6. The ink pen was dropped by her parent. Change this sentence to active voice. *

Answers

Answer 1

Answer: g what are you talking ab

Explanation:

Answer 2
"Her parent dropped the ink pen." would be the active voice of this sentence

Related Questions

Any netflix recomendations?

Answers

Watch maid-sama or one peice
Deathnote, Violet Evergarden, Arcane, Erased, Anne with an E, A Silent Voice. :)

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string an alphanumeric a float an integer

Answers

Answer:

an integer because it is the most common form of the atom and the same way it is used to be used to describe the same type of them

Answer:

^^^^ He is right

Explanation:

What are some machines, places or apparatus that sensors could be used in? Give at least five examples.

Answers

Answer:

Sorry

Explanation:

A sensor could be used in a school,jails or courts, amusement parks and museums.

HEY CAN SOMEONE HELP ME OUT WITH THESE QUESTION PLZ THERE DUE TODAY!!!

1. Imagine you came across the following article when searching online to try and solve a disagreement with your friend on the topic. What are two strategies you might use to determine who wrote this information and whether you believe it is credible?

2. Use searching laterally to find more out about obesitymyths.com and if it is credible. Share your findings here.


3.Look at the reference article. The Atlantic is considered a credible source, but this article is a native ad. What do you see on the page that might hint to you that it isn’t credible?

HEY CAN SOMEONE HELP ME OUT WITH THESE QUESTION PLZ THERE DUE TODAY!!!1. Imagine you came across the

Answers

Answer:

i have no idea but i didnt see this until today soooooooooooooo

Explanation:

I’m to late... sorry :(

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

Why is a repeat command helpful when programming a turtle?

A. it gives input B. it engages memory C. it saves time when writing code D. it rotates objects

Answers

Answer:

C. it saves time when writing code

Explanation:

A repeat command (also known as a loop) is a programming statement that allows a block of code to be executed repeatedly for a specified number of times. When programming a turtle, a repeat command can be very helpful because it allows the same set of commands to be executed multiple times without having to write them out repeatedly. This can save a lot of time and make the code much shorter and easier to read.

For example, if a programmer wants a turtle to draw a square, instead of writing out the commands to move the turtle forward, turn right, move forward, turn right again, and so on, they can use a repeat command to tell the turtle to perform those same commands four times. This makes the code much more efficient and easier to read, and can help prevent errors that might occur if the programmer had to write out the same commands multiple times.

Answer:

c

Explanation:

1. Why is it important to know how to create a slide?

2. How can you utilize the knowledge in making a slide as a student?​

in own sentence pls

Answers

1. Knowing how to create a slide is important because it is a useful tool for organizing and presenting information in a visual and engaging way, which can help to enhance communication and understanding.

2. As a student, knowing how to create a slide can be beneficial for presenting research findings, summarizing key information, and organizing study materials in a clear and visually appealing way to aid in the learning process.

Answer:

1. Because slides help in improving visual aids. It improves understanding when teaching student.

2. You can make projects, shows, teach others, and play with it just for fun

Explanation:

How do you code things to make shapes out of them and add color

Answers

Answer:

go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top

Help me ASAP
(100 points for quick reply)

Nights and Dragons—
From the memoir of author Abigail Prynne
1
I sit at my desk listening to thunder growl outside my window. Flashes of light burst through the darkness, and wind races past my window. The thrilling combination of sight and sound conjures up visions of dragons roaring proudly, breathing fire, and soaring across the midnight sky. Dragons first fascinated me when I was a little girl. They have followed me ever since. The magnificent creatures appeared in storybooks I read in the library, paintings I saw in museums, movies I watched in the theater, and the dreams I had in my sleep. By the time I was thirteen, one question consumed me. I wanted to know if dragons ever existed, so I set out on a quest for facts.
2
As I started my research, I discovered many skeptics. Scientists presented evidence to show why dragons could not—and did not—exist. They explained that it would be impossible for dragons to fly because they would be too big. They laughed at the idea of dragons breathing fire. They pointed out that no other animal has ever done this. They said that if dragons had lived, someone would have found remains somewhere in the world. No bones about it, there were plenty of logical explanations. It would have been easy for me to accept that the only place dragons ever existed was in the imaginations of those who believed.
3
I could have given up, but I thought about my grandmother. She always told me that "people who believe that science is the answer to everything are missing out on everything else." With her words in mind, I searched some more. There were many facts that hinted that dragons may not be fictional. I noticed that cultures across the world all described dragons in similar ways. This was odd because they had no way to communicate with each other. I found dragons mentioned in more than just stories. They appeared in old legal papers, in the travel logs of Marco Polo, and in the Bible. I saw that the Chinese calendar uses a different animal each year. Dragons are included along with eleven real animals. I began to believe it was a real possibility that all of these people were talking about a creature that actually existed.
4
With renewed hope that there was some truth to the legends, I looked for new research. I found that some experts disagreed with popular arguments against dragons. They suggested that a dragon could have four stomachs like a cow. If it created stomach gases like birds, it might create enough to lift itself off the ground. This would give it the ability to fly. If it forced out air when diving toward the earth, it might release gases which could ignite into flame. When the animal died, the stomachs would release strong acids that would dissolve its dead body over time. Biologists backed up these ideas with sketches and models based on known animals. Not everyone agreed with these ideas, but many of the things we accept about dinosaurs and other extinct species started the same way.
5
I doubt we will ever truly know whether dragons existed. There may always be two sides to the fiery debate. Some will say the stories come from active imaginations. Some will believe with all their hearts that the legendary creatures roamed our ancient world. I don't know for certain which side to believe, but the sound and fury of a night like this makes me smile. It rekindles my childhood dreams and keeps the exciting possibility alive.

Which best states the main idea of the text?


A.
I have found no proof that dragons ever existed.

B.
I have found some proof that dragons may have existed.

C.
I have always wondered if dragons existed, and I hope they did.

D.
I have not been able to decide if dragons ever existed or not.

Answers

I would say B
My reason being is that science has had many logical reasons that this is impossible but with the hope of dragons being a reality she found some information that defies science.
The answer is B , because there is proof of dragons and also there is no proof at all so who to say they didn’t exist or still exist?

Everything that you see on a computer screen is a representation of which of the following?

A.
floats

B.
0s and 1s

C.
database messages

D.
flowchart input

Answers

Answer:

B

Explanation:

coding and programming for the computer to something on command (pressing keys etc)

Answer:B

Explanation:

Which line of code needs to be executed before you execute num = random.randint(1,10) ?

A.
create random

B.
import random

C.
import randint

D.
randint = random

Answers

Answer:

c

Explanation:

The correct line of code that needs to be executed before num = random.randint(1,10) is option B import random.

The random module in Python provides various functions for generating random numbers, including randint, which is used in the given line of code.

By importing the random module, you make its functions and classes available for use in your code. Therefore, it is necessary to include the line import random before calling random. randint(1,10) to ensure that the randint function is accessible and can be used to generate a random number between 1 and 10.

Learn more about Python on:

https://brainly.com/question/30391554

#SPJ1

WILL MARK BRAINLY

Which of the following is considered proper ergonomics?

Elevating keyboard, so wrists are bent when typing
Placing the mouse close to the keyboard
Resting wrists on the desk while typing
Working on a computer while sitting in a recliner

Answers

Answer:

resting wrists on the disk while typing

The disc drive goes fast

I'm very confused. Can someone p|z explain what's happening here?

(view screenshots below)

(I drew a cursor on most of the pictures because I can't screenshot with my cursor meaning when I take a screenshot, my cursor will disappear and so I drew the cursor on the pictures so that way you could see where I was clicking)

I'm very confused. Can someone p|z explain what's happening here? (view screenshots below)(I drew a cursor
I'm very confused. Can someone p|z explain what's happening here? (view screenshots below)(I drew a cursor
I'm very confused. Can someone p|z explain what's happening here? (view screenshots below)(I drew a cursor
I'm very confused. Can someone p|z explain what's happening here? (view screenshots below)(I drew a cursor

Answers

Answer:

It just means that when you answer questions the person who asked it has to vote you as 'brainliest' so you get points or something but the person who has asked it gets to pick who becomes brainliest

I think it’s a glitch

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

what computer languages should i start with + learn if i want to be a pentester/programmer and where can i learn them

Answers

Answer:

Chinese

Explanation:

I'm not sure I understand your question. Good day.

Jason needs to add a picture of his baseball team to the team's web page. Which file format should he use?

ZIP
IMG
JPG
MPG

Answers

Answer:

JPG file(s)

Explanation:

JPG are typically used for digital images. Since he's posting this onto a website, he should use the JPG file format.

Answer: JPG would be the best!

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

What motivated Barbara MBANEFO to become an engineer?

Answers

Answer:

to help her community and give hope to others

Explanation:

She was very helpful, kind and cooperative to others and other people also inspire her to be an engineer.

one word instructions are also known as

Answers

One word instructions are also known as COMMANDS
your answer would be commands, hope this helps

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Write the importance of software in computer . In 6 points ​

Answers

Answer:

Software is a set of instructions, data or programs used to operate computers and execute important tasks but can also help you work more efficiently.

Uses of Software

Uses of Software in Office.Uses of Software in Business.Uses of Software for Play Game.Uses of Software in Shop.Uses of Software for Entertainment.

Explanation:

I think most important software in computer is terminal because it can control any part to computer and can do things we cannot de with other apps

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

how do you disable goguardian on a school chromebook?

Answers

I don’t think you can but you can ask someone if something you need is blocked

Answer:

Navigate to Filtering > Configuration > Advanced Config > Scheduling.

Disable the Enable Out of School Mode toggle.

Explanation:

Or just factory reset, but that will get rid of everything.

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!

Answers

Answer:

computer system normally stores characters using the ASCII code. Each character is stored using eight bits of information, giving a total number of 256 different characters (2**8 = 256).

Explanation:

Not sure but I think the answer that answered first is correct

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

If you want the words “My puppy is a poodle” to appear in the interpreter. What code should you use?

A.
create "My puppy is a poodle"

B.
execute ("My puppy is a poodle")

C.
print("My puppy is a poodle")

D.
print "My puppy is a poodle"

Answers

Answer: Probably C


(also, C and D say the same thing)

I think It’s probably c :)

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

Other Questions
G.I.S.What is G.I.S.?ExamplesHow does G.I.S. work?How is G.I.S. helpful?What is G.P.S.? What is the marginal cost function formula? after reviewing your pie chart, you realize that it could be improved by resizing the segments. resizing the segments in proportion to each segment's relative value enables you to visually show the different values. Arrange the types of questions used to select participants for a focus group in the order in which they are asked. (Place the first type at the top.)1. questions that eliminate2. Questions that ensure criteria3. open-ended questins Question 2(Multiple Choice Worth 5 points)(05.01)Miller has a painting that is 4 ft by 8 ft. What will the dimensions of the painting be if he scales it down by a factor of one-fourth ? 4 ft by 8 ft 2 ft by 4 ft 1 ft by 2 ft 16 ft by 32 ftPls help if you know - Thank you 145 x 36 what is the first partial product, second partial product and final product? Fill in the blankA(n) ________ can be either addition, subtraction, division, or multiplication. What is the equivalent resistance of the circuit shown? 15 ohms 1.2 ohms 27 ohms 13.2 ohms Find the solution to the system of equations. y=x+2 and 4x+2y=16I was wondering how you solve this? I know the answer but i keep getting 6,4 instead of the actual answer which is 2,4 Which of the following helps an adolescent make good relationship decisions?adultshormonespeersmedia - How did European contact change theAmericas? Using the Mandate of Heaven, how would the Chinese traditionally have explained the insurrection at the US Capitol, January 6, 2021? Quadrilateral T'R'A'M os rotated S -goo about the origin. Which one of the following statements relating to intangible assets is true?A Expenditure on the prototype of a new engine cannot be classified as an intangible asset because the prototype has been assembled and has physical substanceB All intangible assets must be carried at amortised cost or at an impaired amount; they cannot be revalued upwardsC The development of a new process which is not expected to increase sales revenues may still be recognised as an intangible assetD Impairment losses for a cash generating unit are first applied to goodwill and then to other intangible assets before being applied to tangible assets The general trend that is shown on the graph is that average surface temperature on Earth o has fallen by 0.4C since 1880. o has risen by nearly 1C since 1880. o dropped a fraction of a degree in 2000. o rose sharply betuneen the tears 1900 and 1920 (Pickleball) the biggest thing holding back most intermediate pickleball players is If f(x)=x-2x, which expression equivalent to f(i)? An advantage that bureaucrats in federal government have over the president in the policymaking process is that bureaucrats. Calendar Inbox History Help MF Mostly survy 1 pint Hailey Corp paid $12,000 for one year of insurance on January 1. How much will Hailey record as an insurance expense on March 31st, adjustments are made at the end of each month? $1,000 O $2.000 $10.000 $3,000 2 1 Hailey Corp paid $12,000 for one year of insurance on January 1. How much will Hailey record as an insurance expense on 0 5:13 PM 5/27/2022 hil tod Dashboard Calendar jo to Hatory Help MY Mly sunny 2 Hailey Corp paid $12,000 for one year of insurance on January 1. How much will Hailey record as an insurance expense on March 31st, if no adjustments have been made in the last 3 months. (Note: Difference in last sentence) $1,000 13.000 $2.000 O $10.000 Submit de And $13 PM 1/27/2002 If rick has 35 oranges and he divide them into equally into 7 bags. what fraction represents the number of oranges rick puts in each bag?