the rule followed in soliciting members of a database is on the basis of

Answers

Answer 1

The rule followed in soliciting members of a database can vary depending on the organization and the purpose of the database.

The rule should be based on obtaining the consent of the individuals whose data will be included in the database.

Consent can be obtained in various ways, such as through a sign-up form, an opt-in process, or an agreement to terms and conditions. It is important that the consent is freely given, specific, informed, and unambiguous, meaning that individuals must be aware of what they are consenting to and have the right to withdraw their consent at any time.

In addition to obtaining consent, organizations should also follow relevant laws and regulations that govern data privacy and protection, such as the General Data Protection Regulation (GDPR) in the European Union or the California Consumer Privacy Act (CCPA) in the United States.

These laws provide guidelines for how organizations can collect, use, store, and share personal data, and may require certain disclosures and rights for individuals.

For more such questions Database

https://brainly.com/question/518894

#SPJ11


Related Questions

Use parallel and highway in a sentence

Answers

Answer:

The road ran parallel to the highway, with the Uncompahgre River separating the unpaved road from the main thoroughfare to the east.

Answer:

QUESTION:

Use parallel and highway in a sentence

ANSWER:

We were on the highway parallel to the train tracks.

Explanation:

Hope that this helps you out! :)  

If any questions, please leave them below and I will try my best and help you.  

Have a great rest of your day/night!  

Please thank me on my profile if this answer has helped you!

a technical pictorial representation that depicts what a system is or does and how the system is implemented

Answers

A technical pictorial representation that depicts what a system is or does and how the system is implemented is called a system diagram or system architecture diagram.

A system diagram is a visual representation of a system's components, their interactions, and how they work together to accomplish a goal. A system diagram can also include technical details such as hardware, software, and network components.

The purpose of a system diagram is to provide a clear and concise view of how a system works and how it is implemented. It helps engineers and designers to understand the system's functionality, identify potential problems, and make informed decisions about the system's design and development.

In conclusion, a system diagram is an essential tool for understanding and designing complex systems. It is a technical pictorial representation that depicts what a system is or does and how the system is implemented.

System diagrams provide a clear and concise view of how a system works and how it is implemented, making it easier to identify potential problems and make informed design decisions.

To learn about pictorial representation here:

https://brainly.com/question/13430620

#SPJ11

_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning

Answers

Answer: it’s A, social media

Explanation:

Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.

What is Social Media?

Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.

Social media includes the technologies used to support virtual communities and the sharing of content.

Hence, the correct option is 1.

Learn more about Social Media:

https://brainly.com/question/18958181

#SPJ2

Alice knows that she will want to send a single 128-bit message to Bob at some point in the future. To prepare, Alice and Bob first select a 128-bit key k ∈ {0, 1} 128 uniformly at random. When the time comes to send a message x ∈ {0, 1} 128 to Bob, Alice considers two ways of doing so. She can use the key as a one-time pad, sending Bob k ⊕ x. Alternatively, she can use AES to encrypt x. Recall that AES is a 128-bit block cipher which can use a 128-bit key, so in this case she would encrypt x as a single block and send Bob AESk(x). Assume Eve will see either k ⊕ x or AESk(x), that Eve knows an initial portion of x (a standard header), and that she wishes to recover the remaining portion of x. If Eve is an all-powerful adversary and has time to try out every possible key k ∈ {0, 1} 128, which scheme would be more secure? Justify your answer.

Answers

In this scenario, using the one-time pad scheme of sending k ⊕ x would be more secure than using AES encryption with the key k. This is because the one-time pad offers perfect secrecy, while AES encryption is vulnerable to brute-force attacks.

In the one-time pad scheme, Alice XORs the key k with the message x before sending it to Bob. This operation ensures perfect secrecy because XORing a random key with the message produces ciphertext that is statistically independent of the original message, making it impossible for Eve to gain any information about x, even with unlimited computational power and time.

On the other hand, AES encryption, although a strong and widely used block cipher, is not immune to brute-force attacks. If Eve has the capability to try out every possible key k, she can potentially decrypt the AES ciphertext by testing each key until she finds the correct one. This process is computationally intensive, but given unlimited time and resources, it is theoretically feasible.

Therefore, the one-time pad scheme provides stronger security because it guarantees perfect secrecy, whereas AES encryption can be vulnerable to brute-force attacks when an adversary has sufficient computational power and time.

Learn more about AES encryption here:

https://brainly.com/question/31944823

#SPJ11

What type of testing uses unexpected randomized inputs to determine how software will respond?.

Answers

The type of testing that uses unexpected randomized inputs to determine how software will respond is called Fuzz testing or Fuzzing.

Fuzz testing is a technique used in software testing where inputs are generated automatically or semi-automatically to find vulnerabilities, crashes, or unexpected behavior in a software application.

In fuzz testing, random or mutated data is provided as input to the software, including malformed or unexpected inputs that may not conform to the expected input patterns. The purpose is to test how the software handles such inputs and whether it can gracefully handle unexpected or invalid data without crashing or exhibiting security vulnerabilities.

Learn more about  testing https://brainly.com/question/32790543

#SPJ11

write a Visual Basic program that asks the user to enter their name and then uses a for loop to display their name 1000 times.​

Answers

Answer:

Module Module1

   Sub Main()

       Dim name As String

       Console.WriteLine("Enter your name: ")

       name = Console.ReadLine()

       For i = 1 To 1000

           Console.WriteLine(name)

       Next

       Console.ReadLine()

   End Sub

End Module

. WAP in c to Rotate the elements of 2D array by 90:
eg [1 2 3 4 5 6 7 8 9] [7 4 1 8 5 2 9 6 3]

Answers

Here's a C program that rotates the elements of a 2D array by 90 degrees:

#include <stdio.h>

#define N 3

void rotateArray(int arr[N][N]) {

   // Transpose the array

   for (int i = 0; i < N; i++) {

       for (int j = i + 1; j < N; j++) {

           int temp = arr[i][j];

           arr[i][j] = arr[j][i];

           arr[j][i] = temp;

       }

   }

   // Reverse each row of the transposed array

   for (int i = 0; i < N; i++) {

       int start = 0;

       int end = N - 1;

       while (start < end) {

           int temp = arr[i][start];

           arr[i][start] = arr[i][end];

           arr[i][end] = temp;      

           start++;

           end--;

       }

   }

}

void displayArray(int arr[N][N]) {

   for (int i = 0; i < N; i++) {

       for (int j = 0; j < N; j++) {

           printf("%d ", arr[i][j]);

       }

       printf("\n");

   }

}

int main() {

   int arr[N][N] = {{1, 2, 3}, {4, 5, 6}, {7, 8, 9}};

   printf("Original Array:\n");

   displayArray(arr);  

   rotateArray(arr);

   printf("\nArray after rotation:\n");

   displayArray(arr);

   return 0;

}

The rotateArray function takes a 2D array as input and rotates it by 90 degrees. It achieves this by first transposing the array (swapping elements across the diagonal) and then reversing each row. The displayArray function is used to print the elements of the array.

In the main function, we initialize the array with the given values [1 2 3 4 5 6 7 8 9]. We then display the original array, call the rotateArray function to rotate it, and finally display the rotated array [7 4 1 8 5 2 9 6 3].

Original Array:

1 2 3

4 5 6

7 8 9

Array after rotation:

7 4 1

8 5 2

9 6 3

The elements of the array have been successfully rotated by 90 degrees.

For more questions on program

https://brainly.com/question/26134656

#SPJ11

Answer quickly!!!

what type of structural semantics does html describe?

Answers

The type of structural semantics does html describe is known as paragraphs.

What type of structural semantics does HTML describe?

Semantic HTML  is known to be a semantic markup is HTML that  is composed of  or it is one that introduces meaning to the web page instead of just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph.

Based on the above, The type of structural semantics does html describe is known as paragraphs.

Learn more about html from

https://brainly.com/question/13276343

#SPJ2

Session begins set global transaction isolation level read committed; session ends session begins set transaction isolation level serializable; transaction 1 transaction 2 set session transaction isolation level read uncommitted;

transaction 3 transaction 4 set transaction isolation level repeatable read; transaction 5 session ends

select each transaction's isolation level.

transaction 1 ___

transaction 2 ___

transaction 3 ___

transaction 4 ___

transaction 5 ___

Answers

Form the Session begins set global transaction isolation level read committed, the transaction's isolation level are:

transaction 1: READ COMMITTEDtransaction 2: SERIALIZABLEtransaction 3: REPEATABLE READtransaction 4: REPEATABLE READtransaction 5: READ COMMITTED

What is the global transaction?

The code scrap above can be seen as a arrangement of SQL explanations that alter the exchange confinement level for the current session and for particular exchanges.

The SQL tends to sets the default exchange confinement level to perused committed for the current session. The articulation  changes the exchange segregation level for the current session to serializable.

Learn more about isolation  from

https://brainly.com/question/27507161

#SPJ1

How could steganography be used to thwart normal forms of surveillance?

Answers

DONT TRUST THE LINK FROM THE OTHER USER

what is the correct java syntax to output the sentence: My dog's name is "dee-dee"?

Answers

Answer:

System.out.println("My dog's name is \"dee-dee\"");

Explanation:

You need to use the backslash to use quotes inside a string.

If 23​% of Americans households own one or more dogs and 42% own one or more​ cats, then from this​ information, is it possible to find the percentage of households that own a cat OR a​dog? Why or why​ not?
Choose the correct answer below.

A.​Yes, because the event of owning a dog and the event of owning a cat are mutually exclusive events.​ Therefore, finding the percentage of people that own a cat or a dog is possible using just the percentage of people that own a dog and the percentage of people that own a cat.

B.​Yes, because the event of owning a dog and the event of owning a cat are not mutually exclusive events.​ Therefore, finding the percentage of people that own a cat or a dog is possible using just the percentage of people that own a dog and the percentage of people that own a cat.

C.​No, because the event of owning a dog and the event of owning a cat are not mutually exclusive.​ Therefore, to find the percentage of people that own a cat or a​ dog, it is necessary to know the percentage of people that own a cat and a dog.

D.​No, because the event of owning a dog and the event of owning a cat are mutually exclusive.​ Therefore, to find the percentage of people that own a cat or a​ dog, it is necessary to know the percentage of people that own a cat and a dog.

Answers

B. Yes, because the event of owning a dog and the event of owning a cat are not mutually exclusive events.

Therefore, finding the percentage of people that own a cat or a dog is possible using just the percentage of people that own a dog and the percentage of people that own a cat.

The correct answer is B. Yes, because the event of owning a dog and the event of owning a cat are not mutually exclusive events.

To find the percentage of households that own a cat or a dog, we can simply add the percentage of households that own a dog (23%) and the percentage of households that own a cat (42%), and then subtract the percentage of households that own both a cat and a dog (which we don't know from the given information). Mathematically, it can be represented as:

Percentage of households that own a cat or a dog = Percentage of households that own a dog + Percentage of households that own a cat - Percentage of households that own both a cat and a dog

Since we don't know the percentage of households that own both a cat and a dog, we cannot calculate the exact percentage of households that own a cat or a dog, but we can say that it is greater than or equal to the sum of the percentages of households that own a dog and a cat.

For similar question on percentage.

https://brainly.com/question/29775174

#SPJ11

Suppose that we have an industry consisting of five, equally-sized firms. Two of these firms want to merge. Based on the HMGLs, what would the initial numerical screen by the DOJ or the FTC conclude? Be specific in your references to the HMGLs. Show all calculations.

Answers

The initial numerical screen by the DOJ or the FTC would conclude that the proposed merger is unlikely to have adverse competitive effects.

Determine The initial numerical screen

Based on the Herfindahl-Hirschman Index (HHI) guidelines (HMGLs), the initial numerical screen by the Department of Justice (DOJ) or the Federal Trade Commission (FTC) would conclude that the proposed merger is unlikely to have adverse competitive effects.

The HHI is calculated by summing the squares of the market shares of each firm in the industry. In this case, there are five equally-sized firms, each with a market share of 20%.

The HHI before the merger is:

HHI = (20)² + (20)² + (20)² + (20)² + (20)² = 400 + 400 + 400 + 400 + 400 = 2000

If two of these firms merge, their combined market share would be 40%, and the HHI after the merger would be:HHI = (40)² + (20)² + (20)² + (20)² = 1600 + 400 + 400 + 400 = 2800

The change in HHI due to the merger is:

ΔHHI = 2800 - 2000 = 800

According to the HMGLs, if the post-merger HHI is less than 1500, the market is considered unconcentrated and the merger is unlikely to have adverse competitive effects.

If the post-merger HHI is between 1500 and 2500, the market is considered moderately concentrated and the merger may raise significant competitive concerns. If the post-merger HHI is greater than 2500, the market is considered highly concentrated and the merger is likely to have adverse competitive effects. In this case, the post-merger HHI is 2800, which is above the threshold for a highly concentrated market.

However, the change in HHI due to the merger is only 800, which is below the threshold of 1000 for a merger that is likely to have adverse competitive effects.

Learn more about HHI at

https://brainly.com/question/30684029

#SPJ11

PYTHON HELP!
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

If you want a loop that continually asks the user what type of pet they have until they input 'stop'...

You could use this loop:

while True:

response = input('What type of pet do you have? ')

if response == 'stop':

break

else:

print(f'You have one {response}. Total # of Pets: 1')

1
2 points
When might an organization use a WAN?
When it has a network with very low
bandwidth
When large files are sent frequently over its
network
When a wide variety of devices are in its
network
When it has multiple locations that are far
apart

Answers

An organization might use a Wide Area Network (WAN) in several situations.

WANs are designed to connect geographically dispersed locations over long distances, often using public or private telecommunication links. If an organization has a network with low bandwidth, such as limited capacity for data transmission, a WAN can help improve connectivity and facilitate data transfer between different locations.

If an organization frequently needs to send large files across its network, a WAN can provide the necessary infrastructure to handle the high volume of data and ensure efficient transmission. WANs typically offer higher bandwidth and optimized routing for such file transfers, enabling faster and reliable delivery.

Learn more about Wide Area Network on:

https://brainly.com/question/18062734

#SPJ1

1.a computer can create an output based on the input of the user.

process store retrieve communicate personal computer desktop computer laptop computer netbook tablet smartphone server game consoles​

Answers

Answer:

But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.

True or False: Nested elements must be indented with respect to parent elements in
order for the code to be properly displayed in a browser

Answers

Answer:

true

Explanation:

Write and test a program that computes the area of a circle. This program should request a number representing a radius as input from the user. It should use the formula 3. 14*radius**2 to compute the area and then output this result suitably labeled. Include screen shot of code

Answers

The program prompts the user to enter any value for the radius of a circle in order to compute the area of the circle. The formula in the program to be used is 3.14* r * r to compute the area. Finally, the program outputs the computed area of the circle.

The required program computes the area of a circle is written in C++ is given below:

#include <iostream>

using namespace std;

int main()

{

   float r,  circleArea;

   cout<<"Enter the value for Radius : ";

   cin>>r;

  circleArea = 3.14 * r * r;

   cout<<"The area of the Circle with radius "<< r<<" = "<<circleArea;

   return 0;

}

Output is attached in the given screenshot:

You can learn more about C++ Program at

https://brainly.com/question/13441075

#SPJ4

Write and test a program that computes the area of a circle. This program should request a number representing

This graph shows the number of steps Ana and Curtis each took over the course of four days. Which of the following labels best describes the y-axis values? Number of Steps per Day 12000 10000 8000 6000 رااا 4000 2000 0 1 2 3 Ana Curtis
Steps per day
None of the above
Day of the week
Steps by user​

This graph shows the number of steps Ana and Curtis each took over the course of four days. Which of

Answers

Answer:

None of the above

Explanation:

Use the drop-down menus to correctly complete these sentences about how variables can be defined.
© are single numbers or values, which may include integers, floating-point decimals,
or strings of characters.
A(n)
© is a group of scalar or individual values that are stored in one entity.
A(n)
© is a data type that is assigned a true or false value by a programmer.
A(n)
© is a data type that can be assigned multiple values.

Answers

Three different sorts of data are used in computer programmes: text, numbers, and Booleans. A value for a Boolean data type can only be either true or false.

What form of data can be stored in variables that have the options True or False?

The Boolean data type, often known as Bool, is used in computer science and can take one of two potential values (usually denoted true and false)

Which data type in Visual Basic can be used to build variables that can hold any kind of data?

Variables that contain any kind of data can be defined using the variation data type. To indicate the kind of data the variation data currently includes, a tag is saved with it.

To know more about computer programmes visit:-

brainly.com/question/30307771

#SPJ1

Use the ______ element to create a generic area or section on a web page that is physically separated from others

Answers

Use the div element to create a generic area or section on a web page that is physically separated from others.

In the field of computers, div can be described as a special container that is used in order to make a specific generic area or a particular section on a web page.

The 'div' element stands for division as this element causes a division to be made on the webpage. The div tags are used for multiple purposes such as web layouts.

It is due to the div element that content can be grouped in a webpage that makes it look more attractive and reliable. Without the div element, data will not be understood properly on a webpage and might be misunderstood by the reader.

To learn more about a webpage, click here:

https://brainly.com/question/14552969

#SPJ4

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

WILL GIVE BRAINLYEST You would like to implement the rule of thirds to present high-resolution images in an IT scrapbook. The scrapbook includes images of computer and other IT devices. How can you do this for the scrapbook?
You can implement the rule of thirds by placing the ____(Key, Larger, Smaller)
part of the image along ____ (Central, Intersecting, margin) the
lines.

Answers

Answer:

key              margin

Explanation:

kid rally have a explantions

What are the two protocols used most often with iot devices? (select two. )

Answers

Z-Wave and Zigbee are the two protocols that are used most often with IOT devices.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as Z-Wave and Zigbee.

In Computer networking, the two protocols that are used most often with Internet of Things (IOT) devices include the following:

Z-WaveZigbee

Read more on protocols here: https://brainly.com/question/17387945

#SPJ12

A formula in cell D1 of this spreadsheet gives a result of 3. Which formula
was most likely entered in cell D1?

A formula in cell D1 of this spreadsheet gives a result of 3. Which formulawas most likely entered in

Answers

The duplicated formulas in cells G3 and E3 are =E3+F$3 and =$B3+D3, respectively. The contents of cell C1 will be 44, the value shown in cell E1 will be -40, and the result we will obtain is 7.

What does an Excel formula go by?

Using specified values, referred to as inputs, in a given order, or structure, functions are established formulas that carry out calculations. Simple or sophisticated computations can be carried through using functions.

Which of the three formula kinds are they?

Chemical formulas can be divided into three categories: empirical, molecular, and structural. Molecular formulas indicate the number of each type of atom in a molecule, empirical formulas display the simplest whole-number ratio of atoms in a compound, and structural formulas display the number of each type of atom in a compound.

To know more about cells visit:-

https://brainly.com/question/8029562

#SPJ1

in c++ write a program using a do while loop that will read in the price of a car and the monthly payment.

Answers

A program using a do-while loop that will read in the price of a car and the monthly payment is given below:

The Program

//input the neccessary #include-header files

#include <iostream>

#include <iomanip>

//input the neccessary namespace standards

using namespace std;

//define the main function

int main()

{

//declare the program variables

int months;

double loan;

double rate;

double payment;

double month_rate;

//Prompt the user to input the loan amount.

cout <<"How much is the loan?: $";

cin >> loan;

cout << endl;

//Prompt the user to input the annual interest rate.

cout <<"Enter the annual interest rate: ";

cin >> rate;

cout << endl;

//The program will calculate the monthly interest rate by dividing the percent and interest by 12.

month_rate = rate / 100. /12.;

//Prompt the user to input the monthly payment.

cout <<"Enter your monthly payment: $";

cin >> payment;

cout << endl;

//using while loop

//1. To check if the entered monthly paid value is less than the monthly interest

//2. Then again asking the user to enter the monthly payment

while (payment <= loan * month_rate)

{

//Prompt the user to enter the higher monthly payment.

cout <<"Monthly payment is too low. The loan can't be repaid.\n";

cout <<"\nEnter your monthly payment: $";

cin >> payment;

}

months = 0;

//while loop

while (loan > 0)

{

loan = loan - (payment - (loan * month_rate));

months++;

}

//Print out the results to the user

cout <<"AT" << rate <<"% and payments of $" << payment <<" per month\n It will take" << months <<" months to repay the loan\n";

//system ("pause");

return 0;

} //end of main function

Read more about computer programming here:

https://brainly.com/question/23275071

#SPJ1

Why do we need to get the minimum and maximum resistance value of resistors?

Answers

To determine if the circuit using them will function probably when the resistor has the related tolerance.

Which one of the following wireless transmission types requires a clear LOS to function?o Bluetootho NFCo IRo Wi-Fi

Answers

Infrared is the sort of wireless transmission that needs a clear LOS (line of sight) to work (IR). A clear channel must exist between the transmitter and receiver for infrared signals.

What kind of antenna, specifically across long distances, is used in a point-to-point link?

Yagi antennas are useful for creating point-to-point links between buildings or in long, narrow spaces (for example, connecting to a distant point in a valley). They can also be utilised to increase a point-to-multipoint network's range.

What is the mobile Bluetooth range, measured in metres?

The Bluetooth connection's range is roughly 30 feet (10 meters). However, depending on obstructions (people, metal, walls, etc.) or the electromagnetic environment, the maximum communication range may vary.

To know more about Bluetooth visit:-

https://brainly.com/question/13072419

#SPJ4

Write an MSP430 assembly language subroutine, REP_FREE, to examine the elements of a list of positive word-size numbers stored at location LIST_IN. The list is already sorted in an ascending order. The first element is the number, n, which is the length of the array. The subroutine will copy the elements from location LIST_IN to location LIST_OUT. While copying, if an element appears more than once (repeated), then the repeated copies are ignored. In essence, the subroutine eliminates the replicated elements from LIST_IN and places the results in LIST_OUT. Note that you need to update number m (the first element on the top) which is the actual number of elements in LIST_OUT after eliminating all replicates.

Answers

The first element is the number, n, which is the length of the array. The subroutine will copy the elements from location LIST_IN to location LIST_OUT.

an MSP430 assembly language subroutine that will solve the problem you've described:
REP_FREE:
   ; Inputs:
   ;   R4: Pointer to LIST_IN
   ;   R5: Pointer to LIST_OUT
   ; Outputs:
   ;   R4: Points to the end of the original list
   ;   R5: Points to the end of the new list
   ;   R6: Contains the number of elements in the new list
   ; Initialize variables
   MOV R6, #0 ; R6 will be used to count the number of unique elements

An array is a data structure that stores a collection of elements of the same type. The elements are arranged in contiguous memory locations and can be accessed using an index or subscript value. Arrays are commonly used for storing and manipulating large sets of data in programming languages.

Learn more about array here:

https://brainly.com/question/30199244

#SPJ11

Select the correct answer from each drop down menu

What computing and payment model does cloud computing follow?

Cloud computing allows users to ____ computing resources and follows the ___________ payment model


First blank choices are
1. Buy
2. Own
3. Rent
4. Sell
Second blank choices are
1. Pay as you go
2. Pay anytime anywhere
3. Pay once use multiple times

Answers

Answer:

buy and pay as you go

Explanation:

Other Questions
Marc decided to place $180 in equal deposits every month at the beginning of the month into a savings account earning 13.63 percent per year, compounded monthly for the next 6 years. The first deposit is made today. How much money will be on his account at the end of that time period? GIVING BRAINLIEST! need help with my spanish homework please! (check image) The perimeter of the rectangle shown is 76 cm. It is rotated about line b. A rectangle with a perimeter of 76 centimeters is shown. The rectangle is rotated about line b at a side with length 24 centimeters. Which best describes the resulting three-dimensional figure? a cone with a base radius of 26 cm a cone with a base radius of 14 cm a cylinder with a base radius of 26 cm a cylinder with a base radius of 14 cm. These polygons are similar. Find the scale factor of the smaller figure to the larger figure.Can you guys help??? Ellen sells wedges of cheese at the local farmers' market. To make the wedges, she cuts a big 5-pound block of cheese into 16 pieces. How much does each wedge of cheese weigh? Karl Marx was a proponent of _____________. Group of answer choices Antipositivism Positivism Functionalism Communism Convert 14x + 6y = 36 to Y intercept form. Given a convex quadrilateral ABCD with ACBD, prove thatAB2+CD2=BC2+AD2. what could be implied by a university having both a high graduation rate and a low student/teacher ratio?(1 point) Which of the following correctly represents the coordinates of the foci of the ellipse shown below?(x+2)/9 + (y-4)/ 36 = 1OA. (-2+93,4)OB. (-2+33,4)OC. (-2,493)OD. (-2,433) Would an alkaline earth metal make a good replacement for tin in a tin can? What is the mean absolute deviation for 1.25 3.50 2.55 8.20 4.80 0.30 0.75 2.25 Helpp I need this asap Explain how to modify the graphs of f(x) and g(x) to graph the solution set to the following system of inequalities. How can thesolution set be identified?ysx-3y>-x +2 Exercise 1 Draw a vertical line (|) between the complete subject and the complete predicate.Over the intercom came the principals announcement. bruce lincoln's definition of religion emphasizes four domains What does Bruno notice that all of the people outside of his window are wearing? What do the images reveal about quaker liberty in pennsylvania?. What are three body systems of a chick that work together to maintain homeostasis? You are beginning triage at the scene of a mass-casualty incident in which a commuter train has derailed. Which of the following should you do first?a) Check the airway status of all patients who do not appear to be moving.b) Announce that everyone who can get up and walk needs to go to the parking lot of a nearby building.c) Do a quick pulse check on all patients at the scene. Helium gas at 1500 kPa and 300 K is throttled through an adiabatic valve to a final pressure of 100 kPa . Compute the exit temperature of the helium gas if: Helium behaves as an ideal gas b. Helium obeys the Redlich Kwong equation of state. a.