What is Open Application menu?

Answers

Answer 1

ANSWER - The Application Menu is composed of a drop-down button control that displays a menu containing Commands that expose functionality related to a complete project, such as an entire document, picture, or movie. Examples include the New, Open, Save, and Exit Commands.

Related Questions

Which assigns the last vector element with 20? vector int> user Num(N_SIZE); o userNum.at(20); o userNum.at() = 20; o userNum.at(N_SIZE = 20; o userNum.at(N_SIZE - 1) = 20;

Answers

The correct way to assign the last element of a vector of integers named userNum with the value 20 would be:

userNum.at(userNum.size() - 1) = 20;

Explanation:

userNum.at(userNum.size() - 1) is used to access the last element of the vector userNum. userNum.size() returns the number of elements in the vector, and subtracting 1 gives the index of the last element since vector indices are zero-based.
= is the assignment operator used to assign the value 20 to the last element of the vector.
So, the correct statement would be userNum.at(userNum.size() - 1) = 20;.

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

When using the font element, the following attributes can be used: Color Face and Shape

true
false ​

Answers

It is True that when using the font element, that color face and shape can be used.

What more should you know about font elements?

The font element is an old and deprecated HTML tag and is no longer recommended to be used in modern HTML. However, for the sake of answering the question, the font element does have several attributes that can be used, but they are not limited to color, face, and shape.

The font element can also use the size, bgcolor, border, clear, compact, height, hspace, ismap, language, link, noshade, nowrap, vlink, and width attributes. However, it's important to note that these attributes are deprecated and should be avoided in modern HTML. Instead, CSS should be used to style text and HTML elements.

Find more useful information on font element;

https://brainly.com/question/27333413

#SPJ1

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

acme widgets has 10 employees and they all need the ability to communicate with one another using a symmetric encryption system. the system should allow any two employees to securely communicate without other employees eavesdropping. if an 11th employee is added to the organization, how many new keys must be added to the system?

Answers

there would be 55 keys in the system to allow all 11 employees to securely communicate with each other.

In a symmetric encryption system, each pair of employees would need their own unique key to communicate securely. With 10 employees, there are a total of 45 possible pairs of employees (n*(n-1)/2 = 10*(10-1)/2 = 45). Therefore, there would be 45 keys in the system.

If an 11th employee is added to the organization, there would be 55 possible pairs of employees. This means that 10 new keys would need to be added to the system to accommodate the new employee (n-1 = 10). So in total, there would be 55 keys in the system to allow all 11 employees to securely communicate with each other.

to learn  more about: symmetric encryption

https://brainly.com/question/8455171

#SPJ11

Question 14 of 25
A computer programmer will often use a
by other programmers.
, which includes code written

Answers

A computer programmer often uses a programming language to write code that other programmers can understand and utilize.

How is this so?

Programming languages provide a set of syntax and rules that allow programmers to create software and applications.

By using a standardized programming language, programmers can communicate their ideas effectively and share code with others.

This promotes collaboration,reusability, and efficiency in software development, as code can be easily understood, modified, and built upon by different programmers.

Learn more about computer programmer at:

https://brainly.com/question/29362725

#SPJ1

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

To me I think it’s B

Explanation:

The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work.

For better understanding, we have to understand why Amman owns the photo and what creative Common license.

Amman own the photo and when he puts it online, he didn't license it but made it free for all to use. That does not mean someone should take His work and use as their own. Creative Commons simply known as the term that summarizes the scope of various outcome that exists between full copyright and the public domain. That is it ranges from all rights reserved to no rights reserved. This type of licenses helps one to have copyright while allowing certain uses of your work and the licenses can stand up in a court of law. Even though Beatrice has the creative license, the photo does not belong to her.

From the above, we can therefore say that the statement of The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work is true.

Learn more about creative license from:

https://brainly.com/question/17082747

*
Which of the following variable names are invalid?
123LookAtMe
Look_at_me
LookAtMe123
All of these are valid

Answers

Answer:

I think they're all valid but the validility depends on the website your using the usernames on.

Explanation:

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
port or connected wirelessly?
An attachment
A peripheral
A flash drive
A plug-in

Answers

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

The term for a device (usually external to a computer) that is plugged into a computer's communication  port or connected wirelessly is:

B. A peripheral

According to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly

As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.

Therefore, the correct answer is option B

Read more here:

https://brainly.com/question/20488785

How do I calculate this square footage?

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

How do I calculate this square footage?

refer to the exhibit. a network administrator needs to configure router-on-a-stick for the networks that are shown. how many subinterfaces will have to be created on the router if each vlan that is shown is to be routed and each vlan has its own subinterface?

Answers

The PC, printer, IP phone, and switch control VLAN are all on different VLANs based on the IP addresses and masks provided.

Four sub interfaces on the router are necessary in this circumstance. Finally, we set sub-interfaces to begin our router configuration. We set up sub-interfaces for each VLAN on the port that connects the router and the switch. Additionally, we configured 802.1Q encapsulation using the sub-VLAN interface's number. This suggests that switching between different VLANs can be accomplished using a router and switch with a single physical interface. Multi-vendor VLAN support is provided by the IEEE 802.1Q (Dot1q) protocol, which establishes a system of VLAN tagging for Ethernet frames.

Learn more about Ethernet here-

https://brainly.com/question/13441312

#SPJ4

as with all previous versions of windows,windows 2000, xp, and 2003 are secure with their default installation settings. True or false?

Answers

As with all previous versions of Windows, Windows 2000, XP, and 2003 are secure with their default installation settings. False.

While it is true that previous versions of Windows had security features in place, they were not as robust as the later versions of Windows. Windows 2000, XP, and 2003 did have some security measures, but they were not enough to protect against the increasing threats and vulnerabilities found in the digital landscape. These older versions of Windows are more susceptible to attacks and malware compared to newer versions like Windows 10. It is always recommended to update to the latest version of Windows and keep it regularly updated with security patches to ensure maximum security.

Learn more about vulnerabilities: https://brainly.com/question/31734739

#SPJ11

question 2 you are having trouble connecting to the internet, so you call your service provider for help. they need to know the permanent unique identifier address of your specific device so they can help troubleshoot it. what address are they asking for

Answers

Since y are having trouble connecting to the internet, so you call your service provider for help. they need to know the permanent unique identifier address of your specific device so they can help troubleshoot it. the address that they asking for is  MAC address.

What MAC address is used for?

Each device on a network has a unique identity known as a Media Access Control address (MAC address). It is primarily assigned by the manufacturer. They are frequently located on the network interface controller (NIC) card of a device.

A 12-character alphanumeric property known as a MAC (Media Access Control) address, which is also known as a hardware or physical address, is used to identify certain electrical devices on a network. The MAC address 00-B0-D0-63-C2-26 is an illustration.

Therefore, A MAC address is a set of six colon-separated pairs of two hexadecimal numbers. The Internet Service Provider will troubleshoot the network and reset the connection when you give them your MAC address, making it simple for you to connect to the internet.

Learn more about MAC address from

https://brainly.com/question/29540374
#SPJ1

What was the name of the first computer, developed by charles babbage?.

Answers

Answer: Analytical Engine

Explanation:

Answer:

analytical engine - 1837

Can anybody answer this

Can anybody answer this

Answers

Answer:

The answer should be C. I, II, IV

TASK 1 – Work out the cost.
The cost of the trip for each student is a share of the cost of a coach plus the cost of entry to the theme park.
The total cost of the coach will be $550. The entry cost to the park is $30 for each student. The national park gives one free ticket for every ten that are bought, which must be taken into consideration.
Set up a program that:

• stores the cost of the coach
• stores the cost of an entry ticket
• inputs the estimated number of students taking part, this must be validated on entry and an
unsuitable entry rejected
• calculates and outputs the recommended cost per student to ensure the trip does not make a loss.

Write an algorithm to complete Task 1, using either pseudocode, programming statements or a
flowchart. [5]

Answers

Answer:

please check the question again

Explanation:

Given what you know about the formation of photochemical smog, in which of the following situations is it most likely to occur?
Rural area in a low-sunshine location
Rural area in a high-sunshine location
Urban area in a high-sunshine location
Urban area in a low-sunshine location

Answers

Photochemical smog is formed when sunlight interacts with certain air pollutants, such as nitrogen oxides (NOx) and volatile organic compounds (VOCs), in the presence of sunlight.

Therefore, it is most likely to occur in an urban area in a high-sunshine location.

In an urban area, there are typically higher concentrations of vehicles, industrial emissions, and other human activities that release NOx and VOCs into the air. These pollutants can accumulate in the urban atmosphere, and when exposed to sunlight, they can undergo photochemical reactions that result in the formation of photochemical smog.

High levels of sunlight are necessary for the formation of photochemical smog because the reactions that produce smog require energy from sunlight to occur. In rural areas or low-sunshine locations, the availability of sunlight may be limited, which reduces the likelihood of photochemical smog formation. However, in urban areas with high levels of sunlight, combined with significant emissions of NOx and VOCs, the conditions for photochemical smog formation are more favorable.

learn more about    photochemical smog  here:

https://brainly.com/question/15728274

#SPJ11

the fact that everyone is a publisher means: a. all of these are correct. b. hiring a programmer to create a website is no longer necessary. c. there is content clutter. d. users can create and interact with the content they see. e. strong coding knowledge is no longer necessary to create a website.

Answers

Answer is option a) All of these are correct

Web Development :

  While everyone was manually coding their sites in the early days of the internet, many websites are now built with a content management system (CMS). A CMS removes the need to code by offering a visual interface to build web pages and structure your site.

         The website developer is a web development specialist. A professional website developer's web solution will be more technically complex and advanced than the website you build. They can have any sophisticated features you want. Front-end developers have more experience developing tools that improve the user experience. If you have a design concept that must work across multiple browsers and computers, you should hire a front-end developer. Back-end developers are essentially computer programmers who specialise in the development of Web applications. They are capable of developing content management systems, security features, and data management tools.

           Web programmers, also known as web developers or web engineers, create web-based applications. Their work focuses on non-design aspects of web development, such as coding and markup. Coding is the process of writing software, whereas markup is the process of organising and formatting text. The web programmer receives user requests for a specific web application, converts the request into coding, and creates a working online application. Web designers typically lack experience with computer programming. They may understand the fundamentals of HTML, CSS, and other common tools, but they are not the people you want to hire to build a website.

To learn more web development refer:

https://brainly.com/question/25941596

#SPJ4

a t bond pays interest on the 15th of april & october. a trade occurs on friday january 8. how many days of accrued interest does the buyer owe the seller?

Answers

The buyer owes the seller 88 days of accrued interest for a T Bond trade that occurred on Friday, January 8, considering actual days and including weekends from the last coupon payment date (October 15) to the settlement date (January 9) inclusive of weekends (Saturday and Sunday).

Accrued interest on Treasury bonds is calculated using actual days and includes weekends. In this scenario, the trade took place on Friday, January 8, and the settlement date was Monday, January 9. To determine the accrued interest owed by the buyer to the seller, we start counting from the last coupon payment date (October 15) and include all the days up to and including the settlement date (January 9), including weekends (Saturday and Sunday).

Counting the days, we have 17 days for October, 30 days for November, 31 days for December, and 10 days for January, totaling 88 days of accrued interest.

The complete question:

A T Bond pays interest on the 15th of April & October. A trade occurs on Friday January 8. How many days of accrued interest does the buyer owe the seller?

Learn more about Bond at https://brainly.com/question/25965295

#SPJ11

(a) Design an ASM chart that describes the functionality of this processor, covering the functions of Load, Move, Add and Subtract. (b) Design another ASM chart that specifies the required control signals to control the datapath circuit in the processor. Assume that multiplexers are used to implement the bus that connects the registers R0 to R3 in the processor.

Answers

Designing ASM charts involves identifying inputs, states, and actions to represent processor functionality, while specifying control signals for the datapath circuit.

What steps are involved in designing an ASM chart for the functionality of a processor and specifying the required control signals for the datapath circuit?

Sure! I will explain the steps involved in designing an ASM chart for the functionality of a processor, covering the functions of Load, Move, Add, and Subtract.

To design an ASM chart for the processor functionality, you need to:

Identify the input variables: Determine the inputs required for each operation, such as the source registers, immediate values, and control signals.

Determine the state variables: Identify the state variables that need to be stored during the execution of each operation, such as the destination register and the result.

Define the states: Determine the different states required for each operation, such as "Fetch," "Decode," "Execute," and "Write Back."

Draw the ASM chart: Represent each state as a rectangle and connect them with arrows representing the control flow. Label the arrows with conditions for state transitions based on the control signals.

Add actions and outputs: Specify the actions to be performed in each state, such as reading from registers, performing arithmetic operations, and updating the state variables. Include outputs that indicate the result or any flags.

To design an ASM chart for specifying the required control signals to control the datapath circuit, you need to:

Identify the control signals: Determine the control signals required to control the datapath circuit, such as clock signals, register select signals, enable signals for multiplexers, and operation control signals.

Define the states: Determine the different states required for each control signal, such as "Idle," "Load," "Move," "Add," and "Subtract."

Draw the ASM chart: Represent each state as a rectangle and connect them with arrows representing the control flow. Label the arrows with conditions for state transitions based on input signals.

Add actions and outputs: Specify the actions to be performed in each state, such as setting control signals to appropriate values, enabling or disabling certain components, and initiating the desired operation.

Please note that the above explanation provides a general guideline for designing ASM charts for a processor's functionality and control signals. The actual design may vary depending on the specific requirements and architecture of the processor.

Learn more about ASM charts

brainly.com/question/33169390

#SPJ11

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

An international airport approaches Accenture to help identify their existing security vulnerabilities. In which way can one of Accenture's Red Team use its state-of-the-art tools and capabilities to help the client?

Answers

Accenture is contacted by an international airport to assist in identifying their current security gaps. Make thorough aviator simulations to assist users in avoiding online security risks.

What is Accenture Security?

Accenture's Information Security team uses a strict, industrialised approach to offer the technological architecture, governance, operational infrastructure, client data protection, and behavioural change initiatives required to maintain the security of all data and information under Accenture's control.

What does "red team vs. blue team" at Accenture mean?

Red teams are offensive security specialists who specialise in taking down defences and attacking systems. Blue team defensive security specialists are in charge of maintaining internal network defences against any threats and cyberattacks.

To know more about assist visit:-

https://brainly.com/question/984866

#SPJ4

ASSIGNMENT FORM 2 1. Evaluate the following without using mathematical tables 0.36 x 6(142 +58) 21.44 - 10.64​

Answers

9251.44 or 231286/25 or 9251(11/25)

0.36*6*200*21.44-10.64
becomes
9262.08-10.64
gives you the result

Construct an expression to calculate the number
of bits in a megabyte.

Answers

Answer:

1 megabyte = 8*10^6 bits

Explanation:

def ex1(conn, CustomerName):
# Simply, you are fetching all the rows for a given CustomerName.
# Write an SQL statement that SELECTs From the OrderDetail table and joins with the Customer and Product table.
# Pull out the following columns.
# Name -- concatenation of FirstName and LastName
# ProductName # OrderDate # ProductUnitPrice
# QuantityOrdered
# Total -- which is calculated from multiplying ProductUnitPrice with QuantityOrdered -- round to two decimal places
# HINT: USE customer_to_customerid_dict to map customer name to customer id and then use where clause with CustomerID

Answers

It looks like you're trying to define a function called ex1 that takes two arguments: a database connection object (conn) and a customer name (CustomerName). From the hint you've provided, it seems like you want to use a dictionary called customer_to_customerid_dict to map the customer name to a customer ID, and then use a WHERE clause in your SQL query to filter results based on that ID.



To accomplish this, you'll first need to access the customer_to_customerid_dict dictionary and retrieve the customer ID associated with the provided CustomerName. You can do this by using the dictionary's get() method:

customer_id = customer_to_customerid_dict.get(CustomerName)

This will return the customer ID associated with the provided name, or None if the name isn't found in the dictionary.

Next, you can use the customer_id variable to construct your SQL query. Assuming you have a table called "orders" that contains customer information, you might write a query like this:

SELECT * FROM orders WHERE CustomerID = ?

The question mark here is a placeholder that will be replaced with the actual customer ID value when you execute the query. To do that, you can use the execute() method of your database connection object:

cursor = conn.cursor()
cursor.execute(query, (customer_id,))

Here, "query" is the SQL query you constructed earlier, and the second argument to execute() is a tuple containing the values to be substituted into the placeholders in your query. In this case, it contains just one value: the customer ID retrieved from the dictionary.

Finally, you can retrieve the results of the query using the fetchall() method:

results = cursor.fetchall()

And that's it! You should now have a list of all orders associated with the provided customer name, retrieved using a WHERE clause based on the customer ID retrieved from a dictionary.

For such more question on database

https://brainly.com/question/518894

#SPJ11

A good example of an SQL statement that takes data from the OrderDetail table and joins it with the Customer and Product tables using CustomerName is given below

What is the program?

The code uses the CONCAT function to merge the FirstName and LastName columns derived from the Customer table into a single column called Name.

There was a link the Customer table to the OrderDetail table through the CustomerID field, and to the Product table through the ProductID field. A subquery is employed to fetch the CustomerID associated with a particular CustomerName from the Customer table, which is then utilized in the WHERE clause to refine the output.

Learn more about CustomerName from

https://brainly.com/question/29735779

#SPJ1

def ex1(conn, CustomerName):# Simply, you are fetching all the rows for a given CustomerName.# Write

Your programme coordinator asked you to create a database for your respective department at the university, you must populate a database and includea form, two queries, and a report

Answers

To create a database for your department at the university, you need to follow these steps: design the database structure, create a form, develop two queries, and generate a report.


1. Design the database structure: Identify the tables, fields, and relationships needed to store department information (e.g., students, courses, faculty, etc.).

2. Create a form: Design a user-friendly form to input and update data, such as adding new students or updating course information.

3. Develop two queries: Create two queries to retrieve specific data from the database (e.g., a list of students enrolled in a specific course or faculty members teaching a particular subject).

4. Generate a report: Design a report that presents the data from your queries in a well-organized and readable format.

By following these steps, you will have a functional and useful database for your department that includes a form, two queries, and a report.

To know more about database visit:

https://brainly.com/question/30634903

#SPJ11

true or false? third-party served ads in amazon dsp can be used on third-party desktop and mobile sites, third-party apps, third-party video, and amazon o

Answers

The statement is true because third-party served ads in Amazon DSP can be used on third-party desktop and mobile sites, third-party apps, third-party video, and Amazon O.

Amazon DSP (Demand-Side Platform) is a programmatic advertising platform that allows advertisers to buy and manage display, video, and audio ads across a wide range of websites, mobile apps, and connected TV devices.

Amazon DSP offers a range of targeting options to help advertisers reach their desired audience, including contextual, behavioral, and audience-based targeting.

Amazon DSP allows advertisers to run third-party served ads on a variety of channels, including third-party desktop and mobile sites, third-party apps, third-party video, and Amazon-owned and operated properties (such as Amazon.com and IMDb). This provides advertisers with a broad reach and allows them to deliver their ads to audiences wherever they are consuming content.

Learn more about Amazon DSP https://brainly.com/question/29450976

#SPJ11

Can somebody help I need it now please and thank you correct answer please

Can somebody help I need it now please and thank you correct answer please

Answers

Answer:

3/8 is the answer....... accurately 0.378

Answer:

0.375 can it be a decimal?

Explanation:

I need help please hurry!!!!!!! jay works in the it department. his main responsibility at work is to keep all equipment working. he needs to know what maintenance to perform and when. he should _____.



inventory all equipment


copy the user's manual and distribute it to all the employees


read the manuals


update the software in the office


establish the frequency of maintenance tasks


identify individuals to complete the tasks


set up auto reminders


list the maintenance tasks


create a log to document maintenance

Answers

Jay is employed with the it division. Maintaining the functionality of all equipment is his primary duty at work. He must understand what upkeep to execute and when  to decide to perform maintenance.

He needs to decide how often to perform maintenance. The number of jobs that must be completed in a certain amount of time is referred to as maintenance frequency. Its periodicity can also vary based on the set time, from daily to weekly. Work equipment comprises a working platform, fall arrest devices, and any gear, computers, apparatus, tools, or installations used exclusively or mostly for work-related purposes. Task analysis examines how a task is carried out and includes a thorough description of both manual and mental processes, the lengths of the task and its elements, and task frequency.

Learn more about computers here

https://brainly.com/question/20414679

#SPJ4

write a program to calculate the circumference of a circle with a diameter of 2. create a constant to hold the diameter. what type will the constant be?

Answers

Answer:

Explanation:

(Diameter, Circumference and Area of a Circle) Write a program that reads in. // the radius of a circle and prints the circle's diameter, circumference and.

The program to calculate the circumference of a circle with a diameter of 2 is in explanation part.

What is programming?

Computer programming is the process of carrying out a specific computation, typically by designing and constructing an executable computer program.

Here's an example program in Python that calculates the circumference of a circle with a diameter of 2 and uses a constant to hold the diameter:

# Define a constant to hold the diameter

DIAMETER = 2

# Calculate the circumference

circumference = DIAMETER * 3.14159

# Print the result

print("The circumference of the circle is:", circumference)

In this program, the constant DIAMETER is assigned the value of 2. Since the diameter is a numeric value that won't change during the program's execution, it makes sense to use a constant to hold it.

Thus, the resulting value of circumference is also a floating-point number.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Other Questions
y-5 = -3 (x+2) in standard form Solve x-2/y = z for y. check over my answer Which sentence from "Preserving Animal Habitats" uses key words that help identify the text structure?"American Indians help preserve animal habitats. ""Humans share the planet with about 8. 7 million species. ""People can't cut down trees or hunt in the parks. ""This is why they only take what they need to survive. " human activities that interfere with distribution of natural resources are contributing to the increase of earthquake risk. Select all that applyWhich of the following are the three basic types of research used in psychology? (Select all that apply.)Multiple select question.CorrelationalVariableExperimentalDescriptive all of the following structures are considered to be part of the limbic system, except for which one?a. hippocampus.b. cingulate gyrus.c. amygdaloid body.d. caudate nucleus. Find the measure of "theta". Round all answers to the nearest tenth. Which set of angle measures cannot be the angle measures of a triangle How do you factor a mortgage payment? Define each of these terms: Harlem Renaissance; Negro Nationalism; negritude. Are they equal or diffrent angles HELP MEEEE ASAP AND PLEASE TELL MEEE THE CORRECT ANSWERRR TY When a self-correcting error is discovered after closing the books for the second year A. an entry must be made to correct both the income statement and balance sheet accounts B. an entry must be made to correct the income statement C. no entry is necessary because all permanent accounts are correctly stated D. an entry is necessary to correct the permanent accounts Complete the ratio table. A mass attached to a spring is displaced from its equilibrium position by 5cm and released. The system then oscillates in simple harmonic motion with a period of 1s. If that same massspring system is displaced from equilibrium by 10cm instead, what will its period be in this case?. if a package of cupcake liners contain 75 liners how many liners are there in 13 package emily is extremely afraid of coming in contact with germs so she always wears two pairs of surgical-quality gloves when she leaves her house, and washes her hands repetitively when she gets back. her fear is a(n) , whereas wearing gloves and handwashing are . find the value of the variables. x and y Find an equivalent ratio where the total number of games is 100Wins: 3 Total games: 12. 100