which of the following actions do not contribute to recommedations you see online

Answers

Answer 1

Answer:

All of these actions contribute to recommendations you see online.


Related Questions

Help please this is my last assignment of the year

Help please this is my last assignment of the year

Answers

Answer:

the answer is in the website that are there

(a) Contruct instruction to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and explain the difference between the two instructions. (5 marks)

Answers

Here are the instructions to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and an explanation of the difference between the two instructions: Instruction using LXI opcode: LD DE, 2036HLXI instruction is used to load 16-bit data into a register pair.

LXI opcode is used to initialize the registers BC, DE, and HL with 16-bit data. The instruction has a format of LXI RP, data16. Here RP represents register pair (BC, DE, HL or SP) and data16 represents the 16-bit data.Instruction using MVI opcode:LD E, 36HLD D, 20HMVI instruction is used to load 8-bit data into a register. The instruction has a format of MVI R, data8. Here R represents the destination register and data8 represents the 8-bit data that will be loaded into the register.

The difference between the two instructions is that the LXI opcode is used to load 16-bit data into a register pair while the MVI opcode is used to load 8-bit data into a single register. Additionally, the LXI opcode requires two bytes of memory to store the 16-bit data while the MVI opcode only requires one byte of memory to store the 8-bit data.

To know more about 16-bit data visit:

https://brainly.com/question/31325908

#SPJ11

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Answers

Answer:

change the NTFS permissions on the folder that you are sharing

Explanation:

In order to solve this, you are going to need to change the NTFS permissions on the folder that you are sharing. These are permissions that allow or prevent the files in that current system location from being modified. In order to do this, you will need to first, right-click on the folder that you are sharing. Next, click on "Properties" and head to the Security tab. Finally, choose the groups or user names of the individuals who have access and check allow on all the boxes. This will give them full control over the data in the folder.

what dose a bios system do?

Answers

BIOS instructs the computer on how to preform basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer
Bios tells computer how to do basic functions

Someone please help!

Someone please help!

Answers

Answer:

192.168.1.5

Explanation:

Assuming that 192.168.1 is the class C subnet, the last number is the host number. You simply combine them to get the IP address.

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

The ____ file is typically saved with a prefix of inc_.
a. insert
b. include
c. nested
d. increment

Answers

The include file is typically saved with a prefix of inc_.

What is include file?

The include (or require ) statement is known to be one that often takes the total text/code/markup that is seen in the specified file and it is one that copies it into a given file that uses what we call the include statement.

A file is known to be any form of documents and it is one that can be in any format such as pdf, doc and others.

Hence, in the case above, The include file is typically saved with a prefix of inc_ as that is the way to save it.

Learn more about file from

https://brainly.com/question/26125959

#SPJ1

What layer of the OSI model does every transmission medium network function on?
A. the fifth layer
B. the second layer
C. the first layer
D. the seventh layer

Answers

Answer:

Hopefully i am correct! Sorry if i am not

Explanation:

Every transmission medium network function operates at the Physical Layer (Layer 1) of the OSI model.

The Physical Layer is responsible for the physical transmission of data over the communication channel, including the electrical, mechanical, and functional specifications of the network interface, such as voltage levels, data rates, and physical connectors.

Therefore, the correct answer is C. the first layer.

Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying

Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying

Answers

Have you tried the esc button? Or restart your cp

states that message passing is both time- and space-coupled – that is, messages are both directed towards a particular entity and require the receiver to be present at the time of the message send. Consider the case, though, where messages are directed towards a name rather than an address and this name is resolved using DNS. Does such a system exhibit the same level of indirection?

Answers

In the case where messages are directed towards a name rather than an address and this name is resolved using DNS, the system does exhibit a level of indirection, but it may not be as time- and space-coupled as a system where messages are directed towards a particular entity.

DNS (Domain Name System) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the internet or a private network. It translates domain names, which are easier for humans to remember, into IP addresses, which are used by machines to identify each other on the network. When a message is directed towards a name, the sender does not need to know the exact address of the recipient. Instead, the sender can use the name, which is resolved using DNS to find the IP address of the recipient. This adds a level of indirection to the message passing process, as the sender is not directly sending the message to the recipient's address.

However, because DNS is a decentralized system and caching can occur, the level of time- and space-coupling may not be as significant as in a system where messages are directly sent to a particular entity. The receiver does not necessarily need to be present at the time of the message send, as the message can be cached or redirected to a different address if the original recipient is not available. In summary, while the use of DNS for resolving names adds a level of indirection to the message passing process, it may not exhibit the same level of time- and space-coupling as a system where messages are directly sent to a particular entity.

To know more about  system visit :

https://brainly.com/question/19843453

#SPJ11

TRUE/FALSE. if the objective function is to be maximized and all the variables involved are nonnegative, then the simplex method can be used to solve the linear programming problem.

Answers

if the objective function is to be maximized and all the variables involved are nonnegative, then the simplex method can be used to solve the linear programming problem: True.

What is the simplex method?

The simplex method can be defined as a widely used algorithm that was developed by Dr. George Dantzig during the Second World War.

Generally speaking, the simplex method makes use of an approach that is considered as being very efficient because it does not compute the value of an objective function at every given point.

This ultimately implies that, the simplex method can be used for solving a linear programming problem when the objective function is maximized and all of the variables involved are non-negative.

Read more on simplex method here: https://brainly.com/question/32948314

#SPJ4

you're building a new network for a small financial services startup company. security is paramount, so each organization within the company will have their own network segments separated by routers. funds are limited, and you've been asked to keep costs to a minimum. you've acquired a used fiber optic switch, and you want to use it to create a fiber optic backbone that interconnects all of the routers. you've purchased several used multi-mode gbic modules on ebay that you'll install on each router to allow them to connect to the switch.

Answers

Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

Why would the above implementation not work?

The reason is that a person  is not permitted to use multimode patch cables with  one or single mode GBIC modules as this is ideal.

Is GBIC still used?

Not as before, the use of GBIC is known to be considered as old or obsolete, a

The gigabit interface converter, which is GBIC module is said to be a kind of a transceiver that act to converts electric currents to a ay that is known to be optical signals.

Therefore, Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

Learn more about  network segments from

https://brainly.com/question/7181203

#SPJ1

See full question below

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum.

You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.

Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.

Will this implementation work?

I NEED IT ASAP!!!!!!!



Search for a "family budget estimator" and calculate the monthly expenses for a family living in your city.

Insert a screenshot of the calculator you used, as well as all of the information you entered into it. If you are unable to insert a screenshot, then list the information below

I NEED IT ASAP!!!!!!!Search for a "family budget estimator" and calculate the monthly expenses for a

Answers

MONTHLY COSTS

••• adults and  ••• children

•••

2 adults and 4 children

Union County, NJ

HOUSING •••   $1,731

FOOD •••   $1,142

CHILD CARE •••   $1,723

Transportation •••   $1,173

HEALTH CARE •••   $1,528

OTHER NECESSITIES •••   $1,159

TAXES •••   $1,411

Monthly Total •••   $9,865

Annual Total •••   $118,386

Discuss in not less than five sentences, one way the internet has been benificial to persens around the word.​

Answers

The internet has been beneficial go people around the world because it allows us to connect with others through the use of different apps. (You can elaborate on this to get the correct amount of sentences you need)

Use the drop-down menu to complete the steps for editing a conditional formatting rule.

On the ___ tab, click the ___ group. On the Styles drop-down list, click ______. In the dialog box, select the rule, and click ________. Make the changes to the rule and click ok.

Use the drop-down menu to complete the steps for editing a conditional formatting rule.On the ___ tab,

Answers

Answer:

1. Home

2. Conditional formatting.

3. Manage rules.

4. Edit.

Explanation:

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems through the use of Microsoft Excel.

On the Home tab, click the Conditional formatting group. On the Styles drop-down list, click Manage rules. In the dialog box, select the rule, and click Edit. Make the changes to the rule and click OK.

Answer:

Use the drop-down menu to complete the steps for editing a conditional formatting rule.

On the

✔ Home

tab, click the

✔ Styles

group.

On the Styles drop-down list, click

✔ Conditional Formatting

.

In the dialog box, select the rule, and click

✔ Manage Rules

.

Make the changes to the rule, and click OK.

Explanation:

you are working in the headquarters of an organization and you're asked to deal with the interruption in services due to network issues found in the isp servers. how will you tackle this situation?

Answers

Using NIC teaming is the way to tackle the situation.

What is network?

Network is defined as a network of linked computers, servers, mainframes, peripherals, network devices, or other devices that facilitate data sharing. Because it is a global network of computers connected by telephone and cable lines, the Internet is known as a network of networks and allows for communication between them.

Users can combine two or more physical NICs into a single logical network device known as a bond via NIC teaming. The virtual machine is unaware of the underlying physical NICs after a logical NIC is configured.

Thus, using NIC teaming is the way to tackle the situation.

To learn more about network, refer to the link below:

https://brainly.com/question/15088389

#SPJ1

What are some technical challenges and questions that arise from the need to represent digital information in computers and transfer it between people and computational devices?

Answers

Answer:

security

Explanation:

One technical issue that arises from this is security. Many times the information that is being transferred is private or even valuable, therefore grabbing the attention of hackers/thief's that want this information. This makes security highly important, but making sure that the information is completely secure is impossible. The best that can be done is adding certain safety measures to secure the information as much as possible, which in term is a technical challenge.

which modes on bluetooth devices at greater risk? (choose all that apply)

Answers

The modes on Bluetooth devices that are considered to be at greater risk are:

Discoverable ModePairing Mode

What are the modes on Bluetooth devices?

The modes on Bluetooth devices that are considered to be at greater risk in terms of security vulnerabilities and potential attacks include:

Discoverable Mode: When a Bluetooth device is set to "Discoverable Mode," it actively broadcasts its presence to other nearby Bluetooth devices. This mode poses a higher risk as it makes the device more visible and accessible to potential attackers who can try to connect or exploit vulnerabilities.

Pairing Mode: Pairing mode is the state in which a Bluetooth device is ready to establish a secure connection with another device. While the actual pairing process involves establishing an encrypted connection, the initial pairing mode can be susceptible to attacks if not properly managed.

It is important to note that while these modes are considered to be at greater risk, the actual security vulnerabilities and risks depend on various factors, including the implementation of Bluetooth protocols, firmware, and security measures implemented by the device manufacturers. It is always recommended to keep Bluetooth devices updated with the latest firmware and follow best practices for Bluetooth security, such as using strong passcodes, disabling unnecessary Bluetooth services, and being cautious while pairing with unknown devices.

Learn more about Bluetooth devices

brainly.com/question/28778467

#SPJ11

What fact constitutes the main difference between most standard fault types and issues of network performance?Standard faults usually result from performance issues.Performance management has its own set of tasks.Performance management is a subset of fault management.Standard faults usually result from failed devices.

Answers

A standard fault is a type of fault that occurs due to a deviation from a predefined specification or standard, which can cause errors or malfunctions in a system or process.

The main difference between most standard fault types and issues of network performance is that standard faults usually result from failed devices, whereas issues of network performance are caused by various factors that impact the network's ability to perform optimally.

Standard faults are typically straightforward to identify, and they involve the replacement or repair of a faulty device. For instance, if a router stops working, it is usually a standard fault, and the technician can easily replace it to restore the network's functionality. In contrast, issues of network performance are complex, and they require a more comprehensive approach to resolve.

Performance management is a subset of fault management that focuses on optimizing the network's performance, monitoring, and analyzing data to identify potential bottlenecks, and resolving them before they affect the network's performance. Unlike standard faults that are typically caused by a single failed device, issues of network performance could result from various factors such as bandwidth limitations, network congestion, or poor routing configurations.

Therefore, performance management requires a different set of tasks than fault management, and it involves continuously monitoring and analyzing the network's performance to identify potential performance issues and resolve them proactively. Overall, understanding the difference between standard faults and network performance issues is critical for network administrators to manage their networks effectively and optimize their performance.

To know more about standard fault visit:

https://brainly.com/question/25762503

#SPJ11

Which type of cryptography uses two mathematically linked keys, one key encrypting the data and the other decrypting the data?
Asymmetric
Encoding
Firewall
Symmetric

Answers

Answer:

Asymmetric.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

There are two (2) main types of encryption techniques used in cryptography and these are;

I. Symmetric encryption.

II. Asymmetric encryption.

Asymmetric encryption is a type of cryptography which uses two mathematically linked keys, one key encrypting the data and the other decrypting the data. These two keys are generally referred to as a public key and a private key respectively.

This ultimately implies that, a pair of key (two keys) that are different in values is required or needed to make a computer system secured.

your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network.one day, you find that an employee has connected a wireless access point to the network in his office.which type of security risk is this?one day, you find that an employee has connected a wireless access point to the network in his office.which type of security risk is this?

Answers

The act of an employee connecting a wireless access point to the network in violation of the company's security policy presents the security risk of an unauthorized or rogue wireless network.

Explanation:

1. Unauthorized Wireless Network: When an employee connects a wireless access point without proper authorization or knowledge of the IT department, it creates an unauthorized or rogue wireless network. This means that there is an additional network infrastructure that is not under the control or supervision of the organization's IT security measures.

2. Security Implications: The presence of an unauthorized wireless network introduces several security risks. These risks include:

a. Unauthorized Access: The rogue wireless network may allow unauthorized individuals, such as external attackers or nearby individuals, to gain access to the organization's network resources without going through the necessary authentication and security measures.

b. Data Exposure: If the rogue wireless network is not properly secured, sensitive data transmitted over the network may be intercepted by unauthorized parties, potentially leading to data breaches or information leakage.

c. Malicious Activity: The presence of a rogue wireless network provides an opportunity for malicious actors to launch attacks against the organization's network. They can exploit vulnerabilities, launch man-in-the-middle attacks, or deploy other malicious activities that can compromise the network's security.

d. Network Disruptions: The unauthorized wireless access point can interfere with the organization's authorized wireless networks, causing network disruptions or performance degradation.

3. Violation of Security Policy: Connecting a wireless access point against the company's security policy demonstrates a breach of established security protocols and guidelines. It indicates a lack of adherence to the organization's security standards and poses a threat to the overall security posture of the network.

To mitigate this security risk, it is crucial for organizations to enforce strict policies regarding the use of wireless networks and regularly monitor network activity to detect any unauthorized devices. Implementing network access controls, conducting regular security audits, and educating employees about the risks associated with unauthorized wireless networks are essential measures to prevent and address such security breaches.

To know more about wireless access point, please click on:

https://brainly.com/question/29870107

#SPJ11



What is an example of a network database

Answers

A network database is a type of database management system that organizes data in a flexible, interconnected structure, allowing multiple relationships among different entities. An example of a network database is the Integrated Automated Fingerprint Identification System (IAFIS) used by the FBI.

In the IAFIS, the network database is designed to manage fingerprint records, criminal history information, and related data. It facilitates the connection of various types of information, such as fingerprints, mugshots, and criminal records, through a network structure. The database allows multiple connections between different data types, making it easier for law enforcement agencies to access and analyze information efficiently. The flexibility of the network database model makes it well-suited for complex data relationships and systems that require rapid data access and retrieval.

To learn more about database management system click here:

https://brainly.com/question/31733141

#SPJ11

what is the total revene recorded in the simplified sales table? total revenue is the sum of the price column. your query should produce one column named total revenue with one row showing the value.

Answers

The total revenue recorded in the simplified sales table is the sum of the price column.

To produce one column named total revenue with one row showing the value, the query to be used isSELECT SUM(price) AS "Total Revenue" FROM sales table;In this query, the SUM function is used to add up all the values in the price column. The result is then labeled as "Total Revenue" using the AS keyword. The FROM keyword specifies which table to retrieve the data from. The semicolon (;) indicates the end of the SQL query.

In summary, the SQL query to find the total revenue recorded in the simplified sales table is SELECT SUM(price) AS "Total Revenue" FROM sales table;.

Learn more about Total revenue record at: brainly.com/question/31007001

#SPJ11

A device used in a star topology that keeps a table of mac addresses is called:

Answers

Answer:

Ethernet switches

Explanation:

Ethernet switches eliminate the need to broadcast communications out to all spokes on the star network. Instead, the Ethernet switch maintains a media access control (MAC) address table.

The ________ is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. Group of answer choices world wide web Internet of Things Cloud solid state of things

Answers

Answer:

Internet of Things (IOT)

The Internet of Things (IoT) is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.

The Internet of Things (IoT) refers to the network of physical objects or "things" embedded with sensors, software, and other technologies that enable them to connect and exchange data with other devices or systems over the Internet.

These objects can be everyday items such as household appliances, wearable devices, industrial machines, vehicles, and much more.

IoT allows these objects to collect and transmit data, interact with their environment, and even respond to certain events or conditions without requiring direct human intervention.

The data generated by IoT devices can be analyzed and utilized to make informed decisions, improve efficiency, enhance convenience, and create new services and applications.

IoT has the potential to transform various industries, including healthcare, agriculture, transportation, manufacturing, and more.

It is an essential component of the ongoing development of the Internet, as it expands the scope of connected devices beyond traditional computers and smartphones.

Hence the correct answer is: Internet of Things (IoT).

Learn more about Internet of Things click;

https://brainly.com/question/29767247

#SPJ3

Single-line comments are ignored by the python interpreter, and so are only for human benefit.a. Trueb. False

Answers

Answer:

True

Explanation:

The interpreter ignores comments, and they can be represented by adding a # at the start of the line.

Brainliest would be appreciated if this answer helped you :)

a. True because The portion of the line after the pound symbol is a single-line comment that provides further explanation of the code.

What are Single-line comments in Python?

Single-line comments in Python are lines of code that are ignored by the interpreter. They are used to provide explanations or descriptions of the code or to leave notes for other programmers who may read the code. Single-line comments are denoted by the pound symbol (#) at the beginning of the line, and everything after the pound symbol is ignored by the interpreter.

For example:

# This is a single-line comment

x = 10  # This is also a single-line comment

In the example above, the first line is a single-line comment that explains the purpose of the code. The second line is a statement that assigns the value 10 to the variable x. The portion of the line after the pound symbol is a single-line comment that provides further explanation of the code.

Hence, the given statement is true.

To learn more about the Python Program click here:

brainly.com/question/15061326

#SPJ12

For questions 2-4, consider the following code:



if month == 7:

if day <= 15:

print("First half of the month")

else:

print("Second half of the month")

else:

print("Not in July")



What is the output if month = 7 and day = 14?
Group of answer choices

Nothing is output

Not in July

First half of the month

Second half of the month

Answers

Answer:

First half of the month

Explanation:

first if statement is true; nested if statement is true so the statement print("First half of the month") is executed

What are the different types of peripherals and give some examples in each category? What do you think would be a really cool type of peripheral that could be developed in the future?

Answers

Explanation:

Remember, peripheral devices are portable devices connected to a computer in other to add more functionality to the computer system such as a printer, mouse, hard drive, CD-ROM, etc.

A really cool type of peripheral that could be developed in the future is a voice-enabled mouse that can perform normal operations on the computer.

which component of the oracle cloud infrastucre identiy and access management service can be used for controlling access to resources for authentuicated pricakpls

Answers

Oracle Cloud Infrastructure Identity and Access Management (IAM) service component that can be utilized for controlling access to resources for authenticated principals is called policy.What is Oracle Cloud Infrastructure Identity and Access Management (IAM) service?Oracle Cloud Infrastructure Identity and Access Management (IAM) service allows managing users, groups, compartments, and policies in Oracle Cloud Infrastructure (OCI).

It offers a centralized, cloud-based way to authorize and authenticate applications and services to access your cloud resources. It provides the following features:Identity ManagementAccess ManagementIntegration and Federation PolicyComponents of Oracle Cloud Infrastructure Identity and Access Management (IAM) ServiceThere are three components of Oracle Cloud Infrastructure Identity and Access Management (IAM) Service:UsersGroupsPoliciesThe Policies component of the Oracle Cloud Infrastructure Identity and Access Management (IAM) Service is utilized for controlling access to resources for authenticated principals.Explanation:The Policies component of the Oracle Cloud Infrastructure Identity and Access Management (IAM) Service is utilized for controlling access to resources for authenticated principals. You can utilize policies to enforce compliance, to grant or restrict access to resources, to organize users, and to support auditing and monitoring activities.In Oracle Cloud Infrastructure (OCI), policies allow you to specify who can access a resource and what actions they can perform on that resource. Policies use groups and compartments to simplify administration and policy management. A policy consists of one or more policy statements, each of which specifies one or more resource types, actions, and who can access that resource and how.

Policy statements are written in Oracle Cloud Infrastructure's policy language and are applied to IAM users, groups, and compartments.Policies are composed of policy statements. Each policy statement defines one or more resource types, actions, and who can perform those actions. A policy statement can be applied to an IAM user, group, or compartment. Policies make it easy to centralize and enforce permissions across multiple services and resources.

To know more  about   Identity and Access Management (IAM) service visit :

https://brainly.com/question/32200175

#SPJ11

Consider the following code:
Using Python
x = 19
y = 5
print (x % y)
What is output?

Answers

In python the % operator is modulo. Modulo returns the remainder of two numbers.

19 % 5 = 4 therefore,

print(x%y) would output 4

Using Python, the output of the code will be 4. The explanation of the problem is shown below.

What is Python?

Python is a high-level, interpreted programming language that was first released in 1991 by Guido van Rossum. It is a general-purpose language that can be used for a wide variety of applications, including web development, scientific computing, data analysis, artificial intelligence, machine learning, and more.

Python is known for its simplicity and readability, making it easy to learn and use. Its syntax is designed to be concise and expressive.The % operator in Python returns the remainder of the division of two numbers.

In this case, x % y is equivalent to 19 % 5, which is 4 since 19 divided by 5 is 3 with a remainder of 4. The print function is used to display the value of the expression x % y on the screen.

Learn more about Python, here:

https://brainly.com/question/30391554

#SPJ3

Other Questions
g(n) = 2n 3h(n) = n^3 + 5Find (g. h)(1) The times to pop a regular bag of microwave popcorn without burning it are Normally distributed with a mean time of 140 seconds and a standard deviation of 20 seconds. The times to pop a mini bag of microwave popcorn without burning it are Normally distributed with a mean time of 90 seconds and a standard deviation of 15 seconds. Suppose two independent random samples, 25 of each, are taken and the mean popping times are calculated. Let R = the popping time of a randomly selected regular-sized bag and M = the popping time of a mini-sized bag. Which of the following best describes the standard deviation of the sampling distribution of xr-xm? why is it said that the warren court took the handcuffs off the criminals and put them in the police A liquid's resistance to flow is calledviscosity.OdensityO pressure.O tension. what is called science Line M goes through the points (-2,-8) and (1,1). Which pair of pointslies on a straight line that intersects Line M?(-3,-2), (2,6)(-2,-1), (3,14)(0,2), (1,5)(2,1), (-5,-20) find the values of x and y if / || m.9.(10x - 17)17(6) + 29) (8x + 1) If the concentration of a dilute solution of nitric acid is 0. 0001 m. What is the ph of that solution? neurons are brain cells. where would new neuron come from A bacteriaB non-living matterC other cellsD food 1. Emma knows that she wants to be a digital artist, but she feels like working by herself as a freelancer would be more work than she was willing to do. She is hoping to get a job with a largeanimation studio instead. Does she still need business savvy if she is not going to be an entrepreneur?No, that is only for artists working for themselves.Yes, she will need to negotiate a good contract for herselfYes, she is very likely to change her mind and want to freelance.No, the company she works for will make the best possible deal for her. What expression has the same meaning as 2 7/4 NEED HELP ASAP PLEASE !!!!!!!!!!!!!!!!!!!!!Answer the following questions about the letter:1) What is Lincoln saying in the first paragraph?2) Bracket the sentences which show he has left no doubt as to what his goal is?3) Underline what he says he will not save the Union.4) What is Lincolns personal wish?5) Explain why Lincoln would not follow his conscience on this matter.6) Compare differences in the form of Lincolns letter to the form used today.Executive Mansion,Washington, August 22, 1862.Hon. Horace Greeley:Dear Sir.I have just read yours of the 19th. addressed to myself through the New-York Tribune. If there be in it any statements, or assumptions of fact, which I may know to be erroneous, I do not, now and here, controvert them. If there be in it any inferences which I may believe to be falsely drawn, I do not now and here, argue against them. If there be perceptable [sic] in it an impatient and dictatorial tone, I waive it in deference to an old friend, whose heart I have always supposed to be right.As to the policy I "seem to be pursuing" as you say, I have not meant to leave any one in doubt.I would save the Union. I would save it the shortest way under the Constitution. The sooner the national authority can be restored; the nearer the Union will be "the Union as it was." If there be those who would not save the Union, unless they could at the same time save slavery, I do not agree with them. If there be those who would not save the Union unless they could at the same time destroy slavery, I do not agree with them. My paramount object in this struggle is to save the Union, and is not either to save or to destroy slavery. If I could save the Union without freeing any slave I would do it, and if I could save it by freeing all the slaves I would do it; and if I could save it by freeing some and leaving others alone I would also do that. What I do about slavery, and the colored race, I do because I believe it helps to save the Union; and what I forbear, I forbear because I do not believe it would help to save the Union. I shall do less whenever I shall believe what I am doing hurts the cause, and I shall do more whenever I shall believe doing more will help the cause. I shall try to correct errors when shown to be errors; and I shall adopt new views so fast as they shall appear to be true views.I have here stated my purpose according to my view of official duty; and I intend no modification of my oft-expressed personal wish that all men everywhere could be free.Yours,A. Lincoln. Laser light. Consider an electromagnetic wave travelling in a vacuum with an electric field given by E(y, t) = (3 106 [V/m]) wave? O A. The EM wave is travelling along the k direction with frequency 4.8 105 Hz and wavelength 6.3 10 m. O B. The EM wave is travelling along the direction with frequency 1.7 106 Hz and wavelength 1.8 10-8 m. O C. The EM wave is travelling along the direction with frequency 4.3 104 Hz and wavelength 7.0 10-7 m. direction with frequency 2.7 x 105 Hz and wavelength 1.1 10-7 m. O D. The EM wave is travelling along the cos [ky + (2.7 x 105 [rad/s]) t]. What is the direction, frequency, and wavelength of the travelling the nurse has been monitoring a patient's vital signs closely after initiating a transfusion of packed red blood cells (prbcs). the nurse has observed that the patient's temperature is trending upward, and the patient is complaining of chills. the nurse has stopped the transfusion and informed the patient's health care provider, who believes that the patient is experiencing a febrile nonhemolytic transfusion reaction (fnhtr). what course of action should the nurse anticipate? In the following lines, why the author didn't write the whole sentence in one line?"die, Into the valleyof Death Rode theSix hundred" ?*(A lot of point) ;) please help Briefly explain the terms "specialist" and generalist" in thecontext of environmental science. Use the slope formula to determine the slope of the line containing the two points (4,-8) and (-1,-2) 7. A 5.00 g sample of spinach was extracted with 1% oxalic acid and the extract was diluted to 50.0 ml. The titration of 1.00 ml DCPIP required 20.6 ml and 19.8 ml in duplicate titrations. The titration required 7.8 ml and 8.6 ml of a 0.030 mg/ml standard solution of L-ascorbic acid. How much vitamin C was in 5 g of spinach PARAGRAPH 1: What milestones make someone an adult? Describe why Write a paragraph according to this prompt: What milestones make someone an adult? AND DESCRIBE WHY PLEASE INCLUDE A INTRODUCTION , ARGUMENT 1 ,2 ,3 AND A CONCLUSION PARAGRAPH 2 : If you could trade one aspect of yourpersonality for another, what would you get rid ofand what would you want inits place?PARAPGRAPH 2 INCLUDE INTRODUCTION , ARGUMENT 1,2,3 AND CONCLUSION PLEASEI have to turn in this paragraph today a story ending with 'we forgot the past and became friends