which option is the correct format of placing html tags while coding in html
A.
B.
C.
D.

Answers

Answer 1

Answer:

what are the answers?

it just says A, B. C. or D.

Explanation:


Related Questions

What two choices do you have when you open the Remote tab of the System Settings?

Answers

Answer:

remote assistance and remote desktop

Explanation:

^

what is the number of times a receiver is exposed to a media vehicle in a given time period? A) Potency B) Reach C) Coverage D) Frequency E) Audience contact

Answers

D) Frequency. Frequency refers to the number of times a receiver is exposed to a media vehicle in a given time period.

Frequency measures the repetition or the number of times an individual or target audience is exposed to a particular media vehicle, such as an advertisement, within a specific timeframe. It helps determine how often a message is delivered to the target audience. Frequency is an essential factor in advertising campaigns, as repeated exposure can reinforce the message and increase the likelihood of the audience retaining and responding to it. By managing frequency effectively, advertisers can optimize their reach and impact on their target audience.

Learn more about media here:

https://brainly.com/question/14047162

#SPJ11

1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this statement? Provide evidence to support your position, (2 points)​

Answers

Answer:

true

Explanation:

everything is computerized. banks, shopping, financial business records, ect

which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

Answers

The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.

You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.

Learn more about Slide Sorter here

https://brainly.com/question/16910023

#SPJ4

Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

a. Normal

b. Outline

c. Slide Show

d. Slide Sorter

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

suppose that a system administrator at sls read the details of this case. what steps should he or she take to improve the company's information security program?

Answers

To improve the company's information security program need to create a comprehensive security policy and implement strong firewalls.

STEP :

1. Create a comprehensive information security policy that outlines acceptable use of company resources and data.

2. Educate all staff on the importance of protecting data and the risks of not doing so.

3. Implement access control procedures such as multi-factor authentication, password complexity requirements, and regular password changes.

4. Implement strong perimeter security measures such as firewalls, intrusion detection systems, and antivirus software.

5. Establish regular auditing and monitoring of the system to detect any unauthorized access or usage of data.

6. Establish a process for responding to security incidents, including reporting, investigation, and remediation.

7. Implement a secure backup and recovery system to protect against data loss.

8. Establish an incident response team to investigate and respond to any security incidents.

9. Regularly review and update the security policies and procedures to ensure compliance with changing regulations.

10. Develop a policy for the secure disposal of confidential data.

To know more about security :
https://brainly.com/question/28581015
#SPJ4

You have $5 and earn $1.75 for each roll of wrapping paper you sell. Write an equation in two variables that represents the total amount A (in dollars) you have after selling r rolls of wrapping paper

Answers

Answer:

A = 5 + 1.75r

Explanation:

Amount you have = $5

Earning per roll of wrapping paper = $1.75

Let

r = number of rolls of wrapping paper

A = Total amount earned

A = 5 + 1.75r

Equation that represents the total amount A (in dollars) you have after selling r rolls of wrapping paper is

A = 5 + 1.75r

Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is more than or equal to 10 one is added to it. the result is displayed the process is repeated until the number 0 is entered.

Answers

Answer:

please find the attachment of the flowchart.

Explanation:

In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.

Please find the program and its output in the attached file.

Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled

What web browser feature would be particularly useful when using public computers?

Answers

A web browser feature which would be particularly useful when using public computers is: C. Privacy browsing.

What is a web browser?

A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

What are public computers?

Public computers can be defined as the type of computers that are typically used by the general public and as such are less secured than personal computers.

In this context, we can infer and logically deduce that privacy browsing is a web browser feature which would be particularly useful when using public computers.

Read more on privacy browsing here: https://brainly.com/question/6970507

#SPJ1

Complete Question:

What web browser feature would be particularly useful when using public computers?

A. Session restore

B. Pinned tabs

C. Privacy browsing

D. All of the above

Assign a pointer to any instance of searchChar in personName to searchResult.
*/
int main() {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = 0;
/* Your solution goes here */
searchResult = strchr(personName, searchChar);
if (searchResult != 0) {
cout << "Character found." << endl;
}
else {
cout << "Character not found." << endl;
}
return 0;

Answers

}

/*

strchr() is a function that allows us to search for a specific character in a string. This function returns a pointer to the first occurrence of the character in the string.

What is occurrence ?

Occurrence is a term that is used to refer to an incident or event that takes place. It is also used to describe a phenomenon that happens at a certain time or place. Occurrences can be anything from an unexpected event, to a natural phenomenon, to a random occurrence. Occurrences can be positive, negative, or neutral. For example, an occurrence could be a natural disaster, a momentous event such as a wedding, or a random occurrence that seems to happen out of nowhere.

In this case, we are searching for the character 'J' in the string "Albert Johnson".

We can assign the pointer returned by strchr() to the pointer "searchResult". This will assign the address of the first occurrence of 'J' in the string to searchResult.

*/

To learn more about occurrence

https://brainly.com/question/30562157

#SPJ4

How can Mario complete his task without leaving the word application?

Answers

Answer:Use the Thesaurus feature to find a synonym of the word.

Explanation:i just got the same question.

Answer:Use the Thesaurus feature to find a synonym of the word.

Explanation:

advantages and disadvantages of a watch tower​

Answers

Watchtower refer to a high place or building that give view about an area.

The Advantages of watchtower are;

Its provide a high and safe place from which someone can observe the surrounding area. In some cases, non-military towers, such as religious towers, may also be used as watchtowers.It gives overview of all the surrounding area.

Disadvantages include;

Invade of Emergency, coming done from the watchtower can be difficult. it won't be fast and easy.

What is Watchtower?

Watchtower refer to a high building built which give someone good overview of the area around the place they are guarding.

Learn more about watchtower from the link below.

https://brainly.com/question/755944

Explain something you found easy in GMetrix in preparation for the IBC. Explain something you found difficult in GMetrix in preparation for the IBC.​

Answers

When preparing for a certification exam, GMetrix is utilized to pinpoint areas that need improvement.

What is GMetrix?

GMetrix is defined as a platform for performance-based testing and exam preparation that aids in obtaining IT certification qualifications. It is intended to aid students and professionals in their certification preparation by offering practice tests.

The easy in GMetrix in preparation for the IBC is certification become easy and the difficult is that the person who are not eligible for certification also get certification.

Thus, when preparing for a certification exam, GMetrix is utilized to pinpoint areas that need improvement.

To learn more about GMetrix, refer to the link below:

https://brainly.com/question/28313092

#SPJ1

6
Select the correct answer.
Jorge needs to print out an essay he wrote, but he does not have a printer. His neighbor has a printer, but her internet connection is flaky. Jorge is
getting late for school. What is the most reliable way for him to get the printing done?
O A. send the document to his neighbor as an email attachment
О в.
share the document with his neighbor using a file sharing service
OC.
physically remove his hard disk and take it over to his neighbor's
OD. copy the document onto a thumb drive and take it over to his neighbor's

Answers

Since Jorge needs to print out an essay, Jorge should D. Copy the document onto a thumb drive and take it over to his neighbor's

What is the printer about?

In this scenario, the most reliable way for Jorge to get his essay printed would be to copy the document onto a thumb drive and take it over to his neighbor's.

Therefore, This method does not depend on the internet connection, which is flaky, and it also avoids any potential issues with email attachments or file sharing services. By physically taking the document over to his neighbor's, Jorge can ensure that the document will be printed on time.

Learn more about printer from

https://brainly.com/question/27962260

#SPJ1

Please help! ESSAY: TELESCOPES

Research the critical new developments in telescopes. Write a 200-word paper on the new developments.


OLEASE DONT EXPLAIN HOW TO DO IT, AND WRITE ME AND ACTUAL ORIGINAL ESSAY :)

Answers

Answer:

Telescopes have been used to observe space since the 1600s and have been continually improved and developed to give us a better understanding of the universe. Over the past few decades, there have been many critical new developments in telescopes that have allowed us to explore further and gain a deeper understanding of the universe.

One major development has been the use of mirrors to reflect and focus light to achieve greater magnification and resolution. This has allowed telescopes to observe distant objects in greater detail and at greater distances. Another major advancement has been the use of segmented mirror designs that allow for larger apertures and thus larger fields of view. This has allowed for greater coverage of the night sky and for more accurate observations.

In addition, the introduction of adaptive optics has allowed for telescopes to adjust their focus in real-time to compensate for atmospheric turbulence, allowing for much sharper images. Another development has been the introduction of space telescopes, allowing us to observe the universe without the interference of the Earth's atmosphere. The Hubble Space Telescope and the James Webb Space Telescope are examples of this type of telescope.

Finally, the development of space-based observatories has allowed for greater accuracy in observation than ever before. These observatories use multiple telescopes to observe a single object, allowing for greater accuracy and detail.

All of these developments have allowed us to observe the universe in greater detail and to gain a deeper understanding of its many mysteries. Telescopes have become increasingly powerful and precise, and have allowed us to explore further and deeper than ever before.

when using a(n) ____ join, only rows that meet the given criteria are returned.

Answers

the answer is "inner"

hope this helps!

where can you view detailed information about threats that have been detected on protected endpoints?

Answers

The Threats tab is a place where you can view detailed information about threats that have been detected on protected endpoints.

What is a threat tab?

The Threats tab on the Endpoint information screen allows you to view all security threats detected on a specific endpoint.

Threat detection refers to an IT organization's capacity to recognize threats to a network, its applications, or other assets with speed and accuracy. Understanding the hazards that exist in the cyber world is the first step in developing an efficient threat detection and response strategy.

Therefore, You can read comprehensive details regarding threats that have been found on protected endpoints under the Threats page.

To learn more about threat, refer to the link:

https://brainly.com/question/29941324

#SPJ1

Can someone help me please and please answer all the questions and explain :D

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

you have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. how many assignable host addresses are on each subnet?

Answers

Given a subnet mask of 255.255.255.240, this indicates that the first 28 bits of the network address are used for the network portion, and the remaining 4 bits are used for the host portion.

How to calculate the number of assignable host addresses?

To calculate the number of assignable host addresses on each subnet, we need to determine the number of host bits, which is 4 in this case. The number of assignable host addresses is calculated using the formula:

2^(number of host bits) - 2

Substituting the value of 4 for the number of host bits, we get:

2^4 - 2 = 14

Therefore, there are 14 assignable host addresses on each subnet with the given network address of 133.233.11.0 and subnet mask of 255.255.255.240.

To learn more about subnet mask, visit: https://brainly.com/question/28256854

#SPJ1

Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on the visual spectrum. B. Put text or images of one color on top of the other color. C. Find out if they are additive or subtractive colors. D. Find out the Munsell numbers of each color.

Answers

Answer:

B

Explanation:

I'll be honest, I'm not 100% sure this is correct but I'm pretty sure it is. Good Luck :)

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea

Answers

Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.

If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.

Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)):    for j in range(len(matrix[i])):        matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)):    for j in range(len(matrix[i])):        if matrix[i][j] not in d:            d[matrix[i][j]] = 1        else:            d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d:    if d[key] >= 2:        sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

Which is a factor that limits or restricts a design?


A. brainstorm

B. trade-off

C. constraint

D. process

Answers

Answer:

The answer is Brainstorm.

Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on

Write a loop that continually asks the user what pets the user has until the user enters rock in which

Answers

Loops are program statements that are repeated as long as the loop condition is true.

The loop in Python, where comments are used to explain each line is as follows:

#This initializes the number of pets to 0

count = 0

#This gets input for the pet name

pet = input("Pet: ")

#This is repeated until the user enters "rock"

while pet.lower() != "rock":

   #This increases the number of pets by 1

   count+=1

   #This prints the pet and the number of pets

   print("You have a",pet,"with a total of",str(count),"pet(s)")

   #This gets input for the pet name

   pet = input("Pet: ")

Read more about loops at:

https://brainly.com/question/19344465

Please Tell Me How To Code This

A supermarket wants to install a computerized weighing system in its produce department. This system produces a label for fruits and vegetables (see below).
Input Screen: Ask the following questions for input. You will be using the Scanner Class for this step.
- Please enter each of the following: - Date in the form of MM/DD/YY
- Description of Item (accept a string as input, but you will only print the first 3 letters from the String. Ex. Input: banana and Output: ban)
- Weight of item (accept a decimal as input)
- Price per pound if item (accept a decimal as input) o Output Screen: Print the output exactly as you see if below.
- Things to note: For the date use the replace command to replace /'s with -'s.
- The description of the item, use the substring command to print only the first 3 letters.​

Answers

The program is an illustration of string manipulations.

String manipulation involves splitting and replacing characters of a string.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    //The next two lines declare all variables, as strings and double

 String ddate,desc;

 double weight, price;

 //This creates a scanner object

 Scanner input = new Scanner(System.in);

 //This prompts the user for date, and also gets its input

 System.out.print("Date (MM/DD/YY): ");  ddate = input.nextLine();

 //This prompts the user for item description, and also gets its input

 System.out.print("Description: ");  desc = input.nextLine();

 //This prompts the user for price per pound, and also gets its input

 System.out.print("Price per pound: ");  price = input.nextDouble();

 //This prompts the user for weight, and also gets its input

 System.out.print("Weight: ");  weight = input.nextDouble();

 

 //This replaces all slashes (/) in the date by dash (-)

 ddate = ddate.replace("/", "-");

 

 //This prints the first three characters of the item description

 System.out.println("Description: "+desc.substring(0, 3));

 //This prints the date

 System.out.println("Date: "+ddate);

 //This prints the item price per pound

 System.out.println("Price per pound: "+price);

 //This prints the item weight

 System.out.println("Weight: "+weight);

 //This prints the total price of the item

 System.out.println("Total: "+(weight*price));

}

}

At the end of the program, all user inputs are printed

See attachment for sample run.

Read more about similar programs at:

https://brainly.com/question/15520075

Please Tell Me How To Code ThisA supermarket wants to install a computerized weighing system in its produce

Which technology below can be used to set up passwordless SSH logins by distributing a server SSH certificate

Answers

One technology that can be used to set up passwordless SSH logins by distributing a server SSH certificate is the SSH Public Key Authentication method.

SSH Public Key Authentication is a secure method for logging into a remote server without the need for a password. It involves the use of public-private key pairs. In this scenario, the server's SSH certificate would be generated and signed by a trusted certificate authority (CA). The server's public key would then be distributed to the clients who wish to connect to the server.

The clients would generate their own key pairs and add their public keys to the server's authorized_keys file. When a client attempts to connect to the server, the server verifies the client's identity by using the client's private key to encrypt a challenge provided by the server. If the server can successfully decrypt the challenge using the client's public key, the client is authenticated and granted access without requiring a password. This method provides a higher level of security compared to traditional password-based authentication and eliminates the need to remember and manage passwords for SSH logins.

Learn more about SSH certificate here:

https://brainly.com/question/33365211

#SPJ11

Define the term Project brief? why is it important to do planning?

Answers

Answer: the project brief is a document that provides an overview of the project.

Explanation: It says exactly what the designer, architect, and contractor needs to do to exceed your expectations and to keep the project on track with your goals and your budget.

what is pirating means in technical terms?​

Answers

Answer:

the illegal copying, distribution or use of software

Pirating refers to the unauthorized copying, distribution, or use of copyrighted material, such as software, music, movies, or books, without the permission of the copyright holder.

Here,

In technical terms pirating refers to the unauthorized copying, distribution, or use of copyrighted material.

This can include activities such as downloading or sharing copyrighted content without paying for it or using cracks to bypass licensing or copy protection mechanisms.

Pirating is considered illegal and unethical because it infringes upon the rights of the copyright holder and can result in legal consequences.

Know more about pirating,

https://brainly.com/question/29769277

#SPJ6

Given the list (7, 23, 12, 8, 5, 6), what is the order of the elements after the third insertion sort swap?

Answers

So the order of the elements after the third swap is (7, 8, 12, 23, 5, 6). Note that the 5 and 6 have not yet been sorted, since they have not yet been examined by the algorithm

in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:

Answers

in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as resource pooling.

What is computing resources?

The simplest computational resources are computation time, which is the total number of steps required to solve a problem, and memory space, which is the amount of storage used while solving a problem, although many more complex resources have been developed. An action on any legitimate input is typically used to characterize a computational problem[citation needed]. Examples of issues are "with an integer n, find whether n is prime" and "compute the product of x and y given two values" The quantity of computer resources required to solve an issue will grow as the inputs are larger. As a result, the resources required to solve a problem are stated in terms of asymptotic analysis, where the resources are determined as a function of the input's size or length.

To know more about computing resources, visit:

https://brainly.com/question/30090250

#SPJ4

Other Questions
Consider a sample of oxygen gas at 27 went a volume of 9.55L at a pressure of 2.97 atm. The pressure is changed to 8.25 atm and the gas is heated to 125. WHAtS the new volume the shape of the planets and dwarf planets after acculating all their material is? How did canals and roads help the United States grow? What is the equation of the line that passes through the point (-6,-4) and has a slope of 1/3 describe why Mao feels that China's people being "poor and blank" is a goodthing. Can someone pleaseee help me I dont know the answer Here is a table of values for y = f(x).X-5 -3 0 2 6 7 9 10 132 30 1 2 3 0 1f(x) 1Mark the statements that are true.A. The range for f(x) is all real numbers.B. The domain for f(x) is the set {-5, -3, 0, 2, 6, 7, 9, 10, 13).c. f(-3) = 2D. f(0) = 10SUBMIT Balance in Work in Process and Finished Goods Prull Company, a job-order costing firm, worked on three jobs in July. Data are as follows: Job 86 Job 87 $21,370 $10,360 $15,960 Balance, July 1 Direct materials $6,190 $12,230 $16,170 Direct labor $12,280 $23,910 Machine hours 500 300 1,020 Overhead is applied to jobs at the rate of $15 per machine hour. By July 31, Jobs 86 and 88 were completed. Jobs 82 and 86 were sold. Job 87 remained in process. On July 1, the balance in Finished Goods was $49,010 (consisting of Job 82 for $25,620 and Job 84 for $23,390). Job 88 Prull prices its jobs at cost plus 30%. During July, variable marketing expenses were 5% of sales, and fixed marketing expenses were $1,970; administrative expenses were $4,760. (Round all amounts to the nearest dollar.) Required: Balance, July 11 Direct materials Direct labor Applied overhead $0 1. Prepare job-order cost sheets for all jobs in process during July, showing all costs through July 31. All amount cells must have an entry; enter zeros as needed. Prull Company Job-Order Cost Sheets For the Month of July Job 86 Job 87 Job 88 1. Prepare job-order cost sheets for all jobs in process during July, showing all costs through July 31. All amount cells must have an entry; enter zeros as needed. Prull Company Job-Order Cost Sheets For the Month of July Balance, July 1 Direct materials Direct labor Applied overhead Total Job 86 Job 87 Job 88 2. Calculate the balance in Work in Process on July 31. The balance in Work in Process on July 31 is s 3. Calculate the balance in Finished Goods on July 31. The balance in Finished Goods on July 31 is $ 4. Calculate Cost of Goods Sold for July. The cost of goods sold for July is s 5. Calculate operating income for Prull Company for the month of July. The operating income for the month of July is $ The hypothalamus monitors the availability of nutrients and water a doctor sees a patient who has kidney failure, lack of motor coordination, and a poorly functioning nervous system. after testing the doctor finds that these symptoms are all related to a chronic lack of energy in some of the patients cells. the doctor diagnoses a metabolic disorder known as leigh's disease. Based on evidence a malfunction in what organelle is most likely responsible for leighs disease? 1) 1) The centromere is a region in which A) new spindle microtubules form at either end. B) chromosomes are grouped during telophase. the nucleus is located prior to mitosis. D) chromatids remain attached to one another until anaphase. E) metaphase chromosomes become aligned at the metaphase plate. 2) 2) If there are 20 chromatids in a cell, how many centromeres are there? A) 80 B) 10 C) 30 D) 40 E) 20 3) 3) Which is the longest of the mitotic stages? A) anaphase B) telophase prometaphase D) metaphase E) prophase 4) 4) A cell containing 92 chromatids at metaphase of mitosis would, at its completion, produce two nuclei each containing how many chromosomes? A) 92 B) 16 C) 23 D) 46 E) 12 5) Cytokinesis usually, but not always, follows mitosis. If a cell completed mitosis but not cytokinesis, 5) the result would be a cell with A) two nuclei but with half the amount of DNA. B) a single large nucleus. two nuclei. D) two abnormally small nuclei. E) high concentrations of actin and myosin. 6) The formation of a cell plate is beginning across the middle of a cell and nuclei are re-forming at opposite ends of the cell. What kind of cell is this? A) an animal cell undergoing cytokinesis B) an animal cell in telophase C) an animal cell in metaphase D) a plant cell undergoing cytokinesis E) a plant cell in metaphase 7) 7) Chromosomes first become visible during which phase of mitosis? A) metaphase B) prometaphase 9) telophase D) prophase E) anaphase Which equation best represents the axis of symmetry? F y = 6 G X= 2 Hy = 4 J x = 0 The acceleration of gravity is 9.8 m/s2. What would the force of gravity be if the mass of an object is 4.5 kg? What is the slope of the line that passes through these two points?(1,-2)(3,4) the case of lia lee is significant for medical anthropologists because: Which of the following resources could be a good place to start if you are researching case law? (Select all that apply.)-The website of the court where the decision was made.-Annotated codes for the law the case deals with.-Legislative history of the law the case deals with.-The daily Federal Register (multiple choice) Which words from the passage are a good example of direct characterization?I lazily flipped through the pages of my textbookToo bad I cant be more like my brotherHe is very studious and a bit of a perfectionistI am much more likely to spend my time daydreaming a capacitor consists of two conductors, usually referred to as plates separated by an insulator called the ? . What effect does the first-person point of view of "The Yellow Wallpaper" most likely have on the reader? Which website is least likely to provide reliable information about rainforests in Costa Rica? http://www.rainstudies.edu/http://www.CRforest.org/http://www.rainforests.com/http://www.costarica.gov/