What is a large public computer network through which computers can exchange information at high speed?​

Answers

Answer 1

Answer:

Server

Explanation:

The Question is vauge, but I believe a Server is the word you're looking for. Computer Network could mean various things, in this case im going to assume that by Network, its saying Server. As a server is what allows for high speed interactions between a host computer and a client computer.


Related Questions

Which would be considered a peripheral device?

A. a printer that can be connected from outside the computer to communicate with it

B. a CPU

C. RAM

D. an internal hardware part like a motherboard or hard drive

Answers

Answer:

D is the correct answer of this question

Why each of the six problem-solving steps is important in developing the best solution for a problem

Answers

Answer:

The Answer is below

Explanation:

Each of the six problem-solving steps is important in developing the best solution for a problem because "each of these steps guarantees consistency, as every member of the project team understands the steps, methods, and techniques to be used."

For illustration, step one defines the problem to be solved.

Step two seek to find the main or underlying issue that is causing the problem

Step three: assist in drawing the alternative ways to solve the problem.

Step four: this is where to choose the most perfect solution to the problem

Step five is crucial as it involves carrying out the actual solution selected.

Step six is the step in which one check if the solution works fine or meets the intended plan.

Hence, all the steps are vital

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Answers

Since you have found a file named FunAppx86.exe on your hard drive, the systems that this executable file MOST likely run on is Both 32-bit and 64-bit systems.

What does 32- and 64-Bit Mean?

When it comes to computers, the processing capability differential between a 32-bit and a 64-bit is everything. 64-bit processors are newer, quicker, and more secure than 32-bit processors, which are older, slower, and less secure.

Therefore, A computer file that contains an encoded sequence of instructions that the system can directly execute when the user clicks the file icon," is the definition of an executable file.

Learn more about executable file from

https://brainly.com/question/28146265
#SPJ1

please complete the spelling please tell fast.​

please complete the spelling please tell fast.

Answers

Answer:

spacebar and number i think

Explanation:

Answer:

b)ans might be number.........

Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.

Answers

A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:

Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.

From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.

Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.

The query design grid should look like this:

Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:

Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:

The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.

Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.

The final output should look like this:

Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

For more such questions on query, click on:

https://brainly.com/question/30622425

#SPJ8

Please Help!! Thank You. What will happen in this program after the speak function is called for the first time?

Please Help!! Thank You. What will happen in this program after the speak function is called for the

Answers

Answer:

D The sprite will say "hi" twice.

Explanation:

the first call of the speak function specifies that:
if the word is not bye then the word will be repeated twice
so the sprite will say hi twice

Answer:

D.The sprite will say "hi" twice.

Explanation:

Implement above using c programming language

Answers

Answer:

1. Click on the Start button

2. Select Run

3. Type cmd and press Enter

4. Type cd c:\TC\bin in the command prompt and press Enter

5. Type TC press Enter

6. Click on File -> New in C Editor window

7. Type the program

8. Save it as FileName.c (Use shortcut key F2 to save)

Given integer variables seedVal and highest, generate three random numbers that are less than highest and greater than or equal to 0. Each number generated is output. Lastly, the average of the three numbers is output.

Answers

Answer:

Here's a Python code snippet to generate three random numbers between 0 and highest (exclusive), and then calculate the average of these numbers:

import random 

seedVal = int(input("Enter seed value: "))

highest = int(input("Enter highest value: ")) 

random.seed(seedVal)

num1 = random.randint(0, highest)

num2 = random.randint(0, highest)

num3 = random.randint(0, highest) 

print("First number:", num1)

print("Second number:", num2) 

print("Third number:", num3)

average = (num1 + num2 + num3) / 3 

print("Average:", average)

You should unplug your computer if you
A. start it up and the desktop appears
C. are recharging the batteries
f
O Search
*
Save Answer
O
B. smell burning or see smoke rising from it
D. sense an electrostatic discharge
SP
C how can you help me with that please

Answers

Answer:

B

Explanation:

If you smelling burning or smoke you have the possibility of the computer being set on fire

Determine the total number of votes and the percentage of the total votes by each candidate. The sample output of your program is shown below. It incudes the winner of the election. Use methods from the System.out stream for your output.

Determine the total number of votes and the percentage of the total votes by each candidate. The sample

Answers

The program that yeilds the above output is given as follows.

public class VoteCounter {

   public static   void main(String[] args) {

       int candidate1Votes = 500;

       int candidate2Votes = 300;

       int candidate3Votes = 200;

       

       int  totalVotes = candidate1Votes + candidate2Votes + candidate3Votes;

       

       double candidate1Percentage = (double) candidate1Votes / totalVotes * 100;

       double candidate2Percentage = (double) candidate2Votes / totalVotes * 100;

       double   candidate3Percentage = (double) candidate3Votes / totalVotes * 100;

       

       System.out.println("Total   votes: " + totalVotes);

       System.out.println("Candidate 1 votes: " + candidate1Votes + " (" + candidate1Percentage +   "%)");

       System.out.println("Candidate 2 votes:   " + candidate2Votes + " (" + candidate2Percentage +   "%)");

       System.out.println("Candidate 3 votes: "   + candidate3Votes + " (" + candidate3Percentage + "%)");

   }

}


  How does this  work?

In this program,we have three candidates,   and the number of votes for each candidate is given.

We calculate the total   votes by summing up the votes for all candidates. Then,we calculate the percentage   of votes for each candidate by dividing their votes by the total votes and multiplying by 100.

Finally,we use the System.out.println() method   to display the total votes and the votes and percentages for each candidate.

Learn more about program:
https://brainly.com/question/23275071
#SPJ1

what is cyber ethics​

Answers

Answer:

cyber ethics​

Explanation:

code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world.

Add (total) all the number in the list (below) using a for loop, but skip over the number at index 3.
numbers = [10,20,30,40,50,60,100]

Answers

Answer:

The program in Python is as follows:

numbers = [10,20,30,40,50,60,100]

total = 0

for i in range(len(numbers)):

   if i != 3:

       total+=numbers[i]

print(total)

Explanation:

This initializes the list

numbers = [10,20,30,40,50,60,100]

Set total to 0

total = 0

This iterates through numbers

for i in range(len(numbers)):

This ensures that the index 3, are not added

   if i != 3:

       total+=numbers[i]

Print the calculated sum

print(total)

numStudents is read from input as the size of the vector. Then, numStudents elements are read from input into the vector idLogs. Use a loop to access each element in the vector and if the element is equal to 4, output the element followed by a newline.

Ex: If the input is 6 68 4 4 4 183 104, then the output is:

4
4
4

Answers

Here's an example solution that uses a loop to access each element in the vector idLogs and outputs the elements equal to 4

How to write the output

#include <iostream>

#include <vector>

int main() {

   int numStudents;

   std::cin >> numStudents;

   std::vector<int> idLogs(numStudents);

   for (int i = 0; i < numStudents; i++) {

       std::cin >> idLogs[i];

   }

   for (int i = 0; i < numStudents; i++) {

       if (idLogs[i] == 4) {

           std::cout << idLogs[i] << std::endl;

       }

   }

   return 0;

}

Read more on Computer code here https://brainly.com/question/30130277

#SPJ1

Design a combinational circuit with four inputs A, B, C, D and four outputs x, y, z, w. When the input is 0,1,2, or 3, the output is one greater than the input. When the input is 4,5,6 or 7, the output is one less than the input, otherwise the input will be equal to the output.​

Answers

Answer:

s

Explanation:

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?

Answers

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

Identify a possible IOT (internet of Things) device in a smart kitchen and write a use case for interacting with the software of this device . Your use case should have the following headings: Use Case Name, Actors, Preconditions, Description/ Normal Flow, Exceptions/ Alternate Flow and Postconditions

Answers

Answer:

Following are the solution to this question:

Explanation:

An electronic refrigerator in an intellectual fridge is an illustration of an IoT system. One use would be that the user could see from outside the receptacle, or any other gadget we own on the web, what is within the fridge.

Use Case: see the inside of the refrigerator by opening up that refrigerator.

Primary Actor: Apps not authorized

Description/Normal Flow: Used it to look on the inside of a refrigerator by opening a refrigerator. Whenever the user is allowed to penetrate the authentication code for whatever is inside the refrigerator.

Preconditions: Their client has not yet been authorized but no pin must be issued.

PostConditions:

Start of success: Insert a valid pin.

State of failure: Invalid pin entry

Minimum Garantie: the user is allowed to retry and insert a pin.

Exceptions/Alternative Flow:

Unless the person visits an incorrect pin, therefore the pin will be entered again. Even so, the interval between both the error checking continues to rise, and after some time the user will have to enter that pin and reset that procedure again for a specific amount of minutes. This allows the user not to invent the pin.

A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.

Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.

Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.

Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.

The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.

The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.

Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.

Answers

The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.

What is the Quicksort?

Some rules to follow in the above work are:

A)Choose the initial element of the partition as the pivot.

b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.

Lastly,  Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.

Learn more about Quicksort  from

https://brainly.com/question/29981648

#SPJ1

When you are hired to develop a system for an organization. Is it important to follow all the requests/wants of the system owner rather than of the system user?

Answers

If you are hired to develop a system, note that Is it vital to follow all the requests or needs of the system's owner.

The company knows what they want and it is good you do comply with their directives. You can only give your suggestions if need be.

Who can develop an information system?

The information systems field is one that is made up of people in organizations that are skilled and can design and build information system.

Note that to be  hired to develop a system, one has to follow all the requests/wants of the system owner instead of the system user as the one who needs it knows what he or she wants so you have to comply with it. You can only give your suggestions.

Learn more about system from

https://brainly.com/question/13603602

g A function called processArray takes one argument: an array of strings to be processed. It returns nothing. Write the function header for the processArray function

Answers

Answer:

Following are the declaration of the method:

void processArray(String x[])//defining a method processArray that holds a string parameter

{

//method body

}

Explanation:

In the above-given code, a method "processArray" is declared, that holds a variable x, which is as a string of array implies it is an array of string.

In the method declaration, we use method return type is void because a method doesn't return any value, and the "void" can't return any value.

why is this not working for my plus membership

Answers

Answer:

The overwhelming main cause for PlayStation Plus subscriptions not being recognised is because of PlayStation server maintenance which prevents your PS4 from communicating with Sony and discovering that you are a paid up PS Plus subscriber.

Assume that a, b, and c have been declared and initialized with int values. The expression

!(a > b || b <= c)
is equivalent to which of the following?

a. a > b && b <= c
b. a <= b || b > c
c. a <= b && b > c
d. a < b || b >= c
e. a < b && b >= c

Answers

Answer:

Option c (a <= b && b > c) and Option e (a < b && b >= c) is the correct answer.

Explanation:

According to the question, the given expression is:

⇒ !(a > b || b <= c)

There will be some changes occur between the values such as:

! = It becomes normal> = It becomes <|| = It becomes &&

So that the expression will be:

⇒ a <= b && b > c

and

⇒ a < b && b >= c

Other choices are not connected to the expression or the rules. So the above two alternatives are the correct ones.

A loss of __________ is the unauthorized disclosure of information.
a) authenticity
b) integrity
c) confidentiality
d) reliability

Answers

Answer:

I believe its confidentiality

Explanation:

confidentiality means the state of being kept secret or private

A loss of confidentiality is the unauthorized disclosure of information. The correct option is c).

What is confidentiality?

Confidentiality is a set of rules or a promise that limits access to specific information. There aren't enough boundaries in confidential information. One shouldn't give your information to random people, but you also shouldn't give it to people close to you because not everyone is trustworthy.

One should only give out one's information when it is absolutely necessary, which is if you are. Unless there is a compelling reason not to, request consent to share information.

Unless it is going to hurt you or another person, a counselor will keep all of the information you give them confidential. When a detective keeps all crime-related clues and information confidential and hidden from civilians.

Therefore, the correct option is c) confidentiality.

To learn more about confidentiality, refer to the link:

https://brainly.com/question/15144094

#SPJ5

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

You need to migrate an on-premises SQL Server database to Azure. The solution must include support for SQL Server Agent.

Which Azure SQL architecture should you recommend?

Select only one answer.

Azure SQL Database with the General Purpose service tier

Azure SQL Database with the Business Critical service tier

Azure SQL Managed Instance with the General Purpose service tier

Azure SQL Database with the Hyperscale service tier

Answers

The recommended architecture would be the Azure SQL Managed Instance with the General Purpose service tier.

Why this?

Azure SQL Managed Instance is a fully managed SQL Server instance hosted in Azure that provides the compatibility and agility of an instance with the full control and management options of a traditional SQL Server on-premises deployment.

Azure SQL Managed Instance supports SQL Server Agent, which is important for scheduling and automating administrative tasks and maintenance operations.

This would be the best option for the needed migration of dB.

Read more about SQL server here:

https://brainly.com/question/5385952

#SPJ1

How many ways can you save in MS Word?​

Answers

Answer:

three waves

Explanation:

You can save the document in Microsoft word in three ways: 1. You can save by clicking File on top left corner and then click save as. After that browse the location where exactly you want to save in your computer.

Which WPA mode allows users to provide authentication via a pre-shared key or password?

Answers

Answer:

WPA2 allows users to provide authentication via a pre-shared network key / password

Explanation:

The WPA mode that allows users to provide authentication via a pre-shared key or password is the personal mode. The correct option is a.

What is WPA mode?

The most recent and secure Wi-Fi protocol at the moment is WPA3 Personal. A pre-shared key is used by Personal WPA to verify users' first login information.

Wi-Fi security access All users on 2 pre-shared key (WPA-PSK) networks use the same passphrase. A security standard for computing devices using wireless internet connections is called Wi-Fi Protected Access (WPA).

It was created by the Wi-Fi Alliance to provide stronger user authentication and data encryption than the original Wi-Fi security standard, Wired Equivalent Privacy (WEP).

Therefore, the correct option is a. Personal mode.

To learn more about WPA mode, refer to the link:

https://brainly.com/question/29034850

#SPJ5

The question is incomplete. Your most probably complete question is given below:

a. Personal mode

b. Enterprise mode

c. Extensible Authentication Protocol mode

d. Wired Equivalent Privacy mode

Pls help me to answer these questions:(

Pls help me to answer these questions:(

Answers

The fetch execute cycle is the basic operation (instruction) cycle of a computer (also known as the fetch decode execute cycle).

What is fetch- execute cycle?

The fetch execute cycle is the basic operation (instruction) cycle of a computer (also known as the fetch decode execute cycle).

During the fetch execute cycle, the computer retrieves a program instruction from its memory.  It then establishes and carries out the actions that are required for that instruction.

The cycle of fetching, decoding, and executing an instruction is continually repeated by the CPU whilst the computer is turned on.

Four steps of the machine cycle:

Fetch - Retrieve an instruction from memory. Decode - Translate the retrieved instruction into computer commands. Execute - Execute the computer commands. Store - Send and write the results back in memory,

The operand is copied to the MAR, as it provides the address of the data to be loaded (0100 in this case). The data at address 0100 is then fetched from RAM and passed up the data bus to the MDR.

To learn more about fletch-execute refers to;

https://brainly.com/question/20493746

#SPJ1

create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why

Answers

The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.

You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.

A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.

Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Learn more about PPT, refer to the link:

https://brainly.com/question/31676039

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioned

item includes an ID number, item description, length of auction in days, and minimum required bid.

Design a flowchart or pseudocode for the following:

-a. A program that accepts data for one auctioned item. Display data for an auction only if the

minimum required bid is more than $250.00

Answers

The pseudocode for the program: Announce factors for the unloaded thing information, counting:

auction_id (numbers)

item_description (string)

auction_length (numbers)

minimum_bid (drift)

Incite the client to enter the auction_id, item_description, auction_length, and minimum_bid.

What is the pseudocode?

The program acknowledges information for one sold thing, counting the auction_id, item_description, auction_length, and minimum_bid. It at that point checks in case the minimum_bid for the unloaded thing is more prominent than or rise to to $250.00.

The pseudocode for the program pronounces factors for the sold thing information and prompts the client to enter the information. At that point it employments an in the event that articulation to check in case the minimum_bid is more noteworthy than or break even with to 250.00.

Learn more about pseudocode  from

https://brainly.com/question/24953880

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioneditem
Other Questions
Gemma had $2, 034 in her checking account. She wrote a check for $625 to pay the rent on her apartment. After the landlord cashed the check, how much money did Gemma have left in her checking account?$1, 419$2, 659$2, 419$1, 409 Please help me !!!!!!! What was Mendal's first conclusion Why didnt the federal government get involved and help stop Daniel Shays rebellion?A. They were too busy making peace with England.B. They had no money to help raise a militia to send to MA.C. They werent allowed to interfere with states issues, according to the Articles of Confederation.D. They didnt want to get involved. The words can only be used onece. Use the words to complete the sentences below: Switch, break, on, complete, electricity, bulb, off, battery A circuit which has a _____________________ in it will not allow _____________________ to flow through it. A device called a ______________________ can be used to ______________ a circuit so that other devices can be switched ____________ or ______________________. Select the correct answer from the drop-down menu.Read the sentence from paragraph 3.Night after night I would steal away by myself and go to the border of the village to watch the sun set in the foothills, to gaze at the far line of sky and prairie, to long and long for my father's lodge.How does the phrase "Night after night" help create tension in the passage?The author creates tension with the phrase "Night after night" because this phrase .Select the correct answer. What is one way that the author develops a theme about new journeys? A. by creating a parallel between Winesburg and the city B. by setting the story in the spring C. by casting a mild, gentle tone D. by describing George's immaturity Which compounds produce three ions per formula unit by dissociation when dissolved in water? (Select all that apply)a) K2SO4b) Al(NO3)3c) Li3PO4d) Ca(NO3)2 13.Mi hermano____en la piscine cada verano cuando era nio.1.nadbamos2.nadaba3.nadabas4.nadaban which is the odd one. A) bake a cake B) boiling a egg C) frying a sausage D) melting some butter a particle is projected from the surface of earth with a speed equal to 3 times the escape speed. when it is very far from earth, what is its speed? The following initial rate data are for the reduction of nitric oxide with hydrogen: 2 NO + 2 H2N2 + 2 H2O Experiment [NO]o, M [H2]o, M Initial Rate, M s-1 1 0.167 0.210 8.3810-3 2 0.334 0.210 3.3510-2 3 0.167 0.420 1.6810-2 4 0.334 0.420 6.7010-2 Complete the rate law for this reaction in the box below. Use the form k[A]m[B]n , where '1' is understood for m or n and concentrations taken to the zero power do not appear. Don't enter 1 for m or n. Rate = From these data, the rate constant is M-2s-1. multiple -c2( 3c - 2) the common stock of flavorful teas has an expected return of 23.92 percent. the return on the market is 16 percent and the risk-free rate of return is 2.8 percent. what is the beta of this stock? When it is believed that a law treats people differently because of their race, national origin or religion, the courts treat the case under the test of Which of the following is a technological issue that must beconsidered in the digital environment?Rate of technological changeEnsuring the competitiveness of companiesLocalization of web contentA Refer to one or more details from the text to explain what led anne to think that local children's leukemia might be caused by a virus in the local environment Describe the two types of survey errors and the actions thatneed to be taken in order to reduce research biases. in the long run: a production choices are more limited than in the short run. b the firm considers all inputs as variable. c the average total cost curve is horizontal. d there are no costs. e the firm considers all inputs as fixed. A: Find the solution to the following linear programming problem using the simplex method Max (Z)=50x1+60x2 Subjected to: 2x1+x2 < 300 3x1+4x2 509 4x1+7x2812 x1,x220 In the laboratory, a general chemistry student measured the pH of a 0.328 M aqueous solution of acetylsalicylic acid (aspirin), HC9H7O4 to be 1.987. Use the information she obtained to determine the Ka for this acid.