A(n) _________ is an interactive website kept constantly updated and relevant to the needs of its customers using a database.

Answers

Answer 1

A Content Management System (CMS) is an interactive website kept constantly updated and relevant to the needs of its customers using a database.

A Content Management System (CMS) is a software application or a set of related programs that allows users to create, manage, and modify digital content on a website without the need for specialized technical knowledge. It provides an interface for users to easily create, edit, and publish content, as well as manage other aspects of the website such as design, layout, and navigation.

A CMS typically consists of two main components: a content management application (CMA) and a content delivery application (CDA).

Learn more about Content Management Systems, here:

https://brainly.com/question/28340827

#SPJ4


Related Questions

Which statement is true regarding the Quick Access toolbar?
O It can be located at the top left-hand corner of the screen or below the ribbon.
O. It can contain functions that are also in the ribbon
O It can be modified to contain any function that you use frequently.
O All the above statements are true.​

Answers

Answer: All the above statements are true

Answer:

D) All of the above

Explanation:

what is au lab files?

Answers

The term "au" typically stands for "audio" and is used to refer to audio files. A "lab" is a laboratory, which is a place where scientific experiments are conducted. "Files" are typically computer documents that contain information.

So, what is au lab file?

Therefore, we must say that  "au lab files" likely refers to audio files that are used in a laboratory setting, perhaps for research or experimentation purposes. These files may contain recordings of sounds or other audio data that are used in the lab.

For more information about au lab, visit:

https://brainly.com/question/18496962

#SPJ11

FOLLOWING QUESTION ( 10 EACH ) MINIMUM 5 SENTENCES , MAXIMUM OF 10 SENTENCES

why is it important to use recipe abbreviations and equivalent of measurement ?

Answers

Recipes and abbreviations are important because they help to ensure accuracy and uniformity in the final output.

Why are recipes and abbreviations important?

Recipes are good because they are standards that can be referred to even after some time or in a different location. A chef might use a recipe in one country and another chef who can get all of the ingredients in another location would reproduce the recipe.

Abbreviations are also important because they save time and also help chefs easily identify ingredients without writing them all out. These two are very important in cooking and any other procedural task.

Learn more about recipes and abbreviations here:

https://brainly.com/question/6496327

#SPJ1

Identify and label the parts fo the audio mixer (use the provided list as a guide).
____________. Audio Input Knob Potentiometers
____________. Audio Input Slider Potentiometers
____________. Audio Mixer
____________. Main Output Control
____________. Sub-master Control

Identify and label the parts fo the audio mixer (use the provided list as a guide). ____________. Audio

Answers

The parts of the mixer are labeled as follows:

B. Audio Input Knob Potentiometers

D. Audio Input Slider Potentiometers

F. Audio Mixer

A. Main Output Control

B. Sub-master Control

What is a mixer?

A mixing console, often known as a mixing desk, is electrical equipment used in sound recording, reproduction, and sound amplification systems to combine audio signals.

Microphones, signals from electric or electronic devices, and recorded sounds are all examples of console inputs. Analog and digital signals can be controlled using mixers.

Audio mixers are classified into three types: analog, powered analog, and digital. Each form has advantages and disadvantages.

Learn more about mixers:
https://brainly.com/question/26534052
#SPJ1

My monitor, every time I try to turn it on says this "reboot and select proper boot device or insert boot media in a selected boot device and press a key" I've already tried to press all the keys to enter BIOS but since before this problem happened I enabled ultra-fast boot so it doesn't give me time to press any of them and I don't know what to do I've seen so many videos and I just can't find any that could possibly help me

Answers

You may have a corrupt system or your hard drive may be loose. (it used to be a common issue for me when I upgraded my computer to SSD, that computer is only used for backup purposes)

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

PLS HELP!!
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your online education.
Make sure that your paper details clearly the type of game, how it will work, and how the student will progress through the action. Also include how the school or teacher will devise a grading system and the learning objectives of the game. Submit two to three paragraphs.

Answers

Incorporating cutting-edge gaming technology into web-based learning can foster an interactive and stimulating educational encounter. A clever method of attaining this goal is to incorporate immersive virtual reality (VR) games that are in sync with the topic being taught

What is the gaming about?

Tech gaming can enhance online learning by engaging learners interactively. One way to do this is by using immersive VR games that relate to the subject being taught. In a history class, students can time-travel virtually to navigate events and interact with figures.

In this VR game, students complete quests using historical knowledge and critical thinking skills. They may solve historical artifact puzzles or make impactful decisions. Tasks reinforce learning objectives: cause/effect, primary sources, historical context.

Learn more about gaming from

https://brainly.com/question/28031867

#SPJ1

A large multinational corporation is in the planning stages of migrating some of its applications to a cloud service provider. They have outlined their technical needs and have sent some of the documentation along with the potential provider's SLAs and terms of service to the legal department to review. Which of the following might be a concern expressed by the legal department after reviewing these documents?


a. Ensuring data is hosted in the appropriate regions for the cloud service provider

b. Ensuring that the corporation has a way to measure uptime to ensure SLAs are actually met *J#

c. Ensuring that there is a guarantee that the cloud service provider will provide notice in the event that they decide to discontinue operations

d. Ensuring that the cloud service provider will allow an audit of their network for security purposes

Answers

After reviewing the documents, a concern that might be expressed by the legal department is option d: Ensuring that the cloud service provider will allow an audit of their network for security purposes.

Security is a critical consideration when migrating applications to the cloud. The legal department may want to ensure that the cloud service provider allows the corporation to perform security audits on their network infrastructure to verify compliance with regulatory requirements, data protection standards, and internal security policies.

This is important to assess the effectiveness of the cloud provider's security measures and identify any potential vulnerabilities or risks.

Auditing the network helps ensure that proper security controls are in place, data privacy is maintained, and the corporation's intellectual property is adequately protected. It also helps establish trust and transparency between the corporation and the cloud service provider.

By conducting audits, the corporation can validate the cloud service provider's security practices and ensure that they meet the required standards. This concern reflects the legal department's focus on protecting the corporation's data, mitigating risks, and maintaining compliance with applicable regulations.

Overall, the legal department's concern about conducting audits of the network is essential for the corporation to verify the cloud service provider's security posture and ensure the confidentiality, integrity, and availability of their applications and data.

So, option d is correct.

Learn more about network:

https://brainly.com/question/8118353

#SPJ11

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance.

Answers

Since the director asks that they be put into a RAID solution that offers redundancy over performance, i will use option d. RAID 6.

What does RAID 6 mean?

This is known to be a redundant array of independent disks.

Note that RAID 6, is a term that is known as double-parity RAID (redundant array of independent disks).

This is one of a lot of other RAID schemes that functions by putting data on multiple disks and giving room for input/output (I/O) operations to be able to overlap in a situation that is balanced thereby improving performance.

Hence, Since the director asks that they be put into a RAID solution that offers redundancy over performance, i will use option d. RAID 6.

Learn more about redundancy from

https://brainly.com/question/17880618

#SPJ1

See full question below

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance. Which would you use?

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

50 points 3. Which of the following statements is true of phishing emails?
O A. They're important to keep.
B. They come from trusted sources.
C. They pretend to need information and use it for harm.
D. They're the same thing as junk mail.

Answers

Answer:

C. They pretend to need information and use it for harm

Explanation:

goog it

They pretend to need information and use it for harm. Therefore, the correct answer is option C.

Phishing is a form of cybercrime in which criminals use malicious emails and websites to try and extract sensitive information such as usernames, passwords, credit card numbers, and other personal information from unsuspecting victims. The criminals use this information for their own financial gain, either by stealing the victim's money or using the victim's identity to commit various other frauds. Phishing emails often appear to come from trusted sources and can use various tactics to try and convince the recipient to click on a malicious link or provide credentials. In contrast, junk mail or spam is just annoying and usually is not associated with malicious activities.

Therefore, the correct answer is option C.

Learn more about the Phishing here:

https://brainly.com/question/32858536.

#SPJ6

why do thread activities sometimes require coordinating

Answers

Thread activities require coordination when multiple threads need to access shared resources or data structures.

In a multi-threaded application, multiple threads can run concurrently, and each thread may have its own stack and program counter, but they all share the same memory space.

This can create potential problems when multiple threads try to access the same resource or data structure at the same time. These problems can include:

Race conditions: When two or more threads try to access or modify the same data at the same time, the order in which they execute can affect the final outcome. Deadlocks: When two or more threads are waiting for each other to release a resource or data structure, they can become deadlocked, meaning that they are unable to make progress.Data corruption: When multiple threads modify the same data structure without proper synchronization, they can corrupt the data, leading to inconsistent or invalid results.

Learn more about thread here:

https://brainly.com/question/30746992

#SPJ11

Which of the following statements are true about the growth of technology? Select 3 options. A. Individuals in the United States currently own an average of three connected devices. B. The general public began connecting to the Internet when the World Wide Web was introduced in 1991. C. By 1995, almost half of the world’s population was connected to the Internet. D. Currently, 67% of people on earth use at least one mobile device. E. The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.

Answers

Answer:

b

Explanation:

the general public began connecting to the internet when the world wide web was introduced

Answer:

The general public began connecting to the Internet when the World Wide Web was introduced in 1991.

By 1995, almost half of the world’s population was connected to the Internet.

Currently, 67% of people on earth use at least one mobile device.

Explanation:

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return false; be written in the code? function checkVowel(character){ var vowels = ["a", "e", "i", "o", "u"]; for(var i=0; i

Answers

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.

The main function's return of 0 indicates a successful program execution. Return 1 in the main function denotes an error and indicates that the program did not run correctly. Returning zero indicates that a user-defined function has returned false. Returning 1 indicates that a user-defined function has returned true.

What return false be written in the code?

One of the two values is what t may return. If the parameter or value supplied is True, it returns True. If the supplied parameter or value is False, it returns False.

Because it is a string, “0” is equivalent to false in JavaScript. However, when it is tested for equality, JavaScript's automatic type conversion changes “0” to its numeric value, which is 0; as we know, 0 denotes a false value. As a result, “0” is false.

Therefore, at the end, i.e., after the for loop. I also included a more attractive alternate implementation.

Learn more about code here:

https://brainly.com/question/20345390

#SPJ5

The primary analytic tool used to evaluate the responsiveness of one variable to change in another variable is called ______.

Answers

Answer: Elasticity

achievements of science in our society

Answers

Answer:

Science has paved the way for so many discoveries throughout the decades. Some big science achievements in society that could be remarked are;

Lunokhod 1:

Lunokhod 1 was a spacecraft that landed first remote controlled robot that landed on the moon by the soviet union. the robot weighted just under 2,000 pounds and was designed to operate for 3 months. Lunokhod was operates by a 5 person team on Earth.  

The First Ultrasound:

The first ultrasound was introduced by Ian Donald. He used a one dimensional A-mode to measure the parietal dimeter of a fetal head and two years later Donald's and Brown, a co-worker, presented the ultrasound of a female tumor. Donald's and Browns work paved the way for ultrasounds in medical science.

Rapid Covid Vaccinee Development:

One of the biggest achievements if the rapid development of the vaccinee for Covid-19, with the deadly virus spreading back in 2020,  it took less than 2 years to develop a vaccine when normally, it takes 10-15 years. Medical science has come a long way, and this is a huge example of it.

which of the following is true of the agile approach to software development? group of answer choices in the agile method, requirements and solutions evolve through collaboration. agile is a predictive model of software development. an agile approach sets scope goals, but leaves time and cost goals flexible. in the agile approach, requirements must be clearly expressed early in the life cycle.

Answers

In the agile approach to software development, requirements and solutions evolve through collaboration.

This allows for flexibility and adaptability throughout the development process. Agile is not a predictive model; instead, it emphasizes iterative and incremental development. While scope goals are set in the agile approach, time and cost goals are considered flexible to accommodate changing requirements. It is not necessary for requirements to be clearly expressed early in the life cycle, as they can evolve and be refined as the project progresses through collaboration and feedback. Agile is characterized by its collaborative nature, where requirements and solutions evolve through continuous collaboration and feedback. This approach recognizes that requirements can change over time as the project progresses and stakeholders gain a better understanding of their needs. By involving stakeholders, including developers, clients, and end-users, throughout the process, the agile approach allows for a more responsive and adaptable development cycle.

Learn more about software development here:

https://brainly.com/question/32399921

#SPJ11

Hyperlinks can only point to webpages.

True or False

Answers

Answer:

I believe thats false

what is the domain and path in this URL? www.example.com/homepage.html​

Answers

Answer:

the domain is example.com. the path is /homepage

Explanation:

In the above URL, the domain is example.com. the path is /homepage.

What is a URL?

The full form of the URL is Uniform Resource Locator. Uniform Resource Locator is a reference to an online resource that identifies its location on a computer network and a method of retrieval.

Although many people mistakenly use the words "URL" and "Uniform Resource Identifier" interchangeably, a URL is a particular kind of URI. It is simply a web address.

A domain name is a phrase that designates a space where administrative autonomy, power, or control is exercised.

A page, post, file, or other asset's precise location is indicated by the path. It is frequently compared to the website's underlying file structure. The hostname comes before the route, which is separated by a "/"

Learn more about URL here:

https://brainly.com/question/31146077

#SPJ2

the most common example of ____ data is the human voice.

Answers

The most common example of analog data is the human voice.

What is Analog?

Analog is an adjective that describes a device or system in which information is represented by continuously changing physical quantities. A record player is a simple example of an analog device. The stylus continuously reads the unevenness of the record. Watches with hands are one such example because the hands move continuously on the dial, the clock can be displayed at any time of the day.

Analog contrasts with digital. Turntables are analog, but CD players, which read the binary data representing the audio signal, are digital. A clock with hands is analog, but a digital clock can only represent a limited number of times such as every tenth of a second. In general, computers are digital devices, but the human experience is analog. For example, our sight and hearing are constant transmissions of information to our senses. There are infinitely smooth gradations of shapes, colors, and sounds.

Learn more about analog https://brainly.com/question/12620232

#SPJ4

Create a variable ‘temp’ and assign the value in Celsius. Display the message ‘It’s extremely hot day today!’ if the temperature is greater than 40oC otherwise, displays ‘It’s not too hot!

Answers

Answer:

This code is written using C++

Comments are used for explanatory purpose

Program starts here

#include<iostream>

using namespace std;

int main() {

int temp;

//Prompt user for input

cout<<"Enter temperature (in Celcius): ";

//Check if input is acceptable

while(!(cin>>temp)) {

cout << "That was invalid. Enter a valid digit: "<<endl;

cin.clear(); // reset the failed input

cin.ignore(123,'\n');//Discard previous input

}

//Check if temp is greater than 40

if(temp>40) {

cout<<"It's extremely hot day today!";

}

else{//If otherwise

cout<<"It's not too hot!";

}

return 0;

}

//End of Program

Which of the following types of CPUs have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU?HyperthreadingDual-core CPUQuad-core CPUHexa Core processors

Answers

A type of CPU which have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU include the following: A. Hyperthreading.

What is a CPU?

In Computer technology, CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control.

This ultimately implies that, the central processing unit (CPU) performs most of the calculations, which enables a computer to function and is sometimes referred to as the “brain” of the computer.

Generally speaking, hyperthreading is a type of central processing unit (CPU) that is designed and developed with an extra hardware which is built in order to allow two (2) or more thread to be processed at the same time on a single central processing unit (CPU).

Read more on CPU here: brainly.com/question/5430107

#SPJ1

Which file format is most often used with the CMYK color model and allows the image to be increased or decreased in size with minimal loss in quality?

GIF
PNG
TIFF
JPEG

Answers

The file format  that is most often used with the CMYK color model and allows the image to be increased or decreased in size with minimal loss in quality is option C: TIFF.

What is the purpose of a TIF file?

Computer files called TIFFs, which stand for Tag Image File Format, are used to store raster graphics and image data. If you want to avoid lossy file formats, TIFFs, which are a favorite among photographers, are a useful option to keep high-quality photographs before editing.

Hence, With a high color depth of up to 32 bits per color component, the format supports both the RGB and CMYK color models. Transparencies, masks, and layers can also be stored. You may copy or save data without sacrificing quality thanks to lossless compression.

Learn more about  file format from

https://brainly.com/question/24102638
#SPJ1

in which ef development technique do you start by writing entity and database context classes before generating a new database?

Answers

Note that the development technique that has to do commending by writing entity and database context classes before generating the new database is called the "Code -First Development".

What is "Code -First Development"?

The above is a kind of technique that is used when developing software to create and amanage on or more database s.

It works by writing classes in code such that they define the data entities and their connections or relationships.

It is normally used in modern website apploications and can permit develops to achive better control over the database amanagement.

Learn more about database context classes at:

https://brainly.com/question/14077805

#SPJ1

Which of the following are generally considered to be professional behaviors in IT? Check all of the boxes that apply.

O.maintaining technical competency
O.sharing confidential information
O.teaching others about technology​

Answers

The option that considered to be professional behaviors in IT is Maintaining technical competency.

What professional behavior implies?

Professional behavior is known to be a kind of etiquette that is often seen in the workplace and it is one that is often  linked to respectful and courteous ways.

Hence, The option that considered to be professional behaviors in IT is Maintaining technical competency.

Learn more about IT from

https://brainly.com/question/25226643

#SPJ1

Answer:

The answer is actually A and c

Explanation:

The answer is right trust me

how do i scan or check for computer virus?​

Answers

Answer:

what type of computer

Explanation:

why can’t the pm use the organization’s current information system for project monitoring and reporting?

Answers

PM needs to provide regular updates to stakeholders who require concise and actionable information. In such cases, the PM may have to invest in a dedicated system that is specifically designed for project monitoring and reporting.

There are several reasons why the project manager (PM) may not be able to use the organization’s current information system for project monitoring and reporting. These reasons are discussed below:Lack of Compatibility:One of the primary reasons why the PM may not be able to use the organization’s current information system is due to a lack of compatibility between the system and the project’s requirements.

The current system may not have the necessary features or functions to monitor and report on the project’s progress. As such, the PM may have to invest in a new system that is specifically designed for project monitoring and reporting.Cost:The cost of purchasing and implementing a new system can be a significant obstacle for many organizations. Even if the current system is not suitable for the project’s needs, the organization may be unwilling or unable to invest in a new system.

To know more about stakeholders  visit:-

https://brainly.com/question/30241824

#SPJ11

Why can videos be streamed from one computer to another with excellent
quality?
A. They are received using either analog or digital signals.
B. They are transmitted using digital signals.
C. They are transmitted using analog signals.
D. They are received using both analog and digital signals.
SUBMIT

Answers

Answer:

I believe the answer is B.

Explanation:

They are transmitted using digital signals. The correct option is B.

What is video quality?

Video quality refers to how clear, sharp, and detailed the image of a video appears to the viewer.

Videos are typically transmitted as digital signals that can be easily encoded, compressed, and transmitted over the internet or other networks.

Maintaining the video stream's quality requires ensuring a stable and fast network connection between the sender and receiver, as well as employing efficient video compression techniques to reduce the amount of data that must be transmitted.

Furthermore, the use of buffering and other techniques can help to smooth out any fluctuations in network performance and ensure smooth and uninterrupted video playback.

Thus, the correct option is B.

For more details regarding video quality, visit:

https://brainly.com/question/9940781

#SPJ5

How to fix "the number you are trying to call is not reachable"?

Answers

The number you are trying to call is not reachable" typically indicates that the phone number you are trying to call is currently unavailable or out of service. To fix this issue, you can try the following:

Check the phone number you are trying to call to make sure it is correct.Ensure that your phone is connected to a network with good signal strength.Restart your phone and try calling againTry calling the number from a different phone or from a landline to see if the issue is with your phone.If the issue persists, contact your phone service provider for further assistance.

It's also possible that the number you are trying to call has been disconnected or is no longer in service. In this case, you will not be able to reach the number. Troubleshooting is the process of identifying and resolving problems or issues with a system or device. In this case, the system or device is a phone, and the problem is that a call to a certain phone number is not going through and the message "the number you are trying to call is not reachable" is being received.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

In a typical office, biometric authentication might be used to control access to employees and registered visitors only. We know the system will have some false negatives, some employees falsely denied access, so we need a human override, someone who can examine the employee and allow access in spite of the failed authentication. Thus, we need a human guard at the door to handle problems as well as the authentication device; without biometrics, we would have had just the guard. Consequently, we have the same number of personnel with or without biometrics, plus we have the added cost to acquire and maintain the biometrics system. Explain the security advantage in this situation that justifies the extra expense.

Answers

The security advantage in this situation that justifies the extra expense is that these Biometric devices is one that separates the handling of issues regarding biometric information from the system operating system.

It is one that render it impossible for hackers to alter the authentication process.

What is the aim of biometric authentication?

An biometric authentication is known to be a device that is used to handle access in regards to physical and digital resources, e.g. buildings, rooms and other forms of computing devices.

Note that the security advantage in this situation that justifies the extra expense is that these Biometric devices is one that separates the handling of issues regarding biometric information from the system operating system.

It is one that render it impossible for hackers to alter the authentication process.

Learn more about Biometric devices from

https://brainly.com/question/19096951

#SPJ1

What's the difference between HTML and CSS

Answers

The difference between HTML and CSS is that HTML is used for providing a structure (skeleton) for a website while CSS informs the style (skin).

What is CSS?

CSS is an abbreviation for Cascading Style Sheets and it can be defined as a style sheet programming language that is designed and developed for describing and enhancing the presentation of a webpage (document) that is written in a markup language such as:

XMLHTML

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language which is used for designing, developing and creating websites or webpages.

In conclusion, we can reasonably infer and logically deduce that the difference between HTML and CSS is that HTML is used for providing a structure (skeleton) for a website while CSS informs the style (skin).

Read more on CSS style here: brainly.com/question/14376154

#SPJ1

Other Questions
i dont know how this works lol what is the volume to this shape? What is the domain of the given relation? {(-1,4), (4,3), (4,-4), (1,3)} o {3,-1,-4} o{-1,3,4} o{-1,1,4} o{-4,-1,3,4) Next Choose the best answer and give a reasonable explanation._____________ maps show features of the earth's surface.GeographyReferenceThemePoliticalPhysical What stays in the corner while traveling around the world? In your own words provide a clear definition of each of the following type of data, and provide one example for each: (a) discrete data (b) primary data (c) qualitative data (d) quantitative data (e) secondary data flaming the mouth of the tube containing sterilized nutrient broth is not necessary before introducing a specimen from bacterial culture. question 2 options: true false Business to Business Buying depends on derived demand. Demand is driven by their customers who would be another business and the customers of the other business. How does Costco change demand in retail to affect the business to business relationship with their suppliers? 2. Describe Costco's evaluation of their business to business suppliers by using an example from the video or your own research. 3. Give your opinion of Costco's business to business relationships Question 17 (3 points) Describe what happens if lim f(x) = f(a) for a function Ax). ____ I dropped the glass, the pieces the scattered all over the floor.Whats the conjunction? A covalent bond is formedA. when one or more electrons are transferredfrom one atom to another.B. by the sharing of electrons between atoms.C. the same way an ionic bond is formed.D. when ions are created. evidence that some cones are especially sensitive to red light, others to green light, and still others to blue light is most directly supportive of the ________ theory. what was one way american colonists resisted British policies before the american revolution A(n) ________ is a set of one or more computer programs that serves as an intermediary between the user and the DBMS. (Trig. Functions and Angles of Elevation & Depression)A lifeguard is sitting on her tower 5 feet above the ground. She sees a swimmer in the pool beneath her stand when she looks downward at an angle of depression of 22. What is the horizontal distance between the swimmer and the base of the lifeguard's tower? List potentialcareplan revisions available to nurses. 7x + 49y + 21need the answer htfutures contracts on gold are based on 100 troy ounces and priced in dollars per troy ounce. assume the january gold contract settled today at 1285.10 and opened at 1284.60. the april contract settled at 1285.30 and opened at 1285. you own four of the april contracts that you purchased at 1284.70. what is your total profit or loss to date? multiple choice $160 $240 $40 $120 $60ps://www./search?q At which location along a river or stream would the greatest rate of erosion most likely occur? at its point nearest to the ocean at its steepest incline at its widest point at its origin Based on the context of the passage, what is the meaning of the word figure? A. appear conspicuous B. make sense of something C. represent by a figure D. indicate by a set of numbers