20
Select the correct answer.
Part of social health means that you make positive contributions to your community,
ОА.
True
OB
False
Reset
Next

Answers

Answer 1

Answer:

true

Explanation:

because my 8 ball said so

Answer 2

Answer:

True

Explanation:


Related Questions

functional dependency vehicleid --> ownername exists in the table vehicle. vehicle vehicleid type make ownerid ownername 111 car ford o1 pam 222 car ford o2 pat 333 truck honda o3 pam 444 car honda o1 pam group of answer choices true false

Answers

The given functional dependency of vehicle ID on the behalf of username is found to be incorrect. So, it is absolutely false.

What is Functional dependency?

Functional dependency may be defined as a type of relational database theory that significantly represents the constraint between two sets of attributes in a relation from a database.

On the basis of functional dependency, the relationship between vehicle IDs with respect to the username has been allocated to the individuals irrespective of another type of information. It basically determines the sense of one attribute uniquely that determines another attribute.

Therefore, the given functional dependency of vehicle ID on the behalf of username is found to be incorrect. So, it is absolutely false.

To learn more about Functional dependency, refer to the link:

https://brainly.com/question/28812260

#SPJ1

What is shotgun microphone?

Answers

Answer:

A type of microphone characterized by an extremely directional polar pattern. Shotgun mics may be condenser or dynamic, but are almost always built with a long (8 to 24 inch) tube protruding from the front.

Explanation:

Shotgun mics are long, narrow tubes with slits evenly spaced along each side and a capsule near the rear end.

Determine which careers you can enter after completing a training program and which careers require a college degree.

Answers

Answer: statistician automotive engineer customer service specialist data modeler broadcast technician video systems technician

Explanation:

what is UTP in terms of network​

Answers

Answer: Unshielded bent match (UTP) could be a omnipresent sort of copper cabling utilized in phone wiring and neighborhood region systems (LANs). There are five sorts of UTP cables recognized with the prefix CAT, as in category each supporting a distinctive sum of transfer speed.

Explanation:

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. What version of Windows 10 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop

Answers

The Windows 10 Home edition does not have the ability to lock the hard drive and render it unusable if removed from a laptop.

The feature of locking the hard drive to prevent usability if removed from a laptop is known as "Device Encryption" or "BitLocker." This feature is only available in the Pro and Enterprise editions of Windows 10.

Windows 10 Home does not include the BitLocker functionality, which means it does not have the ability to lock the hard drive for security purposes in case of theft or unauthorized access.

If Andrew's boss requires the computers to have the ability to lock the hard drive and render it unusable if removed, they would need to consider using Windows 10 Pro or Enterprise edition rather than the Home edition.

These higher-tier editions provide the necessary security features such as BitLocker encryption to protect data in case of theft or physical removal of the hard drive from the laptop.

Learn more about Windows 10 here:

brainly.com/question/31563198

#SPJ11

difference between tablet and smart phone

Answers

Answer:

What is the difference between tablets and smartphones? The main difference is the size of the screen. Smartphones usually have screen sizes between 4″/10cm and 7″/17cm, a tablet is anything over this. When it comes to processing power and available apps—they usually share the same capabilities.

Explanation:

Tablets are overwhelmingly used to play games and access entertainment (67 per cent), while smartphones are divided between games, social networking, and utilities (to name a few). Basically, tablets are seen as an entertainment platform, while smartphones are considered mostly a communications device.

Why should even small-sized companies be vigilant about security?

Answers

Answer:businesses   systems and data are constantly in danger from hackers,malware,rogue employees, system failure and much more

Explanation:

hackers are everywhere

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario

Answers

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

As a student, what are the things you need to know to start building a program?

Answers

Answer:

Get the basics right. When you start learning, the first thing you need to be sure of are the“basics”. ...

Build patience. The number one prerequisite for being successful as a programmer is building patience. ...

Set a goal & move towards it. ...

Do more projects. ...

Get into social coding. ...

Balance your learning.

Match the language with its generation.
"third generation"
"second generation"
"first generation"
"fourth generation"

machine language
assembly language
BASIC
Visual Basic .NET

Answers

"first generation" - machine language

"second generation" - assembly language

"third generation" -  high-level languages, like BASIC

"fourth generation" - high-level languages, like Visual Basic .NET

Answer:

1st gen - Machine language

2nd gen- Assembly language

3rd gen- Basic

4th gen- Visual Basic .Net

Explanation:

hi
is it right?
"I think there is a small mistake in the quotation(second not first)"​

hiis it right?"I think there is a small mistake in the quotation(second not first)"

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

  The correct option to this question is:

.clr{color:blue;}

I write the complete code of HTML using this CSS style to execute this scenario as given below

<html>

<head>

<style>

.clr

{

color:blue;

}

</style>

</head>

<body>

<a href="pg.html" class="clr">click here</a>

<h2 class="clr">Home</h2>

</body>

</html>

The bold text is a complete code of this question.  When you will run it it will execute a link and Home text on the page in blue color. So the correct option is .clr{color:blue;}

Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d

Answers

D. It is a technique that allows all of a file's data to be restored from

compressed data. Lossless compression shrinks the image without sacrificing any crucial information.

More about lossless compression

A type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.

By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.

Learn more about lossless compression here:

https://brainly.com/question/17266589

#SPJ1

All of the following are negatives of cloud computing except ________. the company has to rely on vender management loss of control no control over prices dependency on a vendor having a disaster recovery plan 1 points

Answers

All of the following are negatives of cloud computing except "having a disaster recovery plan." Cloud computing refers to the delivery of computing services, such as storage, software, and processing power, over the internet.

While there are numerous benefits, some potential drawbacks include dependency on vendor management, loss of control, and lack of control over prices. In the context of cloud computing, vendor management involves overseeing and collaborating with third-party service providers to ensure optimal performance and minimize potential risks. This can be time-consuming and might create a dependency on the vendor, which can be seen as a negative aspect.
Loss of control can also be a concern, as companies may not have direct oversight or control of their data and applications when they are hosted in the cloud. Similarly, having no control over prices can be a drawback, as companies may experience price increases or unexpected fees from their cloud service providers.
However, having a disaster recovery plan is a positive aspect of cloud computing, as it allows companies to maintain business continuity and recover their data and applications in the event of a disaster. Cloud service providers often have robust disaster recovery capabilities, helping to mitigate potential downtime and data loss.

Learn more about Cloud Computing here:

https://brainly.com/question/29737287

#SPJ11

Discuss the core technologies and provide examples of where they exist in society. Discuss how the core technologies are part of a larger system

Answers

Answer:

Part A

The core technologies are the technologies which make other technologies work or perform their desired tasks

Examples of core technologies and where they exist are;

Thermal technology, which is the technology involving the work production, storage, and transfer using heat energy, exists in our refrigerators, heat engine, and boilers

Electronic technology is the technology that involves the control of the flow of electrons in a circuit through rectification and amplification provided by active devices. Electronic technology can be located in a radio receiver, printed circuit boards (PCB), and mobile phone

Fluid technology is the use of fluid to transmit a force, provide mechanical advantage, and generate power. Fluid technologies can be found in brakes, automatic transmission systems, landing gears, servomechanisms, and pneumatic tools such as syringes

Part B

The core technologies are the subsystems within the larger systems that make the larger systems to work

The thermal technology in a refrigerator makes use of the transfer of heat from a cold region, inside the fridge, to region of higher temperature, by the  use of heat exchange and the properties of the coolant when subjected to different amount of compression and expansion

The electronic technologies make it possible to make portable electronic devises such as the mobile phones by the use miniaturized circuit boards that perform several functions and are integrated into a small piece of semiconductor material

Fluid technologies in landing gears provide reliable activation of the undercarriage at all times in almost all conditions such that the landing gears can be activated mechanically without the need for other source of energy

Explanation:

Core technologies includes biotechnology, electrical, electronics, fluid, material, mechanical, and others.

What are core technologies?

Core Technologies are known to be the framework of technology systems. The major Core Technologies includes:

Mechanical StructuralMaterials, etc.

They are also called "building blocks" of all technology system as without time, technology would not be existing today.

Learn more about Core technologies from

https://brainly.com/question/14595106

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help them understand the dangers?

Answers

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

Phishing, keylogging and malware are different ways of illegally getting hold of user data to be used for fraudulent activities.

Phishing is performed by impersonation, where users or customers of a particular organization or platform are contacted by emails, text or call requesting them to provide sensitive on behalf of the institution.

Keylogging occurs when keystrokes of a user is being monitored without consent. The logged or captured keys can be used to log into the individual's information and retrieve sensitive data.

Malware involves the use of infected files delivered over a network to carry out cyber attacks capable of capturing tons of data illegally.

It is important to withhold sensitive information and contact service providers if any suspicious communication is received.

Similarly, visiting unauthorized websites should be avoided and the use of firewalls on computer system should be adopted.

Therefore, phishing, keylogging and malware are ways of perpetrating cyber crime.

Learn more: https://brainly.com/question/19588151?referrer=searchResults

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

(True/False) Binary Search on a sorted linked list has big O running time of O(log n)?

Answers

It is True that Binary Search on a sorted linked list has a big O running time of O(log n) because binary search divides the input data into two halves at every step.

As the linked list is already sorted, we can easily eliminate half of the remaining nodes at each step, which reduces the number of nodes we need to search through. This results in a time complexity of O(log n) for binary search on a sorted linked list.

However, it is worth noting that binary search is not the most efficient algorithm to use on a linked list as it requires random access to elements, which is not efficient in a linked list. Other search algorithms, such as linear search or interpolation search, might be more efficient for linked lists.

Learn more about Binary Search:https://brainly.com/question/15190740

#SPJ11

The specification (including data types, instruction types, registers) of the interface between programs and the underlying hardware is called the

Answers

Answer:

instruction set architecture

PLS HELP WITH THIS ACSL PROGRAMMING QUESTION ASAP. WILLING TO GIVE A LOT OF POINTS ! Pls answer ONLY IF YOU ARE SURE IT'S CORRECT. WILL GIVE BRAINLIEST! CHECK IMAGE FOR PROBLEM.

PLS HELP WITH THIS ACSL PROGRAMMING QUESTION ASAP. WILLING TO GIVE A LOT OF POINTS ! Pls answer ONLY

Answers

Here is one way to solve the problem statement in Python:

def create_tree(string):

   # Initialize the first array with the first letter of the string

   letters = [string[0]]

   

   # Initialize the second array with a value of 0 for the first letter

   values = [0]

   

   # Process the remaining letters in the string

   for i in range(1, len(string)):

       letter = string[i]

       value = 0

       

       # Check if the letter is already in the array

       if letter in letters:

           # Find the index of the existing letter and insert the new letter before it

           index = letters.index(letter)

           letters.insert(index, letter)

           values.insert(index, values[index])

       else:

           # Find the index where the new letter should be inserted based on the value rule

           for j in range(len(letters)):

               if letter < letters[j]:

                   # Insert the new letter at this index

                   letters.insert(j, letter)

                   # Determine the value for the new letter based on the value rule

                   if j == 0:

                       value = values[j] + 1

                   elif j == len(letters) - 1:

                       value = values[j - 1] + 1

                   else:

                       value = max(values[j - 1], values[j]) + 1

                   values.insert(j, value)

                   break

       

       # If the new letter was not inserted yet, it should be the last in the array

       if letter not in letters:

           letters.append(letter)

           values.append(values[-1] + 1)

   

   # Output the letters in order of their value

   output = ""

   for i in range(max(values) + 1):

       for j in range(len(letters)):

           if values[j] == i:

               output += letters[j]

   return output

What is the explanation for the above response?

The create_tree function takes a string as input and returns a string representing the letters in order of their value. The function first initializes the two arrays with the first letter of the string and a value of 0. It then processes the remaining letters in the string, inserting each letter into the first array in alphabetical order and assigning a value in the second array based on the value rule.

Finally, the function outputs the letters in order of their value by looping through each possible value (from 0 to the maximum value) and then looping through the letters to find the ones with that value. The output string is constructed by concatenating the letters in the correct order.

Here's an example of how you can use the function:

string = "BDBAC"

tree = create_tree(string)

print(tree) # Output: ABBBCD

In this example, the input string is "BDBAC", so the output string is "ABBBCD" based on the value rule.

Learn more about phyton at:

https://brainly.com/question/16757242

#SPJ1

Two popular feedback formulas are?____________________ and ____________________

Answers

Answer:

negative and positive

Explanation:

lexie works for a small insurance agency managing their it network. she's setting up some new file storage space and needs to provide backup coverage as well as remote access to the data. which storage type is the best solution for lexie's purposes? a. nas b. raid c. san d. ram

Answers

The storage type is the best solution for Lexie's purposes is SAN. The correct option is c.

What is storage?

Memory is the location of short-term data, whereas storage is the component of your computer that allows you to store and access data over time.

A storage area network (SAN) is a network of storage devices that can be accessed by numerous servers or computers, allowing for a shared pool of storage capacity. Each computer on the network can access SAN storage as if it were a local disc linked directly to the computer.

Therefore, the correct option is c. san.

To learn more about storage, refer to the link:

https://brainly.com/question/20116592

#SPJ1

the metric unit used for length

Answers

Answer:

kilometer

Centimeter

Meter

Milimeter

Hope it helps

Please mark me as the brainliest

Thank you

Multiple Select

In what

ways

does

a computer network make setting appointments easier?

0, by reassigning workloads to enable attendanre

0 by sending out invitations

by telephoning those involved

providina a common calendar

Answers

A computer network can provide a shared calendar system that allows users to view and update schedules in real-time. This eliminates the need for back-and-forth emails or phone calls to confirm availability and schedule appointments.

Sending out invitations: With a computer network, users can send out electronic invitations that include all the necessary details about the appointment, such as the date, time, location, and attendees. This reduces the chances of miscommunication and ensures that everyone has the same information. Reassigning workloads to enable attendance: In some cases, a computer network can help redistribute workloads to enable more people to attend appointments. For example, if one team member is unable to attend a meeting, they can still participate remotely via video conferencing or other collaboration tools.

A computer network allows users to send out invitations to appointments through email or scheduling applications, ensuring that all invitees receive the information and can confirm their attendance. A computer network also facilitates the use of shared or common calendars, which can help users view and coordinate appointments with others, making it easier to find suitable time slots and avoid scheduling conflicts.

To know more about computer network visit:

https://brainly.com/question/14276789

#SPJ11

What makes a recipe for a meal an example of an algorithm?
A. It results in a finished meal that is consumed.
B. It is outlined as a set of instructions.
C. It includes a number of ingredients.
D. It can be shared electronically over the Internet.

Answers

Answer:

b

Explanation:

it outlines as a set of instructions so you can do it correctly.

Which are characteristics of interpreters? Select
all that apply.
translate high-level programming language
into binary computer machine language
offer a program run-time that is faster than
when a compiler is used for the translation
make it possible to change the source
program while the program is running
offer a program run-time that is slower than
when a compiler is used for the translation

Answers

Answer:

translation is used for interpretation

how should a security analyst review system generated events for signs of intrusion or other problems on the network?

Answers

A software program called an intrusion detection system (IDS) automates the intrusion detection procedure. Software that combines all the features of an intrusion detection system with the ability to try to thwart potential events is known as an intrusion prevention system (IPS).

What security analyst review system generated events?

Through the client-side injection of malicious scripts, XSS vulnerabilities give attackers the ability to manipulate user interactions with web applications, plan impersonations, and/or launch phishing campaigns.

Therefore, A network intrusion detection system (NIDS) is installed at one or more strategic locations so that it can keep track of all incoming and outgoing traffic between all networked devices.

Learn more about security here:

https://brainly.com/question/16354463

#SPJ1

This is a python program my teacher assigned:
Create a list of days of the week. (yes, this uses strings)
A) Print each day using a for loop.
B) for non-school days, print “freedom” next to the day of the week.

How would I execute this?

Answers

Answer:

#Create an array for week

week = ["Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday","Sunday"]

#Create a varable index and use index to loop through week(array)

for index in week:

 #if the index is on Saturady or Sunday then, print freedom

 if index == "Saturday" or index == "Sunday":

   print(index + " Freedom")

#else just pint out the other days

 else:

   print(index)

In a partially filled array, the number of slots in the array that are not currently used is the?

Answers

Answer:

Can you please explain more

Explanation:

excel includes ____ database functions that allow you to evaluate numeric data in a table.

Answers

Excel includes various database functions that allow you to evaluate numeric data in a table. By using these and other database functions in Excel, you can quickly and easily analyze large sets of numeric data to gain insights and make informed decisions.

Excel is a powerful tool for working with large sets of data. It includes several built-in functions that can help you analyze and manipulate your data quickly and easily. When working with numeric data in a table, you may need to perform calculations or other operations on the data to get meaningful insights.

There are several different database functions in Excel that you can use to analyze numeric data in a table. Some of the most commonly used functions include:
- SUM: This function adds up the values in a specified range of cells. You can use it to quickly calculate the total value of a column or row of data in a table.
- AVERAGE: This function calculates the average value of a specified range of cells. You can use it to get a sense of the typical value of a column or row of data.
- COUNT: This function counts the number of cells in a specified range that contain numeric data. You can use it to quickly get a sense of how much data you're working with.
- MAX and MIN: These functions return the highest and lowest values in a specified range of cells, respectively. You can use them to quickly identify outliers or extremes in your data.
- SUMIF and COUNTIF: These functions allow you to perform calculations on a specific subset of your data based on a certain condition. For example, you could use SUMIF to add up all the values in a column that meet a certain criteria, such as being greater than a certain value.

To know more about Excel visit :-

https://brainly.com/question/3441128

#SPJ11

Other Questions
p8.15: the torque ratio of a gearset is 0.75. the pinion gear has 36 teeth and a diametral pitch of 8. determine the number of teeth on the output gear and the radii of both gears. 3Select the correct answer.Which value is needed to determine a confidence interval for a sample mean?O A.the sample proportionO B.the standard error of the meanO C.the margin of error for the proportionODthe population sizeResetNext I need help with this assignment ASAPIdentifying Major Figures in Modern HistoryBegin this task by selecting someone who played a major role in modern history. Below is a list of people to consider, but you may choose any person you learned about in this unit. Mohandas Gandhi. Mao Zedong Nelson Mandela Augusto Pinochet Gamal Abdel Nasser Saddam HusseinNow answer some questions about the individual you selected. Each answer should be three to five sentences in length.Part AHow could the individual you selected be considered a leader in modern history? Explain, including some background information about this person, including where and when they served as a leader.Part BWhat did this person do to be considered a leader? In your answer, you should list at least three actions and briefly explain the effects. You might need to find outside sources to answer this question. Be sure to list the sources that you consulted during your research.Part CHow was this person viewed by the people in his or her nation? How do you know what the public opinion was? You might need to find outside sources to answer this question. List any sources you consulted along with your answer.Part DHow should history remember the leader? How did this person influence other people over time? What is this leader's legacy in history? You might need to find outside sources to answer this question. List any sources you used to support your answer. Explain the process of radioactive decayWhat happens during radioactive decay Classify each of the events according to whether the solubility of the solute increases, decreases, or stays the same. Solute solubility increases Solute solubility decreases Solute solubility stays the same Answer Bank glucose in water heating the mixture CO, in blood: body temperature rises to 103 F KCI in water warming the mixture clectrolytes in solution: a mountain climber ascends 5 km with a sports drink, atmospheric pressure drops 50% a shipping company sells large boxes and small boxes. The dimensions of the large box are 3 times the dimensions of the small box.How does the volume of the large box compare to the volume of the small box?a) the volume of the large box is 3 times the volume of the small boxb) 6 timesc) 9 timesd) 27 times a rectangular channel on a 0.003 slope is constructed of glass. the channel is 10 ft wide. the flow rate is 400 ft3/s. estimate the water depth. What argument does Lincoln make about the Civil War in "The Gettysburg Address"? Which of the following is the correct definition for free cash flows to the firm? the researcher claims that there is no selective advantage to fur color, so light and dark fur color phenotypes are present in similar frequencies in the fourth generation of this mouse population. based on the data in figure 1, which of the following best evaluates this null hypothesis? responses the null hypothesis is rejected, because the change to a darker background color led to an increase in the dark-colored fur phenotype. the null hypothesis is rejected, because the change to a darker background color led to an increase in the dark-colored fur phenotype. the null hypothesis is rejected, because there is no significant difference between the frequencies of the two phenotypes right after the human-caused change to the habitat in the third generation. the null hypothesis is rejected, because there is no significant difference between the frequencies of the two phenotypes right after the human-caused change to the habitat in the third generation. the null hypothesis cannot be rejected, because there is no significant difference between the frequencies of the two phenotypes right after the human-caused change to the habitat in the third generation. the null hypothesis cannot be rejected, because there is no significant difference between the frequencies of the two phenotypes right after the human-caused change to the habitat in the third generation. the null hypothesis cannot be rejected, because the darker background color caused by the human-caused change to the habitat led to a decrease in the light fur color phenotype. The stock price for Chevrolet is $35. An investor believes that the stock price will experience significant volatility in the following six months but is uncertain about the direction of the share price movements. He decides to use a long straddle strategy by buying both a put and a call option for Chevrolet, with the same expiration date in 6 months and the same strike price of $35. The investor paid a premium of $1.77 for the call option and a premium of $1.99 for the put option. Part 1 "Attempt 1/18 for 10 pts. What will be the net profit or loss for the investor if the stock price is $38 on the expiration date of the options? 2+ decimals Submit Part 2 | Attempt 1/18 for 10 pts. Investor B believes that Chevrolet stock price will stay in a narrow range around $35 in the next 6 months. He decides to sell a straddle by selling both a put option and a call option for Chevrolet, with the same expiration date in June and the same strike price of $35. What will be the net profit or loss for the investor if the stock price is $32.04 on the expiration date of the options? 2+ decimals Submit Part 3 Attempt 1/18 for 10 pts. How far can the stock price move in either direction before the net profit of investor B becomes negative (in $)? Please help. Serious answers please preparamos la tarea todos los diasa. Diego y yob tuc. Laurad. Mario y Oscar e. yo Your parents are always complaining that you do not do enough housework. they say that you should be helping them out because you are only a student and you have a lot more spare time than them. the number of hours per week that your parents work has a mean of 48.69 hours and a standard deviation of 2.90 hours. you believe that the number of hours per week that you have to study for university has a mean of 48.17 hours and a standard deviation of 2.60 hours. you plan to record the number of hours that you study each week over 15 randomly selected weeks throughout the year. calculate the probability that the mean of your sample is greater than the mean number of hours per week worked by your parents. assume that the population of study hours per week is normally distributed. give your answer as a decimal to 4 decimal places. probability Please Help!!!This is due today!!! Calculate the ending balances to update the t-accounts for the next accounting cycle. Be sure to enter all zero balances on the normal balance side and enter balances for permanent accounts! Retained Earnings Dec. 31 24,600 39,300 Adj. Bal. 5,000 Dec. 31 Income Summary Dec. 31 5,300 11,000 Dec. 31 5,700 Bal. Dec. 31 5,700 Cash Dec. 31 19,800 Service Revenue Dec. 31 14,300 14,300 Adj. Bal. Common Stock 55,900 Dec. 31 Supplies Expense Adj. Bal. 900 900 Dec. 31 Dividends Adj. Bal. 9,500 9,500 Dec. 31 Accounts Payable 4,000 Dec. 31 Thesis statement for child abuse ppose we are testing a new shampoo to see if it makes hair grow faster. We knowthat the average rate of hair growth is 0.5 inches per month. The hypothesis are as follows:H0:m0:5vs.H1:m>0:5. Suppose that the null hypothesis is not rejected and that thereal truth is that the shampoo actually does make hair grow faster. What type of error, if any,occurred? help pls i need this asap how does Stevie Wonder feel about life for African Americans in the 1970's?