​How long would it take to download a 700 Megabyte file on a 40Mb connection?

Answers

Answer 1

Answer:

17-18 minute estimate.

Explanation:

If 40 mb were able to download per minute and there is 700 mb needed to be downloaded, it would take around 17-18 minutes to download as an estimate. The division is 700 divided by 40 which equals 17.5.

Answer 2

Answer:  17-18 minute at least

Explanation: hope this helps


Related Questions

In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to complete the sentence

Answers

You'll require a block of bold text to draw the attention of your viewers. Fiona is trying to figure out how to make a page layout appealing to readers in a DTP project.

How can text be made bold on web pages?

Format, Font, and Bold must all be chosen first, then Bold. Be aware that bolding a portion of text can draw readers' attention to the layout of the page.

DTP gives a document's creator control over distribution and final product appearance.

Determine where your audience will see your message or form of it (billboard, business card, brochure, newsletter, etc.) and what effect you are hoping when developing a publication. Also, clearly describe your objective and target audience.

Planning and research are necessary for effective design. arranging the content. Choose the topics that will interest the reader the most. A thumbnail sketch is a quick, unpolished version of how a document or design will be laid out and designed.

To know more about DTP project visit:-

https://brainly.com/question/28134383

#SPJ4

Answer:

You'll need a hook

Explanation:

A hook is something that grabs the reader's/watcher's attention and draws them toward the content. An example of a hook would be, as mentioned in the question, an illustration, photograph, a block of bold text(like I used to emphasize the answer), or a quote in a colour that is in contrast to the background.

In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona

one of the leading causes of damage to sesitive circuitry is

Answers

One of the leading causes of damage to sensitive circuitry is electrostatic discharge (ESD).

This occurs when there is a sudden flow of electricity between two objects with different electrical charges, such as a person and an electronic device. ESD can cause permanent damage to electronic components, leading to malfunction or failure of the device. It is important to take proper precautions to prevent ESD, such as wearing an anti-static wrist strap and avoiding touching electronic components with bare hands.
One of the leading causes of damage to sensitive circuitry is electrostatic discharge (ESD).

learn more about sensitive circuitry

https://brainly.com/question/4412130

#SPJ11

Which of the following configuration tasks can be automated when using DSC version 2 in Windows Server 2016? (Choose all that apply.).

Answers

When using DSC version 2 in Windows Server 2016, configuration tasks such as managing Windows features and roles, configuring registry settings, managing file and folder permissions, configuring network settings, installing and managing software packages, and configuring security settings can be automated.

Which configuration tasks can be automated when using DSC version 2 in Windows Server 2016?

When using DSC (Desired State Configuration) version 2 in Windows Server 2016, the following configuration tasks can be automated:

1. Managing Windows features and roles: DSC allows automating the installation, configuration, and removal of Windows features and roles on target servers.

2. Configuring registry settings: DSC can automate the management of registry settings, including creating, modifying, and removing keys and values.

3. Managing file and folder permissions: DSC enables automating the configuration of file and folder permissions, ensuring consistent and secure access controls.

4. Configuring network settings: DSC can automate the configuration of network-related settings, such as IP addresses, DNS settings, and firewall rules.

5. Installing and managing software packages: DSC allows automating the installation, upgrade, and removal of software packages on target servers.

6. Configuring security settings: DSC enables automating the configuration of security settings, including user rights assignments, password policies, and security options.

By automating these tasks with DSC version 2, system administrators can ensure consistent and reliable configuration management across Windows Server 2016 environments, reducing manual effort and improving overall efficiency.

Learn more about configuration tasks

brainly.com/question/31620424

#SPJ11

help me pleaseeeeeeee

help me pleaseeeeeeee

Answers

Answer:

I think you have to ask to your parents

complete the following tasks: install the appropriate wap on the roof of building b to provide wireless coverage on the patio. attach the appropriate antenna that will provide adequate wi-fi coverage for building b's patio.

Answers

The way to complete the above process involiving an outdoor wireless network is given below.

How to complete the installation of an outdoor wireless network

Install an antenna on the roof of each building to give a high-speed wireless connection.Expand High  -gain Antennas on the  Shelf.Drag the High-gain Antenna (Directional) to the installation place on the roof of Building A.For the link   between the buildings,you utilize a high-gain directional antenna to deliver a very strong, focused signal in only one direction.   Using a high-gain omnidirectional antenna will cause the signal to be broadcast in all directions over a very long distance, posing a security issue.Drag the remaining High-gain Antenna (Directional) to the installation location on the top of Building B.Install a WAP on   the roof of each structure.Extend Wireless Access Points on the Shelf.Drag the Wireless Access Point(Outdoor) to the installation spot on the top of Building A.Because you simply need to cover the patio areas, a directional antenna is the ideal option.   Outdoor WAPs are built to endure elements like as heat, cold,and rain.Move the remaining Wireless Access Point (Outdoor) to the installation spot on the roof of Building B.Connect both antennas   to ensure optimal coverage.Expand WAP Antennas on the Shelf.Drag the WAP   Antenna (Directional) to one of the outside WAPs that has been installed.Drag the remaining WAP Antenna (Directional)to the other outside WAP that has been installed.

Learn more about wireless network:
https://brainly.com/question/26956118
#SPJ1

________ is a program or collection of programs that enable the hardware to process data.

Answers

Software information technology components is a program or collection of programs that enable the hardware to process data.

What is software?

Devices like the CPU, monitor, keyboard, and printer are examples of hardware. These components work together to receive, process, and display data and information. Software enables hardware to process data. It might be a single program or a group of related applications. A database is a grouping of linked files or tables that contain data. An operating system is a group of applications that manages a computer system's resources and regulates the execution of programs. The hardware elements of the system, such as keyboards, printers, displays, and disk drives, are these resources. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context.

Learn more about  Software here:

https://brainly.com/question/21687169

• Example of the properties of materials in the construction projects, photos, identify the property, causes, how to apply it in the construction industry, how it is affected, how it would be improved (according to the property).

Answers

One example of a property of materials in construction projects is durability. This property refers to the ability of a material to resist damage or wear over time. Some materials that exhibit high durability include concrete, steel, and brick.

In order to identify the property of durability in a construction project, one could observe the condition of the materials after an extended period of time. Causes of reduced durability in materials can include exposure to weather or chemicals, poor design or construction practices, and normal wear and tear.

In order to apply the property of durability in the construction industry, materials should be carefully selected and installed to ensure they can withstand the expected conditions of their use. This might involve using materials that are resistant to corrosion, moisture, or other environmental factors that could impact their durability over time.

Know more about durability:

https://brainly.com/question/32627929

#SPJ11

Write a program in C to find the product of all elements of the array. Note. 1. You need to input the size of the array from the terminal (size <100) 2. You need to input the elements from the terminal, all of them are integers. For example, input: [1,3,5,6] output: 90(1∗3∗5∗6)
Previous question

Answers

Here's a program in C to find the product of all elements of an array, with inputs taken from the terminal:

```
#include

int main() {
   int size;
   printf("Enter the size of the array (less than 100): ");
   scanf("%d", &size);
   int arr[size];
   printf("Enter the elements of the array, separated by spaces: ");
   for (int i=0; i

int main() {
   int size, i;
   int array[100];
   int product = 1;

   printf("Enter the size of the array (size < 100): ");
   scanf("%d", &size);

   printf("Enter the elements of the array: ");
   for(i = 0; i < size; i++) {
       scanf("%d", &array[i]);
   }

   for(i = 0; i < size; i++) {
       product *= array[i];
   }

   printf("The product of all elements in the array is: %d\n", product);
   return 0;
}
```

For example, if you input [1,3,5,6] (size = 4), the output will be "The product of all elements in the array is: 90".

Learn more about :

Array : brainly.com/question/26104158

#SPJ11

Which AWS service is highly available when there are atleast two ports open , and allows for a connection from remote servers to the AWS cloud at any time

Answers

The AWS service that is highly available when there are at least two ports open, and allows for a connection from remote servers to the AWS cloud at any time is Amazon Virtual Private Cloud (VPC).

Amazon Virtual Private Cloud (VPC) is a web service.That allows you to create a virtual network that is isolated from the rest of the AWS cloud. It enables you to launch Amazon Web Services resources into a virtual network that you define.

It also provides network isolation, enabling you to control access to instances and applications, making it ideal for hosting multi-tier architectures.The VPC provides secure and reliable connections between remote servers and the AWS cloud.

It is highly available when there are at least two ports open. It also enables you to create a VPN connection to the AWS cloud, allowing you to access your resources in the cloud securely.

To know more about AWS service visit:

https://brainly.com/question/30176136

#SPJ11

simple example of hybrid computer​

Answers

gas pump station

radar systems

ct scan machines

These hybrid computers are capable to resolve more complicated set of differential equations. Examples are – freedom space flights, chemical reaction kinetics, human immunosuppressive system, food processing plants, and more.

How is video compression accomplished?
Video compression works by making the pixel size smaller.
Video compression works by removing the sound.
Video compression works by smoothing the pixels.
Video compression works by removing unnecessary parts of frames

Answers

Video compression works by making pixels smaller, so A.

Answer:

A. Video compression works by making the pixel size smaller.

Explanation:

E2020!

________ occurs when one physical device, such as a smartphone, provides the functions that previously required many physical devices, such as gps navigators, flashlights, medical devices, credit cards, texting, and cellular phones.

Answers

Dematerialization occurs when one physical device, such as a smartphone, provides the functions that previously required many physical devices, such as GPS navigators, flashlights, medical devices, credit cards, texting, and cellular phones.


What is the physical device?

A physical device is a grouping of physical servers used together for a single purpose in a network. The opposite of rational devices is physical devices. They are collections of hardware, which could contain other actual objects, machinery, ports, other connectors.

The act of converting your products to capture and commodities into digitized or digital format is referred to as dematerialization. The straightforward schedule aims to simplify the process of purchasing, selling, moving, and storing inventories as well as to make it efficient and error-free.

Learn more about physical device, here:

https://brainly.com/question/14726938

#SPJ1

I'm playing robl.
ox right now add me as a friend and we can play together if u want
Name: aftonfam_rules

Answers

Okay I will added you

I'll add you later! btw do you play gach a onli ne? My user name is Wolfie

_

Rolbox

HD

Find at least two articles (one journal article and one white paper) that discuss storytelling, especially within the context of analytics (i.e., data-driven storytelling). read and critically analyze the article and paper and write a report to reflect your understanding and opinions about the importance of storytelling in bi and business analytics.

Answers

The ability to effectively communicate experiences from a dataset using narratives and perceptions is known as data storytelling. It is frequently used to introduce informational nuggets into the scene and direct crowd action.

Data narrative needs to have these three elements:

Data: Carefully examining accurate, complete data serves as the foundation for your data story. You can be given the ability to fully understand data by dissecting it through straightforward, analytic, prescriptive, and predictive inspection.

Account: A verbal or written story, also known as a storyline, is used to transmit information gleaned from data, the setting surrounding it, and activities you recommend and hope will arouse in your audience.

Perceptions: Visual representations of your data and account can be useful for clearly and significantly telling its tale. These may take the form of summaries, diagrams, graphs, images, or recordings.

Primary Report:

When all things are equal, business intelligence dashboards and data perception tools are progressively more essential.

Business data has undergone a significant evolution, and there are now several options for perception tools that help clients make the most of the data. However, these tools frequently bombard corporate clients and executives with confusing dashboards that are overloaded with data points and analysis.

The facts and experiences should be introduced via data storytelling to give them additional weight.

This post will guide you on a journey to understand the need for data storytelling, what it entails for businesses, and how it helps them to improve analysis.

Information Storytelling's Need

The following layers make up the data examination process:

Final Verdict:

Without a question, data storytelling can aid firms in making the most of their data and improving data communication. In order to generate engaging stories from complex facts in real time, Phrazor blends the power of language and narrative with data.

Learn more on data storytelling here:

https://brainly.com/question/28310382

#SPJ4

In computer science how can you define "copyright, designs and patents act 1988"?​

Answers

Answer:

:)

Explanation:

Copyright Designs and Patents Act

The Copyright Designs and Patents Act (1988) gives creators of digital media the rights to control how their work is used and distributed. ...

Anything which you design or code is automatically copyrighted and may not be copied without your permission, as the digital creator.

PLS HURRY
Look at the image below

PLS HURRYLook at the image below

Answers

Answer:

\(\large\boxed{\text{A. Press the Control key together with the C key.}}\)

Explanation:

When you have an infinite program running, say

\(\texttt{while 1==1:}\)

  \(\texttt{print("hello")}\)

(which will run forever, since 1 is always equal 1)

You can press "Control C" to terminate the program.

Most bash's use Control+C as the terminating process, however there is also Control+Z which sends a protocol named SIGTSTP which temporarily "sleeps" the program - this can be undone. However, with Control+C, the program is stopped unless you start it from the beginning again.

Hope this helped!

What percentage of teens say they have witnessed cyberbullying?

50

95

70

35

Answers

A Majority of Teens Have Experienced Some Form of Cyberbullying. 59% of U.S. teens have been bullied or harassed online, and a similar share says it's a major problem for people their age

254 × (×) igual 20×()682883993

how images are encoded

Answers

Answer:

Digital images are encoded in binary. ... Students make connections between the amount of data used by the computer to store, transmit and create an image and the file size of different images (generally, the more pixels and more bits to encode the image, the larger the file size).

n this exercise, you are going to prompt the user for the number of cents (less than 1000). Based on their response, you will then determine the least number of coins needed to make change.

Remember, quarters are worth 25 cents, dimes are worth 10 cents, nickels are worth 5 cents, and pennies are worth 1 cent.

Sample Response:

Please enter an amount (less than 1000 cents): 436

Quarters: 17
Dimes: 1
Nickels: 0
Pennies: 1

Answers

Quarters: 20
Dimes: 10
Nickles: 20
Pennies: 200
Total amount 900cents

________ refers to the process of integrating external stakeholders into the innovation process.
A) Nearshoring
B) Open innovation
C) Media sharing
D) Crowdsourcing
E) Social cataloging

Answers

B) Open innovation. Open innovation is a concept developed by Henry Chesbrough, which refers to the practice of integrating external stakeholders such as customers, suppliers, and other partners into the innovation process of a company.

Open innovation can take many forms, such as collaborating with external partners on research and development projects, licensing or acquiring intellectual property from other companies or universities, or even crowdsourcing ideas from the general public through platforms such as IdeaScale or InnoCentive. The benefits of open innovation include increased access to new ideas, reduced R&D costs, faster time to market, and improved customer satisfaction. However, open innovation also presents some challenges, such as the need for effective intellectual property management, the potential for conflicts of interest, and the difficulty of integrating external partners into the company's culture and processes. Despite these challenges, many companies have embraced open innovation as a way to stay competitive and drive growth in today's fast-paced, constantly evolving business environment.

Learn more about Open innovation here:

https://brainly.com/question/1008019

#SPJ11

Open innovation refers to the process of integrating external stakeholders into the innovation process.

Open innovation refers to the process of integrating external stakeholders, such as customers, suppliers, and partners, into the innovation process to co-create and collaborate on new ideas and solutions. This approach allows companies to leverage external knowledge and expertise to enhance their innovation capabilities and improve their competitiveness. Other terms such as nearshoring, media sharing, crowdsourcing, and social cataloging are related to innovation but do not specifically refer to the process of integrating external stakeholders.

What is Open innovation?

Open innovation is a collaborative approach to innovation that involves working with external stakeholders such as customers, suppliers, universities, and other organizations. Rather than relying solely on internal research and development, open innovation involves sharing ideas, knowledge, and resources with external partners to develop new products, services, and technologies.

Open innovation can take many forms, such as joint ventures, licensing agreements, strategic alliances, and crowdsourcing. The goal of open innovation is to access a wider range of expertise and resources, speed up the innovation process, and improve the chances of success.

To know more about innovation process visit:

https://brainly.com/question/1008019

#SPJ11

-(PROJECT: SHADOW_ACTIVATED.)-

Answers

Answer:

OH NO!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Explanation:

WE'RE GONNA DIE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

(?_?)             o_O               O_o              (¯(●●)¯)

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

Breaking difficult problems down into smaller more manageable pieces is an example of

Answers

Answer:

Divide and Conquer

Explanation:

what acl entry would eliminate the effect of the implicit deny?

Answers

To eliminate the effect of the implicit deny in an Access Control List (ACL), you would need to add an explicit "permit" entry that matches the traffic you want to allow.

This entry should come before the implicit deny statement. By default, most ACLs have an implicit deny at the end, which denies all traffic that doesn't match any preceding permit statements. To counteract this implicit deny, you can insert a specific permit statement that matches the desired traffic. When the ACL is evaluated, if the traffic matches the permit statement, it will be allowed, and the implicit deny won't come into effect. However, it's crucial to ensure the permit entry is appropriately configured to match the desired traffic, as ACLs are processed in a top-down order, and the first matching entry is applied.

Learn more about  Access Control List here:

https://brainly.com/question/31956684

#SPJ11

What does a hanging indent look like?

The right and left edges of the paragraph are evenly lined up.
The first line of a paragraph is perfectly lined up with the lines below it.
The first line of a paragraph starts farther to the left than the lines below it.
The first line of a paragraph is indented more to the right than the lines below it.

Answers

Answer:

Option C, The first line of a paragraph starts farther to the left than the lines below it.

Explanation:

In a hanging indent (which is opposite of the normal paragraph), the first line of the paragraph is lined up with the left margin while the lines below the first line will indent one-half inch from the left margin.

Hence, option C is correct

A Simple Blood Bank Management System stores donors' information (Name, mobile and blood group). Users can add new donors and search & list donor information based on a specific blood group. Perform the following tasks: Task1: Your program should offer a menu like the one shown below. The program should display the same menu options repeatedly until the user enter option 3 and the program exits. ****** Welcome to the Blood Bank Management System ****** 1 Add Donor 2 Search Blood Group 3 Exit Task2: Your program should have addDonor () function to add new donor data kept in file donor.txt. ****** Welcome to the Blood Bank Management System ****** 1 add Donor 2 Search Blood Group. 3 Exit Enter your choice: 1 Enter the name, mobile and blood group. >> Mona 053123456 A Task 3: Your program should have searchBloodGroup() function which aske the user a requested blood group then list all the matched records from the (donor.txt) file, if there is no record found, the program should display an error message saying "There is no donor for the requested blood group" Welcome to the Blood Bank Management System ****** add Donor 1 2 Search Blood Group 3 Exit Enter your choice: 2 Enter the blood group: A Mona 0511111111 A ****** Welcome to the Blood Bank Management System ****** 1 add Donor 2 Search Blood Group 3- Exit Enter your choice: 2 Enter the blood group: B There is no donor for the requested blood group.

Answers

Blood Bank Management System is a simple program that stores donors' information like name, mobile number and blood group. Users can add new donors and search the donors' information based on the blood group. To complete this project, the following tasks need to be performed:Task 1: The program should offer a menu to the user with three options.

The menu should be displayed repeatedly until the user enters option 3 to exit the program.Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. ExitTask 2: An addDonor() function is required to add new donor information to the donor.txt file.  Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 1 Enter the name, mobile and blood group. >> Mona 053123456 ATask 3: A searchBloodGroup() function is required which asks the user to enter the blood group to list all the matching records from the donor.txt file.

If no records are found, the program should display an error message stating that there is no donor for the requested blood group.Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 2 Enter the blood group: A Mona 0511111111 AWelcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 2 Enter the blood group: B There is no donor for the requested blood group.

To know more about program visit:-

https://brainly.com/question/30613605

#SPJ11

Which fine arts field might someone who loves travel enjoy? O watercolor painting O travel photography O food blogging O hotel management​

Answers

Answer: Watercolor Painting

Explanation:

Answer:

Explanation:

Travel photography

True or False. A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status.

Answers

A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status: True.

In Cloud computing, a storage area network (SAN) refers to a high-speed computer network that is specially designed and developed to avail end users the ability to have an access to a consolidated, block-level data storage.

Hence, a storage area network (SAN) is typically designed to connect network servers to a data storage.

iSCSI is an acronym for Internet Small Computer System Interface and it is an internet protocol (IP) standard that is used essentially on a storage area network (SAN), for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).

On Windows Server, after an iSCSI Target feature has been installed, you should proceed to create a new iSCSI virtual disk and then configure the access server on your computer system.

By the default, the Microsoft iSCSI Initiator Service is stopped on Windows computer.

In order to use it, you must start the service and make sure its status reads "Running" before any configuration can be done.

Read more: https://brainly.com/question/24228095

Alishia's employer has its corporate office on one side of their city, but its data
center is on the opposite side. They want to the corporate office and data center to
be on the same network. Which network type would be appropriate?
Choose the answer.
MAN
SAN
WAN
OLAN

Answers

Hey! I just did the test and your answer is MAN.

Yes or no If the space is crowned make sure there are no white spaces​

Answers

Explanation:

huh??

I didn't understand

Other Questions
the target stores' "bulls-eye" logo is an example of a _____. Which of the following best describes the characteristics of a tendon?A) stabilizes joints, such as the kneeB) connects muscle to boneC) is the least stretchy type of connective tissueD) connects bone to cartilage Eleven girls are standing around a circle. A ball is thrown clockwise around the circle.The first girl, Ami, starts with the ball, skips the next three girls and throws to thefifth girl, who then skips the next three girls and throws the ball to the ninth girl. Ifthe throwing pattern continues, including Ami's initial throw, how many total throws arenecessary for the ball to return to Ami? Semester 1 EOC Review1. A square and rectangle have equal perimeters. The length of a side of the squareis 4x 1. The length of the rectangle is 2x + 2 and the width is 2x. Write andsolve an equation to find x.- Why is Leonardo da Vinci known as a Renaissance Man? A) This is the name that has been widely used for Leonardos self-portrait. B) Leonardo was born near the town of Vinci in the Italian province of Renaissance. C) Leonardos many interests perfectly symbolize the revival in learning associated with the Renaissance. D) Leonardo lived from 1452 to 1519 meaning that chronologically he lived in the middle of the Renaissance period. this chapter is filled with examples of statutes that have been struck down by the courts. a texas law banning flag burning was rejected by the supreme court, as was a louisiana death penalty statute. where does the supreme court get its power to strike down congressional statutes as unconstitutional? Only Answers No Explanation1) For heat-based systems, there must be sufficient 1 point residual heat energy to activate the surfaces of the adjacent regions, causing cooling. True False 2) If an extrusion-based system is built which query can be used to evaluate the expression 5 / 7? select 5 / 7; 5 / 7; select 5 / 7 from mysql; it's not possible Name a type of scientist to help people recover from an illness. how do they do this? Given q(x)=3x and r(x)=x2. What is (rq)(2)? Mathematics 25 points Question 5(Multiple Choice Worth 1 points) (01.05 LC) Which of the following is an equivalent form of the compound inequality -22 -5x - 72-33? -5x - 7-22 and -5x - 72-33 O-5x - 7-22 and -5x - 72 33 O-5x = -22 and -7 2 -33 -5x 7-22 and -5x - 7 -33 a person that has only a antigens on their red blood cells has type blank blood, while a person who has only b antigens will have type blank blood. a person who has both a and b antigens has type blank blood, and a person that has neither a nor b antigen has type blank blood. multiple choice question. ab; a; b; o Select the sentence that would best appear in the end of a narrative. I got so distracted playing video games that I did not have time to do my homework or study for tests. After a long conversation with my father, I learned to take my responsibilities more seriously. I told my father everything was fine at school, but he said that my teacher called to tell him that I was failing math. One day I came home from school and was shocked to find my father looking angry and disappointed. 1) Recount an action you have taken that directly results from messages you encountered in the mediait could be from a movie, a series, advertising, a news cast or a social media post.2) Describe the media content or message that motivated you to act3) Critique that action using media literacy:- Who controlled or produced the media content that influenced you?- What was the agenda behind that content?- Would you do the same again, now that you have thought about the agenda of the media source that inspired your action? There are.GRAMMAR NOTES 1-2 Complete the sentences about the Burlington Mall with There is How did improvements in transportation affect industry?They made it more expensive for manufacturers to ship their goods.They made it easier for manufacturers to package their products.They made it easier to move products by water but not by land.They made it easier for manufacturers to obtain raw materials and ship finished products. Where does the energy for all Earth's processes come from What is the grammatical function of the gerund phrase?Kylie loves reading wilderness survival stories, and she plans to write a book abouther own experiences.It is a subjectIt is an object of a verb.It is an object of a preposition.Submit What are the domain and range of g(x)=14(x21)2+47?