1) If it takes your computer 2 hours to complete a process requiring 3TB of memory, how fast is your dada processing speed in KB per second

2) You are comparing two computerized devices to determine which to buy. You like downloading 30 MB songs. How many full songs will a device with 8GB storage hold

we are supposed to use the cancelling method thing or whatever

Kilobyte=KB=1024 bytes
megabyte=MB=1024 KB
gigabye=GB=1024 MB
terabyte=TB=1024 GB

Answers

Answer 1

If it takes a computer 2 hours to complete a process requiring 3TB of memory, the data processing speed in KB per second is: 416667KB/Second.

What is the justification for the above answer?

Since our answer must be in KB/Sec, hence we first convert our data in to KB and Seconds.

Given the above conversion table,

3TB  = 3 x 10⁹ or 3000000000 kb

2 hours = 7200 seconds

Hence,

Processing speed in KB/sec

= 3000000000/ 7200

= 416666.666667

\($\approx$\) 416667KB/Second

If one likes downloading 30 MB songs. How many full songs will a device with 8GB storage hold?

8GB = 8000megabyts

Hence,

a device with 8,000 megabytes will contain:

8000/30

= 266 songs.

Learn more about Data Processing Speed:
https://brainly.com/question/14515121
#SPJ1


Related Questions

Give an example of a class and an example of an object. Describe what a class is, what an object is, and how they are related. Use your examples to illustrate the descriptions.

Answers

Answer:

Science. Science is where you learn about the worlds enviroment.

Book. A Book is a object that has words in it that you can read. It has sometimes thick pages or thin pages.

hgffhfhnhnfhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnny

Answers

Answer: yeah, I know right?

Explanation: totally get you

This is the hardest question I’ve encountered, I believe the answer is apples

What is one way that Accenture can ensure that the Cloud is secure for a client?

Answers

One of the ways through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

What is a cloud?

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources (physical hardware) through virtualization and over the Internet, so as to enable the storage of files and documents virtually.

In this context, a way through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

an example for Shareware?

Answers

a software that is free of cost for a certain amount of time such as Adobe programs, or Winzip.

Answer:

WinZip, GetRight ,Adobe Acrobat 8 Professional.

Which describes a market research report? Select all that apply.
A record of customer names
A summary of consumer buying behaviors
A projection of future consumer buying behaviors
An analysis of consumer interests

Which describes a market research report? Select all that apply. A record of customer names A summary

Answers

Answer:

A projection of consumer buying behaviors prediction comes in various ways. It can be through collecting information through primary or secondary research such as analyzing online actions, feedback analysis, focus groups, conversational marketing, and more.

1. What do you understand by the term Integrated Circuit? ». Describe the following widely used IC's: (i) Logic Gate IC (ii) Timer IC (iii) Operational Amplifier . State three (2) Advantages and two (2) Disadvantages of Integrated Circuit. 1. Design a logic circuit that has three inputs A, B and C, and whose output will be high only when a majority of the inputs is high Show that: (i) A+ A' B = A + B (ii) (A + B) (A + B) = A​

Answers

An integrated circuit (IC) is a miniaturized electronic circuit consisting of transistors, resistors, capacitors, and other components connected together to perform a specific function.

What is electronic circuit?

An electronic circuit is an interconnected network of electronic components, such as resistors, transistors, capacitors, inductors and diodes, that allows the flow of electrical current. These components are connected together with conductive wires, which allow the electrical energy to be transferred from one component to another.

(i) Logic Gate IC: A logic gate IC is an integrated circuit that performs logical operations.

(ii) Timer IC: A timer IC is an integrated circuit that provides digital timing signals for the control of electronic devices.

(iii) Operational Amplifier: An operational amplifier (op amp) is an integrated circuit that amplifies electrical signals.

Advantages of Integrated Circuits: Small size and low cost: Integrated circuits can pack a large number of components into a small space, resulting in lower costs, Improved performance.

To learn more about electronic circuit

https://brainly.com/question/24167692

#SPJ1

Ethics in Al can contribute toward social progress and boost positive changes in society. Which aspect should be removed to achieve this change society ?
A. safety
B. management
C. bias
D. law

Answers

Answer: Hayaa~!

The answer is: . c. bias

Is known when someone purposefully biased an answer towards what they belive or think, this can be avoided by not asking them about topics that we firmly believe they are biased.

Explanation: I took the test

Hope this Helps

-Aaden<3

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

Previous
15
Next →
Pretest: Data Representation and Execution
Submit Test
Reader Tools
15
Drag each label to the correct location on the image.
Drag each logic gate name to its corresponding truth table.
XOR
NAND
NOR
OR
А
B
Output
А
B
Output
A
B
Output
А
B
Output
0
0
0
0
1
0
0
1
0
0
0
0
1
1
0
1
1
0
1
0
1
1
1
0
1
1
1
o
0
0
0
1
1
1
1
1
1
1
1
1
0
0
1
1
0
Reset
Next

Answers

Answer:

A b output 0110111111001111

Uses of browser extensions include: Select all that apply. A. blocking ads B. reformatting a hard drive C. translating web pages D. tracking online orders

Answers

Answer:

B. reformatting a hard drive

Explanation:

Browser extension is defined by its characteristics or ability to modify a web browser to users' taste. It is often considered as a software module which is a source code. It serves a lot of purposes some of which includes:

1. It serves as a keylogger to save users sensitive information like passwords on a website.

2. It can be used for ad inclusion and ad blocking on website pages. average.

3. It can assist in redirecting online search traffic elsewhere.

4. It can also track online activities such as transactions.

Hence, in this case, the correct answer is "option B. reformatting a hard drive."

A Browser Extension is known to be a little software module. It is used for blocking ads.

What are the uses of browser extensions?

A browser extension is known as a software that allow different kinds of extensions. It helps in;

The user interface modifications.Cookie management, ad blocking.The custom scripting and styling of web pages. etc.

They are known to be designed to boast user experience in a web browser when using web apps.

Learn more about browser extensions from

https://brainly.com/question/4116298

Which type of webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed?a. automatic b. responsive c. adjustable d. relative

Answers

Answer:

C

Explanation:

FJH GGSGUXH YZUDYFZ GSUFZD. DHUF

In programming 5/2 is an example of what math?

Answers

Answer:

division

Explanation:

/ in programming language is divide ÷

Division because / means to divide


Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at
your school.

Answers

Answer: You don't want to download any virus and Chat rooms with stranger can be harmful

Explanation: You can get a virus on your school device, get yourself in harmful situations and your passwords might not be safe

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

What is one sign that inflation is happening?

Answers

Answer:Gas prices. You're welcome.Explanation:

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

At which point should a user select the option to make a delegate aware of permissions?
in the message body after selecting the recipient
after configuring the permissions in the dialog box
before assigning the permissions in the delegate dialog box
in the user’s contact information by clicking Send Permissions

Answers

Answer:

after configuring the permissions in the dialog box

Explanation:

Answer:

B) after configuring the permissions in the dialog box

Explanation:

Just got it right

please what are stands in computing

Answers

IT is a broad professional category that includes functions such as building communication networks, protecting knowledge / analysis, and troubleshooting computer problems.

What is Information technology?

Building communication networks for a company, safeguarding data and information, generating and prescribing databases, assisting employees with computer or mobile device problems, or performing a variety of other tasks to ensure the efficiency and security of business information are all examples of information technology.

The use of hardware, software, assistance, and successfully applied to manage and deliver information via voice, data, and video is referred to as information technology.

Thus, IT stands for information technology.

For more details regarding information technology, visit:

https://brainly.com/question/14426682

#SPJ1

Your question seems incomplete, the complete question is:

What does IT stands in computing?

I hope The characters That I want in Mortal kombat 12 is Lori and peron That’s My character wishlist in The next Mortal kombat game To be in The roster

Answers

Answer:

not sure how to answer but cool bro

Explanation:

Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?

Answers

To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.

How to calculate

To calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.

Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.

Therefore, we need 2 subnet bits.

Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.

Read more about subnet mask here:

https://brainly.com/question/28390252

#SPJ1

Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb

Answers

To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:

1. S → SS | AB | B

2. A → AA

3. A → a

4. B → bBb | bb | ε

5. C → CC | a

6. D → aC | bb

Explanation:

1. The production S → SS has been retained as it is.

2. The production A → aAAa has been split into A → AA and A → a.

3. The production B → bBb has been split into B → bB and B → b.

4. The production B → bb has been kept as it is.

5. The production B → ε (empty string) has been denoted as B → ε.

6. The production C → CC has been retained as it is.

7. The production C → a has been kept as it is.

8. The production D → aC has been kept as it is.

9. The production D → bb has been kept as it is.

In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.

For more questions on parsing, click on:

https://brainly.com/question/13211785

#SPJ8

Answer:

Explanation:

To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:

Step 1: Eliminate ε-productions (productions that derive the empty string).

Step 2: Eliminate unit productions (productions of the form A → B).

Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.

Step 4: Convert terminals in remaining productions to new non-terminals.

Step 5: Ensure all productions are in the form A → BC (binary productions).

Applying these steps to the given grammar:

Step 1: Eliminate ε-productions

The given grammar doesn't have any ε-productions.

Step 2: Eliminate unit productions

The given grammar doesn't have any unit productions.

Step 3: Convert long productions

S → SS (Remains the same)

S → AB

A → aAAa

B → bBb

B → bb

C → CC

C → a

D → aC

D → bb

Step 4: Convert terminals

No changes are needed in this step as all terminals are already in the grammar.

Step 5: Ensure binary productions

The given grammar already consists of binary productions.

The converted grammar in Chomsky Normal Form (CNF) is:

S → SS | AB

A → aAAa

B → bBb | bb

C → CC | a

D → aC | bb

Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

it is the process of combining the main document with the data source so that letters to different recipients can be sent​

Answers

The mail merge is  the process of combining the main document with the data source so that letters to different recipients can be sent​.

Why is mail merge important?

Mail merge allows you to produce a batch of customised documents for each recipient.

A standard letter, for example, might be customized to address each recipient by name.

The document is linked to a data source, such as a list, spreadsheet, or database.

Note that Mail merge was invented in the 1980s, specifically in 1984, by Jerome Perkel and Mark Perkins at Raytheon Corporation.

Learn more about mail merge at:

https://brainly.com/question/20904639

#SPJ1

What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point

Answers

Answer:

A plus sign

Explanation:

EDGE 2021

Answer: or in other words B

Explanation: on edg hop this helps

As the complexity of a network increases, the possibility of security breaches decreases. is this true or false

Answers

As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

What is the complexity of a network?

Network complexity is known to be a term that connote the series of nodes and alternative paths that is said to often exist inside of a computer network.

A network is seen to be complex due to the nature of its functions as it is known to be often multipurpose in nature.

It is one that is seen as the different kinds  of communication media, communications equipment, as well as the protocols, hardware and software applications that can be located in the network.

Therefore, As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

Learn more about security breaches from

https://brainly.com/question/24956493
#SPJ1

16 Select the correct answer. Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is this? ОА. NIC B. hub C. modem D. switch E. bridge Reset Reset Next​

Answers

Answer:D. switch

Explanation:cause it is

You have searched a database to locate US cities with population counts above 1 million people. You need to present the results to the class. Which of these describes the process you should use to accomplish these tasks?

options

enter data into a form and present it to the class

present the table you used to search for cities with more than 1 million people

run a query and create a report from the datasheet

run a query and present the datasheet to the class

Answers

Answer:

Run a query and create a report from the datasheet.

Explanation: creating a report will give a easy to understand explanation of all the data you have collected.

Answer:

the answer is C

the next one is B

Explanation:

Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.)a. Servicesb. Eventsc. Roles and Featuresd. Performance

Answers

Without requiring physical access to the servers or the need to enable Remote Desktop protocol (rdP) connections to each server.

What is Server manager?

Server Manager is a management console in Windows Server that aids IT professionals in provisioning and managing both local and remote Windows-based servers from their desktops.

Server Manager was enhanced in Windows Server 2012 to provide remote, multi-server management and help boost the number of servers an administrator can manage, even though it is still accessible in Windows Server 2008 R2 and Windows Server 2008.

Depending on the workloads the servers are handling, Server Manager in Windows Server 2016, Windows Server 2012 R2, and Windows Server 2012 can be used to manage up to 100 servers in our tests.

Therefore, Without requiring physical access to the servers or the need to enable Remote Desktop protocol (rdP) connections to each server.

To learn more server manager, refer to the link:

https://brainly.com/question/30608960

#SPJ1

I need help with this coding homework! I cant get right the Two Test Case's shown in the picture.

Instructions
Redo Programming Exercise 16 of Chapter 4 so that all the named constants are defined in a namespace royaltyRates.

Instructions for Programming Exercise 16 of Chapter 4 have been posted below for your convenience.

Exercise 16
A new author is in the process of negotiating a contract for a new romance novel. The publisher is offering three options. In the first option, the author is paid $5,000 upon delivery of the final manuscript and $20,000 when the novel is published. In the second option, the author is paid 12.5% of the net price of the novel for each copy of the novel sold. In the third option, the author is paid 10% of the net price for the first 4,000 copies sold, and 14% of the net price for the copies sold over 4,000. The author has some idea about the number of copies that will be sold and would like to have an estimate of the royalties generated under each option. Write a program that prompts the author to enter the net price of each copy of the novel and the estimated number of copies that will be sold. The program then outputs the royalties under each option and the best option the author could choose. (Use appropriate named constants to store the special values such as royalty rates and fixed royalties.)

THE FULL CODE:
#include
#include

using namespace std;

namespace royaltyRates {
const double FIXED_ROYALTY_1 = 5000.00;
const double FIXED_ROYALTY_2 = 20000.00;
const double ROYALTY_RATE_2 = 0.125;
const double ROYALTY_RATE_3_LOW = 0.1;
const double ROYALTY_RATE_3_HIGH = 0.14;
const int COPIES_THRESHOLD = 4000;
}

using namespace royaltyRates;

int main() {
double netPrice;
int estimatedCopies;

cout << "Enter price of each copy: ";
cin >> netPrice;

cout << "Estimated number of copies sold: ";
cin >> estimatedCopies;

double royalty1 = FIXED_ROYALTY_1 + FIXED_ROYALTY_2;
double royalty2 = ROYALTY_RATE_2 * netPrice * estimatedCopies;
double royalty3 = 0;

if (estimatedCopies > COPIES_THRESHOLD) {
royalty3 = (COPIES_THRESHOLD * netPrice * ROYALTY_RATE_3_LOW)
+ ((estimatedCopies - COPIES_THRESHOLD) * netPrice * ROYALTY_RATE_3_HIGH);
} else {
royalty3 = estimatedCopies * netPrice * ROYALTY_RATE_3_LOW;
}

cout << fixed << setprecision(2);
cout << "Royalties under option 1: $" << royalty1 << endl;
cout << "Royalties under option 2: $" << royalty2 << endl;
cout << "Royalties under option 3: $" << royalty3 << endl;

if (royalty1 >= royalty2 && royalty1 >= royalty3) {
cout << "Option 1 is the best option you can choose for maximum royalties.";
} else if (royalty2 >= royalty1 && royalty2 >= royalty3) {
cout << "Option 2 is the best option you can choose for maximum royalties.";
} else {
cout << "Option 3 is the best option you can choose for maximum royalties.";
}
return 0;
}

I need help with this coding homework! I cant get right the Two Test Case's shown in the picture. InstructionsRedo

Answers

This Python script assists the author in comparing three options and determining which one to select.

The Script and Explanation

First, it requires the input of the net price for each copy and an estimated amount of copies sold. Subsequently, royalties are computed under each option and displayed. Finally, the script determines the optimal choice and displays it.

Option 1 involves fixed royalties valued at $20,000 plus $5,000. Option 2 provides royalties based on a percentage of the net price multiplied by estimated copies sold, while Option 3 uses tiered percentages applied to the net price until the maximum number of sales is reached (4,000), after which a different percentage applies.

The resulting royalty payouts are denoted individually for each option and presented as output formatted with two decimal places. The best alternative among them is calculated via conditional statements that establish whether Royale Options #1, #2, or #3 offers the highest payout. Then, the corresponding option tag is returned as output.

Read more about programs here:

https://brainly.com/question/23275071

#SPJ1

There are two different ways to insert content from one application to another—embedding and —————-

Answers

There are two different ways to insert content from one application to another—embedding and linking.

Embedding refers to the process of incorporating content from one application directly into another, creating a self-contained object within the destination application. When content is embedded, it becomes an integral part of the destination document or file.

The embedded content maintains its original format and functionality, allowing users to interact with it as they would within its original application.

For example, embedding a spreadsheet into a presentation allows the audience to view and manipulate the spreadsheet directly without leaving the presentation.

On the other hand, linking involves creating a connection between the source content and the destination application. Instead of embedding the actual content, a link is established that points to the original file or source.

When the linked content is accessed in the destination application, it retrieves and displays the most up-to-date version of the source content. For instance, linking a chart from a spreadsheet to a word document ensures that any changes made to the chart in the spreadsheet are automatically reflected in the linked chart within the document.

Both embedding and linking have their advantages and considerations. Embedding provides a self-contained experience, ensuring that the content remains accessible even if the source file is modified or deleted. However, embedded content can increase file size and may lead to compatibility issues between applications.

Linking, on the other hand, allows for dynamic updates and efficient use of file space, but it relies on the availability and proper organization of the source files.

Ultimately, the choice between embedding and linking depends on factors such as the nature of the content, the desired level of interactivity, the need for real-time updates, and the intended use of the destination document or application.

For more questions on content

https://brainly.com/question/18331458

#SPJ11

Other Questions
Which ethnicity made up the majority of the population in south africa from 1904 to 1960? This question is about sound waves and light waves. which of the following alternative engery technologies is most likey to be used to power a car?windgeothermal biofuelhydropower How long does the shingles vaccine remain effective. The four thinkers in the chart were French philosophes. The chart lists some of their most important works and their major contributions to knowledge.Comparing and Contrasting Which two philosophes in the chart would you say had the most similar ideas? Explain.Drawing Conclusions Judging from the information in this chart, which philosophe had the greatest impact on the way the world is today? Explain your answer. MIS as a technology based solution must address all the requirements across any structure of the organization. This means particularly there are information to be shared along the organization. In connection to this, a student has complained to MIS grade recently submitted that he does not deserve C+. following the complaint, the instructor checked his record and found out that the students grade is B+, based on the request the Department Chair also checked the record in his office and found out the same as the Instructor. Finally, the record in the registrar office consulted and the grade found to be B+. Therefore, the problem is created during the data entry of grades of students to the registrar system. Based on the explanations provided, which of information characteristics can be identified? 6. Casey wants to decorate her dorm room with posters. Posters cost $5 each and Caseyhas no more than $35 to spend. What is the greatest amount of posters Casey can buy?pA Complete the following table:Note: Do not round net price equivalent rate and single equivalent discount rate. Round the dollar amounts to the nearest cent. How do to the Sierra Madre Mountainsimpact the environmental issues in Mexico City? Whatenvironmental issues are present here?Your answer A small airplane can carry lessthan 840 pounds of luggage andmail. The mail for the day weighs480 pounds. If each passengerbrings 60 pounds of luggage,what is the greatest possiblenumber of passengers that canbe taken? How does Chapter 15 (136-142) add to the tension in the novel? One reason for using an alias is simplicity. T/F Tim and Samara are volunteering in the community flower gardens. It takes Tim 2 hours to plant150 flowers. It takes 3 hours for Samara to plant 180 flowers. Which equation could be used todetermine how long it would take them together to plant 600 flowers? john is a salesperson in the appliance department of a store. he is guaranteed a minimum salary of $385 per week or 7.5% of his total sales, whichever is greater. what would the commission amount be for a week in which his total sales were $3422.00? find the value of b for which 1 e^b e^2 b^3 b ...=9 After a rotation, A(3, 4) maps to A'(4, 3), B(4, 5) maps to B'(5, 4), and C(1, 6) maps to C'(6, 1). Which rule describes the rotation? R0, 90 R0, 180 R0, 270 R0, 360 David is helping to plan a surprise birthday party for his sister Sarah. What lobe isresponsible for this processing? Use the properties of exponents to simplify the expression 2 (x1/3) 6/5 y 2/3. what is NOT a purpose or goal of the constitution?a) to establish rules for the structure of our governmentB) to prevent any one branch of government from gaining too much power ? C) to establish the natural rights of citizensD) to call for independence from king gorge Why do scientists believe the universe is still expanding? aThe further away an object is, the higher the temperature and pressure eventually become, causing nuclear fusion bDistant objects shift in frequency toward red on the electromagnetic spectrum, which tells us objects are moving away from us cSpiral galaxies spin, so they appear to be a rotating disk of stars and dust dDistant objects shift in frequency toward blue on the electromagnetic spectrum, which tells us objects are closer to us us