What impact does social media have on political opinions?

Answers

Answer 1

Social media is a persuasive communication tool that frequently works to alter or influence beliefs, especially when it comes to political views. .

What elements influence the way we think politically?Some of them include family, family background, occupation, and education. One of these aspects is "family," which is the most crucial institution where all social and political processes are passed down from generation to generation ever since the birth of the individual. The family of an individual adopts and upholds political attitudes, according to a large body of research.Because there are so many ideas, thoughts, and opinions floating about on the social media platform, social media is a persuasive communication tool that frequently works to alter or influence beliefs, especially when it comes to political views.    

To learn more about Social media refer to:

https://brainly.com/question/3653791

#SPJ4


Related Questions

consider using a simple linked list as a dictionary. assume the client will never provide duplicate elements, so we can insert elements at the beginning of the list. now assume the peculiar situation that the client may perform any number of insert operations but will only ever perform at most one lookup operation. a. what is the worst-case running time of the operations performed on this data structure under the assumptions above? briefly justify your answer. b. what is the worst-case amortized running time of the operations performed on this data structure under the assumptions above? briefly justify your answer.

Answers

The worst-case running time of the operations on this data structure would be O(n), where n is the number of elements in the linked list. The worst-case amortized running time of the operations on this data structure would still be O(n), since the worst case is still possible.

The maximum time that can be used to execute a lookup operation in a linked list is proportional to the size of the list. Each element of the list will be checked one by one, which means that it will take a long time to execute when there are many elements. The lookup operation will be executed in O(n) time on the worst-case because of the list of size n.

The worst-case amortized running time is O(1) because it considers the total time taken to execute all insert and lookup operations. This is why the cost of a particular operation is distributed among all other operations that are executed on the data structure.

When multiple insert operations are executed, the client will insert elements at the beginning of the linked list. Since the elements are unique and there is only one lookup operation, the cost of the lookup operation is shared among all the insert operations, resulting in O(1) amortized time.

Learn more about the data structure at https://brainly.com/question/29487957

#SPJ11

what network is carrying the us open golf tournament

Answers

CBS Sports
Peacock & Golf Channel will also be broadcasting

Create a C++ program using arithmetic operators to compute the AVERAGE of THREE (3) QUIZZES and display the score and average on different lines.

The output should be similar to this:

Create a C++ program using arithmetic operators to compute the AVERAGE of THREE (3) QUIZZES and display

Answers

using the knowledge in computational language in python it is possible to write a code that using arithmetic operators to compute the average of three quizzes and display the score and average on different lines.

Writting the code:

#include <iostream>

using namespace std;

   int main()

   {

    float n1,n2,n3,n4,tot,avrg;

 cout << "\n\n Compute the total and average of four numbers :\n";

 cout << "----------------------------------------------------\n";  

       cout<<" Input 1st two numbers (separated by space) : ";

    cin>> n1 >> n2;

       cout<<" Input last two numbers (separated by space) : ";

    cin>> n3 >> n4;

    tot=n1+n2+n3+n4;

 avrg=tot/4;

       cout<<" The total of four numbers is : "<< tot << endl;

       cout<<" The average of four numbers is : "<< avrg << endl;

       cout << endl;

       return 0;

   }

See more about C++ at brainly.com/question/19705654

#SPJ1

Create a C++ program using arithmetic operators to compute the AVERAGE of THREE (3) QUIZZES and display

A career in culinary arts can best be described as working in the __________ industry.
A.
food
B.
clothing
C.
computer
D.
entertainment

Answers

Answer:

A-Food

Explanation:

The answer would be A:Food

How does the onEvent block work?

Answers

Answer:The onEvent() block takes three parameters. The first two are the id of the element and the type of event that should be “listened” for. The third parameter is a function. If you were going to read the onEvent block like a sentence it would read “on the event that this id experiences this event, call this function”

Explanation:

Above answer is the correct choice in my opinion !! For this question hope this helps

what is role can ICT play in helping school take part in social responsibility

Answers

Answer:

The answer is below

Explanation:

Given that Social responsibility deals with ideas that individuals or groups of people are expected or bound to work in alliance with other individuals or groups of people in favor of the generality of society.

Hence, some of the role ICT can play in helping school take part in social responsibility are:

1. Helps students to have independent access to knowledge

2. It assists the students with special needs

3. It helps the teachers to teach outside the comfort of the classroom only.

4. It exposes teacher and students to more knowledge and opportunities

5. The school governing body can access people and the community's opinions about ways to improve the school better.

6. It exposes the school to more ideas and opportunities.

7. It can be used to assist the school in improving the quality of education, both for the teachers and students side.

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

Drag the tiles to the correct boxes to complete the pairs Match each cloud service with its cloud component

Answers

MONITORING TOOLS - MaaS

STORAGE AND NETWORK DEVICES - IaaS

VIRTUAL COMPUTING PLATFORM - PaaS

SOFTWARE UPGRADES AND PATCHES - SaaS

don’t know why I did it in caps

the answers are right for Plato students! I just answered it correctly =D

IaaS- virtual computing platform, SaaS- software upgrades and patches, MaaS- monitoring tools, PaaS- storage and network devices.

What is SaaS and PaaS?

SaaS (Software as a Service) and PaaS (Platform as a Service) is a feature that functions as a framework for the development of applications.  This attribute of cloud computing aids in the development of the business for which the software is offered. It enhances operating systems, middleware, timely data transmission, and task management, among other things.

PaaS (Platform as a Service) is a feature that functions as a framework for the development of applications. It enhances operating systems, middleware, timely data transmission, and task management, among other things. It aids in the development, testing, and upgrading, of the software. SaaS is software upgrades and patches.

Therefore,IaaS- virtual computing platform,

SaaS- software upgrades and patches, MaaS- monitoring tools,

PaaS- storage and network devices.

Learn more about SaaS, here:

brainly.com/question/13485221

#SPJ5

In a day, a car passes n
kilometers. How many days does it take to travel a route of length m
kilometers?

The program receives as input in the first line a natural number n
and in the second line a non-negative integer m
. Python code

Answers

#Calculate days.

def calculateDay(m, n):

   assert isinstance(m, int) and m >= 0, "m should be a natural number."

   assert isinstance(n, int) and n > 0, "n shouldn't be negative."

   return m/n

   

#Main function

def Main():

   m, n = input().split()

   print(f'Result: {calculateDay(int(m),int(n)):.2f} days.')

   

#Point.

if(__name__ == "__main__"):

   Main()

In a day, a car passes n kilometers. How many days does it take to travel a route of length m kilometers?The

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

A. Perform a System Restore to an earlier date before the infection

B. Install a secondary anti-malware solution on the system

C. Verify the hosts.ini file has not been maliciously modified

D. Reformat the system and reinstall the OS

Answers

Based on the given scenario, the next action you should perform to fix the redirection issue with the browsers is:

C. Verify the hosts.ini file has not been maliciously modified

Check the hosts.No harmful changes have been made to the ini file.

The hosts.ini file is a system file that can be modified by malware to redirect website requests to malicious websites. By checking the hosts.ini file, you can ensure that it hasn't been tampered with and is not causing the redirection issue. If any suspicious entries are found in the file, you can remove or modify them accordingly. This step is recommended before resorting to more drastic measures like performing a system restore or reinstalling the operating system.

Learn more about redirection here

https://brainly.com/question/30763350

#SPJ11

For a direct-mapped cache design with a 32-bit address, the following bits of the address are used to access the cache: Tag Index Offset 31-10 4-0 9-5 a. What is the cache block size (in words)? b. How many entries does the cache have? C. What is the ratio between total bits required for such a cache implementation over the data storage bits? Starting from power on, the following byte-addressed cache references are recorded: 0,4, 16, 132, 232, 160, 1024, 30, 140, 3100, 180, 2180 d. How many blocks are replaced?

Answers

a. The cache block size (in words):The offset bits determine the size of the block that is accessed, since each block must be the same size as a memory word. In this case, there are 25 bits in the tag and 5 bits in the index field. That means that the offset field is made up of 5 bits, so the block size is 2^5=32 bits.b. Number of entries in the cache:There are 2^5 = 32 index values. As a result, there are 32 cache entries.

Each entry has a length of 32 bits, which includes 25 tag bits, 5 index bits, and 2 control bits, one of which is valid. As a result, the total number of bits required for cache entries is 32 x 32 = 1024 bits. c. Ratio between total bits required for such a cache implementation over the data storage bits:In total, the size of the memory is 2^32 bytes, or 2^30 words. If we divide the amount of memory by the size of the block, we get the number of blocks in memory:2^30 words / 2^5 words per block = 2^25 blocksThere are 32 cache entries in total.

As a result, the cache can only store 32 blocks at a time. As a result, the cache hit rate is expected to be low, resulting in a high miss rate. If a block is accessed that is not currently in the cache, it must be loaded from memory and saved in a cache entry. If a cache entry is already occupied by another block, the current block must be evicted. The cache replacement algorithm determines which block is evicted. The least recently used algorithm, which evicts the block that has not been used in the longest period of time, is the most common algorithm.

d. Number of blocks that are replaced:We'll have to look at each memory reference one at a time to figure out how many blocks are replaced. 0 is a reference to memory location 0. 0 maps to block 0 in the cache since the index field is 0. As a result, block 0 is loaded into the cache. 4 is a reference to memory location 4. 4 maps to block 0 in the cache since the index field is 0. As a result, block 0 is already in the cache. There is no replacement of blocks. 16 is a reference to memory location 16. 16 maps to block 0 in the cache since the index field is 0. As a result, block 0 is already in the cache. There is no replacement of blocks. 132 is a reference to memory location 132. 132 maps to block 26 in the cache because the index field is 26. As a result, block 26 is loaded into the cache. 232 is a reference to memory location 232. 232 maps to block 46 in the cache because the index field is 46. As a result, block 46 is loaded into the cache. 160 is a reference to memory location 160. 160 maps to block 32 in the cache because the index field is 32. As a result, block 32 is loaded into the cache.

To know more about memory visit:

https://brainly.com/question/28754403

#SPJ11

What's the vbsd canvas instructor address?

Answers

Answer:

Instructor access would be the same domain students use as they don't change for teachers on the canvas website.

Explanation:

What is Web Application (Web Apps)

Answers

Answer:

A web application is an application that's stored and primarily executed remotely through the internet.

Sally’s preview of her document ensures her that she is now ready to print her report. Which options can she change to complete this task? Check all that apply. Printer to be used spacing between text lines page number to be printed orientation of the document number of copies to be printed.

Answers

Sally's preview of her document ensures her that she is now ready to print her report. Sally has several options to change to complete the task of printing her report.

The following are the options she can change to complete this task: Printer to be used Spacing between text lines Orientation of the document Number of copies to be printed Before printing her report, Sally can choose which printer she wants to use. Sally has the option of selecting any printer that is available on her computer. She can also choose to change the spacing between text lines if she wants to.

Sally can set the orientation of the document to landscape or portrait depending on the way she wants to present her report. Sally can change the number of copies to be printed according to her requirements. Once she has made the necessary changes, she can preview her report once again to ensure that all the changes have been made correctly. Sally can print her report by clicking the Print button, which is located in the Print section of the File tab. After clicking the Print button, a Print window will appear.

To know more about document  visit:

brainly.com/question/13311445

#SPJ11

Please help answer now! First correct answer get branliest! Place the directions in order from first to last to explain how to hide the ribbon from the top of your Excel worksheet.

Move the cursor to the top-right corner

Select the auto-hide ribbon

Click on the up arrow

Answers

Answer:

just do bodldld

Explanation:

Answer:

Move the cursor to the top-right corner

Click on the up arrow

Select the auto-hide ribbon

Explanation:

If you need more room on the screen, you can hide the ribbon
Group of answer choices

True

False

Answers

Answer:

I hope this helps

Explanation:

The answer is true

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as dumpster diving. (True or False)

Answers

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as: dumpster diving. True

The given statement is True. Dumpster diving is a term used to describe the process of sifting through garbage or waste materials in order to extract valuable information or items. This practice has been used by thieves, hackers, and other malicious actors as a way to gather data or insights that can be used to launch a security attack.

It is often used as a way to obtain sensitive information, such as financial data or personal identification details, that can be used for fraud or identity theft. Dumpster diving is a relatively easy and low-tech method of obtaining information, as it requires no hacking skills or sophisticated equipment. It can be conducted anywhere that waste materials are disposed of, including office buildings, retail stores, and even residential areas. To protect against dumpster diving, it is important to properly dispose of sensitive materials and to shred any documents that contain personal or financial information. It is also important to be aware of any suspicious activity in the area and to report any potential security breaches to the appropriate authorities.

For such more question on financial

https://brainly.com/question/989344

#SPJ11

Micro sleep is when you ____.

Answers

Microsleep refers to periods of sleep that last from a few to several seconds.

Microsleep refers to period of sleep that last from a few to several seconds

Difference between software developer and software engineer.

Answers

Answer:

The core difference between the two jobs is that software developers are the creative force that deals with design and program implementation, while software engineers use the principles of engineering to build computer programs and applications.

Explanation:

Answer: The terms "software developer" and "software engineer" are often used interchangeably, but there are some subtle differences between the two roles.

Explanation: Here are some key differences:

Focus: A software developer typically focuses on the implementation of software code and applications based on design specifications, while a software engineer is involved in the entire software development lifecycle, including design, development, testing, deployment, and maintenance.Education and training: Software engineers usually have a broader education and training than software developers, with a strong foundation in computer science and software engineering principles. Software developers may have more specialized training in specific programming languages, frameworks, or technologies.Job responsibilities: Software engineers often take on more managerial or leadership responsibilities, such as project management, requirements analysis, and team leadership, while software developers typically focus more on writing and testing code.Professional standards: Software engineering is typically governed by professional standards and codes of ethics, which may not apply to software development. This reflects the more rigorous and disciplined approach to software engineering compared to software development.

To learn more about software developer; https://brainly.com/question/3188992

Strong linkages to customers and suppliers decrease switching costs. true or false

Answers

Answer:

False

They increase switching costs .

________ deals with more objective, rational, and technical knowledge.

Answers

Explicit knowledge deals with more objective, rational, and technical knowledge.

Explicit knowledge is knowledge that can be readily verbalized, codified, stored and accessed. Hence, explicit knowledge can be easily transmitted to others.

Explicit knowledge is the most basic form of knowledge since it can be easily accessed. Examples of explicit knowledge is company data sheets, research reports. Explicit knowledge deals with more objective, rational, and technical knowledge.

Find out more at: https://brainly.com/question/16980038

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

Describe and contrast the data variety characteristics of operational databases, data warehouses, and big data sets.

Answers

Operational databases are focused on real-time transactional processing with low data variety, data warehouses consolidate data from various sources with moderate data variety, and big data sets encompass a wide range of data types with high data variety.

Operational Databases:

Operational databases are designed to support the day-to-day operations of an organization. They are optimized for transactional processing, which involves creating, updating, and retrieving small units of data in real-time. The data variety characteristics of operational databases are typically low. They are structured databases that follow predefined schemas, ensuring data consistency and integrity. The data in operational databases is usually well-organized and standardized to support specific business processes.

Data Warehouses:

Data warehouses, on the other hand, are designed to support analytical processing. They are repositories that consolidate data from various operational databases and other sources. Data warehouses are optimized for complex queries and reporting, enabling businesses to gain insights and make informed decisions. In terms of data variety, data warehouses tend to have higher variety compared to operational databases. They store data from different sources, which may have different structures, formats, and levels of granularity. Data warehouses often undergo a process called data integration or data transformation to standardize and harmonize the data before storing it.

Big Data Sets:

Big data sets refer to extremely large and complex datasets that cannot be easily managed or processed using traditional database technologies. They typically have high data variety characteristics. Big data sets encompass a wide range of data types, including structured, semi-structured, and unstructured data. Structured data is organized and follows a predefined schema, similar to operational databases. Semi-structured data has some organizational structure but does not adhere to a strict schema. Unstructured data, on the other hand, has no predefined structure and includes formats like text documents, social media posts, images, videos, and more.

To learn more about operational database: https://brainly.com/question/32891386

#SPJ11

beneficial effects from a microdermabrasion treatment include all of the following examples except:

Answers

  The beneficial effects from a microdermabrasion treatment include improved skin texture, reduced appearance of fine lines and wrinkles, and increased skin radiance. However, one example that is not included among the beneficial effects of microdermabrasion is permanent removal of scars.

  Microdermabrasion is a non-invasive cosmetic procedure that exfoliates the outer layer of the skin, promoting cell turnover and stimulating collagen production. As a result, it can effectively improve the overall texture and tone of the skin, making it smoother and more vibrant. Fine lines and wrinkles can also appear diminished due to the removal of dead skin cells and the stimulation of collagen.

  However, it's important to note that while microdermabrasion can reduce the appearance of scars, it is not a permanent solution for scar removal. Deeper or more severe scars may require more intensive treatments such as laser therapy or chemical peels for significant improvement.

Learn more about exfoliates here: brainly.in/question/10319704

#SPJ11

LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? Reliability and timing Confidentiality and performance Security and cost Cost and performance

Answers

Performance and price what features distinguish networks the most? Timing and dependability Performance and confidentiality Cost and safety Performance and price.

LAN MAN WAN: What is it?

An office building, a school, or a home may have a local area network (LAN) that links a number of nearby computers. A state, province, or country, for example, can be covered by a wide area network (WAN).

Which four types of wireless communication networks are under the Metropolitan Area Network (MAN) umbrella?

Performance and confidentiality Cost and safety Performance and price. There are four different types of wireless networks, each with a specific purpose: wireless local area networks, wireless metropolitan area networks, wireless personal area networks, and wireless wide area networks.

To know more about LANs visit :-

https://brainly.com/question/13247301

#SPJ4

consider a system for temperature measurement consisting of an integrated temperature sensor (electronic component sensitive to temperature) and an amplifier of the voltage signal produced by the sensor. the sensor has a voltage output and linear characteristic between -10 degrees and 20 degrees; at 0 degrees it is 1 v and increases by 0.1 v for each degree of temperature. it is required to determine the mathematical relationship that links the system output (represented by the amplified voltage) to the input (represented by the temperature of the environment in which the sensor is immersed) and to represent this relationship by means of a graph.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA

You were fortunate to get the ice off of the wings, but whatever caused the cabin to depressurize also vented all of your fuel overboard. You are now a big gilder and are going to have to land in Lake Michigan. You need to slow down to minimize the impact, but you don’t want to stall.
What device can you use to help and how do they work?

Answers

Answer:

A speed govenor

Explanation:

speed governor is an electronic device linked to the gearbox where sensors capture the movement of the vehicle. If the vehicle exceeds the specified speed limit, the device automatically slows the vehicle.

nit 3 Quiz
Deshawn wants to buy a Chromebook that includes the Chrome OS because it is cheaper and has more freedom from software contracts and
icenses. Since it is an open-source software, where will he MOST LIKELY get technical support when he needs it?
OA
online communities that offer free or paid support
OB. the instruction manual that comes with the OS
OC. there is no assistance since it is an open-source software
OD. the company's 24/7 help line
Reset
Next

Answers

Since it is an open-source software, Deshawn would most likely get technical support when he needs it through the following medium: A. online communities that offer free or paid support.

What are the types of software license?

In Computer technology, there are four (4) main types of software programs based on usage rights and these include the following:

Freeware softwarePurchased licenseShareware softwareOpen source software

What is an open source software?

In Computer technology, an open source software can be defined as a terminology which is used to describe a type of software that all end users can use and adapt it for any purpose or modify it for free without paying any license fee (money).

In conclusion, some technical support for an open source software can be gotten through online communities.

Read more on software here: brainly.com/question/25703767

#SPJ1

The statement int[ ] list = {5, 10, 15, 20};
O initializes list to have 5 int values
O initializes list to have 20 int values
O initializes list to have 4 int values
O declares list but does not initialize it
O causes a syntax error because it does not include "new int[4]" prior to the list of values

Answers

Option 3 is correct ( initializes list to have 4 int values) The syntax here implies direct setup of integer array named list with 4 initial values. there is no need to mention size for this kind of syntax.

Describe an array.

An array is a group of related data items kept in close proximity to each other in ram. The sole way to retrieve each data element direct is using its index number, making it the most basic data structure.

How do arrays function?

A linear data structure called an array contains elements of the same data type in contiguous and nearby memory regions. Arrays operate using an index with values ranging from zero to (n-1), where n is the array's size.

To know more about array visit :

https://brainly.com/question/15048840

#SPJ4

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

Other Questions
How do I solve the area for the shapes? Which term describes the process of water moving from plant leaves to the atmosphere? Air pressure Humidity Transpiration Density Character table for point group D6h (x axis coincident with C', axis) |3C"2 253 256 (XY)30. 30. linear functions, cubic functions rotations quadratic functions x2+y?. 2 FFF 0 0 (R. R.) (RX, R) - E15 +2 +2 E23 -2 -1 -1 200 -1 -2 0 0 +2 +1 1 2 +2 -1 -1 +2 (xz, yz) (x2-y?. xy) FF FF FF FF FF FF -1 +1 -1 22, z(x2+y2) x(x2-3y2) y(3x2-y2) (x22, yz?) [x(x++y2), y(x+y)] [xyz, z(x2-y)] 0 0 0 (x, y) E2 +2 +1 E21 +2 -1 -1 -2 0 -1 -2 0 -2 -1 +1 +2 2 +1 +1 2 Please focus on a crystal with point group D_6h (image attached for convenience). a) Can you specify which are the allowed non-zero components of the polarization vector, and any symmetry constraints relating these components? b) Can you mention which are the allowed non-zero components of the dielectric tensor, and any symmetry constraints relating these components? c) For which irreducible representations can vibrations be IR-active? d) For which irreducible representations can vibrations be Raman-active? e) What is the maximum possible degeneracy of an electronic state at k=0? What is the product of 3.28 and 2.9 solve the separable differential equation 9x4yx2 1dydx=0. subject to the initial condition: y(0)=4. classic industries is a registered trademark. all content on this website is copyrighted. no part of this website, including text, photos, or illustrations may be copied without the prior written permission of classic industries. all rights reserved. copyright 1994-2022 classic industries When there's a federal government budget deficit, a. the government must raise taxes or reduce government spending to balance the budget. b. the Federal Reserve System must increase the nation's money supply to finance the deficit. c. the government borrows funds from the nation's largest banks to finance the deficit. d. the Treasury Department must sell new bonds to finance the deficit. You invest $1000 today at 6ompounded annually and want to know how much money you will have in 5 years. what does the $1000 represent? please helpWhat is 94*106 which of the ""big five"" personality dimensions is associated with being thorough and organized? Fixed costs total $247,000, and variable costs are $37 per unit. ... dollars LO P2 SBD Phone Company sells its waterproof phone case for $124 per unit. You have created a 95% confidence interval for with the result10 15. What decision will you make if you test H0: =12versus H1: 12 at = 0.05?Do not reject H0 in favour Do we have any algorithm or formula to undertand how to Human IQ i being calculate ? (PLEASEEE HELP ASAP!!) The Sugar Sweet Company will choose from two companies to transport Its sugar to market. The first company charges $5743 to rent trucks plus an additionalfee of $225.75 for each ton of sugar. The second company charges $7500 to rent trucks plus an additional fee of $100.25 for each ton of sugar.sugar do the two companies chargeQ1: For what amountthe same?Q2: What is the cost when the two companies charge the same? PLEASE HELP!! Select the correct form of the verb ir to complete the sentences.1. Miguel, ____ jugar al golf el fin de semana? vamos vamos a vamos de2. Por qu Cristina no ____ excursin con sus compaeros? va de van va3. Ramiro y Paz ____ la escuela en patineta. van van al van a4. Por la tarde ____ visitar dos monumentos muy interesantes. voy a voy voy al5. Ustedes ____ parque municipal todos los das? van van a van al6. T ____ escalar la montaa con nosotros? vas vas a vas de oh no i have a F+in math please help me can a molecule be homoatomic and triatomic ? why or why not Basil has come to terms with his mortality, accepted responsibility for his existence, and knows that he determines what happens in his life. Existentialists would say that Basil is ________.A. living in bad faithB. attaining faith existenceC. experiencing thrown-nessD. attaining authentic existence Admission for adults is 12 dollars. Admission for kids is eight dollars.One day 575 people entered the cave paying 5600 how many adults into the cave Callan is making pizza using flour, tomatoes, and mozzarella cheese. This table gives the cost, per kilogram, of each ingredient, and the amount, in kilograms, that Callan uses: Ingredient Price per kilogram Amount Flour 0.800.800, point, 80 dollars per kilogram xxx kilograms Tomatoes 3.303.303, point, 30 dollars per kilogram yyy kilograms Mozzarella zzz dollars per kilogram 0.50.50, point, 5 kilograms The total amount Callan spends on ingredients is CCC dollars.