A measuring cylinder is used to measure the volume of an irregular
solid object.​

Answers

Answer 1

Answer:

Yes it is used for measuring the volume of irregular solid objects for example a peice of stone, rubber etc.

Explanation:


Related Questions

A personal directory of e-mail addresses stored and maintained with one’s e-mail program

Answers

Answer:

It’s a address book

45 points!

What is the full form of PNG and GIF?
The full form of PNG is
and GIF is ______

45 points!What is the full form of PNG and GIF?The full form of PNG isand GIF is ______

Answers

Full form of PNG is Portable Network Graphics

Full form of GIF is Graphics Interchange Format

Hope it helps

Answer:

\(png = > portable \: network \: graphic(a \: file \: format) \\ gif = > graphics \: interchange \: format(bitmap \: image \: format) \\ thank \: you\)

I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUS
the coordinate's that determine the position of an element in space are expressed as. Different shapes, 1,2, and 3/ x,y,z/l,t,p


refer to the pictures

I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUSthe coordinate's that determine the position
I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUSthe coordinate's that determine the position
I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUSthe coordinate's that determine the position
I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUSthe coordinate's that determine the position

Answers

6. x, y, and z (x is right, z is forward, and y is up)

7. true

8. plane

9. Cartesian grid

10. They describe a location using the angle and distance from the original.

11. effects that alter the look of an object.

12. true

13. true

14. (not sure, but I would go with conceptual)

15. 3-D elements

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

Which TWO statements describe the functions of wireless media?


require metal shielding to prevent data transmission losses

transmit signals on a network through cables.

used for network connectivity on cell phones, iPads, and laptops

converts signals from digital to analog when transferring data

data is carried through radio, infrared, and microwave signals

Answers

Wireless media eliminates the need for physical connections, allowing for greater mobility and flexibility in accessing and transferring data.

It enables communication between devices without the limitations imposed by cables, making it a convenient and widely used technology in today's digital age.

The two statements that describe the functions of wireless media are:

1. Used for network connectivity on cell phones, iPads, and laptops.

2. Data is carried through radio, infrared, and microwave signals.

1. Wireless media, such as Wi-Fi and cellular networks, provide network connectivity to mobile devices like cell phones, iPads, and laptops. These devices can access the internet and communicate with other devices without the need for physical cables.

2. Data is transmitted through wireless media using radio, infrared, and microwave signals. These signals carry digital information wirelessly from one device to another. Radio signals are commonly used for Wi-Fi and cellular communication, while infrared signals are used for short-range communication. Microwave signals, on the other hand, can transmit data over longer distances and are used in technologies like satellite communication and microwave links.

Wireless media eliminates the need for physical connections, allowing for greater mobility and flexibility in accessing and transferring data. It enables communication between devices without the limitations imposed by cables, making it a convenient and widely used technology in today's digital age.

Learn more about transferring data here:

https://brainly.com/question/12914105

#SPJ11

In a Windows domain, where is the centralized database kept?
A. domain controller
B. DNS server
C. DHCP server
D. client/server network

Answers

In a Windows domain, the centralized database is kept on the domain controller.

A domain controller is a server that is responsible for authenticating users, managing security policies, and maintaining the centralized database known as the Active Directory. The Active Directory database stores information about users, groups, computers, and other network resources within the domain.

The domain controller plays a crucial role in a Windows domain environment by providing authentication services, enforcing security policies, and allowing centralized management of network resources.

Therefore, the correct answer is A. domain controller.

Learn more about Domain Controller here -: brainly.com/question/30665178

#SPJ11

So I got a question when I ask a question some people send me a link that seems weird in their answer you can't put links in your answer so is it a grabify link to track my IP?

Answers

Answer:

dw just ignore it

Explanation:

its just stoopid kids or people just ignore it

and think positive like elmo

Answer:No I don't think so hope u have a great day

Explanation:

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

Which device actively works to prevent collisions by making sure not to send data to a segment that is already busy?

Answers

Answer: Bridge

Explanation: Bridges are employed in network connections for managing data packets, when transmissions are received, the bridge network makes the decision or filter the transmitted data and makes decision on whether to forward or block the data depending on the destination address on each frame. This prevents unnecessary traffic transmission to a network segment. Bridge networks identifies the amount of traffic in each network segment, making it possible to delineate busy segment from the one's which aren't busy and thereby blocking transmission of data to the busy segment.

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Effective controls protect ______ from workplace hazards.

Answers

Answer:

Contact your team leader, supervisor, manager, etc.

Answer:

The Worker I did the TEST and got it right.

Which of the following types of operating systems does Windows® belong to?

Real-time operating systems (RTOS)

Single-user, single task operating systems

Single-user, multi-tasking operating systems

Multi-user operating systems

Answers

Answer:

C) Single-user, multi-tasking operating systems

The type of operating system that Windows® belongs to is Single-user, multi-tasking operating system. Thus, the correct option for this question is C.

What do you mean by Operating system?

An Operating system may be defined as a type of system software that significantly regulates computer hardware and software resources. It also provides some common services for computer programs. This system also directs the processing of programs on the basis of specific commands.

Windows are typically based on the graphical user interface system (GUI). This system deals with the collection of software that works on the command which represents Single-user, multi-tasking operating systems.

Therefore, the type of operating system that Windows® belongs to is Single-user, multi-tasking operating system. Thus, the correct option for this question is C.

To learn more about Operating systems, refer to the link:

https://brainly.com/question/22811693

#SPJ2

if you wanted to show how a single database stores customer information, payment details, and a record of parking tickets, which tool would be most useful?

Answers

A relational database management system (RDBMS) would be the most useful tool to store customer information, payment details, and a record of parking tickets in a single database.

What is the database about?

RDBMS is a type of database management system that organizes data into tables with rows and columns, and establishes relationships between tables using keys. This allows for efficient storage, retrieval, and manipulation of data.

Therefore, Popular RDBMS tools include MySQL, Oracle Database, Microsoft SQL Server, and PostgreSQL. These tools provide robust features for data modeling, data storage, data retrieval, data manipulation, and data security, making them suitable for managing complex data sets with multiple interrelated tables, such as customer information, payment details, and parking ticket records. They also offer scalability, reliability, and performance optimizations for handling large amounts of data and concurrent user access.

Read more about database here:

https://brainly.com/question/518894

#SPJ1

A database schema diagram would be the most useful tool to show how a single database stores customer information, payment details, and a record of parking tickets.

A database schema diagram is a visual representation of the logical structure of a database, which shows how different data elements or entities are related to each other.

It is used to provide an overview of the different tables, columns, and relationships within a database.

A database schema diagram is a visual representation of the logical structure of a database, which shows how different data elements or entities are related to each other. It is used to provide an overview of the different tables, columns, and relationships within a database.

In the case of a database storing customer information, payment details, and a record of parking tickets, a schema diagram would provide a clear picture of how these entities are organized and related to one another within the database. For example, the schema diagram might show that there is a table for customer information, a table for payment details, and a table for parking ticket records, with various relationships between these tables.

Using a schema diagram makes it easier for developers, database administrators, and other stakeholders to understand the structure and relationships within a database, which can be helpful in troubleshooting issues, optimizing performance, and making changes to the database schema.

Learn more about database here:

https://brainly.com/question/30634903

#SPJ11

who is he can anyone help me​

who is he can anyone help me

Answers

This person is Elon Musk, the owner of Tesla :)
The person in the photo is Elon Musk. He’s the CEO of SpaceX and CEO and product architect of Tesla, Inc.,founder of The Boring Company, co-founder of Neuralink, and co-founder and initial co-chairman of OpenAI.

Why is it not a good idea for a company to treat employee records with dupli-
cate first and last names as duplicate records?

Answers

Answer:

Maybe several files are titled the name of the client if the client returns to use the company again under different circumstances

Explanation:

Who produced the earliest incarnation of the technology that came to be known as the "mouse"?
A. Apple Computer, Inc, who introduced the device to the world with the Macintosh.
B. Doug Englebart and his team at the Standard Research Institute, as demonstrated in "The Mother of all Demos."
C. A design team at the Xerox Palo Alto Research Center (PARC), as part of the Xerox Star workstation computer.
D. Microsoft Corporation, as a required accessory for the Windows 95 operating system.
E. A and B, above.

Answers

Doug Englebart and his team at the Standard Research Institute, as demonstrated in "The Mother of all Demos." produced the earliest incarnation of the technology that came to be known as the "mouse"

The first mouse had two wheels on its underside rather than a rubber trackball, and it was contained in a wooden box that was twice as high as modern mice. It also had three buttons on top. The wheels, one for the horizontal and one for the vertical, were positioned at an angle. The horizontal wheel rotated sideways as the vertical wheel rolled along the surface in response to mouse movements. This event, which attracted about 1,000 computer professionals, would go on to earn the moniker "mother of all demonstrations" and unveil a number of modern computing innovations, including the mouse, hypertext, object addressing, and dynamic file linking.

learn more about  incarnation of the technology  here:

https://brainly.com/question/30901305

#SPJ4

Doug Englebart and his team at the Standard Research Institute, as demonstrated in "The Mother of all Demos." produced the earliest incarnation of the technology that came to be known as the "mouse"

The first mouse had two wheels on its underside rather than a rubber trackball, and it was contained in a wooden box that was twice as high as modern mice. It also had three buttons on top. The wheels, one for the horizontal and one for the vertical, were positioned at an angle. The horizontal wheel rotated sideways as the vertical wheel rolled along the surface in response to mouse movements. This event, which attracted about 1,000 computer professionals, would go on to earn the moniker "mother of all demonstrations" and unveil a number of modern computing innovations, including the mouse, hypertext, object addressing, and dynamic file linking.

learn more about  incarnation of the technology here:

brainly.com/question/30901305

#SPJ4

Your _______ can help block inappropriate content online.
1. web browser
2. Password

Answers

Answer:

web browser.

Explanation:

yea let me go post my password to block content (sarcasm)

Which student is demonstrating the most effective time-management skills?

Answers

could you please elaborate? i’m not sure what you’re trying to ask!

Answer:

Carlo sticks to a regular study schedule.

Explanation:

I did this already.

8.3.7: Exclamat!on Po!nts
Write the function exclamation that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:

Convert the initial string to a list
Use a for loop to go through your list element by element
Whenever you see a lowercase i, replace it with an exclamation point in the list
Return the stringified version of the list when your for loop is finished
Here’s what an example run of your program might look like:

exclamation("I like music.")
# => I l!ke mus!c.

Answers

The function is an illustration of loops.

Loop instructions are used to repeat operations

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def exclamation(myStr):

   #This iterates through the string

   for i in range(len(myStr)):

       #This checks if the current character of the string is "i"

       if myStr[i] == "i":

           #If yes, this converts the string to a list

           s = list(myStr)

           #This replaces i with !

           s[i] = '!'

           #This gets the updated string

           myStr = "".join(s)

   #This returns the new string

   return myStr

       

Read more about similar programs at:

https://brainly.com/question/22444309

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

Intrusion detection and prevention systems can deal effectively with newly published attacks or variants of existing attacks.

Answers

Intrusion detection and prevention systems can deal effectively with newly published attacks or variants of existing attacks is False statement.

Why use an intrusion detection and prevention systems?

A network intrusion detection system (NIDS) is known to be one that is very vital for network security due to the fact that it helps you to be able to know or detect and also be able to respond to any form of a malicious traffic.

Note that the primary gains of an intrusion detection system is to make sure that IT personnel are notified if an attack or network intrusion has taking or is taking place.

Hence, Intrusion detection and prevention systems can deal effectively with newly published attacks or variants of existing attacks is False statement.

See full question below

Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.

A) True

B) False

Learn more about Intrusion detection from

https://brainly.com/question/26199042

#SPJ1

Assignment 4: Evens and Odds
Instructions

Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd. Continue doing this as many times as the user indicated. Once the loop ends, output how many even numbers were entered and how many odd numbers were entered.

Hint: For a number to be even, when the number is divided by 2, there should be no remainder - so you will want to use the modulus (%) operator.

Hint: You will need two count variables to keep track of odd and even numbers.

Sample Run 1
How many numbers do you need to check? 5
Enter number: 20
20 is an even number.
Enter number: 33
33 is an odd number.
Enter number: 4
4 is an even number.
Enter number: 77
77 is an odd number.
Enter number: 8
8 is an even number.
You entered 3 even number(s).
You entered 2 odd number(s).
Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Benchmarks
1. Create and initialize two count variables - one for odd and one for even.
2. Prompt the user to answer the question, “How many numbers do you need to check?"
3. Based on the previous input, create a for loop that will run that exact number of times.
1. Prompt the user to “Enter number: “
2.If that number is even, output “[number] is an even number.”
3.Update the even count variable.
4.Or else if the number is odd, output “[number] is an odd number.”
5.Update the odd count variable.
4.Output “You entered [number] even number(s).”
5.Output “You entered [number] odd number(s)."

Answers

Wow that is really long

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

Toothpicks are used to make a grid that is60toothpicks long and32toothpicks wide. How many toothpicks are used altogether?

Answers

Answer:

184 toothpicks

Explanation:

60 toothpicks+60 toothpicks+32 toothpicks + 32 toothpicks = 184 toothpicks

Answer:

3932

Explanation:

So, For 60×32 grid toothpicks required = 2x60x32 +60+32 = 3932*

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

(Finding the Required Interest Rate) Question 3 of 20 Check My Work (3 remaining) E ebook Your parents will retire in 17 years. They currently have $360,000 saved, and they think they will need $2,500,000 at retirement, What annual interest rate must they earn to reach their goal, assuming they don't save any additional funds? Round your answer to two decimal places.

Answers

Your parents would need to earn an annual interest rate of approximately 6.17% to reach their retirement goal of $2,500,000 in 17 years, assuming they don't save any additional funds.

Let's calculate the required interest rate for your parents to reach their retirement goal.

Given:

Present Value (PV) = $360,000

Future Value (FV) = $2,500,000

Number of Periods (N) = 17 years

We can use the formula:

\(Interest Rate = (Future Value / Present Value)^(1 / Number of Periods) - 1\)

Plugging in the values:

\(Interest Rate = ($2,500,000 / $360,000)^(1 / 17) - 1\)

Calculating this expression will give us the required interest rate. Let's do the math:

\(Interest Rate = (6.94444444444)^(0.05882352941) - 1\)

Interest Rate ≈ 1.0617 - 1

Interest Rate ≈ 0.0617

Therefore, your parents would need to earn an annual interest rate of approximately 6.17% to reach their retirement goal of $2,500,000 in 17 years, assuming they don't save any additional funds.

learn more about funds here:

https://brainly.com/question/30554039

#SPJ11

Write a function that takes in a parameter, squares it, and then prints the results. Squaring a number means multiplying it by itself. Then make several calls to that function in your start function to test it out. Does it
work for all arguments?

this is what i have so far but when i check the code it says “you should call your function square with some parameters. call your function at least twice” what am i doing wrong?

Write a function that takes in a parameter, squares it, and then prints the results. Squaring a number

Answers

Answer:

are you looking answer like this?

def square(x):

   return x * x

def start():

   print(square(2))

   print(square(3))

   print(square(4))

   print(square(5))

start()

Assume you are given an int variable named nPositive and a two-dimensional array of ints that has been created and assigned to a2d. Write some statements that compute the number of all the elements in the entire two-dimensional array that are greater than zero and assign the value to nPositive.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int nPositive = 0;

    int[][] a2d = {{-7,28, 92}, {0,11,-55}, {109, -25, -733}};

 for (int i = 0; i < a2d.length; i++) {

                  for(int j = 0; j < a2d[i].length; j++) {

         if(a2d[i][j] > 0){

             nPositive++;

                       }

                  }

 }

 System.out.println(nPositive);

}

}

Explanation:

*The code is in Java.

Initialize the nPositive as 0

Initialize a two dimensional array called a2d

Create a nested for loop to iterate through the array. If an element is greater than 0, increment the nPositive by 1

When the loop is done, print the nPositive

Answer:

const a2d =  [[7,28, 92], [0,11,-55], [109, -25, -733]];

let nPositive = a2d.reduce((a,c) => a + c.filter(n => n>0).length, 0);

console.log(nPositive);

Explanation:

Just for fun, I want to share the solution in javascript when using the powerful list operations. It is worthwhile learning to understand function expressions and the very common map(), reduce() and filter() primitives!

add the appropriate cellular structures to complete the epithelial cell

Answers

saromere

The saromere is the appropriate cellular structures to complete the epithelial cell.

What is cellular structures?

Cell structure theories have evolved significantly over time. Cells were once thought to be simple membranous sacs containing fluid and a few floating particles, according to early biologists. Biologists now understand that cells are infinitely more complex than this.

The body's cells come in a variety of sizes, shapes, and types. The concept of a "generalized cell" is introduced for descriptive purposes. It incorporates characteristics from all cell types. A cell consists of three components: the cell membrane, the nucleus, and the cytoplasm that lies between the two. The cytoplasm contains intricate arrangements of fine fibers as well as hundreds or even thousands of tiny but distinct structures known as organelles.

To know more that Fibre, visit: https://brainly.com/question/28902486

#SPJ1

Other Questions
30 POINTS!!!!!! HELP ASAP! At cruising speed a car burns fuel at a rate of 2.5 kilograms per hour the mass of the car including the fuel when it reaches cruising speed is 1,550 kg and the mass of the car when the fuel tank is empty is 1,520 kg. the domain of the function f(t) is best described as Help me urgent please please - Jill's credit card was stolen. The thief charged a $900 kayak on thecard before she reported it stolen. a. How much of the thief's purchase is Jill responsible for?b. Jill's average daily balance would have been $1,240 without thethief's purchase. What was the sum of her daily balances for the30-day billing period? Explain. c. The thief's purchase was on her daily balances for 10 out of the30 days during the billing cycle. What was the sum of Jill's dailybalances with the thief's purchase included?d. What was the average daily balance with the thief's purchaseincluded? n 1970 total phosphorus loadings to the Great Lakes were (Chapra and Sonzogni 1979) Using the parameters from Example 5.3 and assuming that total phosphorus settles at a rate of approximately 16 myr 1 , (a) Calculate the steady-state concentration for each lake. (b) Determine how much of each lake 's concentration is due to upstream lakes. 53. Suppose that 5000Ci 137 Cs(t 50 30yr ) was spilled into Lake Huron due to a nuclear accident. Calculate the response of Lakes Huron, Erie, and Ontario to the spill. to respond to security threats, you should create and use ______________ and _______________ passwords. 40 yo M presents with crampy abdominal pain, vomiting, abdominal distension and inability to pass flatus or stool he has a history of multiple abdomninal surgeries What is the most likely diagnosis? Every year Chana uses her income form her job to pay for 80% of her college tuition. Next year Chana will need to contribute $2,000 toward her tuition. Next year the tuition will be $600 more then this years tuition. How much is this years tuition? PLEASE HELP! STEP BY STEP EXPLANATION IF YOU CAN! What should be added to the diagram to better explain the water cycle?A The sun to provide energy for evaporationB Rocks to release thermal energyPlants to provide oxygen in the atmosphereD) Soil to trap water from runoff Which Oklahoma oil drilling field produced 17% of the United States' oil by 1919?A. Cushing FieldB. Healdton FieldC. Red Fork FieldD. Glenn Pool Field need cool art ideas pleas The compound on the right contains two functional groups. It is:________ A) an aldehyde and an ether B) an aldehyde and an alcohol C) a ketone and an ether D) a ketone and an ester E) a carboxylic acid and an ether excel's solver tool has been used in the spreadsheet below to solve a linear programming problem to determine the optimal values of profits from the mix of two products: x and y. what is the objective function? variable final value reduced cost objective coefficient allowable increase allowable decrease x 20 0 5 2 1 y 30 0 4 3 2 group of answer choices max 20x 30y max 5x 4y 5x 4y 20x 30y When Steven was 2 years old (on his birthday), his grandmother decided to set up a trust account to pay for his college education. She wanted the account to grow to $100,000 by his 18th birthday. If she was able to invest her money at 5% per year, how much did she have to deposit into this trust account? (Note: The amount deposited is known as the present value of the investment. The $100,000 is known as the future value. Round your answer to the nearest cent. Creatine is a supplement used by athletes to help increase strength, power, and muscle mass. Creatine is also known as what?. Sarah's family raises chickens. They buy 15 pounds of chicken feed per week. If the chickens eat all but 4 pounds, how many ounces of feed did they eat? canadian radio television and telecommucations commission effect on business? give one example how would it play out? what is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the following properties: two users each using 63% of their bandwidth share two users each using 59% of their bandwidth share one user using 8% of their bandwidth share give answer in percent, with one decimal place (normal rounding) and no percentage sign (e.g. for 49.15% you would enter "49.2" without the quotes). Use Le Chateliers principle to explain how an increase in the concentration of H2 affect the following reaction: 4H2g + N2g -> 2NH4g The picture below shows a model of a weather instrument made with simple objects.Image showing a model of a weather instrument made with simple objects. A clear plastic soda straw is inserted into a rubber stopper; the stopper is plugged into the opening of a glass bottle. A portion of the straw remains outside of the bottle, while a portion of the straw is submerged in colored water that is contained in the bottle.The change in the height of water in the straw of the model instrument is noted at regular intervals of time. Which of these best describes the function of the model instrument? To increase the humidity of air by changing water to vapor. To reduce the temperature by increasing the moisture in air. To predict storms by measuring the atmospheric pressure. To measure the amount of rainfall by collecting water in the straw. HELPPP A triangle has two sides of length 17.6 and 17.9. What compound inequality describes the possible lengths for the third side, x? Write it in a compound equality