Yesterday, you created a new swap area for your system. Today, after rebooting the system, you find that the swap area is not mounted. What should you

Answers

Answer 1

Answer:

You should recreate your swap mount and save it so it does'int go anywhere and u can have it for another day

Explanation:


Related Questions

calculator and clocks are examples of -------------- in windows 7


please answer fast. ​

Answers

Utilities (not sure)

the word item referred to as a: A.value B.label C.Formula​

Answers

I think it’s C If wrong I’m sorry

Which of the following statements is true of sans serif fonts?
A. Sans serif fonts provide a more creative look.
O B. Sans serif fonts are more decorative with additional curls and
loops.
C. Sans serif fonts set a more inviting and comforting tone.
D. Sans serif fonts are easier to read on a computer screen.

Answers

Answer:

The answer is D

Explanation:

I got it right

The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.

What is font?

The word font is known to be a kind of different  printable text characters. e.g. f sans serif fonts

Based on the above, The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.

Learn more about fonts from

https://brainly.com/question/1991747

#SPJ 2

what is the computational complexity of the recursive factorial method?

Answers

The recursive factorial method has a computational complexity of O(n), which means that it grows linearly with the size of the input. This is because each recursive call of the factorial function multiplies the current value by one less than the current value until it reaches 1

so it takes n multiplications to compute the factorial of n. In other words, the number of operations required to compute the factorial of n using the recursive method is proportional to n. This makes the recursive method less efficient than the iterative method for computing factorials, which has a computational complexity of O(1) because it only requires a fixed number of operations (n multiplications) regardless of the input size. However, the recursive method is often more intuitive and easier to understand, especially for small inputs.

To know more about computational visit:

https://brainly.com/question/31064105

#SPJ11

what permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

Answers

The permission that grants a user the ability to open, read, and edit the contents of a file when assigned to a file is known as the Read-Write (RW) permission.

The RW permission grants a user the ability to open, read, and edit the contents of a file. In addition to that, there are two more permissions: Read-Only (RO) and Write-Only (WO) that assign certain levels of permissions to users or groups.

However, the Read-Write permission is the most common permission for users when they work with files or folders.

This permission grants the user the ability to create and modify the contents of the file. The user is allowed to view and read the contents of the file, but they are also allowed to make changes to the file, save them, and exit.

The Read-Write permission is commonly given to users who need to create, edit, and save documents, such as writers, editors, and programmers.

In conclusion, the permission that grants a user the ability to open, read, and edit the contents of a file when assigned to a file is the Read-Write (RW) permission.

Learn more about permission at: https://brainly.com/question/31229331

#SPJ11

the first step in the sdlc is to define the problems to be addressed by the it system, examine different alternatives, and report the findings. this is called the step.

Answers

The first step in the SDLC is to define the problems to be addressed by the IT system, examine different alternatives, and report the findings. This is called the analysis step.

What is SDLC?

The SDLC, or Systems Development Life Cycle, is a methodology for developing software applications. The Systems Development Life Cycle is a systematic approach to software development. This approach entails many stages, each with its objectives and outcomes. The five phases of the SDLC are planning, analysis, design, implementation, and maintenance. The analysis step is the second phase of the SDLC.

What happens in the analysis stage of the SDLC?

The analysis step of the SDLC is where the development team examines the requirements gathered in the planning stage. The goal of the analysis phase is to comprehend the organization's requirements and objectives for a new system, as well as to determine whether or not a new system is required. The team examines current systems, identifies issues, and proposes potential solutions during the analysis phase. They are essentially analyzing the gathered requirements and evaluating them against the existing system to determine whether the suggested solution is feasible or not. The analysis stage of the SDLC concludes with a report summarizing the findings, and the team makes a recommendation on whether to proceed with the next phase or abandon the project.

Learn more about Systems Development Life Cycle here: https://brainly.com/question/14143685

#SPJ11

the java compiler requires that your program handle which type of exceptions?

Answers

The Java compiler requires that your program handle checked exceptions, which are exceptions that the compiler knows might occur and therefore requires you to handle in your code using try-catch blocks or declaring the exception to be thrown in the method signature. Unchecked exceptions, on the other hand, do not need to be explicitly handled in your code.

Software that can convert a developer's Java source code into a platform-independent Java file is known as a Java compiler. The Java Programming Language Compiler (javac), the GNU Compiler for Java (GCJ), the Eclipse Compiler for Java (ECJ), and Jikes are all examples of Java compilers.

Programmers can seamlessly write, run, debug, and share code snippets thanks to Scaler Topics' online compiler's support for the most recent Java versions.

It is one of the most vigorous and simple to-utilize Java online Compilers. We set out to make the best online Java compiler because it is easy to use, has a lot of features for new Java programmers, and we wanted to make it easy to use.

Know more about java compiler here:

https://brainly.com/question/30758428

#SPJ11

Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Your algorithm must locate a pair of values in the list N that sum to the value SUM. For example, if your list of values is 3, 8, 13, 2, 17, 18, 10, and the value of SUM is 20, then your algorithm would output either of the two values (2, 18) or (3, 17). If your algorithm cannot find any pair of values that sum to the value SUM, then it should print the message ‘Sorry, there is no such pair of values’. Schneider, G.Michael. Invitation to Computer Science (p. 88). Course Technology. Kindle Edition.

Answers

Answer:

Follows are the code to this question:

def FindPair(Values,SUM):#defining a method FindPair  

   found=False;#defining a boolean variable found

   for i in Values:#defining loop for check Value  

       for j in Values:#defining loop for check Value

           if (i+j ==SUM):#defining if block that check i+j=sum

               found=True;#assign value True in boolean variable

               x=i;#defining a variable x that holds i value

               y=j;#defining a variable x that holds j value

               break;#use break keyword

       if(found==True):#defining if block that checks found equal to True

           print("(",x,",",y,")");#print value

       else:#defining else block

           print("Sorry there is no such pair of values.");#print message

Values=[3,8,13,2,17,18,10];#defining a list and assign Values

SUM=20;#defining SUM variable

FindPair(Values,SUM);#calling a method FindPair

Output:

please find the attachment:

Explanation:

In the above python code a method, "FindPair" is defined, which accepts a "list and SUM" variable in its parameter, inside the method "found" a boolean variable is defined, that holds a value "false".

Inside the method, two for loop is defined, that holds list element value, and in if block, it checks its added value is equal to the SUM. If the condition is true, it changes the boolean variable value and defines the "x,y" variable, that holds its value. In the next if the block, it checks the boolean variable value, if the condition is true, it will print the "x,y" value, otherwise, it will print a message.  
Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well

What is a System software that serve as a platform/supports other programs/software in a computer system

Answers

Answer:

Operating system.

Explanation:

An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.

What are advantages of lookup fields? check all that apply. Shorter reports simpler queries easier data entry acceptable values fewer misspellings.

Answers

Easier data entry, acceptable values, fewer misspellings are advantages of lookup fields.

What is lookup fields?

A field in a table called a "lookup field" is one whose value is obtained from another table or query. The Lookup Wizard should always be used to create a lookup field.

                  The Lookup Wizard streamlines the procedure and automatically sets the relevant field characteristics and table associations.

What is lookup field how is it used?

Two records can be linked together in a relationship using lookup fields. An account lookup field, for instance, is present in a contact record and links the contact to its account.

                         Simplest vertical and horizontal lookups can be done using Excel's LOOKUP function. Excel offers LOOKUP in both vector and array formats.

Learn more about lookup field

brainly.com/question/16220655

#SPJ4

What is Digital Etiquette? Explain in your own words

Answers

Answer:

rules about the best way to communicate

Explanation

rules about being proper and polite

rag the terms on the left to the appropriate blanks on the right to complete the sentences. ResetHelp 1. An enzyme is considered a(

Answers

An enzyme is considered a catalyst because it facilitates and speeds up chemical reactions without being consumed or permanently altered in the process.

What is the role of an enzyme in chemical reactions?

An enzyme is considered a catalyst because it facilitates and speeds up chemical reactions without being consumed or permanently altered in the process. Enzymes are typically proteins that act as biological catalysts in living organisms. They work by lowering the activation energy required for a reaction to occur, thereby increasing the rate of the reaction.

Enzymes achieve this by binding to specific molecules called substrates and converting them into products. The substrates bind to the enzyme's active site, which has a unique shape that complements the shape of the substrates. This specific interaction between the enzyme and substrate allows for efficient catalysis.

Enzymes are highly specific and typically work on a particular type of substrate. Additionally, factors such as temperature, pH, and enzyme concentration can influence the activity of enzymes.

Learn more about An enzyme

brainly.com/question/31385011

#SPJ11

Under which tab would you look to find the Show in Groups and advanced sort options for messages in Outlook?

File
Folder
Home
View

Answers

Anwers: please explain more

Answer:

Its View

Explanation:

which button is used to run the program in QBASIC

Answers

Answer:

S key

Explanation:

(Alternative) Hit the S key (or just hit Enter) to run the program. The menu shows shortcuts to do the same thing, Shift+F5 or just F5 alone. The program runs: Since the program was run once before, the first output (the first "Hello") remains on the screen.

the property in css used to change the background colour of an element is

Answers

Answer:

background-color property

The background-color property in CSS is used to specify the background color of an element. The background covers the total size of the element with padding and border but excluding margi

Explanation:

Answer:

CSS | background-color Property. The background-color property in CSS is used to specify the background color of an element. The background covers the total size of the element with padding and border but excluding margin. It makes the text so easy to read for the user.

Explanation:

What is a typically widely used boot method for several devices at once?

a. hhd

b. fdd

c. optical

d. network / pxe

e. usb

Answers

The typically widely used boot method for several devices at once is **network/PXE boot** (Preboot Execution Environment). Network/PXE boot allows multiple devices to boot up and load their operating systems or other software over a network connection.

It is commonly used in large-scale IT environments where administrators need to deploy operating systems or software to multiple computers simultaneously, such as in enterprise settings or educational institutions.

With network/PXE boot, a central server hosts the necessary boot files and operating system images. The client devices, upon booting, send out a request to the network server, which responds by providing the required boot files and instructions. This allows the devices to boot directly from the network instead of relying on local storage devices like hard drives (HDD), floppy disk drives (FDD), optical drives, or USB devices.

Network/PXE boot offers several advantages. It simplifies the deployment and management of software across multiple devices as administrators can centrally control the boot process and software distribution. It also eliminates the need for physical installation media on each device, reducing costs and maintenance efforts. Additionally, network/PXE boot allows for faster and more efficient provisioning and imaging of new devices or operating system updates.

In summary, network/PXE boot is a commonly used method for simultaneously booting multiple devices over a network connection. It streamlines software deployment, reduces dependency on local storage devices, and enables efficient management of large-scale computing environments.

Learn more about Network/PXE boot here:

https://brainly.com/question/14409955

#SPJ11

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

Will give brainliest help asap

Will give brainliest help asap

Answers

Answer:

Axure

Explanation:

It is used to prototype or storyboard things.

A network configuration in which connected devices are located in close proximity is called a _____________

Answers

LAN
Local Area Network
A network of devices connected close together over a small geographical are (locally)

A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths​ (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative​ hypothesis, test​ statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative​ hypotheses

Answers

Answer:

The answer is:

\(H_0:\mu=2.2\\H_1:\mu> 2.2\)

Explanation:

\(H_0:\mu=2.2\\H_1:\mu> 2.2\)

The test value of statistic t= \(\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}\)

                                               \(=\frac{2.31688-2.2}{0.206915}\\\\=0.56\)

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.

Choose the assistive technology that best completes each sentence.(a screen reader / Text-to-speech / alternate text)refers to the short descriptions of images added by developers that can then be read by a(n)(a screen reader / Text-to-speech / alternate text)application, to convey visual content to users who are visually impaired.

Answers

Answer:

The answer are for the first one is Alternative text

The second one is screen reader

Explanation:

Hope i helped :)

a. Determine the due date of the note: b. Detemine the autunty value of the note: c?. Journalize the entry co record the recept of payment of the note at maturity. If an amount box does not require an entry, leave it Elana:

Answers

The note is due 120 days from April 11. The maturity value of the note is $4,000 plus any interest accrued.

a. To determine the due date of the note, we add 120 days to the date of April 11. Since we assume a 360-day year for calculation purposes, the due date would be August 9.

t. The maturity value of the note is the principal amount plus any interest accrued. In this case, the principal amount is $4,000.

C1. The entry to record the receipt of the note by Zebra Furniture Company would involve debiting Notes Receivable and crediting Accounts Receivable. Since no specific amount is mentioned for the note, we'll assume it is for the full amount of $4,000. The journal entry would be:

Debit: Notes Receivable  $4,000

Credit: Accounts Receivable  $4,000

C2. The entry to record the receipt of payment of the note at maturity would involve debiting Cash and crediting Notes Receivable. Assuming the full payment of $4,000 is received, the journal entry would be:

Debit: Cash  $4,000

Credit: Notes Receivable  $4,000

To learn more about maturity value visit:

brainly.com/question/9099365

#SPJ11

The complete question is:<Entries for Notes receivable

Autumn Designs & Decorators sued a 120-day, Hote for $4,000, dated April 11 to Zebra Furniture Company on account. Assume 360-dent Shiro calculating omnibus.

a. Determine the due date of the note

t. Determine the maturity value of the note

C1. Journalize the entry to record the receipt of the note by Zebre time. If an amount box does not require an entry, leave it blank.

C2. Journalize the entry to record the receipt of payment of the note at maturity If an amount box does not to require an entry leave it blank.>

You are the IT administrator for a small corporate network. The computer in Office 2 recently failed, and you replaced the hard drive. You would like to download and re-image the workstation from the network. In this lab, your task is to complete the following: Turn on the computer in Office 2.
Configure the Integrated NIC in the BIOS for PXE.
Boot the computer and install the Window 10 image.
Verify that the new image is working on Office2.

Answers

To activate the Office 2 computer, confirm its secure connection to a power supply and press the power switch.

What next should be done?

After turning on the computer, you can enter the BIOS configuration by pushing the assigned button (typically Del, F2, or F10) while the system boots up.

Find the Integrated NIC setup in the BIOS and select the option to boot from PXE. Record the modifications and depart from the BIOS settings.

The network will now be used for booting the computer and commencing the process of installing the Windows 10 image. Once the installation process is completed, it is essential to confirm that the new image is functioning accurately on Office 2

Read more about IT admin here:

https://brainly.com/question/30456614

#SPJ1

Rate these 3 fnaf characters from 1-3 tell me who you find the scariest as well
MICHEAL AFTON CIRCUS BABY GOLDEN FREDDY

Answers

Answer:

Golden Freddy is the scariest in my opinion

Answer:

Micheal Afton=3/3

Circus Baby=3-3

Golden Freddy=2/3

In my opinion, I'd say Circus Baby because of how her voice sounds like.

Produce a function with the following specifications:
NAME: cheby PolyAppx_########
INPUT: f, N, TOL, intTOL, depth
OUTPUT: A
DESCRIPTION: The vector A contains the N + 1 Chebyshev coefficients for f, found using the your adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL.1-TOL).

Answers

The main answer to the given question is to produce a function named "chebyPolyAppx_########" that takes inputs f, N, TOL, intTOL, and depth and returns a vector A containing the N + 1 Chebyshev coefficients for f. The function utilizes the adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL, 1-TOL).

What is the role of the adaptSimpsonInt algorithm in approximating the coefficients, and how does the tolerance intTOL and adaptive depth 'depth' affect the accuracy of the approximation?

The given question requires the implementation of a function that calculates the Chebyshev coefficients for a given function f. The function takes inputs such as the number of coefficients N, tolerances TOL and intTOL, and the adaptive depth 'depth'. The adaptSimpsonInt algorithm is utilized to numerically integrate the function and approximate the coefficients. The tolerance intTOL controls the accuracy of the integration, while the adaptive depth 'depth' determines the number of recursive subdivisions performed by the algorithm. The resulting Chebyshev coefficients are stored in the vector A. Understanding the implementation details, the role of the algorithm, and the impact of the input parameters on the approximation accuracy is crucial for effectively using the function.

Learn more about adapt

brainly.com/question/30584720

#SPJ11

Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest). Ex: If the input is: 10 -7 4 39 -6 12 2 the output is: 2 4 10 12 39

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

   int a[]={10,-7,4,39,-6,12,2};//defining single deminition array and assign value

   int i,x,j,t; //defining integer variable

   cout<<"Before sorting value: ";  

   for(i=0;i<7;i++) //using loop to print value

   {

       cout<<a[i]<<" ";//print value

   }

   cout<<endl <<"After sorting value: ";

   for(i=0;i<7;i++)//defining loop to sort value

{  

 for(j=i+1;j<7;j++)//count array value

 {

  if(a[i]>a[j]) //defining condition to inter change value

  {

      //performing swapping

   t=a[i];  //integer variable t assign array value

   a[i]=a[j];//swapp value

   a[j]=t;//assign value in array

  }

 }

}

for(i=0;i<7;i++) //defining loop to print value

   {

       if(a[i]>=0) //defining condition to check positive value  

       {

       cout<<a[i]<<" ";//print value

       }

   }

   return 0;

}

Output:

Before sorting value: 10 -7 4 39 -6 12 2  

After sorting value: 2 4 10 12 39  

Explanation:

Following are the description to the above code:

In the above program code, Inside the main method, an array a[] is declared that assign some value, and another integer variable "i, j, x, and t" is declared, in which variable "i and j" are used in the loop, and "x, t" is used to sort value.In the next step, three main for loop is declared, in which the first loop is used to print array value.In the second loop, inside another loop is used that sorts array values.In the last loop, a condition is defined, that check the positive value in the array and print its values.

Answer:

integers=[]

while True:

      number=int(input())

      if number<0:

       break

      integers.append(number)  

print("",min(integers))

print("",max(integers))

Explanation:

Type the correct answer in the box. Spell all words correctly.
Which type of cable would a network company lay if it wants to provide fast connectivity without electrical interference?
The company should use (blank) cables to provide fast connectivity without electrical interference.

Answers

Answer:

network cables also plz mark as brainly would really help

Explanation:

The type of cable that a network company can lay if it wants to provide fast connectivity without electrical interference is network cable.

What is network cable?

Networking cables are known to be tools that are used in networking hardware so that they can be able to connect one network device to another.

Note that The type of cable that a network company can lay if it wants to provide fast connectivity without electrical interference is network cable.

Learn more about cables from

https://brainly.com/question/14705070

#SPJ2

1936 - alan turing proposes the turing machine, which becomes the foundation of computer science. this theoretical computing machine laid the groundwork for modern digital computers and their programming
T/F

Answers

True.

Alan Turing proposed the Turing machine in 1936, which became the foundation of computer science and laid the groundwork for modern digital computers and their programming.

Is it true that Alan Turing's proposal of the Turing machine in 1936 became the foundation of computer science?

True. In 1936, Alan Turing introduced the concept of the Turing machine, a theoretical computing device that revolutionized the field of computer science. The Turing machine provided a formal model for how a computer could perform computations and manipulate data. It consisted of a tape divided into cells, a read/write head that could move along the tape, and a set of rules governing its behavior.

The significance of the Turing machine lies in its ability to simulate any algorithmic process. By demonstrating that a universal machine could execute any well-defined computational task, Turing laid the groundwork for the development of modern digital computers and their programming. His work marked a fundamental shift in the understanding of computation, moving it from a mechanical process to a conceptual one.

Learn more about Alan Turing

brainly.com/question/31755330

#SPJ11

exercise 4.2.2: under what circumstances (regarding the unseen attributes of studios and presidents) would you recommend combining the two entity sets and relationship in fig. 4.3 into a single entity set and attributes?

Answers

The studios and presidents overlap and can be used to accurately identify or differentiate between them, then it would be beneficial to combine the two entity sets and relationships into a single entity set and attributes.

What is the attributes ?

Attributes are characteristics or qualities that describe an individual, object, or phenomenon. In computing, attributes are used to describe data and objects. For example, a file can have attributes such as name, size, type, and date created. In databases, attributes are often referred to as fields or columns and describe the properties of data stored in a table. In object-oriented programming, attributes are features of a class or object that store values. Attributes may also be used to describe people or entities; such as eye color, age, gender, or height. Attributes are used to provide descriptive information and can be used to identify or classify objects.

To learn more about attributes

https://brainly.com/question/29796714

#SPJ4

The Excel application is used to create

A) networks

B) spreadsheets

C) Web pages

D) flyers

Answers

Answer:

a

Explanation:

aaaaaaaaaaaaaaa

Other Questions
who was the only president to be unanimously elected? : Calculate the molarity of a solution prepared by diluting 165 mL of 0.688 M calcium chloride to 925.0 mL. 0.123 M 0.222 M 3.86 M 0.114 M 0.743 M a(n) is a document that outlines what needs to be in place and what processes are necessary if an emergency such as a hurricane or fire occurs at a business. disaster recovery plan data security plan archiving plan data backup plan 20 POINTS!!!!!!!!!! will give brainliestA requirements document is created during the _____ phase of software development. CodingPlanningReleaseDesign when the fact-finder refuses to find guilt despite the evidence it is called: magazines targeted to people who love in-line skating, people who enjoy cooking, or people who prefer living more simply use ________ segmentation variables. Insecure but I'm working with itMany things that I could get rid ofAin't about to give it upI made a few mistakes, I regret it nightlyI broke a couple hearts that I wear on my sleeveMy mama always said, girl, you're troubleAnd now I wonder, could you fall for a woman like meAnd every time we touch, boy, you make me feel weakI can tell you're shy and I think you're so sweetSpending every night under covers andStill I wonder, how could you fall for a woman like me (A woman) Answer and explanation Use substitution: y = 2x and x + y = 9* which material will correctly complete the chart A person's reaction to problems, demands, and dangers is influenced by a(n) _____ response. I really need help on all of them, I will give out brainliest to one answer and ten points to both The price of gas on Wednesday was 52.03/gallon. On Friday, the price of gas was $2.26. What is the percent change in the price of gas? Which prominent statesman served as the first general of the edo shogunate. What is the central idea of this passage the animal Cannot believe? Susan is studying the morality of taking terminally ill patients off life support. After thorough research and consideration of many different views, she argues that doctors have a moral obligation to use whatever means are available to preserve a patient's life. Which step of philosophical inquiry has Susan done PLEASE HELP ME!!! watch this video and then answer these questions below: https://youtu.be/bKgIoFzbrKg1. What is the girl's name in the video and where is she from?2. What does her everyday life involve?3. What is her favourite part about ceremonies?4. What instrument would she like to play?5. What does her grandmother do? True or False, 15%-54% of errors reported from primary care practices are related to the testing process. what is the slope of y=17x+43 Explain what the biosphere is