Given that the host operating system has sufficient resources, with ________ virtualization a host can run multiple operating systems on the same hardware at the same time.

Answers

Answer 1

Given that the host operating system has sufficient resources, with hardware virtualization, a host can run multiple operating systems on the same hardware at the same time.

Virtualization is a critical component of cloud computing that aids in the creation of virtual versions of hardware, storage, and network resources. Hardware virtualization is the process of creating a virtualized environment that runs on top of a physical machine. This environment operates as though it were a separate computer, with its own operating system and software installed.

Hardware virtualization is a technique for running multiple operating systems on the same hardware at the same time, as stated in the question. Hardware virtualization is also known as platform virtualization or full virtualization. It makes it possible to share the resources of a single physical computer across multiple virtual machines.

To know more about system visit:

https://brainly.com/question/19843453

#SPJ11


Related Questions

Which of the following devices might be used to transmit electronic mail? *
1 point
(A) Printer
(B) Monitor
(C) Fax machine
(D) Smartphone​

Answers

I believe it is smartphone because a printer prints, a monitor displays information from a computer(does not control it) and a fax machine well faxs stuff so it would only be smart phone

A group of computers running malicious software under control of a hacker is known as:A - HoneynetB - BotnetC - EthernetD - Honeypot

Answers

A group of computers running malicious software under control of a hacker is known as Botnet. A botnet refers to a network of compromised computers that are controlled by a malicious individual (hacker) to perform various tasks, such as sending spam or launching cyberattacks. Thus the correct answer is B) Botnet.

A botnet is a collection of compromised computers, also known as "bots" or "zombies," that are infected with malicious software and controlled by a hacker or a group of hackers. These compromised computers can be used to carry out various cybercriminal activities, such as launching distributed denial-of-service (DDoS) attacks, spreading malware, stealing sensitive information, and conducting other malicious activities without the knowledge or consent of the computer owners.

Therefore correct answer is B) Botnet.

To learn more about botnet; https://brainly.com/question/29902719

#SPJ11

Create a program that:
Asks if you want to participate. If they type anything but y, yes, Yes, or YES, it repeats until they type y, yes, Yes, or
YES (While statement)
The program then asks three survey questions that you create. At least on of the questions must have a decision structure that takes a different path depending on the answer.
Lastly, the program prints a summary of the responses.

Answers

Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

In Python, how do you repeat a program?

repeat() For practicing repeat in Python, the itertools package offers the repeat() function. We supply the data and the number of repetitions in the repeat() function.

How do you handle survey questions where respondents can choose from multiple answers?

Since no statistical software will be able to measure this unless you can divide it into two separate questions, which you shouldn't do, you should eliminate the response entirely. Make sure to let your participants know that each question should only have one response.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ1

Who is known as the "father of computing"?
Mention his contributions?​

Answers

Answer: Charles Babbage

Explanation:

He was named father of computing because of the invention of the Analytical Engine in 1837. This machine contained an integrated memory, a ALU (arithmetic logic unit) and a basic flow control. This machine gave birth to the notion of computer. Unfortunately, the machine wasn't built when Babbage was alive due to some funding issues.

Who is known as the "father of computing"?Mention his contributions?

Answer:

Charles Babbage is known as the father of computer...

Who is known as the "father of computing"?Mention his contributions?

the ________ design technique can be used to break down an algorithm into functions.

Answers

The divide and conquer design technique can be used to break down an algorithm into functions. This technique involves dividing a large problem into smaller subproblems, solving the subproblems, and then combining the solutions to the subproblems to solve the original problem.

It is a useful approach for tackling complex problems because it allows for the development of efficient algorithms by breaking down the problem into smaller, more manageable pieces. In the context of computer science, the term "design" refers to the process of planning and organizing the various components of a system or algorithm in order to solve a particular problem. This process typically involves identifying the inputs and outputs of the system or algorithm, determining the steps or processes that need to be carried out in order to transform the inputs into the desired outputs, and organizing these steps in a logical and efficient manner.

Learn more about design: https://brainly.com/question/14035075

#SPJ4

plz help me I have to submit the work before the day ends
13. (a) State one area where computers are used.
(2 marks)
(b) Give any two advantages of using computers in this area
(4 marks)
(c) Explain three effects of computer technology in the following areas:
(i) Job opportunities
(3marks)

Answers

Answer:

13. (a) One area where computers are used is in the creation of a record of auxiliary workers, doctors, nurses, patients, vendors, and payments that can be easily retrieved at an hospital

(b) Two advantages of using computers in an hospital are;

1) The ability to easily access the health record of a patient by a member of staff involved in treating the patient from any location

2) The reduction in the number of physical files and document kept at the counter or record storage which takes up more space as new patients are registered, even when the number of active patients remains the same

(c) Three effects of computer technology in the following area are;

(i) Job opportunities

1) The introduction of the desktop computer, increased the number of job opportunities in desktop publishing, administrative assistance and secretarial role

2) Computer technology has made more people able to work from home

3) Computer applications use with computer technology and developed to work with production machines has created a large number of machine operator job opportunities

Explanation:

T/F : spread spectrum transmission in wireless lans provides security.

Answers

True, spread spectrum transmission in wireless LANs provides security :Spread spectrum transmission in wireless LANs provides security. Spread spectrum is a radio communication technology that involves spreading the radio signal across a wide frequency band.

A spread spectrum signal appears as random noise to anyone listening in on the channel, making it difficult for eavesdroppers to intercept and decode the signal.Moreover, Spread spectrum transmission in wireless LANs provides security in the sense that it's not susceptible to jamming. Jamming is a common form of attack on wireless networks, and it involves broadcasting noise or other interference on the wireless channel to disrupt communications.

However, Spread spectrum transmission is able to resist jamming attacks, allowing it to continue operating even in the presence of interference.

To know more about LANs visit:

https://brainly.com/question/13247301

#SPJ11

Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours to activities related to the job. Which quality is he looking for? A. responsibility B. flexibility C. trust D. reliability E. integrity

Answers

Answer:

reliabitlity

Explanation:

Help to get unblocked on here

Answers

Answer:

please am sorry

Explanation:

please I mean to help you but I don't know the process

How would you justify using cloud computing?

A less network traffic
B sharing a network could reduce overall costs
C new technology
D government pressure

Answers

Answer:

B.

Explanation:

When a computer loads a webpage, it sends a message to a web server over the Internet. How many Internet protocols are used to send and receive the message

Answers

Answer:

When a computer loads a webpage, multiple Internet protocols are typically used to send and receive the message. The exact number of protocols involved may vary depending on various factors such as the type of webpage, the network configuration, and the specific technologies in use. But basically we can say Two(2) Protocols, HTTP and TCP/IP. However, I'll mention some common Internet protocols that are typically involved in the process:

Explanation:

Hypertext Transfer Protocol (HTTP): This is the primary protocol used for transferring webpages and other resources over the Internet. It defines the format and rules for communication between web clients (such as web browsers) and web servers.

Transmission Control Protocol (TCP): TCP is a core protocol in the Internet protocol suite. It provides reliable, connection-oriented communication between devices. HTTP often runs over TCP, ensuring that the webpage data is transmitted reliably and in the correct order.

Internet Protocol (IP): IP is responsible for addressing and routing packets of data across the Internet. It provides the foundation for sending data between devices on different networks. TCP relies on IP for routing the HTTP request and response packets.

Domain Name System (DNS): DNS is used to translate human-readable domain names (e.g., www.example.com) into IP addresses. When loading a webpage, the computer typically queries a DNS server to obtain the IP address of the web server hosting the webpage.

Transport Layer Security (TLS)/Secure Sockets Layer (SSL): These protocols provide encryption and secure communication over the Internet. They are commonly used to establish a secure connection between the web browser and the web server when loading a webpage over HTTPS (HTTP Secure).

Internet Control Message Protocol (ICMP): ICMP is used for network management and diagnostic purposes. It includes features such as ping, which helps determine if a host is reachable or to measure round-trip time.

Border Gateway Protocol (BGP): BGP is a protocol used for exchanging routing information between different autonomous systems on the Internet. It plays a crucial role in routing data packets across networks.

These are just a few examples of the various Internet protocols involved in sending and receiving messages when loading a webpage. The actual number of protocols utilized can vary depending on the specific requirements and configurations of the network and systems involved.

You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
an operating system.

B
open source software.

C
proprietary software.

Answers

Answer:

C, proprietary software

Explanation:

Proprietary software, also known as non-free software, is computer software for which the software's publisher or another person reserves some rights from licensees to use, modify, share modifications, or share the software. It sometimes includes patent rights.

You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Although indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.

There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document's priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.

You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?

Answers

Answer:

The answer is "Allocate permission for managing documents to the Gladys printer."

Explanation:

In the given scenario, we allow permission for managing the documents to the Gladys printer. It should enable Gladys could continue these trends by bringing something into the community of local administrators and introducing major changes to wherewith your office operates. In especially, they need her to modify its printing process regarding documentation requiring printing.

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

Which media example would be best for mayas presentation

Answers

Answer: c. a diagram that explains the steps involved in photosynthesis

Explanation:

The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.

The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.

What is the output results of Artificial Neurons, electrical signals, chemical signals, numbers or letters?

Answers

Answer:

Neurons communicate via both electrical signals and chemical signals. The electrical signals are action potentials, which transmit the information from one of a neuron to the other; the chemical signals are neurotransmitters, which transmit the information from one neuron to the next.

Explanation:

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called

Answers

Analysis tools such as query-by-example and a specialised programming language called SQL facilitate examining all or selected data, querying the database, and generating reports.

Data collection and analysis technologies are used to collect, evaluate, and present data for a range of applications and industries. They take unprocessed data and turn it into meaningful knowledge that businesses can use to make better choices. A data analyst may operate in a range of sectors, including operations, marketing, and finance. For instance, their findings might result in lower shipping costs. different viewpoints on consumer behaviour. Among the numerous types of data analysis tools, three categories stand out as particularly essential: Applications for Excel, R, Python, and business intelligence (BI).

Learn more about Analysis tools from

brainly.com/question/13994256

#SPJ4

HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP

HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP

Answers

Answer:

I should be C! :D

Answer:

B

Explanation:

Plasma membranes are extremely thin and fragile, requiring an extensive support network of structural proteins that underlies them. this network is called the:______.

Answers

Plasma membranes are extremely thin and fragile, requiring an extensive support network of structural proteins that underlies them. this network is called  cortex.

What protein supports the plasma membrane?The two major integral membrane proteins of red blood cells, glycophorin and band 3, provide well-studied models of the transmembrane protein system (Figure 12.6). Glycophorin is a small glycoprotein of 131 amino acids, with a molecular volume of about 30,000, half of which is protein and half carbohydrate.The four major functions of the plasma membrane include

              (a)identification,

              (b)communication,

              (c)regulation of solute exchange through the membrane,

              (d)isolation of the cytoplasm from the external environment.

The cell includes a protoplasm (or simply plasm), which is the semi-fluid occupancy matter. This living subject or plasm is possessed inside a biological membrane directed to as the plasma membrane

To lean more about plasma membrane, refer to:

https://brainly.com/question/11254387

#SPJ4

mike is sending david an encrypted message using a symmetric encryption algorithm. what key should he use to encrypt the message?

Answers

To encrypt the message using a symmetric encryption algorithm, Mike should use a symmetric key. Symmetric encryption algorithms use the same key for both encryption and decryption. This means that the key used to encrypt the message should also be used by David to decrypt the message.

Symmetric encryption algorithms are fast and efficient because they operate on blocks of data at a time. The key length used in symmetric encryption algorithms varies depending on the algorithm being used. Common key lengths include 128-bit, 192-bit, and 256-bit.

When selecting a key for symmetric encryption, it is important to use a strong and secure key. A strong key should have a high level of randomness and should be kept confidential. It is also recommended to periodically change the key to enhance security.

In summary, Mike should use a symmetric key to encrypt the message. The key should be strong, secure, and shared with David so that he can decrypt the message using the same key.

Learn more about encryption algorithm

https://brainly.com/question/31718006?

#SPJ11

range paramters - for loop
question in picture

range paramters - for loopquestion in picture

Answers

Answer:

start,stop,step_size

Explanation:

Starting at 5 to for loop will count backward by 1 (hence the step_size being -1) until it reaches 0 (stop).

You will create a Network Diagram reflecting the activities you need to undertake to complete the final exam.
It must be configured as follows:
- There must be a minimum of 10 Activities
- You must have at least 2 paths through the network
- Each activity needs a start date, duration and all except the first requires a predecessor(s).
Next use the Critical Path Method (See PMBOK p.210, 6.5.2.2) to do forward and reverse pass on your network diagram and identify the critical path.
Maximum marks will be gained by originality, excellent presentation and accurate use of CPM.

Answers

The network diagram was configured with at least 10 activities, at least two paths through the network, and every activity having a start date, duration, and predecessor(s). After using the Critical Path Method, the critical path for this network diagram is A-B-C-E-F-G-H-I-J, which takes 18 days to complete.

The following is a Network Diagram reflecting the activities you need to undertake to complete the final exam.ActivitiesPredecessorDurationStart DateA - Select Topic - 1 12nd JulyB - Research - 3 A 15th JulyC - Create an outline - 2 B 20th JulyD - Draft the introduction - 2 C 22nd JulyE - Draft the main body - 5 D 24th JulyF - Draft the conclusion - 2 E 29th JulyG - Edit the document - 3 F 31st JulyH - Proofread the document - 1 G 3rd AugustI - Format the document - 2 H 5th AugustJ - Submit the document - 1 I 7th AugustTo complete the final exam, the above network diagram shows the activities that you will have to undertake.

The following are the features of this diagram:It must have a minimum of 10 Activities, which it has accomplished as there are ten activities on the chart.There must be at least 2 paths through the network, which it has fulfilled as there are two paths in the network. The first path is A-B-C-D-E-F-G-H-I-J, and the second is A-B-C-E-F-G-H-I-J.Each activity needs a start date, duration, and all except the first requires a predecessor(s), which the chart has fulfilled. Every activity in the diagram has a start date, duration, and predecessor except for the first activity.The next step is to use the Critical Path Method (CPM) to do forward and reverse pass on the network diagram and identify the critical path.

The forward pass starts at the first activity and finishes at the last. The critical path is the longest path, which is A-B-C-E-F-G-H-I-J, and it takes 18 days to complete the critical path.The reverse pass starts at the last activity and finishes at the first. The critical path is the longest path, which is J-I-H-G-F-E-C-B-A, and it takes 18 days to complete the critical path.In conclusion, the network diagram was configured with at least 10 activities, at least two paths through the network, and every activity having a start date, duration, and predecessor(s). After using the Critical Path Method, the critical path for this network diagram is A-B-C-E-F-G-H-I-J, which takes 18 days to complete.

For more information on  network diagram visit:

brainly.com/question/13439314

#SPJ11

A computer program that copies itself into other software and can spread to other computer systems is called?

Answers

Answer:

Computer Virus

Definition:

A computer program that copies itself into other software and can spread to other computer systems.

Which of the following is true of both copyrights and trademarks?
Both are granted for an unlimited period of time
Both must be applied for and granted by the government
Both provide protection of intellectual property to the owner
Both are registered with the government

Answers

Answer:

I think its Both must be applied for and granted by the government

Explanation:

Answer:

Both Must Be applied for and granted by the government

Explanation: Just took the Unit Test

In cells J3:J13 combine the crop name with the crop type using a space, a dash and final space between the crop name and crop type

Answers

To combine the crop name with the crop type in cells J3:J13, you can use the CONCATENATE function. This function allows you to combine multiple strings of text into one cell.


To start, you'll want to click on cell J3 and type the following formula:

=CONCATENATE(A3," - ",B3)

This formula will combine the text in cell A3 (the crop name) with the text in cell B3 (the crop type), with a space, a dash, and another space in between them.

You can then copy and paste this formula into cells J4 through J13, changing the cell references to match the corresponding crop name and crop type for each row.

Alternatively, you can use the ampersand (&) symbol instead of the CONCATENATE function. In this case, the formula would look like this:

=A3&" - "&B3

This will achieve the same result as the CONCATENATE function.

By combining the crop name and crop type in this way, you'll be able to create a more descriptive and informative list of crops in your spreadsheet. This can help you keep track of your inventory and make more informed decisions about your farming operations.

For such more question on changing

https://brainly.com/question/29499084

#SPJ11

What is the importance of using the proper markup language.

Answers

Answer:

Markup is specifically used to label parts of the document for what they are, rather than how they should be processed. Well-known systems that provide many such labels include LaTeX, HTML, and XML. The objective is to decouple the structure of the document from any particular treatment or rendition of it.

hope it helps!!

Explanation:

Explain ways in which we can create strings in Python?​

Answers

Answer:

Strings can be created by enclosing characters inside a single quote or double-quotes. Even triple quotes can be used in Python but generally used to represent multiline strings and docstrings.

Explanation:

Strings can be created by enclosing characters inside a single quote or double-quotes. Even triple quotes can be used in Python but generally used to represent multiline strings and docstrings.

Fatima wants to compose and send an email in Outlook. Order the steps she needs to follow to do this task.
✓Click the Send button after typing the message.
Under the Home tab, click the New Email button.
Click the To button to choose a contact
Open the Outlook application.

Answers

Answer:

The steps that Fatima needs to follow in-order to send an email on the Outlook include:

1. Open the Outlook application.

2. Under the Home tab, click the New Email button.

3. Click the To button to choose a contact

4. Click the Send button after typing the message.

Explanation:

For every new email to be sent out through the Outlook, there are steps to follow like ensuring that the Outlook application is appropriately opened. Later, a tab showing new email should be clicked to open the dialogue box for typing the email message.

After the message has been typed, a contact to whom the message is going to be sent to is selected before actually sending out the message by a click of a button.

Answer:

4  Click the Send button after typing the message.

2  Under the Home tab, click the New Email button.

3 Click the To button to choose a contact.

1  Open the Outlook application.

which of the following best describes a code of ethics?

Answers

The code of ethics refers to the guide of principles that are required to help professionals so that they can conduct their business with integrity.

Organizations adopt code of ethics so that their members can be able to know the difference between what is considered right and what is wrong.

Through code of ethics, employees can be judged in an organization when they do something that doesn't align with the ethical standards of the organization.

In conclusion, code of ethics is important as it shapes an organization in the right direction.

Read related link on:

https://brainly.com/question/21819443

The Ethics Code relates towards the guidance of principles that specialists need to help them perform their business with integrity.

It also included business ethics, a code of professional behavior as well as rules of ethics for employees.Organizations adopt an ethics code so that their representatives can understand the difference between what is wrong and what is right.Employees may be judged in an organization through an ethics code when they do anything that does not match the company's ethical standards.The code of ethics is important because it shapes an organization.

Therefore, the final answer is "code of ethics".

Learn more:

brainly.com/question/13818432

Why are Quick Parts useful in an Outlook message?

Spreadsheet data sources can be hyperlinked to an email message.
Stored text and graphics can be quickly inserted into an email message.
A gallery of shapes will open up, and you can quickly choose one to insert.
Highlighted parts of Word documents can be inserted into a message body.

Answers

Answer:

I hope the picture helped

Why are Quick Parts useful in an Outlook message?Spreadsheet data sources can be hyperlinked to an email

Answer:

B. stored text and graphics can be quickly inserted into an email message

Explanation:

Edge 2021

Other Questions
What is the value of b2 - 4ac for the following equation?2x^2 - 2x - 1 = 0 What is the probability of rolling a 6 and then a 7 on a number cube?NO LINKS PLEASE! What should an ice machine disposal hook up to? In the end of the "Avengers Infinity War," the villain Thanos snaps his fingers and turns half of all living creatures to dust with the hope of restoring balance to the natural world 12 . How does this affect the long term behavior of various species? Investigate the validity of his claim by modeling various population dynamics such as unconstrained and constrained growth. 13 In the 2018 Marvel Studios blockbuster, "Avengers: Infinity War," the villain Thanos snaps his fingers and turns half of all living creatures in the universe to dust. 14. He was concerned that overpopulation on a planet would eventually lead to the suffering and extinction of the entire population. This is evident in the following quote from Thanos. "Little one, it's a simple calculus. This universe is finite, its resources finite. If life is left unchecked, life will cease to exist. It needs correction." In this activity, we will investigate the validity of Thanos' claims using mathematical models for population dynamics. First, we will consider the following initial value problem dP dt = kP, P(0) = PO, where P is the population at time t, and k and Po are constant parameters. (i) Interpret the meaning of this differential equation (1.8.1). (ii) Solve the initial value problem (1.8.1) and determine what would happen to a population in the long run. Explain why your answer makes sense in terms of the differential equation. (iii) This model is called unconstrained growth, since the population grows without bound. Under what assumptions would it be appropriate to use this type of model? Does this model the situation Thanos is describing? (iv) Thanos' plan is to eliminate half of all living creatures in the universe. What would happen if the population size was suddenly cut in half? How could that be represented with this model? What parameters would change? The imaginary, vertical plane that cuts through the body in such a manner as to divide it into two symmetrical halves is referred to as the Verify the identity. (Simplify at each step.)7 cos^2 7 sin^2 = 14 cos^2 77 cos^2 = 7 sin^2 -7 ( ? )=7 cos^2 +7 cos^2 -7=14 cos^2 -7 Need help asap will give brainliest Suppose you want to save $7,500 to go on a dream vacation in three years. You can save for your vacation by either depositing one single lump of money into a savings account and letting it accumulate interest or by making regular monthly payments. how much energy is absorbed when 2 mol ba(oh) reacts with ammonia in the reaction below a profit-sharing plan allows employees to participate in the earnings of their employer. this type of plan may be irs qualified, making it eligible for the same tax treatment as other types of pension plans. some companies may offer a profit-sharing program that invests heavily in . What is the value of the correlation coefficient r of the data set?0.280.080.080.28 Given that 12q x + 16p + 10p = 192x + 312. Find the values of p and q A firm has a debt-to-equity ratio of 0.5 and a market-to-book ratio of 2. What is the ratio of the book value of debt to the market value of equity? I heard there is going to be a new Harry Potter movie!!!!! 1. Identify the global pattern of migrant distribution. im kinda slow so pls help luv In 2010, the population of a city was 108,000. From 2010 to 2015, thepopulation grew by 7.7%. From 2015 to 2020, it fell by 6.1%. To the nearest100 people, what was the population in 2020? It takes John 1 hour to walk to Jareds house 2. 6 miles away from eachother It only takes 20 minutes on his bike to get to Jareds house how much faster does he travel on his bike Simplify (2)(3/2) N/A 2 23 26 26 Look at the picture Its Better PLEASE HELP companies are most likely to use data mining results identifying unprofitable customers for ________. what should you use instead of a verbal filler during a presentation if you are struggling with what your next word should be?