezing point 0.1 m NaCl or 0.1 M glucose? Plzzz I need helpSpanish Please help AND NO LINKS OR U WILL BE REPORTED! Identify the reference angle for each given angle, .When = 300, =______degreesWhen = 225, =______ degreesWhen = 480, =______degreeswhen = -210, = ______ degrees