A student has created a Car class. The class contains variables to represent the following:

A String variable called color to represent the color of the car

An int variable called year to represent the year the car was made

A String variable called make to represent the manufacturer of the car

A String variable called model to represent the model of the car

The object vehicle will be declared as type Car.

Which of the following descriptions is accurate?

i. An instance of the vehicle class is Car.

ii. An instance of the Car object is vehicle.

iii. An attribute of the year object is int.

iv. An attribute of the vehicle object is color.

v. An attribute of the Car instance is vehicle.

Answers

Answer 1
ii. An instance of the Car object is vehicle.

Related Questions

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Why is digital data, at the base level in computers, represented in binary? * 10 points 0's and 1's are the easiest numbers to deal with mathematically. Using decimal or hexadecimal instead would change the meaning of the underlying data. A system with only 2 states is the most efficient way to organize data in a computer. Because other number systems do not allow you to represent both numbers and letters.

Answers

Answer:

The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.  

Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.

The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.

Select the correct answer.Priyanka wants to send some important files to her head office. Which protocol should she use to transfer these files securely?A.HTTPB.FTPSC.FTPD.DNS

Answers

Answer: FTP

Explanation: FTP stands for file transfer protocol.

Which of these lines of code will increment a variable?

A.
print(variable)

B.
count(variable)

C.
inc(variable)

D.
variable = variable + 1

Answers

Answer:

D

Explanation:

Answer:

D.

Explanation:

I got it right on the test.

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Mike needs to export some animation videos from his smartphone to an online platform. Which common file format can he use for this purpose?

A..swf
B..flv
C..mov
D..3gp

Answers

The answer would be b

Answer:

The correct answer is D.  3gp

Explanation:

Switch on your light make sure it is shining onto the wall hold your largest plastic shopping bag square between the light and the wall

Answers

Explanation:

As light travels through matter, different amounts of that light penetrate through the matter. Transparent objects allow nearly all the light shined on it to pass through the object. Glass, air, and clear plastic are transparent objects.

how are packets sent through the internet

Answers

Explanation:

When we send data across the internet, it is usually converted into smaller chunks called packets. The computer sends each packet to the nearest router, and this router checks the packet's IP header which contains the destination IP (an IP number is like an address, it lets the computer know where the packet wants to go) or the "address where the packet wants to end up". This router has multiple pathways it can send the packet through, but its goal is to send it to a router that is closer to its final destination. Then, this router can send it to its final destination. Once all packets have reached this final destination, they can be put back together, recreating the original piece of data.

Hope this helps and feel free to ask any questions!

5 functions of an operating system

Answers

Answer:

1. Memory Management: Managing primary and secondary memory, allocating and deallocating memory, and organizing how data is stored in memory.

2. Processor Management: Managing the processor, coordination of multiple processors, and scheduling tasks.

3. Device Management: Managing input/output devices such as printers, keyboards, and disks.

4. File Management: Creating, viewing, and managing files, as well as organizing data into folders.

5. Security Management: Enforcing security protocols, preventing unauthorized access, and implementing user authentication.

securitycontrol over system performancejob acountingdevice managementprocess management.

Explanation:

What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)

Answers

Answer:

if the code is like this, theres an indent on the print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

   print (sum)

the output would be:

3

8

15

24

35

or

if the code look like this, it has no indent on print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

print (sum)

the output would be:

35

What is the main difference between structured and unstructured data?

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Identify the type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.

Answers

Configuration Assessment is used to determine vulnerabilities in a workstation or server by performing configuration level check through the command line and provides organizations with a baseline configuration against which they can evaluate the security posture of their systems.

The type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line is Configuration Assessment.Configuration assessment is a type of vulnerability assessment that is used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.

In Configuration Assessment, a comparison of the configuration of a system to a known baseline is done to check for vulnerabilities, unauthorized modifications, deviations, etc. The assessment is typically done using automated tools, which can make the process faster and more accurate.Automated tools are used for the comparison process, which makes the process faster and more efficient.

The configuration baseline is established to ensure the system is configured according to the organization's policies and compliance requirements. Any deviations from the baseline configuration are identified as vulnerabilities that need to be addressed.The Configuration Assessment identifies system vulnerabilities by comparing the system configuration to the security policy. This assessment technique is a proactive approach to identify vulnerabilities in the system before they are exploited.

It can also be performed regularly to ensure that the system's configuration is in compliance with the organization's security policy. In conclusion, Configuration Assessment is used to determine vulnerabilities in a workstation or server by performing configuration level check through the command line and provides organizations with a baseline configuration against which they can evaluate the security posture of their systems.

Learn more about the word vulnerabilities here,

https://brainly.com/question/29451810

#SPJ11

Consider the following code segment.

What is displayed as a result of executing the code segment?

A. True true true.

B. False false false.

C. True false true.

D. False false true.

Consider the following code segment. What is displayed as a result of executing the code segment?A. True

Answers

Answer:

B. false false false

Explanation:

a OR b = true, so NOT a OR b = false

false AND c is false, so a gets assigned false.

b is false and stays that way

c gets assigned c AND a, and since a is now false, c also becomes false.

Answer:

B: False false false

Explanation:

write a function that accepts an array of numbers as an argument and returns their average. 2. write a function that accepts an array of numbers as an argument and returns the largest number in the array

Answers

The above program defines two functions, one to find the average of an array of numbers and the other to find the largest number in an array of numbers.

Write a function that accepts an array of numbers, arguments and, returns their average and largest number?

1. Function to find the average of an array of numbers function findAverage(arr) {let sum = 0;for(let i = 0; i < arr.length; i++) {sum += arr[i];}let avg = sum/arr.length;return avg;}// calling the function with an array of numbersconsole.log(findAverage([1, 2, 3, 4, 5])); // output: 3 // 2. Function to find the largest number in an arrayfunction findLargestNumber(arr) {let largest = arr[0];for(let i = 1; i < arr.length; i++) {if(arr[i] > largest) {largest = arr[i];}}return largest;}// calling the function with an array of numbersconsole.log(findLargestNumber([1, 2, 3, 4, 5])); // output: 5

Learn more about the Function of an array

brainly.com/question/13543316

#SPJ11

4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.

Answers

Answer:

The control [Ctrl] key

Explanation:

While holding down left click and pressing control key it will copy to where you drag and drop it.

Typical problems seen in usability tests include all of the following except: D User fatigue if tests last longer than forty minutes The terms/words the users expect are not there There's too much noise on the site The concept is unclear to the use

Answers

The statement "There's too much noise on the site" is not a typical problem seen in usability tests. The other three options - user fatigue if tests last longer than forty minutes, the terms/words the users expect are not there, and the concept is unclear to the user - are all common issues that can be observed during usability testing.

User fatigue can be a problem if tests last too long, causing participants to become tired or disengaged and affecting their ability to provide useful feedback. Users may also have difficulty finding the terms or words they expect on a site, which can lead to confusion or frustration. Additionally, if the concept of the site or product is unclear to the user, they may struggle to understand how to use it or what its benefits are.

On the other hand, "too much noise on the site" is not a typical problem in usability tests, as this term is not a commonly used phrase in the context of user experience testing.

Learn more about usability tests here:

https://brainly.com/question/28807738

#SPJ11

What are the key differences between the IT operations for a large company (ex. Boeing, Ford, Proctor & Gamble, etc) and the IT operations for a small company (ex. O'fallon Brewery, AAA plumbing services, Mississippi Valley Roofing, etc) Why are there differences? Are there differences in the use of information?

Answers

The key differences between IT operations for large companies and small companies lie in the scale, complexity, and resources involved. Large companies like Boeing, Ford, and Proctor & Gamble typically have more extensive IT operations compared to small companies like O'fallon Brewery, AAA plumbing services, and Mississippi Valley Roofing.

Large companies often have complex IT infrastructures with multiple departments, extensive networks, and a higher volume of data. They require dedicated IT teams to manage and maintain these systems. On the other hand, small companies usually have simpler IT setups with fewer employees and a smaller scope of operations.
The differences in IT operations arise due to various factors such as budget, organizational structure, and business requirements. Large companies have larger budgets to invest in advanced technologies, sophisticated software, and hardware infrastructure. They may also have dedicated IT departments with specialized personnel for different tasks such as network management, cybersecurity, and system administration.

Small companies, in contrast, may have limited budgets for IT operations and often rely on outsourcing or employing a smaller IT team. They may prioritize cost-effective solutions and use off-the-shelf software and hardware. Small companies might also have less complex IT needs and can rely on simpler information management systems.
In terms of information use, both large and small companies rely on data for decision-making and business operations. However, the types and volumes of information may vary. Large companies often have a wider range of data sources, including customer data, supply chain information, and market analytics. Small companies may have a more focused set of information, such as customer records and financial data.

To know more about IT  refer for:

https://brainly.com/question/12947584

#SPJ11

The following tree is an example of_ Degenerated Binary Tree Perfect Binary Tree Complete Binary Tree Full Binary Tree

Answers

The following tree is an example of a Degenerated Binary Tree, and this results in a tree structure that is essentially a linked list. A Degenerated Binary Tree, also known as a Pathological Tree, is a binary tree in which each parent node has only one child.

In the given tree, each parent node has only one child, either on the left or right side.

Degenerated Binary Trees are not balanced and can occur in scenarios where the tree is formed in a specific order, such as when nodes are inserted in strictly increasing or decreasing order.

Example:

markdown

Copy code

     5

    /

   4

  /

 3

/

2

In the above example, each parent node has only one child, either on the left or right side, creating a linear structure resembling a linked list.

Comparison with other types of Binary Trees:

Perfect Binary Tree: A Perfect Binary Tree is a binary tree in which all levels are completely filled, except possibly the last level, which is filled from left to right. It has \(2^{h - 1}\) nodes, where h is the height of the tree.

Complete Binary Tree: A Complete Binary Tree is a binary tree in which all levels, except possibly the last level, are completely filled, and all nodes are as left as possible.

Full Binary Tree: A Full Binary Tree is a binary tree in which every node has either 0 or 2 children. No node has only one child.

The given tree does not meet the criteria for Perfect Binary Tree, Complete Binary Tree, or Full Binary Tree, as it does not have balanced or complete structures, and it violates the conditions of having two children for each node in a Full Binary Tree.

To learn more about Binary Tree, visit:

https://brainly.com/question/13152677

#SPJ11

TRUE / FALSE. previous generations are "digital natives" who grew up in technology-enriched homes, schools, and friendship environments.

Answers

False. The term "previous generations" typically refers to individuals who did not grow up with the same level of exposure to technology as the younger generations.

They may not have had access to technology-enriched environments such as technology-integrated homes, schools, and social circles. While some individuals from previous generations may have adopted technology later in life, they generally did not have the same innate familiarity and comfort with technology as the digital natives who grew up in technology-immersed environments.

Learn more about digital natives here:

https://brainly.com/question/30303913

#SPJ11

How do I convert a PDF to Adobe?

Answers

To convert a PDF to Adobe, you will need to use a PDF converter tool.

There are many different options available, but here are the steps to convert a PDF using Adobe Acrobat:

1. Open Adobe Acrobat and select "Tools" from the toolbar.
2. Choose "Export PDF" from the tools menu.
3. Select the file you want to convert by clicking "Select a File."
4. Choose the file type you want to convert the PDF to (e.g. Microsoft Word, Excel, PowerPoint, etc.).
5. Click "Export" to begin the conversion process.
6. Choose a location to save the converted file and click "Save."

Once the conversion process is complete, you will have a new file in the chosen file type that you can open and edit using Adobe software. Remember to always save the converted file in a location where you can easily find it later.

Learn more about PDF at: https://brainly.com/question/29454290

#SPJ11


b. "The actual use and implementation of computer started after third generations".
Justify this statement in your own words.

Answers

Answer:

The use of computers and planning of them didnt start until after the third generation.

Explanation:

Hope it helps✌✌

Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations

_____styles are added sirectly to an html tag by using the style attributes with the tag

Answers

CSS styles are added directly to an HTML tag by using the style attribute with the tag.

The presentation of an HTML or XML document can be described using the style sheet language CSS (Cascading Style Sheets). HTML or XML documents can add visual styles and layout using CSS styles.

The following are some CSS style examples:

Color is used to change the background or text colour of an element.

The font is used to specify the text's style, size, and family.

To enclose an element in a border, use the border property.

Margin and padding are tools for enclosing an element.

Display - Used to set an element's display property.

Setting the location of an element is done using positioning.

Text: This element is used to set text properties like text-align, text-decoration, and text-transform.

For such more question on CSS styles:

https://brainly.com/question/29580875

#SPJ11

internet of things have the ability to

Answers

Answer:The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.i hope it helps

Explanation:

A ___ covers several adjacent buildings of a school and business.

capus area networking

virtual private network

metropolitan area network

personal area network

Answers

Answer:

Campus Area Network.

Explanation:

Doesn't need explaining.

Answer:

campus area network

Explanation:

correct on edge

how old is the letter 3 on its 23rd birthday when your car turns 53 and your dog needs gas and your feet need lave then when is your birthday when your mom turns 1 and your younger brother is older then you

Answers

Answer:

ummm...idr.k..u got me....wat is it

Explanation:

please answer fast..​

please answer fast..

Answers

Answer:

a. False.

b. True.

c. False.

d. False.

Explanation:

a. False: Data stored in RAM are called firmware. It's the data stored in read only memory (ROM) are called firmware.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

b. True: a register is a temporary storage device within the central processing unit (CPU) of a computer system. Thus, it is designed to quickly accept, store and transfer data or instructions being used on a computer system.

c. False: the result obtained after data processing is given by input devices. Any result obtained after data processing is given by output devices such as speakers, monitor, projector, etc.. Input devices such as keyboard, mouse, scanner, etc., are used for entering the data into a system.

d. False: E-shopping allows us to make deposits, withdrawal and pay bills with the click of a mouse.

E-shopping can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, E-shopping is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

Use the excel template to record all necessary adjusting entries as of December 31 for 2022 for XYZ corporation, a company that makes self-closing zippers. The adjusting entries should be based on the following events that happened throughout the year. 1) On October 1, XYZ purchased bonds at face value for $100,000. The bond pays interest annually at a rate of 12%. 2) Depreciable equipment has historical cost of $50,000, a life of five years, and was purchased two years ago. The company uses straight line depreciation. 3) On December 1 , the company received $3,000 in advance for six months' rent of extra office space. The rental period also began on December 1 . 4) On June 1, the company paid $2,400 for one year of flood insurance. The coverage period began on June 1. 5) The supplies account shows a debit balance of $3,600 at year-end. A physical count of supplies revealed $800 worth of supplies on hand. B) By what amount would net income be misstated if the company failed to record the proper adjusting entries?

Answers

the amounts for the adjusting entries will vary depending on the specific details provided in the question. It is important to double-check and calculate based on the given information.As a text-based AI, I am unable to directly access or provide Excel templates. However, I can guide you through the process of recording the necessary adjusting entries based on the events provided.

1) Adjusting entry for accrued interest expense:
- Calculate the interest expense by multiplying the bond's face value ($100,000) by the interest rate (12%) and the portion of the year (3/12 since it's from October 1 to December 31).
- Debit Interest Expense and credit Interest Payable for the calculated amount.

2) Adjusting entry for depreciation expense:
- Determine the annual depreciation expense by dividing the historical cost ($50,000) by the useful life (5 years) to get $10,000 per year.
- Multiply the annual depreciation by the portion of the year (2/12 since it's two years into the equipment's life).
- Debit Depreciation Expense and credit Accumulated Depreciation for the calculated amount.

3) Adjusting entry for unearned rent:
- Calculate the portion of unearned rent for the remaining months (6 months) by dividing the advance received ($3,000) by the rental period (6 months).
- Debit Unearned Rent and credit Rental Income for the calculated amount.

4) No adjusting entry required for the flood insurance because it was fully paid on June 1.

5) Adjusting entry for supplies:
- Calculate the supplies expense by subtracting the supplies on hand ($800) from the debit balance of the supplies account ($3,600).
- Debit Supplies Expense and credit Supplies for the calculated amount.

By not recording the proper adjusting entries, net income would be misstated. For example, if we fail to record the adjusting entries for accrued interest expense, depreciation expense, unearned rent, and supplies, net income would be overstated by the total of these unrecorded expenses.

To know more about unrecorded expenses.visit:

https://brainly.com/question/27110619

#SPJ11

Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what common tasks are performed by Database Administrators? Check all that apply.

managing large teams of people to complete complex long-term projects
conducting surveys to determine which customers to market products to
modifying existing databases and database management systems
designing new arrangements of desks and office equipment for efficiency
testing programs or databases and correcting errors
planning, coordinating, and implementing security measures to safeguard information

Answers

Answer:

1). managing large teams of people to complete complex long-term projects.

4). designing new arrangements of desks and office equipment for efficiency

5). testing programs or databases and correcting errors

6). planning, coordinating, and implementing security measures to safeguard information.

Explanation:

The common tasks that are carried out by Database Administrators includes the direction of substantial teams for successful accomplishment of complex projects and preparing new designs for office desks as well as equipments most prominently. The less common tasks include evaluation of databases and programs along with the error rectification and hatching the plan and harmonizing with the team members to implement it and protect information.

Answer:

cef

Explanation:

which type of data figure is good for showing complex processes or ideas?

Answers

A type of data figure that is good for showing complex processes or ideas is a flowchart.

Flowcharts are graphical representations that use various shapes, symbols, and arrows to illustrate the sequence of steps, decisions, or actions within a process. They are effective for visually presenting complex processes, workflows, or systems in a simplified and easy-to-understand manner.

Flowcharts provide a clear visualization of the flow of information, activities, or materials through a process. They use different shapes such as rectangles, diamonds, circles, or ovals to represent different types of steps or actions. Arrows indicate the direction of flow and connections between steps.

Learn more about flowchart visit:

https://brainly.com/question/31697061

#SPJ11

Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
A. Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system.
B. The maintenance cost of Treston's new database system was less than the one it was previously using.
C. Treston's new database system was not supported by the database system of its suppliers and distributors.
D. Treston's competitors implemented its database a few days prior to Treston's implementation date.
E. Treston had internally trained personnel managing its new database system, keeping costs low.

By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.
A. True
B. False

In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing.
A. True
B. False

________ are produced at predefined intervals to support routine decisions.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

Answers

Answer:

C. The New database system of Treston was not supported by the database system of its suppliers and distributors.

TRUE

False

Scheduled reports

Drill down reports

Explanation:

The just-in-time is popularly known as the JIT. The JIT inventory system is defined as a management strategy in which the company gets goods and products as close as when they are actually needed. Some goods are received 'just in time' at the processing or at the manufacturing time of the final product.

In the context, the data base system failed for Treston company as the new data base system did not support the database system for the suppliers as well as the distributors of the car manufacturing company, Treston.

It is true that by combining the intelligence of human and the reasoning capabilities with that of retrieval and the analysis of the technology, the visual analytics can help in the process of decision making.

In the distributed environment done online, performing the real-time analytical processes does not enhances the performance of the transaction processing. So the answer is false.

A scheduled report is a report that is sent out or delivered at a specified time by an email provider. They are produced to support the routine decisions at predefined intervals.

A Drill down reports helps to see the data for a more detailed and a comprehensive view. It helps to analyze that a key indicator is not the appropriate level.

             

Other Questions
I dont understand this QuestionWhich statement about the answer to this problem is most accurate?11/121/6=9/12ResponsesThe answer 912 is reasonable because both fractions are closer to 12 than they are to 1, making the difference close to 0.The answer , 9 over 12, is reasonable because both fractions are closer to , 1 2 , than they are to 1, making the difference close to 0.The answer 912 is reasonable because 1112 is closer to 1 than to 12 and 16 is closer to 0 than 12, making the difference close to 1.The answer , 9 over 12, is reasonable because , , 11 over 12, , is closer to 1 than to , 1 2 , and , 1 over 6, is closer to 0 than , 1 2 , , making the difference close to 1.The answer 912 is not reasonable because 1112 is closer to 1 than to 12, and 16 is close to 12, making the difference close to 12. The answer , 9 over 12, is not reasonable because , , 11 over 12, , is closer to 1 than to , , 1 2 , , , and , , 1 over 6, , is close to , , 1 2 , , , making the difference close to , 1 2 , . , ,The answer 912 is not reasonable because 1112 is closer to 12 than to 1, and 16 is closer to 0 than to 12, making the difference close to 12. On January 1, 2018, the Chaucers Restaurant decides to invest in Lake Turner bonds. The bonds mature on December 31, 2023, and pay interest on June 30 and December 31 at 4% annually. The market rate of interest was 4% on January 1, 2018, so the $90,000 maturity value bonds sold for face value. Chaucers intends to hold the bonds until December 31, 2023.Required:a. Journalize the transactions related to Chaucers investment in Lake Turner bonds during 2018.b. In what category would Chaucers report the investment on the December 31, 2018, balance sheet? I WILL GIVE YOU BRAINLIEST!!!!!Which expressions are equivalent to 5x-15? Select three options 5(x + 15) 5(x-3) B 4x+3y 15-3 EX By=6x8y + x -20-3x+ 5 + 8x 6x+5=4x+45 degrees Khan Academy Will give brainleist! Answer this math question in the picture, making sure to follow the steps! Sorry for the bad quality. Adjustment for unearned revenue on august 1, 20y1, newhouse co. received $39,670 for the rent of land for 12 months. journalize the adjusting entry required for unearned rent on december 31, 20y1. round your final answer to the nearest dollar amount. if an amount box does not require an entry, leave it blank TEST YOURSELFMatch the words in Column B with their dictionary meanings in Column A Write the lettersof your answers on your paper,AColumn BColumn A1. Arough copy of a piece ofwriting2. The bringing about the resultthat is wanted, with the leastwaste of time, effort, ormaterials3. A black, solid substance thatis dug up from the ground andused as a fuel4. A machine or device used todo a special job around thehouse more easily5. A substance used for cleaning6. Keeping under control7. To clean by rubbing hard withsomething rough8. More than usual: large; real ortrue9. A pale blue gas with a sharpsmell10. Very bright or glowing in colora coalb. appliancec. fluorescentd. efficiencye substantialf. draft9. detergenthozoneiscour1. restraint identify and describe at least one benefit AND one negative consequence of adaptation for sociology the perimeter of a rectangle parking lot is 328 M, if the length of the parking lot is 88 M, what is its width? the process of verbally expressing what is said or written in another language is known as _____. The following table shows the number of completed passes for the two quarterbacks each game for 16 games. Developing the flu after being exposed to someone sick with the flu is an example ofA-artificially acquired active immunityB-naturally acquired active immunityC-artificially acquired passive immunityD-naturally acquired passive immunity gchoose a nonprofit organization, either one you are personally familiar with or a local organization, and examine the way it uses content. it should signal its use of social media platforms by a share bar somewhere on the site, so be sure to examine those. if you have time, sign up for its e-newsletter and see if it has a mix of news, events, and informative content. The Unemployment program in the United States as compared to those of some European countries can be criticized because?1.It is expensive because in the U.S. workers can collect even if they quit their jobs or leave voluntarily.2.the U.S. program has a greater moral hazard effect than in the European countries.3.the U.S. program gives workers greater motivation to choose leisure over work.4It is very expensive due to the longer periods over which benefits are typically paid in the U.S.5.significant consumption-smoothing benefits are lost because of the relatively short duration of the payment period in the U.S. Where did the Happy Prince's statue stand? Which equations are true equations? Select all correct answers. Responses 8252=427 8 squared minus 5 squared equals 4 squared minus 7 568+32=223 56 divided by 8 plus 3 squared equals 2 times 2 cubed 3936=6104+4 39 minus 3 times 6 equals fraction numerator 6 times 10 over denominator 4 end fraction plus 4 2422=50628 convert each terminating decimal to a fraction in its simplest form. A. 0.4 B. 0.625 It might be a good idea to talk to your parents about alcohol because:you can find out how they might react to alcohol useyou can build trust and confidence with themyou can find out whether or not they drank when they were underage what is the equation of the line in slope intercept form.