2) Prompt the user for his/her favorite 2-digit number, and the output is the square root of the number.

Answers

Answer 1

num = int(input("What's your favorite 2-digit number? "))

print("The square root of {} is {}".format(num, (num**0.5)))

I hope this helps!


Related Questions

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to almost every location around the world. has led to the proliferation of on-the-go computing. Reset Next​

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has

Answers

Answer:

The correct answers are:

Wireless web

Mobile computing

Explanation:

I got it right on the Edmentum test.

Wireless web has brought the internet to almost every location around the world. Mobile computing has led to the proliferation of on-the-go computing.

What is technology?

Technology, or as it is sometimes referred to, the modification and manipulation of the human environment, is the application of scientific knowledge to the practical goals of human life.

A catchall phrase for unrestricted access to the Internet and other services like email and messages.

The wireless Web is made up of public and private hotspots, cellular Internet access, and all other fixed or mobile wireless access services.

In human-computer interaction known as mobile computing, a computer is expected to be carried around while being used, allowing for the transmission of data, speech, and video.

Mobile hardware, mobile software, and mobile communication are all components of mobile computing.

Thus, these are the effects of emerging technology.

For more details regarding technology, visit:

https://brainly.com/question/9171028

#SPJ5

a(n) is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

Answers

An action, tool, process, or technique known as a countermeasure lessens a threat, a vulnerability, or an attack by eradicating it or preventing it, minimising the harm it can do, or by identifying and reporting it so that the appropriate action can be done.

What is vulnerability?
Vulnerabilities
are weaknesses inside a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software which uses it. A threat actor, like an attacker, can use vulnerabilities to breach privilege restrictions and carry out illegal actions on a computer system. An attacker needs at least one tool or technique that really can connect to a system flaw in order to exploit a vulnerability. In this context, the attack surface is another name for vulnerabilities.

Discover all assets, prioritise assets, assess or do a full vulnerability scan, publish on results, fix vulnerabilities, confirm remediation, and repeat are all frequent steps in the cyclical practise of vulnerability management.

To learn more about vulnerability
https://brainly.com/question/25633298
#SPJ4

What is distribution hardware?

Answers

A distributed computer system consists of multiple software components that are on multiple computers, but run as a single system. The computers that are in a distributed system can be physically close together and connected by a local network, or they can be geographically distant and connected by a wide area network.

What is the difference between the complete scan and the resident shield?

Answers

A complete scan and resident shield are two types of antivirus scans. The main difference between them is that a complete scan checks all files and folders on your computer, while a resident shield scans only files as they are accessed or modified.

A complete scan is a thorough antivirus scan that checks all files and folders on your computer's hard drive. This scan examines all of your system's files to detect viruses, malware, and other threats that may be present. A complete scan is time-consuming and can take several hours to complete, depending on the size of your hard drive.

As you work on your computer and open or modify files, the resident shield scans the files for malicious code and alerts you if any are found. This type of scan is very useful because it provides immediate protection against threats that may try to infect your computer while you're working on it.

To know more about antivirus visit:

https://brainly.com/question/29356216

#SPJ11

Edhesive Submitting Unit 11 Assignment – Step 1

Answers

The HTML code required for this prompt is given as follows;

<!DOCTYPE   html>

< html lang="en ">

<head>

 < meta charset  ="UTF-8" >

 < title>My  Webpage< /title>

 <style>

   body {

     back  ground-color : #f2f2f2;

   }

   h1 {

     color:   blue;

     text-  align :cente r;

     font-siz e:40   px ;

 

 }

   h2 {

     color:green;

     font-size:  30 px ;

   }

   p {

     font-size : 20 px  ;

     line-height: 1. 5;

   }

   img {

     display: block;

     margin:auto;

     width:50 %;

   }

 </style>

</head>

<body>

 <h1>  Welcome to My Webpage < /h1>

 <h2 >About Me  </h2>

 <p>  Hi, my name is John Doe and I am a web developer  .</p>

 <p> I have experience in HTML CSS,  and JavaScript.</p>

 <h2>  My Work</h2>

 <p>Here are some   examples of my work:</p>

 <img src=  "https://via.placeholderdotcom/500x300" alt="Placeholder Image">

 <img src="https://via. placeholderdotcom/500x300 " alt="Placeholder Image">

 <h 2>My Links  </h2 >

  <p>  Check out my <a h ref="https://github. com/johndoe">  GitHub</a> profile.  </p>

 <p>Feel free   to send me   an <a hre f=  "mailto:johndoe  exampledotcom">email</a>.</p>

</body>

</html>


How does HTML work?

HTML is an abbreviation for HyperText Markup Language. The term "markup language" refers to the fact that, rather than employing a programming language to accomplish operations, HTML use tags to identify various sorts of content and the roles they each offer to the webpage.

HTML, or Hypertext Markup Language, is a computer language that is used to define the structure of web pages. HTML allows you to construct static pages with text, headers, tables, lists, graphics, and links, among other things.

Learn more about HTML:
https://brainly.com/question/29611352
#SPJ4

Full Question:

Step 1 Instructions For this step, submit your work in the Sandbox below. Remember, you will be graded on whether your webpage contains the following HTML requirements: Page title At least three headers (H1, H2, etc.) Paragraph tags Font tags At least two images. (See below for more information about images.) At least one link to another website One email link Either a background image (in addition to the above images) or a background color

explain the term technology and information technology​

Answers

Answer:

Technology refers to the tools, techniques, and processes used to create, develop, and apply knowledge in various fields. It includes both physical technologies, such as machines and equipment, as well as more abstract technologies, such as systems, methods, and algorithms. Technology is a broad and multifaceted concept that encompasses a wide range of fields and disciplines, including engineering, science, medicine, and the arts.

Information technology (IT) refers to the use of technology to manage, store, process, and transmit information. It includes the development, implementation, and maintenance of computer-based systems and technologies, such as hardware, software, networks, and databases. IT is a rapidly evolving field that plays a critical role in many aspects of modern life, from business and industry to education, healthcare, and entertainment.

In general, technology refers to the tools and techniques used to create, develop, and apply knowledge, while information technology specifically refers to the use of technology to manage and process information.

which of the following are two main components on the motherboard? a. memory and storage b. interpreter and compiler c. processor and memory d. compiler and processor

Answers

The motherboard is the foundation for all system components, with the two main components being the processor and memory.

The Vital Role of Processor and Memory in a Computer System

The motherboard is the backbone of any computer system and it houses two main components - the processor and the memory.

The processor is the brain of the computer and is responsible for carrying out instructions and performing calculations. The memory is what stores the instructions and data needed for the processor to carry out its tasks. Without the processor and memory, a computer wouldn't be able to do anything.

The processor and memory are the two main components on the motherboard and they work together to make a computer function.

The processor takes in instructions from the user and then processes them in order to carry out whatever task the user wants it to do. The memory, on the other hand, stores data and instructions so that the processor can access it quickly and efficiently. Without both of these components, a computer wouldn't be able to do anything.

Learn more about motherboard at: https://brainly.com/question/14454041

#SPJ4


Which file is usually the first file to be displayed when you navigate to a website?

1. home.html
2. Index.html
3. Template.html
4. Starter.html

Answers

Answer:

3. template.html

Explanation:

What are the typical steps in an MBO program? 7. Describe Locke and Latham's goal-setting model. 8 Explain total quality management and how it can be used to improve quality and productivity. 9₁ How can managers develop an organizational culture that encourages a high-performing system or a learning organization? 10 How does the culture affect an organization's ability to change?

Answers

Typical steps in an MBO program include goal setting, action planning, performance monitoring, and performance review and feedback.

In an MBO (Management by Objectives) program, the first step is goal setting. This involves defining clear and specific objectives that align with the overall organizational goals. These objectives should be measurable and achievable.

The next step is action planning, where employees and managers collaborate to determine the necessary actions and strategies to achieve the set goals. This includes identifying tasks, allocating resources, and setting timelines.

Once the action plans are in place, the program moves to performance monitoring. This step involves tracking progress towards the goals and regularly assessing performance. Key performance indicators (KPIs) and metrics are used to measure and evaluate the achievement of objectives.

The final step is performance review and feedback. This includes formal evaluations where managers provide feedback to employees about their performance, strengths, and areas for improvement. It also involves recognizing achievements and providing guidance for future development.

Overall, an MBO program follows a systematic approach to goal setting, planning, monitoring, and performance review, with a focus on aligning individual and team objectives with organizational goals.

Learn more about MBO program

brainly.com/question/31854301

#SPJ11

a literal string can be assigned a zero-length string value called a(n) ____ string.

Answers

A literal string can be assigned a zero-length string value called an empty string.

An empty string is represented by two quotation marks with nothing in between. This is useful when you need to initialize a string variable without assigning it an initial value. It can also be used as a placeholder when you need to add a string value later on. It's important to note that an empty string is not the same as a null value, which represents the absence of any value. Understanding the difference between these two concepts is crucial in programming to avoid errors and unexpected results.

learn more about zero-length string here:

https://brainly.com/question/29037194

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

How can the two independent clauses below be combined to form a correct complete sentence? Check all that apply.
Jonas has homework. It isn’t finished.
Jonas has homework, but it isn’t finished.
Jonas has homework that isn’t finished.
Jonas has homework, it isn’t finished.
The homework that Jonas has isn’t finished.
Jonas has homework; isn’t finished.

Answers

Jonas has homework that isn’t finished.

John is constructing a circuit. He wants a device which can store energy and can be used at any given time. Which device can he use?
A.
inductor
B.
transistor
C.
capacitor
D.
diode
E.
transformer

Answers

Answer:

capacitor

Explanation:

Answer:

capacitor

Explanation:

Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirements, ethical considerations, and the digital sources you will be investigating in hopes of recovering data and collecting evidence to determine who was responsible for the data exfiltration.


For all assignments, remember the following important elements:

Proofread for spelling, grammar, and punctuation.
You may respond in bullet form for this project, but use standard written English. Do not use texting abbreviations or other similar shortcuts.

Answers

The steps you will take to obtain digital evidence.

One has to Respond First. Then a Search and Seizure is ordered.There is the Evidence Collection. There is the Securing of the Evidence. There is Data Acquisition stage.Then there is Data Analysis. Then there is Evidence Assessment. Then there is  Documentation and Reporting.The last is expert witness testimony.What is Digital evidence?

Digital evidence is known to be a kind of information that is often saved or transmitted in a method that uses binary form that can be relied on in case of court.

Note that it is one that can be found on a computer hard drive, a mobile device such as phone, among other means.

Hence, The steps you will take to obtain digital evidence.

One has to Respond First. Then a Search and Seizure is ordered.There is the Evidence Collection. There is the Securing of the Evidence. There is Data Acquisition stage.Then there is Data Analysis. Then there is Evidence Assessment. Then there is  Documentation and Reporting.The last is expert witness testimony.

Learn more about digital evidence from

https://brainly.com/question/18566188

#SPJ1

Next, Leah wants to add a content slide that allows her to insert a table.
Which tab should she click to complete this action? Home
What should Leah click to open a dialog box to select the slide she needs? New Slide down arrow
What should Leah do to access the notes pane of the slide she added? V Click Notes expander.
Multi media design

Answers

Answer:

1. Home

2. New slide down arrow

3. Click Note expander

Explanation:

Home tab should she click to complete this action.

The New Slide down arrow should Leah click to open a dialog box to select the slide she needs.

Click Notes expander should Leah do to access the notes pane of the slide she added.

What is a content slide?

A collection of polished presentation templates is called the Presentations Content Slides. The site provides stunning infographics and PowerPoint illustrations that are laid out in a bullet point structure. Regardless on how many evaluation tools are provided, the main layout is one to three.

Select the button next to "New Slide" on the Home tab. Choose the layout visitors want and a new slide from the layouts collection.choose "New Slide" Make your layout selection in the New Slide dialogue box for any new slide. Study slide layouts in more detail.You can add extra information to presentations that doesn't show up on slides in the Notes pane.

Learn more about content slide, here:

https://brainly.com/question/4214795

#SPJ6

In an interview, you are asked to differentiate between data protection and data privacy. How should you differentiate between data protection and data privacy? Data protection involves unauthorized data access, while data privacy secures data against authorized access. Data protection secures data against unauthorized access, while data privacy secures data against authorized access. O Data protection secures data against authorized access, while data privacy involves unauthorized data access. Data protection involves securing data against unauthorized access, while data privacy is concerned with authorized data access.
Previous question

Answers

The way that a person can differentiate between data protection and data privacy is option A: Data protection involves unauthorized data access, while data privacy secures data against authorized access.

What is the issue of Data protection and privacy about?

Data protection and data privacy are so closely related to one another that people frequently confuse the two terms. But in order to comprehend how one supports the other, it is essential to understand the differences between data privacy and data protection. Anywhere personally identifiable information is gathered, stored, or used, privacy concerns arise.

Therefore, data protection is the process of protecting data from unauthorized access. Authorized access to data is about who has it and how it is defined. Another way to look at it is that data privacy is a legal matter, whereas data protection is basically a technical one.

Learn more about Data protection from

https://brainly.com/question/27034337
#SPJ1

Pls answer this question

Pls answer this question

Answers

Answer:

SSDs are Faster than Hard Drives

Explanation:

. what is the range of integer numbers that can be represented using a 18-bit word size if: (a) you assume unsigned numbers? (b) you assume sign-magnitude numbers? (c) you assume two's complement numbers?

Answers

(a) The range of integer numbers that can be represented using an 18-bit word size, assuming unsigned numbers, is 0 to 262,143.

(b) The range of integer numbers that can be represented using an 18-bit word size, assuming sign-magnitude numbers, is -131,071 to 131,071.

(c) The range of integer numbers that can be represented using an 18-bit word size, assuming two's complement numbers, is -131,072 to 131,071.

In computing, the word size refers to the number of bits that can be processed in a single instruction. In this case, we have an 18-bit word size. The range of integer numbers that can be represented using different number representations can vary.

(a) When assuming unsigned numbers, all the bits in the word are used to represent positive values. With 18 bits, we can represent numbers ranging from 0 to (2^18 - 1), which equals 262,143. Since unsigned numbers only include positive values, the range starts from 0.

(b) When assuming sign-magnitude numbers, the most significant bit (MSB) is used to represent the sign of the number. The remaining bits represent the magnitude. With 18 bits, the MSB can represent either a positive or negative sign. Therefore, the range of representable numbers extends from -131,071 to 131,071.

(c) When assuming two's complement numbers, the MSB represents the sign, and the remaining bits represent the magnitude in a binary form. The range of representable numbers using two's complement is determined by the number of bits. With 18 bits, the MSB represents negative values, and the range extends from -131,072 to 131,071.

Learn more about number representations

brainly.com/question/29276557

#SPJ11

look at this how does it look

look at this how does it look

Answers

Answer:

Amazing! Beautiful class!

Answer:

looks pretty nice right people

Explanation:

which of the following methods of obtaining desert lysed images can recognize and preserve text and formatting
A: a Digital camera
B: an OCR scanneR
C: clip art
D: online graphics

Answers

Answer:

B

Explanation:

What dimensions of data quality are directly supported by the primary key / foreign key relationships among tables?
- Completeness and Timeliness
- Uniqueness and Completeness
- Accuracy and Consistency
- Consistency and Uniqueness
- Timeliness and Accuracy

Answers

Accuracy, consistency, completeness, and validity are the aspects of data quality that are directly supported by primary key/foreign key relationships within tables.

What link does a main key have with a foreign key?

Foreign keys are a column or group of columns in a table whose values correspond to the primary key in another table.

What restrictions do the primary key and foreign key uphold?

A primary key constraint in a relational database management system is a column that uniquely identifies each entry in the table, as opposed to a foreign key, which creates a connection between two tables.

To know more about data visit:-

https://brainly.com/question/11941925

#SPJ1

What two skills are important for him to have to become a successful computer programmer?

Answers

Answer:

Here are some options:

- Problem-Solving

-A Sharp Memory

-Efficient Laziness

-Self-Motivation and Independence

-Perseverance

Explanation:

why is my league client going to black screen after champion select and not letting me connect to the server despite wired internet

Answers

It seems that your League of Legends client is going to a black screen after champion select and not letting you connect to the server despite having a wired internet connection. This issue might be caused by various factors, such as software incompatibilities, firewall settings, or graphics driver issues.

There could be several reasons why your League client is going to a black screen after champion select and not letting you connect to the server despite having a wired internet connection. One possible reason could be an issue with your computer's graphics drivers or DirectX. It's also possible that your computer doesn't meet the minimum system requirements for running League of Legends, which can cause connectivity issues.

Another possible reason for the black screen issue could be due to firewall or antivirus software blocking the game's connection to the server. If this is the case, you may need to add League of Legends to your firewall or antivirus exceptions list.Additionally, there could be issues with the League of Legends servers themselves, which can cause connectivity problems for players. If this is the case, you may need to wait until the servers are back online or contact the League of Legends support team for assistance.Overall, troubleshooting connectivity issues with League of Legends can be complicated, and it may require some trial and error to determine the root cause of the problem. If you continue to experience issues, you may want to seek additional help from a technical support professional or the League of Legends community.

Know more about the graphics drivers
https://brainly.com/question/31516961

#SPJ11

The data below represent the number of books read in the past year by a sample of five students.
1 5 5 15 38
The coefficient of variation for this sample is
Hint: Feel free to copy data over to Excel to answer this question.
89.62%
152.35%
25.68%
117.24%

Answers

The coefficient of variation for this sample is approximately 69.15%. None of the given options matches this value, so it seems there was an error in the provided answer choices.

To calculate the coefficient of variation for the given sample, we need to follow these steps:

Calculate the mean (average) of the sample.

Mean = (1 + 5 + 5 + 15 + 38) / 5 = 13.

Calculate the standard deviation of the sample.

Standard deviation = sqrt(((1 - 13)^2 + (5 - 13)^2 + (5 - 13)^2 + (15 - 13)^2 + (38 - 13)^2) / 5) = sqrt(402 / 5) ≈ 8.99.

Calculate the coefficient of variation.

Coefficient of Variation = (Standard deviation / Mean) * 100 = (8.99 / 13) * 100 ≈ 69.15%.

Know more about coefficient of variation here:

https://brainly.com/question/30783938

#SPJ11

4. what are some limitations of rule-based scheduling systems?

Answers

Rule-based scheduling systems have certain limitations that affect their efficiency and effectiveness. factors be considered choosing scheduling system specific application.

First, they rely on predefined rules which may not adapt well to dynamic or complex environments. This rigidity can result in suboptimal schedules when unexpected changes occur or when unique situations arise that the rules don't account for.
Second, rule-based systems may suffer from a lack of flexibility, making it difficult to incorporate new constraints or preferences without modifying the rules extensively. This can be time-consuming and may introduce errors in the system.
Third, the performance of rule-based systems is highly dependent on the quality of the rules. Developing accurate and comprehensive rules requires significant domain knowledge and expertise, which may not always be available.
Lastly, rule-based scheduling systems may struggle with scalability, as the number of rules and complexity increases with the size of the scheduling problem. This can lead to increased computational time and difficulty in managing the system.

Computer-based information systems are the backbone of the modern office, but they cannot complete all tasks independently. The systems your organisation depends on are constantly capable thanks to the tireless effort of a small team of committed specialists. The unsung heroes of today's workplace are the information systems professionals. One might contend that a computer-based information system could quickly incorporate every card catalogue and Rolodex that has ever existed in the globe, as well as those that haven't yet been created. They include not just the hardware and software but also the person in charge of providing information to these systems and using the data that is gathered and disseminated by them.


Learn more about scheduling systems here

https://brainly.com/question/28258477

#SPJ11

How did technology advance during World War II- catapult computing int a new modern are?

Answers

The technological advance during World War II helped in bomb sightings, communication was stronger, and the discovery of penicillin saved the lives of many people.

What was World War II?

World War II happened from 1939 to 1945, during this time much advancement in technology happened compared to World War I.

Effective Blitzkrieg operations relied on radio communications, which allowed commanders to plan the advance and throw the opponent off guard.

Therefore, the development of technology during World War II improved bomb spotting, communication, and the discovery of penicillin, which helped save countless lives.

To learn more about World War II, refer to the link:

https://brainly.com/question/27753772

#SPJ1

which two commands would return you to the privileged exec prompt regardless of the configuration mode you are in? (choose two.)

Answers

The two commands that would return you to the privileged exec prompt regardless of the configuration mode you are  "exit" and "end"

exit: The exit command is used to exit the current configuration mode or sub-mode and return to the previous mode. If you are in the privileged exec mode, issuing the exit command will have no effect and you will remain in the same mode.

end: The end command is used to exit the current configuration mode or sub-mode and return directly to the privileged exec mode. It bypasses any intermediate modes and takes you directly to the top-level mode. So, regardless of the configuration mode you are in, using the end command will always return you to the privileged exec prompt.

1. Cisco devices, such as routers and switches, have different command modes for different tasks. The two main modes are the user exec mode (represented by a ">" prompt) and the privileged exec mode (represented by a "#" prompt). Within the privileged exec mode, there are various configuration modes for different configuration tasks, such as global configuration mode, interface configuration mode, etc.

2. When you are in a configuration mode, such as global configuration mode or interface configuration mode, using the exit command will return you to the previous mode. However, if you are already in the privileged exec mode, the exit command will have no effect.

On the other hand, the end command is specifically designed to exit from any configuration mode and return directly to the privileged exec mode, regardless of the current configuration mode. It is a convenient way to quickly return to the privileged exec prompt without having to issue multiple exit commands to navigate through multiple configuration modes.

#SPJ11

Learn more about privileged exec mode here:

brainly.com/question/32405408

what is computer technology?​

Answers

Answer:

Computer technology is a technology that instead of building a physical machine for each application builds a logical or virtual machine

Answer: Sometimes abbreviated as tech, technology is knowledge or a set of tools that helps make things easier or resolve problems. Examples are: software applications and operating systems; web-based information and applications such as distance learning; telephones and other telecommunications products; video equipment and multimedia products that may be distributed on videotapes, CDs, DVDs, email, or the World Wide Web

Explanation: Computers make people's lives easier and more comfortable: they provide opportunities for staying in touch to billions of people who may very well be in different parts of the world. Today people can drive computerized cars and work for employers from other countries without even seeing them.

You often need to have several applications open at the same time. Which requirement is related to this need?

A. amount of memory
B. data storage capacity
C. processor speed
D. peripherals

Answers

Answer:

processor speed is the answer but not sure

Describe how to create a list with bullets

Answers

If on docs or a similar writing app, there should be a button with a block dot and lines that when clicked will allow you to make a bullet list
If on paper, just draw a black dot and write each point you want to make on a separate dot.
Other Questions
Sammy has worked for a company with a retirement program, and today is retiring from her job with the amount of $155 in her retirement account. She decides to withdrawal an equal amount from this account, once a year, beginning immediately, and ending 16 years from today (for a total of 17 payments). If the interest rate is 5.50%, solve for the annuity amount such that she uses up her full accumulation. $ Place your answer in dollars and cents. Do not use a dollar sign or comma as part of your answer. For example, an answer of fifty four point three eight would be placed as 54.38. If you invest $1,000 at the end of each year for the next 12 years and earn 14% pet year. how much would you have at the end of 12 years? YOOO BESTIESSS WHATS THE ANSWER AND WHAT ARE THE 5 PLOTSSSSS How many moles can be found in 22g of Co2? A. 1.5 B. 2 c. 480 D. 0.5 show work Exposure to bright light causes the? luis is being asked to remember a series of the following 15 letters: fohhoweswanfbua. he finds this to be easier to remember as foh-how-esw-anf-bua rather than 15 individual letters. luis has used a process known as an expectation of business process design is that the improvements in performance will be at a minimum incremental. Can someone help me with this ONE question? Write an equation.. and solve for X which of the following are evidence in support of the endosymbiosis theory of organellogenesis for mitochondria and chloroplasts?a. Mitochondria use 80S ribosomes to synthesize protein, just as bacteria do b. Mitochondria have genomes that are circular, just as bacteria do c. Chloroplasts have a double membrane, just as bacteria do d. Chloroplasts divide in a similar fashion as bacteria and use similar division machinery Please answer correctly !!!!!!!!!!!! Will mark Brianliest !!!!!!!!!!!!! URGENT When installing post- tension cables, all of the following practices are acceptable except How many numbers greater than 4000 can be formed with the digits 2 3 4 5 and 6 when no digit is repeated? When does energy from air transfer to ocean and when does energy from ocean transfer to air, HELP CUZ IM IN NEED OF HELP how long do salamanders grow How do states assign votes to candidates? Government's job is protect the rights of the people is stated in which part of the Declaration of Independence? find x to the nearest hundreths find cf dr where f=xi 4zyj xk and c is r=ti t2j t3k for 2t3. Which amendment would deal with news sources like CNN and FOX NEWS?