A foreign exchange student from Italy is giving a presentation on Italian cuisine to an audience of professional cooks. What is the best presentation style for this purpose?

an informal one, without the use of visual aids
a formal one, with the use of visual aids
an informal one, with the use of visual aids
a formal one, without the use of visual aids

Answers

Answer 1

Answer:

The answer is B! "a formal one, with the use of visual aids"

Explanation:

I took the assignment and got it correct!

Can I have Brainliest please?

Answer 2

The best presentation style for this purpose is a formal one, with the use of visual aids.

What are visual aids?

Visual aids are known to be any things that a person can use and one which people can look at, e.g. film, graph, etc., that can help people to understand or remember the information that you are showing.

Note that the best presentation style for this purpose is a formal one, with the use of visual aids because it is a formal  event and the use of visual aids will help them to remember the information passed.

Learn more about visual aids from

https://brainly.com/question/3610367

#SPJ2


Related Questions

the person who receives an e-mail​

Answers

i believe the answer to your question is email recipient!!

Skyline Industries Limited (SIL) is a short-run manufacturer of metal components. A short-run manufacturer makes prototypes and samples.they also
make replacement parts that are no longer stocked by major manufacturers. SIL is listed on the Major Stock Exchanges
samples. T
Board of Directors. SIL has a Board of Directors. The president of SIL, Stephen Cooper, is also Chairman of the Board. His wife, Candace, also sits on the board. Each owns 20%
of SIL. Stephen's sister, Daisy Cote, is a lawyer whose firm advices SIL She also sits on the Board of Directors along with her father-in-law, Percival. The law
firm does not permit holdings in client's businesses. Percival owns roughly 3% of SIL through shares purchased on the open market.
The other three members of SIL's board are all outside directors not related to the family. Ronald Payment, CPA, heads the audit committee and recently
retired from a bank. He has recommended an internal control department be created once SIL's sales reach $100 million. Sales for the current year are
expected to be $96 million.
Finance Department
The accounting department has sixteen personnel, Peter Johnson, CPA, is VP Finance and has sixteen years of post-qualification experience. The Controlle
Liza Clark, is also a CPA and has five years of post-qualification experience. She directly supervises Charles Lucas who is completing his work experience
requirement to become a CPA. Charles passed his CPA exams last fall and is made the Assistant Controller.
Operations
One of Charle's duties is to revise all control procedures and accounting manuals. Many of the procedures and manuals refer to paper systems that are no
longer used. With the expansion of 3-D scanners and CADCAM software, most orders are now placed through a secure web portal. Unlike the past, SIL's
personnel may never meet their clients. Plans are sent electronically, parts are made, then shipped to wherever the client directs them,
Electronic transmission of data and financial information may also mean a reorganization of accounting staff. Transaction recording duties have given way
to a need for analytics. Due to high fixed costs relative to production runs, some contracts have resulted in losses. Peter is adamant that no current
personnel lose their jobs during the transition. Neither Peter nor Liza are certain that the clerks who are competent in their current roles can turn into
analysts.

Answers

SIL's board comprises family and independent directors. As sales approach $100 million, SIL plans to establish an internal control department. The accounting department, led by experienced professionals, is adapting to new technologies.

Skyline Industries Limited (SIL) is a metal component manufacturer listed on major stock exchanges. SIL's board of directors includes family members and independent directors.

With anticipated sales of $96 million, SIL plans to establish an internal control department once sales reach $100 million. The accounting department, led by experienced professionals, is adapting to the use of 3-D scanners and CADCAM software for order placement.

The transition may require reorganizing the accounting staff to focus more on analytics. SIL aims to retain current personnel during this shift, although concerns exist regarding their suitability for new roles as analysts.

Learn more about internal control: brainly.com/question/26398073

#SPJ11

Can someone help me with Unit 7 of cmu cs academy python. PLSS EMERGENCYY

Answers

Carnegie Mellon University's CMU CS Academy is an online, graphics-based computer science curriculum taught in Python.

Why is Phyton important?

Python has become a data science industry standard, allowing data analysts and other professionals to do complicated statistical computations, produce data visualizations, design machine learning algorithms, handle and analyze data, and accomplish other data-related jobs.

Development time is far more essential than computer run time in today's society. Python just cannot be beat in terms of time-to-market. Python is also efficient and dependable, allowing developers to design complex programs with minimal effort.

Learn more about Phyton:
https://brainly.com/question/31768977
#SPJ1

CORRECT ANSWER WILL BE MARK AS BRAINLIEST AND SPAM WILL BE REPORTED
What is the one major difference between ROM and RAM?
(dont want a copy paste answer from google if you are sure then only answer)

Answers

Answer:

ROM - Read Only Memory; Allows for the storage of files in a permanent state. Allowed to go back to Memory and get information from it at anytime and be able to work on it, at which point its turns to the RAM's job.

RAM - Random Access Memory; Allows for storage of files in a Temporary state. Files get cleared from RAM once file is closed or exited.

You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the hard drives and RAM being stolen from inside the computers. What could they do to prevent this from happening

Answers

Explanation:

To avoid the theft of  the hard drives and RAM being stolen from inside the computers, all they need to do is replace the PC's screws with proprietary security screws. These screw have very different head, thus impossible to unscrew with common tools. They are also called tamper proof screws.

The _____ contains lists of commands used to create presentations.
Outline view
Menu bar
Slide pane
Title bar

Answers

Answer:

The menu bar is correct

Explanation:

EDG2021

if you wanted to connect two networks securely over the internet, what type of technology coudl you use

Answers

If you wanted to connect two networks securely over the internet, the type of technology you could use is Virtual Private Network (VPN).

VPN creates a secure, encrypted connection between two networks over the internet.

It allows users to connect to a private network over the internet as if they were directly connected to the network, even if they are in a remote location.

VPNs use encryption to protect the data that is transmitted between the two networks. This ensures that the data remains private and secure from unauthorized access.

VPN is commonly used by businesses and organizations to provide remote access to their employees. It can also be used to connect two networks together over the internet. VPN is an effective solution for connecting networks securely over the internet.

Learn more about VPN at:

https://brainly.com/question/14122821

#SPJ11


Solution of higher Differential Equations.
1. (D4+6D3+17D2+22D+13) y = 0
when :
y(0) = 1,
y'(0) = - 2,
y''(0) = 0, and
y'''(o) = 3
2. D2(D-1)y =
3ex+sinx
3. y'' - 3y'- 4y = 30e4x

Answers

The general solution of the differential equation is: y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x).

1. To solve the differential equation (D^4 + 6D^3 + 17D^2 + 22D + 13)y = 0, we can use the characteristic equation method. Let's denote D as the differentiation operator d/dx.

The characteristic equation is obtained by substituting y = e^(rx) into the differential equation:

r^4 + 6r^3 + 17r^2 + 22r + 13 = 0

Factoring the equation, we find that r = -1, -1, -2 ± i

Therefore, the general solution of the differential equation is given by:

y(x) = c1e^(-x) + c2xe^(-x) + c3e^(-2x) cos(x) + c4e^(-2x) sin(x)

To find the specific solution satisfying the initial conditions, we substitute the given values of y(0), y'(0), y''(0), and y'''(0) into the general solution and solve for the constants c1, c2, c3, and c4.

2. To solve the differential equation D^2(D-1)y = 3e^x + sin(x), we can use the method of undetermined coefficients.

First, we solve the homogeneous equation D^2(D-1)y = 0. The characteristic equation is r^3 - r^2 = 0, which has roots r = 0 and r = 1 with multiplicity 2.

The homogeneous solution is given by,  y_h(x) = c1 + c2x + c3e^x

Next, we find a particular solution for the non-homogeneous equation D^2(D-1)y = 3e^x + sin(x). Since the right-hand side contains both an exponential and trigonometric function, we assume a particular solution of the form y_p(x) = Ae^x + Bx + Csin(x) + Dcos(x), where A, B, C, and D are constants.

Differentiating y_p(x), we obtain y_p'(x) = Ae^x + B + Ccos(x) - Dsin(x) and y_p''(x) = Ae^x - Csin(x) - Dcos(x).

Substituting these derivatives into the differential equation, we equate the coefficients of the terms:

A - C = 0 (from e^x terms)

B - D = 0 (from x terms)

A + C = 0 (from sin(x) terms)

B + D = 3 (from cos(x) terms)

Solving these equations, we find A = -3/2, B = 3/2, C = 3/2, and D = 3/2.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1 + c2x + c3e^x - (3/2)e^x + (3/2)x + (3/2)sin(x) + (3/2)cos(x)

3. To solve the differential equation y'' - 3y' - 4y = 30e^(4x), we can use the method of undetermined coefficients.

First, we solve the associated homogeneous equation y'' - 3y' - 4y = 0. The characteristic equation is r^2 - 3r - 4 = 0, which factors as (r - 4)(r + 1) = 0. The roots are r = 4 and r = -1.

The homogeneous solution is

given by: y_h(x) = c1e^(4x) + c2e^(-x)

Next, we find a particular solution for the non-homogeneous equation y'' - 3y' - 4y = 30e^(4x). Since the right-hand side contains an exponential function, we assume a particular solution of the form y_p(x) = Ae^(4x), where A is a constant.

Differentiating y_p(x), we obtain y_p'(x) = 4Ae^(4x) and y_p''(x) = 16Ae^(4x).

Substituting these derivatives into the differential equation, we have:

16Ae^(4x) - 3(4Ae^(4x)) - 4(Ae^(4x)) = 30e^(4x)

Simplifying, we get 9Ae^(4x) = 30e^(4x), which implies 9A = 30. Solving for A, we find A = 10/3.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x)

In conclusion, we have obtained the solutions to the given higher-order differential equations and determined the specific solutions satisfying the given initial conditions or non-homogeneous terms.

To know more about Differential Equation, visit

https://brainly.com/question/25731911

#SPJ11

What is the missing word?
if numA< numB: # line 1
numX = numA # line 2
numA > numB: # line 3
numX = B # line 4

Answers

Answer:

The answer is elif

Explanation:

I got it right in the assignment

The missing word in the given statement is as follows:

if numA< numB: # line 1

        numX = numA # line 2

        elif numA > numB: # line 3

        numX = B # line 4.

What is Elif?

Elif may be characterized as a short "else if" function. It is used when the first if statement is not true, but you want to check for another condition. If the statement pairs up with Elif and the else statement in order to perform a series of checks.

According to the context of this question, if-elif-else statement is used in Python for decision-making i.e the program will evaluate the test expression and will execute the remaining statements only if the given test expression turns out to be true. This allows validation for multiple expressions.

Therefore, The missing word in the given statement is Elif.

To learn more about Elif function in Python, refer to the link:

https://brainly.com/question/866175

#SPJ5

___ design uses the same webpage content, but applies styling depending on the viewport size of the device

Answers

coding design used snake

Which of the following is most likely to occur if a special effects artist holds up production on a feature film because he is not satisfied with the “look” of the work?

A. The artist will be offered future contracts.
B. The artist will not be offered future contracts.
C. The artist will earn the respect of his colleagues.
D. The artist will be fired.

Answers

It definitely B I say because what if he made the film worse than it is.

(just basic coding I can't wrap my around :L) Which of the following shows the assignment of a string to a variable? Select 3 options.

answer = input("How old are you? ")

answer = "23"

answer = (23)

answer = '23'

answer = 23

Answers

Answer:

The answer is A, B, D.

Explanation:

I hope this helps. Have a great day and be safe.

Your network devices are categorized into the following zone types:-No-Trust zone-Low-trust zone-Medium-trust zoneHigh-trust zone

Answers

Properly categorizing network devices into various zone types can help network administrators to manage and secure the network infrastructure. The four main zone types are no-trust zone, low-trust zone, medium-trust zone, and high-trust zone.

Network devices are important for maintaining a secure network infrastructure. To ensure that devices are working properly, they are often categorized into various zone types. These zone types can help network administrators to effectively manage devices and ensure that they are secure. The following are the four main zone types:No-Trust Zone: Devices in the no-trust zone are considered untrusted and may pose a security risk. They may be devices owned by external parties or those that are not compliant with security policies. Devices in this zone should have restricted access and be monitored closely.

Low-Trust Zone: Devices in the low-trust zone are considered less risky than those in the no-trust zone, but they are still not fully trusted. Examples of devices in this zone may include user workstations and devices that have access to external networks. Access to devices in this zone should be restricted and monitored.Medium-Trust Zone: Devices in the medium-trust zone are considered trusted and may include servers that are critical to the organization's operations. Access to devices in this zone should be carefully controlled and monitored.High-Trust Zone: Devices in the high-trust zone are considered highly trusted and may include network management systems and servers that control network operations.

Access to devices in this zone should be limited and closely monitored, and only authorized personnel should have access to these devices.In conclusion, properly categorizing network devices into various zone types can help network administrators to manage and secure the network infrastructure. The four main zone types are no-trust zone, low-trust zone, medium-trust zone, and high-trust zone.

Learn more about Organization here,https://brainly.com/question/19334871

#SPJ11

Network devices are categorized into different zone types based on the level of trust and security they provide. The four common zone types are No-Trust Zone, Low-Trust Zone, Medium-Trust Zone, and High-Trust Zone.

In computer networking, network devices are often categorized into different zone types based on the level of trust and security they provide. These zone types help in defining the access control policies and security measures for the network.

The four common zone types are:

 

These zone types help in creating a layered security approach where different levels of trust are assigned to different network devices based on their role and importance.

Learn more:

About network device zone types here:

https://brainly.com/question/29857538

#SPJ11

Will give brainliest!
Who created binary, and does anyone have any idea how?

Answers

Answer:

Gottfried Leibniz created it and Leibniz was trying to find a system that converts logic's verbal statements into a pure mathematical one.

the administrator at cloud kicks updated the custom object event to include a lookup field to the primary contact for the event. when running an event report, they want to reference fields from the associated contact record. what should the administrator do to pull contact fields into the custom report?

Answers

To access custom report fields at Cloud Kicks, follow these steps: Go to the report builder or creator in the system. Open report or event report that needs contact record fields referenced.

What is the administrator  role?

In the report builder, find the object selection section to set the primary object for the report. Ensure primary object is set to "Event". Look for related objects or lookup fields in the report builder.

The admin must locate the primary contact lookup field for the new event. Add contact to report by selecting primary contact lookup field. Create a link between Event and Contact object. Once the contact object is added, fields from the record can be included in the report. Select contact fields and add to report as needed.

Learn more about administrator  from

https://brainly.com/question/26096799

#SPJ4

Answer: Edit the custom Event report type and add fields related via lookup.

Explanation: thaz waz is righ

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently?

Answers

Answer:

the Format Painter feature

Answer:

the format painter feature

Explanation:

Write a short program in assembly that reads the numbers stored in an array named once, doubles the value, and writes them to another array named twice. Initialize both arrays in the ram using assembler directives. The array once should contain the numbers {0x3, 0xe, 0xf8, 0xfe0}. You can initialize the array twice to all zeros

Answers

Answer:

Assuming it's talking about x86-64 architecture, here's the program:

section .data

once:   dd 0x3, 0xe, 0xf8, 0xfe0

twice:  times 4 dd 0

section .text

global _start

_start:

   mov esi, once    ; set esi to the start of the once array

   mov edi, twice   ; set edi to the start of the twice array

   mov ecx, 4       ; set the loop counter to 4 (the number of elements in the arrays)

loop:

   mov eax, [esi]   ; load a value from once into eax

   add eax, eax     ; double the value

   mov [edi], eax   ; store the result in twice

   add esi, 4       ; advance to the next element in once

   add edi, 4       ; advance to the next element in twice

   loop loop        ; repeat until ecx is zero

   ; exit the program

   mov eax, 60      ; system call for exit

   xor ebx, ebx     ; return code of zero

   syscall

Explanation:

The 'dd' directive defines the once array with the specified values, and the 'times' directive defines the twice array with four zero values.

It uses the 'mov' instruction to set the registers 'esi' and 'edi' to the start of the once and twice arrays respectively. Then it sets the loop counter 'ecx' to 4.

The program then enters a loop that loads a value from once into 'eax', doubles the value by adding it to itself, stores the result in twice, and then advances to the next element in both arrays. This loop will repeat until 'ecx' is zero.

Hope this helps! (By the way, the comments (;) aren't necessary, they're just there to help - remember, they're not instructions).

A program has a class Potato , which is derived from the class Vegetable , which is derived from the class Food . This is an example of _______

Answers

Inheritance

If you have a potato, it has the features/characteristics of a vegetable
A potato is healthy, and it gets this from being a vegetable
A vegetable gets its features/characteristics from food
A vegetable can be eaten, just like food
We can then say that a vegetable inherits the ability to be eaten from food
And that the potato inherits this from being a vegetable
The potato class inherits from the vegetable class the healthiness, but the vegetable class doesn’t inherit healthiness from the food class

What is malicious code and its types?

Answers

Unwanted files or programmes that can harm a computer or compromise data saved on a computer are known as malicious code. Malicious code can be divided into a number of categories, including viruses, worms, and Trojan horses.

A specific kind of destructive computer code or web script intended to introduce system weaknesses that could lead to back doors, security failures, information and data theft, and other potential harm to files and computing systems is referred to as "malicious code" in this context. Antivirus software might not be able to stop the risk on its own. Computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programmes are a few examples of malicious programming that prey on common system weaknesses. By accessing infected websites or clicking on a suspicious email link or file, malicious software might infiltrate a machine.

Learn more about  malicious from

brainly.com/question/29549959

#SPJ4

If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:

Answers

Answer:

Have a more specified search

Explanation:

If you do this in G0OGLE Then it will be the same thing all it basically does it narrow down the search to find more of what you want

What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

A person is asking you not to use those words/sentences here because it hurt their feelings

Select all the correct answers.
Daniel is an app developer. He is working on an app for a retail store selling sports goods. The store manager explains that he would like customers to be alerted whenever there is a sale at the store. Interested customers would also be able to send an immediate response and book items they like from their mobile devices. Which statements about the use of the app are true?

It will make shopping easy.
It will enable quick transactions.
It will enable safety.
It will manage health.
It will save time.
Please I really need it because it will decides my grade.

Answers

Answer:

it will make shopping easy

Explanation:

The app will allow customers to shop with their phone instead of locating to the store. It also keeps the customers informed of events and sales for shopping.

Which type of identifier allows wireless clients to roam freely from AP to AP?
BSSID
IP address
ESSID
Transmitter address

Answers

The type of identifier that allows wireless clients to roam freely from AP to AP is called "ESSID".

ESSID refers to Extended Service Set Identifier, and it is a unique identifier for a wireless network.

Since it is used to differentiate one wireless network from another.

ESSID helps wireless clients to identify and roam freely from one access point to another, without losing connection.

Therefore,

the type of identifier that allows wireless clients to roam freely from AP to AP would be ESSID

Learn more about ESSID here;

https://brainly.com/question/32471069

#SPJ4

help me i'll brainiest if its right

help me i'll brainiest if its right

Answers

Answer:

Your response is correct.

I hope this helped at all.

Answer:A

Explanation: by limiting the amount of thermal energy that flows  out of the drink keeps it nice and taste :D

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment

Answers

The major difference between on-premises identity services and those used in a cloud-hosted environment is to deliver account and/or identity management.

What are cloud services?

In computers, a cloud service can be defined as a type of help in which the company may deliver a service on the internet such as, data storage.

Important companies that provide cloud services over the Internet  (e.g., Amazon Web Services) may handle essential information such as account and/or identity management.

In conclusion, the major difference between on-premises identity services and those used in a cloud-hosted environment is that cloud services can deliver account and/or identity management.

Learn more about cloud computing services here:

https://brainly.com/question/19057393

#SPJ1

Select all that apply.

Which of the following do not increase the clarity of a written message?

1 using long words and sentences to impress your reader
2 using all capital letters to draw attention to your message
3 reviewing before you send
4 organizing the message around one clear main idea
5 thinking about the purpose of the message before you start writing

Answers

1 and 2 since it says does not

Answer:

1. Using long words and sentences to impress your reader

2. Using all capital letters to draw attention to your message

Explanation:

When we're writing a message, we want to make sure that the person we are sending it to will understand it. It's important that we think about the purpose of the message before we start writing it, organize the message around one clear main idea (the purpose), and review it before sending it so that we can correct any mistakes we could've made.

Using long words and sentences and using all capital letters is counterproductive. It's hard to keep track of what we are reading when the words and sentences are too long, so it's better to use shorter, more understandable sentences. We are used to most of the letters being written in the lower case, which is how it should be. Capital letters are distracting, which makes the message harder to read.

All of the following can be used to design and plan a program EXCEPT: IPO chart search engine flow chart storyboard

Answers

Answer:

yes ipo chart and flow chart

Sean Cody is a website most known for what?

Answers

Answer:

Sean Cody is a website most known for to translate English to Portuguese.

is an website from the portugués

the management information base (mib) is a repository of data maintained at a managing entity site, providing the network manager with a centralized, quick-to-query database regarding current network status

Answers

The MIB is distributed across the network devices themselves, and network managers can access and query this distributed information from a central management station using SNMP.

The statement you provided is partially correct. The Management Information Base (MIB) is indeed a repository of data, but it is not necessarily maintained at a managing entity site. Instead, it is a component of the Simple Network Management Protocol (SNMP) framework used for managing and monitoring network devices.

A MIB is a structured database that stores various parameters and information about managed network devices. It organizes data in a hierarchical tree-like structure, with each node representing a specific object or attribute of a network device, such as system information, network interfaces, and performance statistics.

The MIB is typically stored within the network devices themselves, such as routers, switches, and servers. It allows network administrators to access and retrieve information about the devices' current status, configuration settings, and performance metrics.

SNMP-enabled network management systems can communicate with network devices using SNMP protocols and query the MIB to obtain real-time data. This data can be used to monitor the network, diagnose issues, and make informed decisions regarding network management and optimization.

While the MIB does provide a centralized database for network information, it is not necessarily located at a specific managing entity site. Instead, the MIB is distributed across the network devices themselves, and network managers can access and query this distributed information from a central management station using SNMP.

To know more about network click-
https://brainly.com/question/8118353
#SPJ11

Other Questions
On the whole, the United States is gradually losing its control and leadership over the affairs of the Middle East, and there is a trend of marginalization and speculative strategy, which will lead the Middle East, the powder keg of World Geopolitics, into a weak equilibrium composed of six plates. help ASAP please thanks What are the steps for x^2-3x-28=0 Three skeleton key summary What is an equation of the function shown in the graph?O A. y = 3x - 12O B. y = 1x +3O C. y= 1x - 12O D. y = 4x + 3PLEASE HELP ME!! divide by the shortcut method 1,500 divided by 50 Help help help help please this is due soon A recipe calls for 3 cups of sugar for every one cup of butter. How much butter should be used for 14 cups of sugar? White as a mixed number. 3. each round of pcr doubles the number of dna molecules present in the reaction. how many molecules can be generated from one of your dna template molecules after 30 cycles? 39x2 Divided by 3-10? Choose the sentence that shows the correct usage of commas.Rice which is the basic food for millions does not lend itself readily to mass production methods.Rice, which is the basic food for millions does not lend itself readily to mass production methods.Rice, which is the basic food for millions, does not lend itself readily to mass production methods.Rice which is the basic food for millions, does not lend itself readily to mass production methods. Please Help me 7th grade math Faster please!! thanks!! 30 points + brainliest!!Which is an example of simple random sampling created from each given population? A production line operation is tested for filling weightaccuracy using the following hypotheses.HypothesisConclusion and ActionH0: = 16Filling okay;keep running.Ha: 16 The concept of land differs from culture to culture. The First Nations peoples thought of land differently than Europeans did. The First Nations peoples believe that a ladder 10 m long,leans against a vertical wall at an angle of 70 to the ground.if the ladder slips down the wall 4m,find,correct to 2 significant figure(a) the new angle which the ladder makes with the ground (b) the distance the ladder slipped back on the ground from it's original position Flammability (how something burns) is an example of 2. Describe Serena's attitude toward the trip in the first half of the story. Cite specific text evidence to support your answer FAST PLEASE PLEASERead the following selection from Act II of Romeo and Juliet. What does the line in bold most likely mean?JULIETThe clock struck nine when I did send the nurse;In half an hour she promised to return.Perchance she cannot meet him: that's not so.O, she is lame! love's heralds should be thoughts,Which ten times faster glide than the sun's beams,Driving back shadows over louring hills:Therefore do nimble-pinion'd doves draw love,And therefore hath the wind-swift Cupid wings.Now is the sun upon the highmost hillOf this day's journey, and from nine till twelveIs three long hours, yet she is not come.Had she affections and warm youthful blood,She would be as swift in motion as a ball;My words would bandy her to my sweet love,And his to me:But old folks, many feign as they were dead;Unwieldy, slow, heavy and pale as lea From nine a.m. to noon is three hours, but the Nurse has not returned. Juliet has done three hours' worth of work, but she is still not tired. The Nurse has not sent word back to Juliet in nearly three full days. Romeo lied when he told Juliet that he would be ready at nine a.m. I need help with question 1 please