A website design can be rated as acceptable if it enables the site to fulfill its purpose and also
does not contain any broken, mislabeled, or misdirected hyperlinks.
contains a link to the site map on the main navigation menu.
meets audience expectations for navigation, layout, and readability.
implements a site search feature in addition to a main navigation menu.

Answers

Answer 1

Answer:

does not contain any broken, mislabeled, or misdirected hyperlinks.

Explanation:

All the other answers don't make sense, you are not looking to meet the audiences needs, you want to make sure the website is good enough to be considered acceptable, I only see this answer as possible.

Answer 2

Answer:

(A) does not contain any broken, mislabeled, or misdirected hyperlinks.


Related Questions

how move the word up one row using the keyboard shortcut on word mac book

Answers

The shortcut key that we can use on a MacBook to go one row up in the word is Alt + shift + up Arrow.

What are keyboard Shortcuts ?

A keyboard shortcut, sometimes referred to as a hotkey, is a set of one or more keys used in computers to quickly launch a software application or carry out a preprogrammed operation.

A shortcut on the keyboard is a set of keys you may press to carry out a computer instruction. In written writing, it is customary to combine keys that are intended to be struck simultaneously with a +. Ctrl+S, for instance, instructs you to simultaneously hit the Ctrl and S keys. There are several keyboard shortcuts available.

The shortcut key that we can use on a MacBook to go one row up in the word is Alt + shift + up Arrow.

To learn more about Keyboard Shortcuts refer to :

https://brainly.com/question/14403936

#SPJ1

a computer technician is monitoring traffic on a network where users are complaining about slow network performance. the technician is curious as to whether the new network management software is causing the slowdown. which two port numbers would the technician be looking for in the captured packets for snmp traffic? (choose two.)

Answers

The two port numbers that the technician will be looking for in the captured packets for SNMP traffic are port number 161 and port number 162.

Simple Network Management Protocol (SNMP) is a protocol used for managing and monitoring devices on a network, such as routers, switches, servers, and printers. SNMP works by collecting data from network devices, such as their status and performance metrics. The data is collected in the form of SNMP packets and is sent to an SNMP management system that can analyze and act on the data.Port 161 is used for SNMP queries, while port 162 is used for SNMP traps.

SNMP queries are requests sent to a network device for information about its status or performance, while SNMP traps are notifications sent by a network device to an SNMP management system to alert it about a particular event, such as an error or a change in status. In the case of slow network performance, the technician would be looking for SNMP packets with port numbers 161 and 162 to determine whether the new network management software is causing the slowdown.

Learn more about Simple Network Management Protocol:  https://brainly.com/question/32321560

#SPJ11

which of the following is considered as the root of the active directory hierarchy?

Answers

The following is considered as the root of the active directory hierarchy is considered to be the Domain.

Active Directory (AD) is a directory service developed by Microsoft that organizes and manages resources, such as users, computers, and other objects, within a network. The hierarchy consists of several components, including domains, organizational units (OUs), and individual objects. Domains serve as containers for these resources and provide a logical structure for organizing them.

They also establish a security boundary and enable the implementation of security policies, user authentication, and access control. A domain forms the basic unit of replication in an Active Directory forest, which can consist of one or multiple domains. In summary, the root of the Active Directory hierarchy is the Domain, as it serves as the primary container for organizing resources and providing security boundaries within a network, this structure allows administrators to efficiently manage and secure their network environment. So therefore considered as the root of the active directory hierarchy is to be the domain.

Learn more about Active Directory at

https://brainly.com/question/28900362

#SPJ11

The __________ phase of the secsdlc, the team studies the documents from earlier and looks at of relevant legal issues that could affect the design of the security solution.

Answers

The analysis phase of the secsdlc, the team studies the documents from earlier and looks at of relevant legal issues that could affect the design of the security solution.

What is analysis phase in SDLC?

The analysis phase is known to be the stage that tends to tell more on the needed  requirements of the system, as well as the independent of the ways that these requirements will be carried out.

Note that this phase tells about the problem that the customer is trying to handle,

Therefore, The analysis phase of the secsdlc, the team studies the documents from earlier and looks at of relevant legal issues that could affect the design of the security solution.

Learn more about analysis phase from

https://brainly.com/question/2755922

#SPJ1

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Use the drop-down menus to select the answer that best completes each statement.
A person who finds a way to watch a recent movie online without paying for it is violating
A student who posts an inappropriate comment about a person via social media is violating
A student who visits a school-banned website that contains offensive content is violating school rules on

Answers

A person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

What is Movie Piracy?

This refers to the illegal copying and selling of DVDs and CDs without the permission of the owner.

Hence, we can see that a person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

Read more about movie piracy here:

https://brainly.com/question/8042416

#SPJ1

Answer: all the answers are here

Explanation:

Use the drop-down menus to select the answer that best completes each statement.A person who finds a

the system of rules that determined how information was transferred from one computer to another are called __ protocalls.

Answers

Answer:

TCP/IP protocols

Explanation:

TRUE OR FALSE The strlen function returns a C-string's length and adds one for \0.

Answers

The strlen function is a built-in function in C and C++ that returns the length of a C-string. It takes a C-string as input and counts the number of characters in it until it reaches the terminating null character (\0).

When the answer is TRUE.

The function does not count the null character itself, but it is included in the length of the string. Therefore, when the function returns the length of a C-string, it adds one to account for the null character.

For example, if we have a C-string "hello" which has five characters, the strlen function will return 5. However, if we add a null character at the end of the string to make it a proper C-string, like this: "hello\0", the strlen function will return 6. This is because it counts the five characters of the string and adds one for the null character.

In summary, the strlen function is a useful function in C and C++ for determining the length of a C-string. It returns the length of the string and includes the terminating null character in its count.


When the answer is FALSE.

The `strlen` function returns the length of a given C-string, but it does not add one for the null character `\0`. The `strlen` function is used to determine the number of characters in a C-string, excluding the null character, which marks the end of the string. Here's a brief explanation:

1. `strlen` is a standard library function in C/C++ programming languages.
2. This function takes a C-string (a null-terminated character array) as its argument.
3. It iterates through the C-string, counting the number of characters until it encounters the null character `\0`.
4. The function returns the number of characters found, excluding the null character.

Keep in mind that the length returned by `strlen` does not account for the null character. If you want to include the null character in the length, you should manually add one to the result.

Example:

```c
#include
#include

int main() {
 char myString[] = "Hello, world!";
 size_t length = strlen(myString);
 printf("Length of the string: %zu\n", length); // Output: Length of the string: 13
 return 0;
}
```

In this example, `strlen` returns 13, which is the length of "Hello, world!" without counting the null character.

Learn more about string at : brainly.com/question/30099412

#SPJ11

For this exercise, you will complete the TicTacToe Board that we started in the 2D Arrays Lesson.

We will add a couple of methods to the TicTacToe class.

To track whose turn it is, we will use a counter turn. This is already declared as a private instance variable.

Create a getTurn method that returns the value of turn.

Other methods to implement:

printBoard()- This method should print the TicTacToe array onto the console. The board should include numbers that can help the user figure out which row and which column they are viewing at any given time. Sample output for this would be:

0 1 2
0 - - -
1 - - -
2 - - -
pickLocation(int row, int col)- This method returns a boolean value that determines if the spot a user picks to put their piece is valid. A valid space is one where the row and column are within the size of the board, and there are no X or O values currently present.
takeTurn(int row, int col)- This method adds an X or O to the array at position row,col depending on whose turn it is. If it’s an even turn, X should be added to the array, if it’s odd, O should be added. It also adds one to the value of turn.
checkWin()- This method returns a boolean that determines if a user has won the game. This method uses three methods to make that check:

checkCol- This checks if a player has three X or O values in a single column, and returns true if that’s the case.
checkRow - This checks if a player has three X or O values in a single row.
checkDiag - This checks if a player has three X or O values diagonally.
checkWin() only returns true if one of these three checks is true.

public class TicTacToeTester
{
public static void main(String[] args)
{
//This is to help you test your methods. Feel free to add code at the end to check
//to see if your checkWin method works!
TicTacToe game = new TicTacToe();
System.out.println("Initial Game Board:");
game.printBoard();

//Prints the first row of turns taken
for(int row = 0; row < 3; row++)
{
if(game.pickLocation(0, row))
{
game.takeTurn(0, row);
}
}
System.out.println("\nAfter three turns:");
game.printBoard();



}
}

public class TicTacToe
{

private int turn;
private String[][] board = new String[3][3];

public TicTacToe()
{
for(int i = 0; i < 3; i++)
{
for(int j = 0; j < 3; j++)
{
board[i][j] = "-";
}
}
}

//this method returns the current turn
public int getTurn()
{
return turn;
}

/*This method prints out the board array on to the console
*/
public void printBoard()
{

}

//This method returns true if space row, col is a valid space
public boolean pickLocation(int row, int col)
{
return true;
}

//This method places an X or O at location row,col based on the int turn
public void takeTurn(int row, int col)
{

}

//This method returns a boolean that returns true if a row has three X or O's in a row
public boolean checkRow()
{
return true;
}

//This method returns a boolean that returns true if a col has three X or O's
public boolean checkCol()
{
return true;
}

//This method returns a boolean that returns true if either diagonal has three X or O's
public boolean checkDiag()
{
return true;
}

//This method returns a boolean that checks if someone has won the game
public boolean checkWin()
{
return true;
}

}

Answers

ndjdjdbzkdkekkdjdjdkodododofiifidididiidieiekeieidid

Write the differences between human intelligences and artificial intelligence.

Answers

Human intelligence and artificial intelligence differ in their origin, capabilities, and limitations.

Human intelligence is the cognitive ability possessed by humans, characterized by creativity, emotion, consciousness, and complex social interactions. On the other hand, artificial intelligence refers to the development of intelligent machines that can perform tasks typically requiring human intelligence, such as problem-solving, learning, and decision-making, but without consciousness or emotions.

Human intelligence is a result of biological evolution and encompasses a wide range of cognitive abilities, including abstract thinking, language comprehension, and emotional intelligence. It is shaped by experiences, learning, and cultural factors, allowing humans to adapt, reason, and understand complex concepts.

Artificial intelligence, on the other hand, is a field of computer science that aims to create intelligent machines capable of performing tasks that typically require human intelligence. It involves the development of algorithms, machine learning techniques, and computational models to mimic human cognitive abilities. While artificial intelligence has made significant advancements in areas such as speech recognition, image processing, and data analysis, it lacks the holistic nature of human intelligence and the depth of human emotions and consciousness.

You can learn more about Human intelligence at

https://brainly.com/question/30129622

#SPJ11

Which of the following characterize the typical feature of c language


Answers

The typical features of C language include procedural programming, low-level memory access, extensive use of libraries, powerful control structures, and high portability. These features make C an efficient and flexible programming language, well-suited for a wide range of applications.

The typical features of the C language can be characterized by its simplicity, efficiency, and flexibility. C is a procedural programming language, which means it emphasizes the use of functions and procedures to organize code. This allows for modular programming, making it easy to break down complex problems into smaller, manageable pieces.

One of the defining characteristics of C is its low-level access to computer memory through pointers. Pointers enable efficient memory management and make it possible to work with dynamic data structures like linked lists, trees, and graphs.

Another key feature of C is its extensive use of libraries. The C standard library provides a rich set of functions for tasks such as input/output, string manipulation, and mathematical calculations. Programmers can also create their own libraries or utilize third-party libraries, further extending the functionality of the language.

C language also offers powerful control structures, such as if-else, loops, and switch-case statements. These structures provide flexibility in controlling the flow of program execution and handling various scenarios efficiently.

Moreover, C is highly portable. Code written in C can be easily compiled and executed on different computer architectures with minimal changes. This portability has made C the language of choice for developing system software, like operating systems and compilers, as well as application software across platforms.

In summary, the typical features of C language include procedural programming, low-level memory access, extensive use of libraries, powerful control structures, and high portability. These features make C an efficient and flexible programming language, well-suited for a wide range of applications.

Learn more about C language here:

https://brainly.com/question/30101710

#SPJ11

What is the primary function of NCEES? A. administering engineering examinations B. creating and amending ethical standards for engineers C. accrediting educational programs in the United States D. certifying engineering technologists and engineering technicians
RIGHT ANSWER ONLY

Answers

Answer:

NCEES is a national nonprofit organization dedicated to advancing professional licensure for engineers and surveyors. Learn more.

Explanation:

Answer:

A.  

administering engineering examinations

Explanation:

NEXT
Internet and World Wide Web: Mastery Test
1
Select the correct answer
An instructor receives a text message on her phone. Next, she reads out the text to the whole claws. Which network component plays a similar
role by receiving a message and broadcasting it to all other computers connected to the component?
OA Switch
OB .
hub
OC bridge
OD
router
Reset
Wext

Answers

Answer:

hub is the correct answer

hope it is helpful to you

Planning to finance higher education helps people prepare for their financial future because it teaches them about

Loans and interest
Savings and accounts
Filing taxes
Short term goals

Answers

Answer:

savings and account

Explanation:

because that will convince them

Answer:

Loans and Interests.

Explanation:

Edge

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

which of the following are correctly named python identifiers? martinbradley [ select ] c3p_oh [ select ] amy3 [ select ] 3right [ select ] first/name [ select ]

Answers

The only "martinbradley", "c3p_oh", and "amy3" are correctly named Python identifiers.

Python identifiers must follow certain naming rules, such as starting with a letter or underscore and only containing letters, numbers, or underscores. "3right" and "first/name" violate these rules by starting with a number and containing a slash, respectively.

Martinbradley - This is a valid identifier because it starts with a letter and contains only letters. c3p_oh - This is valid because it starts with a letter, and contains letters, digits, and underscores. amy3 - This is valid because it starts with a letter and contains a combination of letters and digits.

To know more about Python visit:-

https://brainly.com/question/29900071

#SPJ11

x = 9 % 2if (x == 1):  print ("ONE")else:  print ("TWO")

Answers

Answer:

ONE

Explanation:

It prints one because % is modulus, which is remainder division. It divides the numbers provided and returns the remainder of the division. 9 / 2 = 4 with 1 remainder, which leads us to our answer.

Jeremiah needs to see data in two different table views from two regions without creating two tables. Which two features would he use to create this?

Answers

Answer:

Tables & Filter

Explanation:

That correct

Answer:

D. Tables and filter

Explanation:

A linear representation of a hierarchical file directory is known as what?

Answers

It is known as a directory path

Answer:

C.) a directory path

Explanation:

because I got it right.

What's your opinion on Brainly?

Answers

Answer:

great it helped me a lot at tests

Explanation:

Answer:

amazing thank you so much your a life saver

Describe how to Download GNS3 IOS Images from Cisco Dynamips routers that you can use to perform and other hands-on lab exercises.

Answers

To download GNS3 IOS images for Cisco Dynamips routers, follow the below given steps to perform hands-on lab exercises.

The steps are-
1. Sign up for a free Cisco account: Before downloading the IOS images, you'll need to create a free account on the Cisco website. Visit www.cisco.com and click "Register" to create your account.
2. Navigate to the Software Download Center: After logging into your Cisco account, go to the Software Download Center by clicking "Support & Training" > "Software Download."
3. Search for IOS images: In the search bar, type the specific Cisco router model you're looking for, such as "7200" or "3745." The search results will display relevant IOS images for the specified router model.
4. Choose the desired IOS image: Click on the router model you're interested in and browse the available IOS images. Look for the IOS image with the appropriate feature set required for your lab exercises.
5. Download the IOS image: Click the "Download" button next to the IOS image of your choice. Accept the End User License Agreement and follow the prompts to download the image to your computer.
6. Import the IOS image into GNS3: Open GNS3, click "Edit" > "Preferences," and then select "Dynamips" > "IOS Routers." Click "New" to add a new IOS image and browse to the downloaded IOS image file. Follow the setup wizard to configure the router model and image settings.
7. Verify the imported IOS image: After completing the setup wizard, the newly added IOS image will be listed in the "IOS Routers" section. Click "OK" to save the changes and exit the Preferences window.

Now, you can use the downloaded GNS3 IOS images to perform hands-on lab exercises with Cisco Dynamips routers.

Learn more about routers here: https://brainly.com/question/27960821

#SPJ11

during the 19th century, in which state did people desire to preserve children in regarding childhood sexuality?

Answers

During the 19th century, in the state of Indiana, people desired to preserve children regarding childhood sexuality.

The following are the reasons why preserving children's childhood sexuality was essential in Indiana during the 19th century:

The public debates over women's sexuality in the United States at the turn of the twentieth century were frequently motivated by issues of childhood sexuality. The preservation of childhood sexuality and the threat posed by sexual knowledge to children's purity were two critical issues. Hence, children's sexual nature had to be preserved from any form of defilement.Indiana's legislators demonstrated an increasingly favorable attitude toward sexual crime legislation in the early twentieth century. Many individuals saw childhood sexuality as a significant social concern that required criminal intervention. They encouraged punishment for sexual abuse against children as a means of protecting children's purity and preserving childhood innocence. They believed that preserving children's sexual nature was critical for their development because they held that children were fundamentally pure beings.

Learn more about childhood sexuality:

brainly.com/question/23143615

#SPJ11

with cell b2 selected, set the width of column b to autofit.

Answers

Autofit is an important feature of Excel that allows the user to adjust the column width in an automated way.

The autofit feature helps users to fit the text data in a given cell to the column size. Therefore, with cell B2 selected, set the width of column B to autofit, the following procedures should be followed:

Step 1: Start by selecting the Home tab of the Excel sheet.

Step 2: Choose the Format command group.

Step 3: Click on the AutoFit Column Width command. It will automatically adjust the width of column B so that the contents of cell B2 will fit within that column. For instance, the amount of text data in cell B2 will determine the column width that will be adjusted. However, if the data in the cell exceeds the maximum capacity of the column, then the extra text data will be cropped.

Therefore, when using Excel, the autofit feature is an essential tool to adjust the column width automatically and improve the efficiency of work. This feature helps to save time and produce an organized worksheet with presentable data.

Know more about the Autofit

https://brainly.com/question/32331452

#SPJ11

Why are salaried employees often excluded from overtime pay

Answers

The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

Do salaried employees get paid overtime?

A salaried employee is one that gets paid due to different kinds of work. They can be paid overtime unless there is a reason that they do not meet the test for exempt status as stated in the  federal and state laws.

Note that they are not eligible if they are specifically exempted from any form of overtime by the provisions that were given in the California Labor Code or the Industrial Welfare Commission Wage Orders that is known to be regulating wages, hours as well as working time.

Hence, The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

Learn more about overtime pay from

https://brainly.com/question/19022439

#SPJ1

You are working at a bank. People routinely come in to withdraw money from their accounts but always request that their money be given to them in the fewest number of bills possible. Write a program named change.c that asks the user how much money they would like to withdraw and then tells them how many of which bills they are to receive. You have bills in the following denominations: 1, 5, 10, 20, 50, and 100 Assumptions All input is valid The user will only ask for whole dollar ammounts (i.e. they won't ask for cents) The examples provided do not represent all possible input you can receive So make sure to test throughly on your machine

Answers

As per the given problem statement, you need to write a program named change.c that asks the user how much money they would like to withdraw and then tells them how many of which bills they are to receive.

Below is the program to fulfill the given requirements:#include int main(){ int amount, remaining_amount, hundreds, fifties, twenties, tens, fives, ones; printf("Enter a dollar amount: "); scanf("%d", &amount); hundreds = amount / 100; remaining_amount = amount % 100; fifties = remaining_amount / 50; remaining_amount

= remaining_amount % 50; twenties = remaining_amount / 20; remaining_amount = remaining_amount % 20; tens = remaining_amount / 10; remaining_amount = remaining_amount % 10; fives = remaining_amount / 5; remaining_amount = remaining_amount % 5; ones = remaining_amount; printf("$100 bills: %d\n", hundreds); printf("$50 bills: %d\n", fifties); printf("$20 bills: %d\n", twenties); printf("$10 bills: %d\n", tens);

printf("$5 bills: %d\n", fives); printf("$1 bills: %d\n", ones); return 0;}The above code first reads the user input and then calculates the number of each type of bills that are needed to fulfill the given amount using modulo operation and then prints the number of bills of each type. This code meets the given requirements and tested on the system. The output of the program can be verified by running the code on any C compiler like Dev C++, Code::Blocks, or online compilers like GeeksforGeeks.

To know more about money visit:

https://brainly.com/question/2696748

#SPJ11

A............
refers to a person who has the knowledge and skills to effectively
use digital technologies to communicate with others, participate in society and create and
consume digital content.
mer

Answers

A digital citizen refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others, participate in society and create and consume digital content. ... cyberbullying, relationships, etiquette and communication.

Here is a sequence of binary digits:
011000101110010100110100010001110101001110001010101
What could this sequence represent? What could it mean?

A. A piece of text
B. A number
C. A set of instructions
D. Musical notes
E. Any piece of information

Could I have some help please?

Answers

Answer:

E

Explanation:

trust me

Who wants to play Among Us as My hero Academia characters?

Who wants to play Among Us as My hero Academia characters?

Answers

Answer:

this is brainly uhhhhhhh

Explanation:

y

Aight, I missed it walpp

What is output by the following code? Select all that apply.

c = 0




while (c < 11):

c = c + 6

print (c)
Group of answer choices

0

2

4

8

10

6

14

16

1

3

12

Answers

Answer:

6
12

Explanation:

c starts with value zero. When the while loop starts 6 is added to the value, so 0 + 6 = 6. then the value is printed on the screen. The while checks if 6 is less than 11, since it's true then the the loop executes again and more 6 is added to the previous value, so now the value is 12. The value is again printed. Then the while checks again if 12 is less than 11, since it's not, then the loop breaks there, and nothing more is printed. So  if there is no line break, the printing should look like:

612
if there is a line break, then its:

6
12

what is profession explain with example​

Answers

Answer:   a profession is a job, or what you do for a living

example : a teacher is an example of proffesion

Answer:

the activities which are done for earning and to live life is called profession . eg: doctor ,engineer,

Other Questions
Michaeall your steps.2x 3xproblem a 60 xmiss chang ordered a pizza to share with some grade 8 students. miss changgave michael some slices of pizza. miss chang gave amy twice as many slices ofpizza as michael. miss chang gave mr. au three times the sum of what she gaveto michael and amy. miss chang gave 60 slices of pizza to michael, amy and mr.au in total. how many slices of pizza miss chang give to each person? A blood clot damages sensory tracts passing through the lower right side of the medulla. Determine which sensations would be abnormal on the left side of the body (multiple answer question) 1) Pain 2) Proprioception 3) Fine touch 4) Temperature 5) Crude touch 6) Vibration the conclusion that a monopoly results in lower output and higher prices than perfect competition relies on the assumption that part 2 a. the demand curve for a monopoly is horizontal. b. elasticity of demand varies along the market demand curve. c. the costs of production are the same whether the industry is perfectly competitive or a monopoly. d. consumers are ignorant of the effects of monopoly. A ducks mass at birth is 0.05 kilograms. the duck gains approximately 0.042 kilograms each week. after how many weeks is the ducks mass 0.890 kilograms? Fill in the blanks below with the (a) A two story house is about 10?tall.(b) In her shower, Karen used about 110?of water.(c) Michael saw an elephant at the zoo. The elephant's mass was about 4000? A science teacher set up a demonstration using a two-part tray containing wax to represent earths crust that was completely divided by a board. The teacher then pulled the board in the direction of the arrows seperating the parts of the tray urgent pleaseQUESTION 43 As the partial pressure of oxygen (Poz) increases, the % saturation of Hb increases. O True O False QUESTION 44 Parietal cells in the gastric glands produce HCl; chief cells produce pepsin How did Americans, other than Californians, benefit from the gold rush? The human _____ is cup- or basin-shaped. This means that compared to a chimpanzee's it is broad and _______ to receive weight of the upper body The boiling points of different substances are given in the table below.SubstanceBoiling point (C)Acetic acid118.1Benzene80.2Chloroform61.2Water100.0Which substance most likely has the strongest intermolecular forces?acetic acidbenzenechloroformwater What is Sterne's purpose for writing?. Which statement best conveys the literal meaning of the following simile?1. The buildings stand in the center of the city like looming mountains.2. The buildings are really tall.3. The buildings are made of stone.4. The buildings are on top of a mountain. Why do people fall for propaganda? Solve the following system by Gauss-Jordan elimination.2x1 + 5x2.+ 11x3 = 3110x1 + 26x2 + 59x3 = 161 Match each root with its meaning.Match Term Definition Port A) Voice; to call Voc B) To be empty Tract C) To build, form Vac D) To pull Struct E) To carry hi help its six grade maths HELPPPP?! Which section of the valcanoes page of the ready . gov website provides information on finding a shelter if you are forced to evacuate . Which operations can be applied to a matrix in the process of Gauss-Jordan elimination?replacing a row with twice that rowreplacing a row with the sum of that row and another rowreplacing a row with three times another rowswapping rowsreplacing a row with the absolute values of that row 3. Mr Chen's salary was $2800. He spent $1500 and gave the rest equally to each of his 3 daughters and 2 sons. How much did each daughter receive? Ans: Stationery, paper clips, and brooms are a type of support product known as:__________