1. This are tools used to make any presentation interesting and exciting.
a. audio and video
c. hyperlinks
b. animations
d. text and graphics​

Answers

Answer 1

Answer:

c. hyperlinks

Explanation:

The correct option is - c.hyperlinks

Reason -

The "hyperlink" function in PowerPoint allows users to advance from one slide to another slide in the presentation when they click on a predetermined word, shape, or image, thereby allowing for a more dynamic and interactive experience than can be obtained with serial presentation of slides alone.


Related Questions

how many times does a loop with the header for count in range (10): execute the statements in its body?

Answers

A loop with the header "for count in range(10):" will execute the statements in its body 10 times. The "range(10)" creates a sequence of numbers from 0 to 9, and the loop will iterate through each of those numbers.

executing the statements in its body each time. A loop is a fundamental concept in computer programming that allows a set of instructions to be executed repeatedly. It is a control flow statement that iterates through a block of code until a specific condition is met. Loops are used to automate repetitive tasks, iterate through collections of data, and perform complex algorithms. There are various types of loops in computer programming, such as for loops, while loops, do-while loops, and foreach loops, each with its own syntax and use cases. A properly designed loop can improve the efficiency and readability of code and allow for more complex programs to be developed. However, improper use of loops can lead to infinite loops or unexpected results.

Learn more about loop  here:

https://brainly.com/question/13918592

#SPJ11

you are the network administrator for westsim. the network consists of a single active directory domain. you have enabled outbound filtering for public networks in the windows firewall with advanced security node of a group policy that applies to member servers. a member server named app1 is being configured to host a custom web application named application 1 that must contact a source server located on the internet using port 735. after installing application 1 on app1, you discover that it is unable to contact the source server. you need to enable app1 to contact the source server on the internet. what should you do?

Answers

The outbound rule will be the one that will be followed and need to be enabled.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Outbound firewall rules are typically guidelines that specify the traffic that is permitted to enter your net through safe ports and travel to authorized destinations. They block requests that are made to dangerous websites and dubious domains. Export network rules configuration can stop data regression.

Learn more about network, Here:

https://brainly.com/question/15088389

#SPJ1

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this

Answers

Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.

Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.

Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.

Hence, the missing phrase is packet filtering firewall.

Learn more : https://brainly.com/question/25706522

Drag the tiles to the correct boxes to complete the pairs.
Match each design principle with the image to which it applies

Emphasis

Contrast

Pattern

Movement

Drag the tiles to the correct boxes to complete the pairs.Match each design principle with the image

Answers

Answer:

Emphasis-girl looking at camera

Contrast- the birds

Movement- girl running

Pattern- the people

1. What is material science?

Answers

Answer:

Explanation:

The study of the properties of solid materials and how those properties are determined by a material’s composition and structure is material science.

Answer:

The scientific study of properties and applications of materials of construction or manufacture.

Explanation:

Information below:

1. What is material science?

Review the items below to make sure that your Python project file is complete. After you have finished reviewing your turtle_says_hello.py assignment, upload it to your instructor.

1. Make sure your turtle_says_hello.py program does these things, in this order:

Shows correct syntax in the drawL() function definition. The first 20 lines of the program should match the example code.

Answers

Code defines the drawL() function with the correct syntax and includes the required documentation string. The function takes a turtle object 't' as an argument, and draws an L shape using turtle graphics.

Define the term syntax.

In computer programming, syntax refers to the set of rules that dictate the correct structure and format of code written in a particular programming language. These rules define how instructions and expressions must be written in order to be recognized and executed by the computer.

Syntax encompasses a wide range of elements, including keywords, operators, punctuation, identifiers, and data types, among others. It specifies how these elements can be combined to form valid statements and expressions, and how they must be separated and formatted within the code.

To ensure that your turtle_says_hello.py program meets the requirement of having correct syntax in the drawL() function definition, you can use the following code as an example:

import turtle

def drawL(t):

   """

   Draws an L shape using turtle graphics.

   t: Turtle object

   """

   t.forward(100)

   t.left(90)

   t.forward(50)

   t.right(90)

   t.forward(100)

To ensure that your turtle_says_hello.py program is complete and correct.

1. Make sure that your program runs without errors. You can do this by running your program and verifying that it executes as expected.

2. Check that your program follows the instructions provided in the assignment. Your program should start by importing the turtle module, creating a turtle object, and define the drawL() function.

3. Verify that your drawL() function works as expected. The function should draw an "L" shape using turtle graphics. You can test this by calling the function and verifying that it draws the expected shape.

4. Ensure that your program ends by calling the turtle.done() function. This will keep the turtle window open until you manually close it.

5. Make sure that your code is properly formatted and indented. This will make it easier for others to read and understand your code.

6. Finally, ensure that your program meets any other requirements specified in the assignment. This might include things like adding comments or following a specific naming convention.

Therefore, Once you have verified that your program meets all of these requirements, you can upload it to your instructor for review.

To learn more about syntax click here

https://brainly.com/question/18362095

#SPJ1

When recording, which is more important, video or audio? Why?

Responses

Audio is more important because it has a more significant emotional impact than video.

Video is more important because what people see is more memorable than what they hear.

They are equally important because both contribute significantly to the overall impact of the message.

Text is more important than both of them, because what is said is more important than how it looks or sounds.

Answers

Answer:

They are equally important because both contribute significantly to the overall impact of the message.

What is the main difference between email and instant messaging?


O Email requires a print out.


O Email requires both users to use the same computer.


O Instant messaging generally expects a faster response.


O Email generally expects a faster response.

Answers

The main difference between email and instant messaging is that instant messaging generally expects a faster response.

Instant messaging platforms are designed for real-time communication, allowing users to have immediate back-and-forth conversations. Messages are delivered and received instantly, facilitating quick and responsive communication. On the other hand, email is asynchronous communication, where messages are not expected to receive an immediate response. Email allows users to compose and send messages that can be read and replied to at a later time, offering a more flexible and less time-sensitive form of communication.

Learn more about here;

https://brainly.com/question/28256190

#SPJ11

Pls help me I beg u

Pls help me I beg u

Answers

Self attribute skills

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2

What is the greatest magnitude negative number one can represent in

an 8-bit 2's complement code? Write your result in binary and

decimal.

Answers

In 2's complement notation, the range of numbers that can be represented with an n-bit system is from -2ⁿ⁻¹ to 2ⁿ⁻¹ - 1. In an 8-bit system.

This means that the maximum magnitude of a positive number that can be represented is 2⁷ = 128 and the minimum magnitude of a negative number that can be represented is -2⁷ = -128. This leaves one bit for representing the sign of the number.

The greatest magnitude negative number that can be represented in an 8-bit 2's complement code would have a binary representation of 10000000. To find the decimal equivalent, we can calculate the value of the bits using their corresponding powers of 2 and add them together:1 * -128 + 0 * 64 + 0 * 32 + 0 * 16 + 0 * 8 + 0 * 4 + 0 * 2 + 0 * 1= -128Therefore, the greatest magnitude negative number that can be represented in an 8-bit 2's complement code is -128, with a binary representation of 10000000.

To know more about range visit:

https://brainly.com/question/29204101

#SPJ11

Which of the following are recent trends? Check all of the boxes that apply.
fewer applications
more access points
fewer mobile devices
new applications

Answers

Answer:

More access points

New applications

Explanation:

Answer:

2 and 4

Explanation:

Did it on edge

Son aplicaciones desarrolladas específicamente para realizar actividades otareas que se llevan a cabo en oficinas o en educación.

Answers

Las herramientas ofimáticas son aplicaciones desarrolladas específicamente para realizar actividades o tareas que se llevan a cabo en oficinas o en educación.

Estas son las diversas computadoras y software que se utilizan para crear, recopilar, almacenar, manipular y transmitir digitalmente la información necesaria para realizar tareas básicas en los ámbitos educativos o comerciales.  

Al automatizar las operaciones de la oficina, es posible lograr una mayor cantidad de tareas más rápido; además elimina la necesidad de una gran cantidad de empleados; y permite que se requiera menos espacio de almacenamiento de datos.

Aprende más en https://brainly.com/question/21750706

who knows how to cope and paste on (ape.x)

Answers

To copy and paste on Apex, you can use the keyboard shortcuts "Ctrl+C" and "Ctrl+V" or right-click the selected text and choose "Copy" and "Paste."

Without more information about the context and platform you are referring to, it is difficult to provide a helpful response. However, if you are asking how to copy and paste on a computer or mobile device, the process typically involves selecting the text or item you want to copy, pressing "Ctrl + C" on a PC or "Command + C" on a Mac, and then pasting it by pressing "Ctrl + V" or "Command + V". The specific steps may vary depending on the software or device you are using, so it is recommended to consult the instructions or help resources for that specific platform.

Copying and pasting are essential computer skills that allow you to duplicate text or other content from one place and insert it into another. In Apex, you can use these methods to copy and paste information, making it easier to complete tasks efficiently.
To know more about keyboard visit:

https://brainly.com/question/24921064

#SPJ11

facing forward in an elevator can be considered a(n) select one: a. informal norm. b. formal norm. c. more. d. sanction.

Answers

Facing forward in an elevator can be considered a(n) (a) informal norm.

Informal norms are unwritten rules or expectations that people generally follow in social situations, such as facing forward in an elevator. These norms are not enforced by laws or regulations but are followed to maintain social harmony and respect for others.

A behavioural expectation that is not governed by rules or laws is known as an informal norm. In social settings, people abide by this unspoken rule.

An informal standard would be facing forward in a lift. In a lift, people typically anticipate that others would face forward in order to preserve social peace and prevent uncomfortable situations.

Maintaining social order and respect for others depends on informal norms. They assist people in comprehending what is required of them in various circumstances.

A formal norm, in contrast, is a behavioural expectation that is upheld by rules or laws. For instance, the government enforces formal rules like traffic laws to preserve public safety.

A more is a moral or ethical standard derived from social norms and precepts. It is a custom that is thought to be crucial for preserving social harmony and order.

A sanction is a form of punishment or rewards intended to uphold standards. It might be formal or informal, and it can come in a variety of shapes, including fines, detention, and social exclusion.

Learn more about the informal norm :

https://brainly.com/question/20972604

#SPJ11

The preferred technology to set up disk storage with mirrored fault tolerance for a user’s backup data is

Answers

The preferred technology to set up disk storage with mirrored fault tolerance for a user's backup data is "RAID (Redundant Array of Independent Disks)."

RAID is a technology used to set up disk storage systems that provide fault tolerance and data redundancy. In the context of setting up disk storage for backup data, a commonly preferred RAID level is RAID 1 (mirroring). RAID 1 involves mirroring the data across multiple disks so that if one disk fails, the data can still be accessed from the mirrored disk. This ensures high availability and protects against data loss. RAID arrays can be configured using hardware RAID controllers or software-based RAID solutions, depending on the specific requirements and infrastructure of the user's backup system.

To learn more about Independent   click on the link below:

brainly.com/question/28963056

#SPJ11

you can use a logical operator to combine two boolean expressions determine if two expressions are equal reverse the value of an expression all of the above a and c only

Answers

Answer:

To manipulate boolean expressions, logical operators can be used. These operators help in combining two or more expressions, determining if two expressions are equal or reversing the value of an expression. By using logical operators like AND, OR, and NOT, complex boolean expressions can be created to make decisions and determine the logic of a program. For example, AND would require both expressions to be true for the overall expression to be true, whereas OR would only require one expression to be true. Additionally, NOT reverses the truth value of an expression, making it false if it was originally true and vice versa.

Why should you pay your full credit card balance by the due date every month?​

Answers

Answer: to avoid late fees and interest

Explanation:

The name for entering numbers into a spreadsheet is D___ E____. Write out the full name in ALL CAPITALS!

Answers

Answer:

DATE

Explanation:

programmable logic controllers are categorized according to the

Answers

Programmable logic controllers (PLCs) are categorized according to the number of input and output points they have.

The most basic PLCs have a small number of I/O points and are suitable for simple applications. Medium-range PLCs have more I/O points and additional features, such as built-in communication protocols. High-end PLCs have a large number of I/O points and are capable of performing complex control tasks. They also offer advanced features like high-speed processing, built-in safety functions, and advanced communication capabilities. PLCs can also be categorized based on their programming language, with the most common ones being ladder logic, function block diagram, and structured text. The choice of PLC depends on the complexity of the application and the required functionality.

learn more about Programmable logic controllers here:

https://brainly.com/question/32089347

#SPJ11

Which of the following BEST describes a front-end developer?

Answers

Answer:

plz give me BRAINLIEST answer

Explanation:

Definition: Front end development manages everything that users visually see first in their browser or application. Front end developers are responsible for the look and feel of a site. ... As a front end developer you are responsible for the look, feel and ultimately design of the site.

A front-end developer is a type of software developer who specializes in creating the user interface (UI) and user experience (UX) of a website or application. They are responsible for translating design mock-ups and wireframes into functional code using programming languages such as HTML, CSS, and JavaScript.

Front-end developers work on the client-side of web development, focusing on the visual aspects and interactions that users see and experience directly. They ensure that the website or application is visually appealing, responsive, and user-friendly across different devices and browsers.

In addition to coding, front-end developers collaborate closely with designers and back-end developers to integrate the UI with the back-end systems and databases. They may also be involved in optimizing the performance and accessibility of the front-end code, as well as testing and debugging to ensure smooth functionality.

Learn more about databases on:

https://brainly.com/question/30163202

#SPJ6

You've been hired to write a program that models the stacking of boxes in a warehouse. (check the pictures below for more information)

You've been hired to write a program that models the stacking of boxes in a warehouse. (check the pictures
You've been hired to write a program that models the stacking of boxes in a warehouse. (check the pictures

Answers

An example of the way that you could implement the program you described using Python's turtle library is given:

import turtle

def draw_square(side_length):

 for i in range(4):

   turtle.forward(side_length)

   turtle.left(90)

# Get input from user for side length and number of boxes

side_length = int(input("Enter side length of boxes: "))

num_boxes = int(input("Enter number of boxes: "))

# Set turtle and screen properties

turtle.bgcolor("your_choice_of_color")

turtle.color("your_choice_of_color")

turtle.setworldcoordinates(0, 0, side_length*num_boxes, side_length)

# Draw stack of boxes

for i in range(num_boxes):

 draw_square(side_length)

 turtle.penup()

 turtle.forward(side_length)

 turtle.pendown()

turtle.exitonclick()

What is the code written above about?

This program will ask the user for the side length of the boxes and the number of boxes to be stacked, then use a loop to draw the stack of boxes using the draw_square function.

Therefore, The background color and turtle color can be set to any color of your choice (Such as yellow). The setworldcoordinates function is used to adjust the size of the screen to fit the number of boxes. Finally, the exitonclick function allows the user to close the window by clicking on it.

Learn more about Python's turtle library from

https://brainly.com/question/18846647
#SPJ1

You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Although indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.

There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document's priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.

You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?

Answers

Answer:

The answer is "Allocate permission for managing documents to the Gladys printer."

Explanation:

In the given scenario, we allow permission for managing the documents to the Gladys printer. It should enable Gladys could continue these trends by bringing something into the community of local administrators and introducing major changes to wherewith your office operates. In especially, they need her to modify its printing process regarding documentation requiring printing.

Java
Write a program Checkerboard that takes an integer command-line argu-
ment n and uses a loop nested within a loop to print out a two-dimensional n-by-n
checkerboard pattern with alternating spaces and asterisks.

Answers

public class Checkerboard {
public static void main(String[] args) {
int n = Integer.parseInt(args[0]);
for (int i = 0; i < n; i++) {
for (int j = 0; j < n; j++) {
if ((i + j) % 2 == 0) {
System.out.print("*");
} else {
System.out.print(" ");
}
}
System.out.println();
}
}
}

The program takes an integer command-line argument n and uses two nested loops to print out an n-by-n checkerboard pattern. The if statement inside the inner loop checks if the sum of the current row index i and column index j is even, and if so, it prints an asterisk. Otherwise, it prints a space.

Which of the following voltages from an ESD would be the minimum to short a computer’s hardware components?

100 volts

5 volts

3.3 volt

12 volts

Answers

most definitely 100 volts..

The voltages from an ESD would be the minimum to short a computer’s hardware components is 100 volts. The correct option is A.

What is hardware?

Hardware is the collective term for the internal and external hardware that enables you to carry out key operations including input, output, storage, communication, processing, and more. Computer hardware comes in two flavors: internal and external.

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.

Hardware describes the physical parts of the computer or its delivery mechanisms for the software's written instructions to be stored and executed.

Therefore, the correct option is A, 100 volts.

To learn more about hardware, refer to the link:

https://brainly.com/question/24231393

#SPJ3

You need to identify the manufacturer of a network interface. Where will you look for this information?The first three octets of a Media Access Control (MAC) addressThe last octet of a Media Access Control (MAC) addressThe first octet of a Media Access Control (MAC) addressThe fourth octet of a Media Access Control (MAC) address

Answers

To identify the manufacturer of a network interface. We will look to the first three octets of a Media Access Control (MAC). The correct option is a.

What is a network interface?

The first six digits of a MAC address, known as OUI, are typically used to identify the manufacturer (Organizational Unique Identifier).

An Ethernet or network adapter over any given network is given a media access control address (MAC address), which is viewed as a distinctive identifier of sorts.

It should be noted that any of their registered vendors have received these MAC prefixes from the IEEE Registration Authority Committee. The rightmost six numbers stands for the Network Interface Controller.

Therefore, the correct option is a, The first three octets of a Media Access Control (MAC).

To learn more about network interface, refer to the link:

https://brainly.com/question/28207436

#SPJ1

five different procedures to automate a office?

Answers

Answer :

The practice of seeing data flow around on its own without human interference, inaccuracies, or errors is known as office automation. It is the process of creating, collecting, storing, analyzing, and sharing sensitive office data using an automated technology in order to successfully complete basic day-to-day regular activities and operations.

1. Workflow designer that is simple

Hard-core system developers used to be the only ones who could create processes. As workflow software progressed, it assumed that the individuals who used it were also programmers.

However, a modern office automation system should start with the business user in mind, not the coder.

When you sit down to trial an office automation tool, start off by making your own workflows. How easy is it? Can you intuitively create the sequence of tasks needed to finish a process? If you can’t figure it out within the first five minutes, you need to move on to the next option.

Your business's activities should not be dictated by a piece of software. Instead, it should assist your employees in improving their current procedures.

2. Compatibility with mobile devices

Your office should be mobile, and so should all of your tools. Whether you have remote workers or just want to check in while waiting for a flight, the office automation solution you pick should perform just as well on a phone in China as it does on a PC in the office.

Your marketing strategy can't be postponed for a day simply because Greg is returning from his vacation in Machu Picchu.

You should be able to conduct your essential operations from a secure cloud and never have to worry about your data's location or security. If you use an office automation platform like Kissflow Workflow, Greg may review the marketing strategy on his phone while in the Peruvian hotel lobby and give his approval before going on to shoot pictures with the llamas.

3. Integration with other applications

You're not the only one using office automation software. You already have an internal database, a CRM, a marketing automation tool, and finance software, to name a few. You need a tool that doesn't just stay to itself when you're relying on so many systems.

Office automation software should be the easiest to combine with your other tools out of all the software available. If it doesn't, you'll be trapped moving data from one system to the next.

When evaluating office automation software, look for pre-integrations or check whether it takes use of linking to a platform like Zapier to gain access to hundreds of other cloud apps.

4. Analytics and reports

How can you tell whether your workplace automation is working? You can't judge the success of a procedure only on how pleased your employees are. Data is the ultimate decision-maker, and it's critical for your company to compare the history of a process, its speed, the quality of the product, and so on.

It's inconvenient and time-consuming to switch to another program to track your workflow data. Why not create a single piece of software that has reporting and analytics capabilities? The greatest office automation systems now include this capability as part of their core functionality.

5. Options for access control

You should assign access privileges to all of your business workflows the same way you limit admittance to your workplace.

Access control is an important component of a good workflow automation system because it recognizes this sensitive necessity. When looking for office automation software for your company, don't forget about this feature.

please, list the role of computer in the society​

Answers

Answer:

Computers benefit the business and personal world by being able to do the following more efficiently: buying and selling products, communicating throughout the world, enhancing our knowledge, job influences, entertainment, research, and paying bills.

Hope this helps! :)

post the solve
Q.1 Write all the MATLAB command and show the results from the MATLAB program Solve the following systems of linear equations using matrices. 2y = 8z = 8 and -4x + 5y +9z = -9. x-2y+z=0,

Answers

The solution for the given system of linear equations is x= 3, y = -1, and z = 2.

As the given system of linear equations can be represented in matrix form as:

| 0 2 8 | | y | | 8 |

| -4 5 9 | x | y | = |-9 |

| 1 -2 1 | | z | | 0 |

MATLAB commands to solve the system of linear equations are:

1. Define the coefficient matrix and constant matrix:

>> A = [0 2 8; -4 5 9; 1 -2 1];

>> B = [8; -9; 0];

2. Solve for the variables using the command ‘\’ or ‘inv’:

>> X = A\B % using ‘\’ operator

X =

3.0000

-1.0000

2.0000

>> X = inv(A)*B % using ‘inv’ function

X =

3.0000

-1.0000

2.0000

Hence, the solution for the given system of linear equations is:

x = 3, y = -1, and z = 2.

Learn more about MATLAB: https://brainly.com/question/30641998

#SPJ11

you're evaluating a new system that uses security-enhanced linux to handle classified government information. what kind of access control model should you expect it to use? choose the best response.

Answers

Most common operating systems employ Discretionary Access Control (DAC)model.

What type of access control model does Linux system use?Traditional Linux security is built on a Discretionary Access Control (DAC) policy, which offers bare-bones defense against malware that is executing as a regular user or as root or against malfunctioning software.The only criteria for accessing files and devices are user identity and ownership.Most common operating systems employ Discretionary Access Control (DAC), a security concept that upholds security via ownership.A user has the ability to modify a file's read, write, and execute permissions if he owns it.Users have discretion over the data under this model.

To learn more about Discretionary Access Control  refer,

https://brainly.com/question/15152756

#SPJ4

Other Questions
JKL is an isosceles triangle. Jk=jl. JK = 2x+3, and KL=10-4x what is the perimeter of jkl Kelly agrees to provide a two hour goat yoga class for Tara and Gabby for $20.00 each. An hour and 50 minutes into the lesson, Kelly misreads the clock and dismisses Tara and Gabby from the lesson. Can Tara and Gabby sue for breach of contract? HELPPP!i need the right answers for this exam # 25-29) A cast iron cylinder serves as a counterbalance that is used in a windowmanufacturer's double-hung window design. The cylinder has a height of 7.45 in and adiameter of 2.7in. The weight density of cast iron is 0.259 lbs/in.What is the volume of the cylinder?Volume = 42.63374What is the surface area of the cylinder?Surface area =What is the weight of the cylinder?Weight =V=7.h3.14 (1.352). 7.45= 42.633742.72=1.353.14(W=dw.vW= what kinds of geological events happen along tectonic plate borders? why do they occur more frequently along plate borders? What is the distance between points F and G?The distance between F and G is . The quotient is a multiple of 4 the dividend is a multiple of 9 the divisior is a factor of 12 possible solution Which of the following IS NOT a model of motivation?A. Self-actualization B. CognitiveC. Expectancyvalue D. Psychoanalytical shoplifting, sweethearting, and retail borrowing are all problems that contribute to__ a.shrinkage pyramid schemes b. pop-up retailing c. off-price retailing d. understored trade areas Find three consecutiveodd integers whose sumis 369 PLSSS HELP ILL MARK BRAINEST Kelvin, Inc. manufactures model airplane kits and projects production at 450, 680, 650, and 500 kits for the next four quarters. (Click the icon to view the manufacturing information.) Prepare Kelvin' Which of the following results in a decrease in the Equity in investee income account when applying the equity method?A. Dividends paid by the investor.B. Net income of the investee.C. Unrealized gain on intra-entity inventory transfers for the current year.D. Unrealized gain on intra-entity inventory transfers for the prior year.E. Extraordinary gain of the investee. 3. Put the following places in order starting with where the Hebrews were first to where they were last. Mount SinaiBabylonMesopotamiaEgypt what are all the roots for the function? f(x)= x^3+3x^2+x-5 y + 6.2x = -13 , when x= -4 Find the values of x and y The decision to transform the Russian steppes into farmland had which of the following consequences? what is the slope of the line through 0,4 and 3,-2 a book weighs 6 n. when held at rest above your head the net force on the book is What does a chemoautotroph have in common with a plant?Please help..!!