Select a travel lane with the least amount of congestion and stay in the lane you have chosen until you need to turn, __________, or avoid a hazard. Activate your DTRs Create a safe following distance Activate the ETC Pass another vehicle Submit answer

Answers

Answer 1

A travel lane with the least amount of congestion and stay in the lane have chosen until you need to turn, Pass another vehicle, or avoid a hazard.

What is the vehicle with  the least amount of congestion?

A person should maintain in their lane until they need to turn, pass another car, or avoid a hazard, according to research on many traffic laws and guidelines.

This is based on the facts given in the question. This safety regulation is in place to prevent any traffic collisions, including head-on collisions.

Thus, option D is correct.

For more details about vehicle with  the least amount of congestion, click here:

https://brainly.com/question/13178663

#SPJ1


Related Questions

A____consists of many users and their information.​

Answers

Active Directory consist of many users and their information.

Answer:

Active Directory

Explanation:

which are three powerpoint options that can be customized?

•Marcos, Themes, Ribbon tabs
•Ribbon yabs, templates, marcos
•user name, themes, Quick Acess buttons
•AutoSave file location, Print options, templates

Answers

Answer:

There are many PowerPoint options that can be customized, but here are three examples:

Themes: PowerPoint themes allow you to change the overall look and feel of your presentation. You can choose from a variety of pre-designed themes, or create your own by customizing colors, fonts, and backgrounds.

Slide layouts: You can customize the layout of each slide in your PowerPoint presentation. This includes adding or removing content boxes, changing the size and position of images and text, and adjusting the overall design of the slide.

Animations and transitions: PowerPoint allows you to add animations and transitions to your slides to make your presentation more dynamic and engaging. You can customize the type and duration of animations and transitions, as well as the direction and timing of each effect.

Explanation:

Answer:

user name, themes, Quick Access buttons

Explanation:

Which of the following is not one of the four criteria for evaluating websites?

Question 1 options:

currency


content and accuracy


validity


authority

Answers

Answer:validity

Explanation:

Because it dont sound right

The option that doesn't belong to the criteria that can be used to  evaluate websites is C: validity.

evaluation of  websites can be regarded as the way to determine the value of information that can be found on the Internet.

Criteria that can be used in evaluation are;

Accuracy: this explains the reliability as well as correctness of the contentRelevance: this describe how important is the needed informationCurrency: this serve as the time period for the information.Authority:  this serve as source of the information.

Therefore, option C is correct.

Learn more at:

https://brainly.com/question/2510490?referrer=searchResults

Please provide a specific example(s) that demonstrates your knowledge and capabilities to leverage xml- powered tables and search functions to provide software and hardware-independent ways of storing, transporting, and sharing data.

Answers

idk sorry i’m sorry ahhh

Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on the screen that requires her to click on an icon indicating agreement, before she can proceed in the program. Such contracts are called:

Answers

answer: terms and services

What are some advantages to having ads tailored to your data?

Answers

Answer:

That you will find something, that you need or just something you find useful. And something that might take your interest.

When a piece of software attempts to change the boot sector, access e-mail services, or make duplicates of itself, it might be flagged as a virus. This is known as:

Answers

When a piece of software attempts to modify the boot sector, access email services, or replicate itself, it might be flagged as a virus. This behavior is known as "malicious activity" or "malware."

Malware is designed to infiltrate, damage, or disrupt a computer system without the user's consent. The boot sector is a critical area on a computer's storage device that contains essential startup information. When a software alters this, it can potentially compromise the system's security and performance.

The software's attempts to access email services can be a sign of a potential spamming or phishing attack, while duplication could indicate self-propagation for wider dissemination. In summary, when software exhibits these behaviors, it is likely considered a virus due to its malicious intentions and potential harm to the user's system.

Learn more about malware here-

https://brainly.com/question/14276107

#SPJ11

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

What python code should i write in lines 8, 11, and 12?

What python code should i write in lines 8, 11, and 12?

Answers

The python code to write in lines 8, 11, and 12 are:

point = 0point += (ord(letter)-96)return point

How to determine the Python codes

From the question, we have the following parameters that can be used in our computation:

The incomplete code segment

First, we need to initialize the total number of points in line 8 as follows:

point = 0

Next, we add the point in each letter in line 11

point += (ord(letter)-96)

Lastly, we return the total number of points in line 12

return point

The code segment for part (b) is points('bed')

Read more about python programs at

https://brainly.com/question/14298565

#SPJ1

T/F: The default storage engine for Core Data is SQLite.

Answers

The given statement "The default storage engine for Core Data is SQLite" is True because due to its efficiency, ease of use, and wide adoption in mobile application development.

It simplifies data storage, retrieval, and manipulation by abstracting the underlying storage mechanism, which allows developers to focus on the data model and relationships between objects, rather than dealing with low-level database management tasks.

SQLite is a lightweight, serverless, self-contained relational database management system (RDBMS) that is widely used in mobile applications due to its efficiency and ease of use. As the default storage engine for Core Data, SQLite enables developers to store and manage structured data efficiently without the need for a separate database server.

Core Data, however, is not limited to SQLite alone. It provides support for other storage options such as binary and XML formats. This flexibility allows developers to choose the most suitable storage mechanism based on the specific needs of their application. For example, if an application requires complex querying and indexing, SQLite would be an appropriate choice. On the other hand, if an application needs a simple storage solution with limited querying capabilities, XML or binary formats may be more suitable.

In summary, the default storage engine for Core Data is SQLite due to its efficiency, ease of use, and wide adoption in mobile application development. This choice provides developers with a powerful, yet simple, solution for managing structured data in their iOS and macOS applications.

Know more about Mobile application development here:

https://brainly.com/question/22082285

#SPJ11

PLEASE HELP Type the correct answer in the box. Spell all words correctly. Ross wants to add a graph from a text file format into his database. Which feature will enable him to add the graph in his database? Ross can use the______data feature to add the graph in his database.

Answers

Answer:

the answer to your problem is (insert)

Explanation:

Click Chart under the Illustrations group on the Insert tab.The Insert Chart dialogue box's arrows can be used to cycle through the various chart kinds.Click OK after selecting the type of chart you like.

What insert data feature to add the graph?

Select Data by selecting with the right mouse button on the chart. The Select Data Source dialogue box appears on the worksheet where the chart's source data are placed.

Click in the worksheet, then click and drag to choose all the data you wish to use for the chart, including the new data series, while keeping the dialogue box open.

The Insert SQL command is used to add new records or data to tables. Because it is used to alter database data, it is seen as falling within the umbrella of statements known as Data Manipulation Language (DML).

Therefore, insert data feature to add the graph in his database.

Learn more about insert data here:

https://brainly.com/question/14331259

#SPJ2

What important information is examined in the ethernet frame header by a layer 2 device in order to forward the data onward?.

Answers

An  important information that is examined in the ethernet frame header by a layer 2 device in order to forward the data onward is  option C: destination MAC address.

Is MAC address source or destination?

The use of the addresses in the Datalink layer header, a Layer 2 switch locates the destination device in a Local Area Network (LAN) (where the data needs to be sent). The addresses put at the Datalink layer header are MAC addresses, as can be seen from the Datalink layer Frame structure.

The Layer 2 device, such as a switch, utilizes the destination MAC address to decide which port or interface to use to send the data on to the final destination.

The MAC ID of the device that transmitted the packet serves as the source, and the MAC ID of the device that is supposed to receive it serves as the destination.

Learn more about destination MAC address from

https://brainly.com/question/27911999
#SPJ1

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

source MAC address

source IP address

destination MAC address

Ethernet type

destination IP address

which is not a valid target for the oracle cloud infrastructure (oci) cloud guard service?a.Changes within the objects stored in an Object b.Storage bucket are collected as Auditlogs.

Answers

The range of what Cloud Guard checks is determined by a target. A target can be any combination of compartments or your whole  Oracle Cloud Infrastructure tenancy.

Which is true regarding the OCI logging service encryption for Oracle Cloud Infrastructure?

The following criteria govern the encryption of OCI logs: The process of ingesting logs into Oracle Cloud Infrastructure Logging encrypts them in-flight; once the logs are in the system, disk-level encryption is applied for commercial situations.

Which of the following statements about server-side encryption support for Oracle Cloud infrastructure OCI Object Storage is true?

Yes. Server-side encryption is supported by Oracle Object Storage. Oracle Object Storage automatically encrypts all of the data it stores. Moreover, clients can employ a master key or server-side encryption with customer-provided keys (SSE-C).

To know more about oracle cloud infrastructure visit:-

https://brainly.com/question/26420772

#SPJ1

List three ideas for checking in with your progress and recognizing completion on your actions.

Answers

One idea for checking in with your progress and recognizing completion on your action is to set specific milestones or targets along the way and regularly evaluate your progress towards them.

How can you effectively track your progress and acknowledge completion of your action?

To effectively track your progress and acknowledge completion of your action, it is important to establish clear milestones or targets that can serve as checkpoints. Break down your overall goal into smaller, measurable objectives that can be achieved incrementally.

Regularly assess your progress by comparing your actual achievements against these milestones. This will provide you with a tangible way to track your advancement and ensure that you stay on track. Once you reach a milestone or successfully complete a specific objective, take the time to acknowledge and celebrate your achievement.

Read more about action check

brainly.com/question/30698367

#SPJ1

popular ____ include access, oracle, db2, mysql, and sql server.

Answers

Popular database management systems (DBMS) include Access, Oracle, DB2, MySQL, and SQL Server.

These DBMS are widely used in various applications and industries to manage and organize large volumes of data efficiently. Each DBMS has its own set of features, capabilities, and targeted use cases.

Access: Microsoft Access is a desktop-based DBMS commonly used for small-scale applications and single-user environments.

Oracle: Oracle Database is a robust enterprise-level DBMS known for its scalability, reliability, and extensive feature set. It is widely used in large organizations and mission-critical applications.

DB2: IBM DB2 is a relational DBMS designed for enterprise-level applications. It offers high-performance, scalability, and compatibility with various platforms.

MySQL: MySQL is an open-source relational DBMS that is widely used for web applications. It is known for its ease of use, speed, and strong community support.

SQL Server: Microsoft SQL Server is a popular DBMS used in Windows environments. It offers a range of features, including high availability, business intelligence, and integration with other Microsoft products.

These DBMS provide powerful tools for data storage, retrieval, and manipulation, catering to different needs and requirements of organizations and developers.

Know more about database management systems here:

https://brainly.com/question/1578835

#SPJ11

Which of the following functions is performed by both TCP and UDP? a. Windowing b. Error Recovery c. Multiplexing using port numbers d. Routing e. Encryption f.

Answers

TCP and UDP are transport layer protocols in the TCP/IP network model. Both TCP and UDP perform the function of multiplexing using port numbers.

Which function is performed by both TCP and UDP?

TCP and UDP are transport layer protocols in the TCP/IP network model. Both TCP and UDP perform the function of multiplexing using port numbers. This means that they use port numbers to distinguish between multiple applications or services running on a single device.

The port numbers help in directing incoming data packets to the appropriate application or service. However, TCP and UDP differ in other functions. TCP provides features like windowing, error recovery, and reliable data delivery through mechanisms like acknowledgments and retransmissions.

UDP, on the other hand, is a connectionless protocol that does not provide error recovery or reliable delivery, making it more suitable for applications that prioritize speed and efficiency over data integrity.

Learn more about function

brainly.com/question/31062578

#SPJ11

Computers that are connected to each other, but not to the internet,
configured according to which network?
plzz this due today

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Computers that are connected to each other, but not to each other - is an intranet.

Because in intranet computers are connected to each other within an organization and don't connect to the internet. In the intranet, computers don't access globally. For example, in banking, the banking system can be accessed within the organization but not from outside as on the internet.

While it is noted that the Internet is a globally-connected network of computers that enables people to share information and communicate with each other. An intranet, on the other hand, is a local or restricted network that enables people to store, organize, and share information within an organization.

When Jimmy Fallon is outside the White House, his persona is mostly O A. humble O B. stern O c. gloomy O D. wild​

Answers

Answer:

a

Explanation:

Given a 10-bit Binary Code determine the user or human input if bits in the 1st and 4th positions are on. 8. A user types the "Tilde - using QWERTY keyboard. Determine the machine language equivalent for the user input.​

Answers

The machine language equivalent for the user input is 126.

1. The 10-bit binary code for the user input is 0100000111.

2. The 1st and 4th positions in the binary code are both on.

3. The machine language equivalent for the user input is 01111100.

1. The 10-bit binary code representation of the user input "Tilde" is 0100000111.

2. In binary, the positions are numbered from right to left, starting from 1. So, the 1st and 4th positions correspond to the bits in the binary code.

3. Both the 1st and 4th bits are on (1), indicating that the "Tilde" key was pressed.

4. The machine language equivalent for the user input "Tilde" is represented by the binary code 01111100. Machine language instructions vary depending on the specific system architecture and instruction set being used.

Learn more about binary code here:

https://brainly.com/question/29792509

#SPJ11

Task
Ask for the total price of the bill, then ask how many diners there are. Divide the total bill by the number of diners and show how much each person must pay.
I need code for this on Repl.it python

Answers

Answer:

Please see the full code in explanation

Explanation:

#This is a console program

def bill_calculator():

print("Enter the Total value of the bill:\n")

bill_total = float(input())

print("Enter total number of dinners:\n")

total_dinner = int(input())

bill_per_person = bill_total / total_dinner

result = ("Bill total: {} \n"

"Total dinners: {} \n"

"Bill per person: {} ").format(bill_total,total_dinner, bill_per_person)

print(result)

if __name__ == '__main__':

bill_calculator()

the example the book gave of www.ellisisland.org, which generates more than 2.5 billion hits, is a site that offers a database that can easily adjust to handle massive volumes of information. what is this an example of?

Answers

The given example of www.ellisisland.org that generates more than 2.5 billion hits is an example of a site that offers a database that can easily adjust to handle massive volumes of information. It is an example of a scalable architecture.An architecture that is flexible enough to adjust to massive information is called a scalable architecture.

It is a type of architecture that can be expanded without having to compromise the system’s performance. In the case of www.ellisisland.org, it provides a database that can manage a vast amount of data effortlessly. The database offers scalable performance, ensuring the site provides its visitors with the best user experience. This means that the site has been designed to handle huge volumes of requests from various users in a concurrent manner.The website www.ellisisland.org uses a distributed system architecture that enables the management of requests to its servers. It has many servers that help to spread the load. Therefore, when more users access the site, the servers’ load automatically adjusts to meet the demand. Consequently, the response time of the site remains at its best, offering its visitors with a smooth experience.

To know more about architecture visit:

https://brainly.com/question/20505931

#SPJ11

An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack

Answers

The one probable purpose of the attack is searching and obtaining trade secrets.

What do you mean by trade secrets?

Trade secrets is made up of any business information that is said to be composed of commercial value that is known to be gotten from its secrecy.

Note that Trade secrets can be one that is seen to be valuable to a person, even if have developed new technology, designed original products, and others and as such, attackers do wants them at any cost.

Hence, The one probable purpose of the attack is searching and obtaining trade secrets.

Learn more about trade secrets from

https://brainly.com/question/27034334

#SPJ1

See full question below

An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?

searching and obtaining trade secrets

cracking the administrator password for a critical server

probing open ports on the firewall on the border network

denying external access to a web server that is open to the public

All the following statements are true EXCEPT: A) Both SUMIF and SUMIFS Functions consider the conditions first. B) SUMIFS allows SUMRANGE first whereas SUMIF allows sum range last. C) SUMIFS considers conditions last whereas SUMIF considers conditions first D) SUMIFS allows multiple conditions a. A b. B c. C d. D

Answers

All the following statements are true EXCEPT for the statement "Both SUMIF and SUMIFS Functions consider the conditions first."

What is the difference between SUMIF and SUMIFS functions?

SUMIF and SUMIFS are two different functions that are used in Excel. Both functions are used to add up the values in a range of cells that meet specific conditions. But, there is a difference between these two functions. The primary difference is that SUMIF only allows one condition to be checked. While SUMIFS allows multiple conditions to be checked.

For example: SUMIF: =SUMIF(A1:A5, "Apples", B1:B5) - This formula will only sum the values in column B if the corresponding cell in column A is "Apples".SUMIFS: =SUMIFS(B1:B5, A1:A5, "Apples", C1:C5, ">0") - This formula will sum the values in column B if the corresponding cell in column A is "Apples" AND the corresponding cell in column C is greater than 0.

Another difference is that in SUMIFS, the sum_range comes first, while in SUMIF, it comes last. In other words, SUMIFS allows sum_range first, whereas SUMIF allows sum_range last.

All the other options that are mentioned in the question are true. Option A) Both SUMIF and SUMIFS Functions consider the conditions first. Option C) SUMIFS considers conditions last whereas SUMIF considers conditions first Option D) SUMIFS allows multiple conditions to be true.

To learn about the SUMIF function here:

https://brainly.com/question/29848364

#SPJ11

slide view definiton

Answers

Answer:

huh

Explanation:

define the term cyber space​

Answers

Answer: Cyberspace, is an amorphous, supposedly virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure

You have been asked to design a centrifuge for use in a medical laboratory. Describe any parameters relevant to your centrifuge design, including but not limited to: - Size - Maximum centrifugal force applied - Maximum rotational speed (in radians per second and rotations per minute (rpm)) - Required strength of materials to withstand the forces present. Additional Questions 1. What angular acceleration and angular deceleration would be appropriate for starting and stopping your centrifuge? 2. In one use of your centrifuge, how much does it rotate? Include the rotation during starting and stopping.

Answers

The specific parameters and requirements of a centrifuge design can vary depending on the intended applications, laboratory protocols, and safety regulations.

These parameters include:

1. Size: The size of the centrifuge should be appropriate to accommodate the samples or specimens commonly used in the laboratory. It should have sufficient space for the sample holders or tubes, and the overall dimensions should fit within the available laboratory space.

2. Maximum Centrifugal Force Applied: The maximum centrifugal force determines the separation capability of the centrifuge. It depends on the specific applications and the types of samples being processed. The centrifuge should be designed to generate the required centrifugal force based on the specific laboratory needs.

3. Maximum Rotational Speed: The rotational speed of the centrifuge is typically specified in radians per second (rad/s) and rotations per minute (rpm). The maximum rotational speed depends on the desired separation efficiency and the characteristics of the samples. Higher speeds can lead to better separation but may require stronger materials and increased safety measures.

4. Required Strength of Materials: The materials used in the construction of the centrifuge should be able to withstand the forces generated during operation. This includes the centrifugal force and the associated stress on the rotating components. The materials should have sufficient strength, durability, and resistance to corrosion to ensure safe and reliable operation.

Additional Questions:

1. Angular Acceleration and Deceleration: The appropriate angular acceleration and deceleration for starting and stopping the centrifuge depend on various factors such as the sample characteristics, safety considerations, and equipment limitations. Generally, a gradual and controlled acceleration and deceleration are preferred to minimize stress on the samples and the centrifuge components.

2. Rotation during Starting and Stopping: The rotation during starting and stopping of the centrifuge depends on the design and control mechanisms. The centrifuge may start from rest and gradually increase its rotational speed until it reaches the desired operational speed. Similarly, during stopping, the rotational speed is gradually reduced to minimize abrupt changes and prevent sample disturbance or damage.

Learn more about centrifuge:

https://brainly.com/question/10472461

#SPJ11

what are some of the against arguments that information
technology systems lead to productivity improvements for the
firm.

Answers

There are several arguments against the notion that information technology systems lead to productivity improvements for a firm.

One argument is that the implementation and maintenance costs of IT systems can be substantial. Firms often need to invest significant financial resources to acquire hardware, software, and skilled IT professionals. Additionally, there are ongoing expenses for system upgrades, security measures, and technical support. These costs can outweigh the potential productivity gains, especially for small and medium-sized enterprises with limited budgets.

Another argument is that IT systems can introduce complexities and challenges that hinder productivity. Implementing new technology often requires changes to existing business processes and employee training. This transitional period can disrupt operations and lead to temporary decreases in productivity. Moreover, technical glitches, system failures, or cybersecurity incidents can result in downtime and decreased efficiency.

Furthermore, some critics argue that the excessive reliance on IT systems can lead to over-reliance on automation and reduced human judgment. While automation can streamline certain tasks, it may also limit creativity, critical thinking, and adaptability. Moreover, if employees become overly dependent on IT systems, they may struggle to perform tasks manually or handle unexpected situations, reducing overall productivity.

In conclusion, the arguments against the notion that information technology systems lead to productivity improvements for a firm emphasize the substantial costs of implementation and maintenance, the potential disruptions and challenges during the transitional period, and the risks of over-reliance on automation. While IT systems can offer significant benefits, firms must carefully consider these concerns to ensure that the potential gains outweigh the associated drawbacks.

Learn more about technology here: https://brainly.com/question/11447838

#SPJ11

In which situations would it be most helpful to filter a form? Check all that apply.
The data needs to be filtered using complex criteria.
The data includes a large number of values that are unique.
The data needs to be filtered by a threshold that is not present.
The data needs to be filtered by data equal to one specific value.
The data includes only a small number of values repeated frequently.

Answers

Answer:

A- The data needs to be filtered using complex criteria

C`- The data needs to be filtered by a threshold that is not present

Explanation:

Just took it.

The situations that would be most helpful to filter a form are;

The data needs to be filtered using complex criteria and

The data needs to be filtered by a threshold that is not present.This is further explained below.

What is a filter?

Generally, a filter is simply defined as a program that formats or filters data before sending it on to another program; it may also be used to pass on just certain sorts of data.

In conclusion, Filtering a form is particularly useful when dealing with the following situations Complex criteria must be used to filter the data.

Read more about filter

https://brainly.com/question/14376643

#SPJ2

The banner on the front page of a newsletter that identifies the publication is the:.

Answers

Answer:

Nameplate

Explanation:

The banner on the front of a newsletter that identifies the publication is its nameplate.

Write a Console program, let users to enter prices calculate subtotal, tax, and total.

- Delcare variable data type as decimal (6 variables needed)
decimal apple;

- Conver string to decimal from input
apple = Convert.ToDecimal(Console.ReadLine());

- Do addition for subtotal

- Multiplication for tax (0.065M) --- M or m stands for money value, read page 94.

- Addition for total

- You need to show only two digits after decimal point
Console.WriteLine(" Subtotal: ${0}", String.Format("{0:0.00}", subTotal));



blank line: Console.WriteLine("")



Console.Write(" Apple: $");
apple = Convert.ToDecimal(Console.ReadLine());

Answers

Answer:

Explanation:

This is a project I already submitted, but I never received feedback. All my upcoming assignments will be based on this, so I wanted to make sure it is correct. I got this program to work as far as calculating the information, but I was hoping someone could please let me know if it meets the parameters/requirements?

I did attempt it. It works and adds the items exactly how the example showed in the video. However, I wanted to make sure my code is solid, and not just a mishmash or working because I got lucky, and if there is a better more solid way to do this I want to make sure I can. I do want feedback so I can learn and get better and I am trying my hardest. I always right out all the code I see here and try it and learn what it does piece by piece, because it helps me learn and improve. I also want to make sure it is going to work once I start the code for the next half of the requirements.

i cant really help they dont let us put codes on here

Other Questions
El desplazamiento (en metros) de una partcula que se mueveen lnea recta esta dado por s = 12 8t + 18, donde t semide en segundos.a) Encuentre la velocidad promedio en cada intervalo detiempo:i) [3, 4] ii) [3.5, 4]iii) [4, 5] iv) [4, 4.5]b) Halle la velocidad instantnea cuando t = 4.c) Dibuje la grafica de s como funcin de t y trace las rectassecantes cuyas pendientes son las velocidades promedioen el inciso a) y la recta tangente cuya pendiente es lavelocidad instantnea en el inciso b). Use the quadratic formula to solve x^2+3x-28=0 8x-4+6x+15Msjdndhenebdisnhsjs ITS A YaLL on edge "This afternoon is going to be so much fun," said Lynette."It's going to be you, me, and the rest of the 'FabThirteens. Just remember, no twelve-year-olds."I heard a toilet flush and scurried into an empty stall.Their giggles felt like needles. I heard the sinks runningand knew they were tossing their locks in the mirror. Thiscouldn't be happening. But I was quickly getting thepicture that it was.-"I'm Not Thirteen Yet,"Amy BernsteinWhich words from the passage show how the writerfeels?O "Their giggles felt like needles."O "I was quickly getting the picture."O "They were tossing their locks."O "This afternoon is going to be so much fun."En Suppose the demand for dollars (in exchange for euro) is given by the equation D = 180 + 0.020 Yor-550 or +7007 - 26 nomi The supply of dollars is given by: S = 60 +0.030 Y + 280 m 520 r + 22 nom Suppose output and the real interest rate in the domestic country and the foreign country are: Y = 7,750, Yr 9,500, r=0.040,rror = 0.050. Calculate the equilibrium value of the nominal exchange rate. (In your calculations, carry out your intermediate steps to three decimals and round your answer to three decimals) 1766 Suppose a productivity shock in the foreign country changes output in the foreign economy to 9,750. Calculate the new equilibrium value of the nominal exchange rate. In your calculations, carry out your intermediate steps to three decimals and round your answer to three decimals.) UREGENT PLEASE HELP . Which of the following statements regarding gas exchange is correct?A) Contracting muscle tissue will not need increased amounts of O.B) Blood that is leaving metabolically active tissues will be high in O2.C) Blood that is leaving the lungs will be high in O and low in CO.D) Blood returning to the heart from body tissues will be low in CO. During 21, jim butler purchased 125 shares of common stock issued by tri state manufacturing for $4700 including commission. later in the same year, jim sold the shares for $5500 after commission. calculate the following. (round all answers to two decimal places.) 1) Bee, butterfly, human face are all examples of what type of symmetry? *AsymmetryRadial SymmetryBilateral Symmetry2) Highlighting part of an artwork to make it stand out is called? *VarietyContrastEmphasisUnity3) Showing rough and smooth together would be an example of what? *ContrastRepetitionBalance4) This is best an example of *Captionless ImageMovementHarmonyPattern5) The arrangement of elements so they work together as a whole *RhythmHarmonyVariety6) Placing an item off by itself to create a focal point would be? *ContrastProportionEmphasis7) The picture below shows what type of symmetry *Captionless Imageasymmetrybilateral symmetryradial symmetry8) We know this tree is big because we can compare it to the size of the human. That is an example of using what? *Captionless ImageRhythmContrastScale9) A drawing that shows a character with very large eyes compared to the rest of their face is an example of what? *BalanceProportionContrast10) When objects change size, point of view or the angle is altered that is considered what? *VarietyContrastBalance PLEASE HELPPPP Jason observed a series of circles and saw the following pattern. What color will the next circle be? red, blue, green, green, red, blue, green, green, ... - yellow- red- green- blue The objective lens of a large telescope has a focal length of 12.6 m. If its eyepiece has a focal length of 3.0 cm, what is the magnitude of its magnification?A : 4.2B : 129C : cannot be calculated without knowing the length of the telescopeD : 12.9E : 420 Calculate the size of the average force in Newtons that you must apply on the tire if you push horizontally to roll it up the ramp. See Case (2). A ladder measures 6 feet. If the top of the ladder is placed 4 feet up on a wall, how many feet from the base of the wall is the bottom of the ladder? Which action was a common objective of President Franklin D. Roosevelt's New Deal and President Lyndon B. Johnson's Great Society? uppose that a firm is producing in the short run with output given by: Q = 5OL-L2 The firm hires labor ata wage of $26 per hour and sells the good in a competitive market at P - $19 per unit. Find the firm's optimal use of labor Enter as a value. ROUND TO THE NEAREST WHOLE NUMBER Type your answer Units of power include which of the following?I) WattII) Joule per secondIII) Kilowatt-houra) I onlyb) III onlyc) I and II onlyd) II and III onlye) I, II, and III W-4y+z=0 for z (please show work) Q2Find the closed form of the relations: ao = 1 an 9 San-1 Find the closed form of the relations: {- - = 1 -1 2 How do you write the algebraic notation when the scale factor is 1/2? Over the course of 5 days, the price of stock at Goodson's fell $35. What was the average change in stock price per day? M