Chapter 5 through 7 of the national electrical code contain
A.general rule for conductor and equipment installation .
B.Rules related to special installations such as signs and emergency lighting.
C.rules related to all types of communications equipment
D.Tables that can be used to determine proper wire sizes for any installations.

Answers

Answer 1

Chapter 5 through 7 of the national electrical code contains "general rule for conductor and equipment installation" (Option A)

 What is the explanation for this ?

Chapter 5 through7 of the National Electrical Code  (NEC) contain general rules and guidelines for conductor and equipment installation.

These chapters cover various aspects of electrical installations, including wiring methods, grounding and bonding, overcurrent protection, and equipment requirements. They provide essential guidelines to ensure safe and code-compliant electrical installations in various settings.

Learn more about national electrical code at:

https://brainly.com/question/14507799

#SPJ1


Related Questions

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other side is 6 unit long. which could b the parallelograms height select all apply

The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other

Answers

Answer:

\(Height = \frac{3}{4}\ unit\)

\(Height = 3\ units\)

Explanation:

Given

Shape: Parallelogram

\(Area = 18 unit^2\)

\(Side\ 1 = 24 units\)

\(Side\ 2 = 6 units\)

Required

Determine possible heights of the parallelogram

Area of parallelogram is:

\(Area = Base * Height\)

Make Height the subject of formula

\(Height = \frac{Area}{Base}\)

When Base = 24 units;

\(Height = \frac{18}{24}\)

\(Height = \frac{3}{4}\ unit\)

When Base = 6 units;

\(Height = \frac{18}{6}\)

\(Height = 3\ units\)

When Base = 24 units

When Base = 6 units

Height: 3

7- Calculator
Submit Assignment
Submitting a text entry box or a file upload
Create a simple calculator program.
Create 4 functions - add, subtract, multiply and divide.
These functions will print out the result of the operation.
In the main program, ask the user to enter a letter for the operator to enter 2 float input values.
After the user enters the values, ask the user what operation they want to perform on the values-A, S, M, D or E to Exit
and
Make sure you check for divide by O.
Your program should continue until E is typed.
upload or copy your python code to the submission

Answers

Answer:

In this tutorial, we will write a Python program to add, subtract, multiply and ... In this program, user is asked to input two numbers and the operator (+ for ... int(input("Enter Second Number: ")) print("Enter which operation would you like to perform?") ch = input("Enter any of these char for specific operation +,-,*,/: ") result = 0 if .

Explanation:

Which development approach was used in the article, "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet"? Predictive, adaptive or Hybrid

Answers

The sequential and predetermined plan known as the waterfall model is referred to as the predictive approach.

What is the  development approach

The process entails collecting initial requirements, crafting a thorough strategy, and implementing it sequentially, with minimal flexibility for modifications after commencing development.

An approach that is adaptable, also referred to as agile or iterative, prioritizes flexibility and cooperation. This acknowledges that needs and preferences can evolve with time, and stresses the importance of being flexible and reactive to those alterations.

Learn more about development approach from

https://brainly.com/question/4326945

#SPJ1

The development approach that was used in the article  "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" is Hybrid approach. (Option C)

How is this so?

The article   "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" utilizes a hybrid development approach,combining aspects of both predictive and adaptive methods.

Predictive development   involves predefined planning and execution, suitable for stable projects,while adaptive methods allow for flexibility in adapting to changing requirements and environments.

Learn more about development approach at:

https://brainly.com/question/4326945

#SPJ1

Plsss 30 points!!!!

Which option should not be considered a security feature because the option can easily be removed and additional edits
can be made to a document?

O Mark as Final
O Protected View
O Editing Restrictions
O none of the above

Answers

Answer:

a

Explanation:

Answer:

Mark as final or option A

Explanation:

1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated

Answers

Answer:

The use of non-volatile storage, such as disk to store processes or data from physical memory.

Explanation:

Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.

Which of the following accurately describes a user persona? Select one.

Question 6 options:

A user persona is a story which explains how the user accomplishes a task when using a product.


A user persona should be based only on real research, not on the designer’s assumptions.


A user persona should include a lot of personal information and humor.


A user persona is a representation of a particular audience segment for a product or a service that you are designing.

Answers

A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.

This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.

Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.

The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.

Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Learn more about User persona, refer to the link:

https://brainly.com/question/28236904

#SPJ1

what is the percentage of 20?

Answers

Hi!

I'm Happy to help you today!

The answer to this would be 20%!

The reason why is because percents are simple to make! Like theres always an end percent! But its always gonna end at 100% Let me show you some examples to help you understand!

So were gonna have the end percent at 100%

Lets turn 2 into a percent!

2 = 2% because its under 100%

Now lets go into a Higher number like 1000%

So lets turn 33 into a percent!

33 = 3.3% 30 turns into 3% because of the max percent of 1000% and then 3 turns into .3% because of the max of 1000%

I hope this helps!

-LimitedLegxnd

-If you enjoyed my answer make sure to hit that Heart! Also Rate me to show others how well i did! You can do that by clicking the stars!

-Question asker mark me brainliest if you really enjoyed my answer!

Mrs. Toma is preparing a marksheet of Final term using Excel. She needs to 1
add a new subject title in the worksheet. Now, which component does she
need to add in her marksheet?

Answers

Answer:

a

Explanation:

Consider a 16 GByte memory (16G locations each holding one byte). What is the number of address lines (N)?

Answers

Answer:

Number of address lines (N) = 34

Explanation:

16G locations each holding 1 byte

           byte

1g    1 - 1 - 1 - 1 - 1 - 1 - 1 - 1

2g

3g

.

.

.

16g

note that; 1 byte = 8 bit

therefore for 16G location, address line(N) will be:

since it is known that \(2^{N}\) = 16G   ,and   1 gigabyte = \(2^{30}\) byte

∴ 16G = 16 × \(2^{30}\)

          = 2⁴ × 2³⁰

          = 2³⁴

since \(2^{N}\) = 16G

∴    \(2^{N}\) = 2³⁴

N = 34

I am doing a customer service manual and need a toc. I can't get the numbers lined up. Can someone please help me? I am using Microsoft word

I am doing a customer service manual and need a toc. I can't get the numbers lined up. Can someone please

Answers

Below is a Table of Contents (TOC) for your customer service manual with aligned numbers using Microsoft Word:

Welcome StatementGetting StartedWays to Discern Customers' Needs and ConcernsTelephone Communication4.1 Transferring a Customer's Call4.2 Sending an EmailSelf-Care After the JobHow to Manage Your Time WiselyFundamental Duties of a Customer Service WorkerEnhancing Customer Impressions and SatisfactionDifference Between Verbal and Nonverbal CommunicationKey TraitsBest Speaking SpeedKnowing the Different Problems and How to Manage Them12.1 Extraordinary Customer Problems12.2 Fixing Extraordinary Customer ProblemsKnowing Customer Diversity13.1 Tactics for Serving Diverse and Multicultural CustomersKnowing How to Handle Challenging Customers

What is the customer service manual?

Below is how you can create a Table of Contents (TOC) with aligned numbers in Microsoft Word:

Step 1: Place your cursor at the beginning of the document where you want to insert the Table of Contents.

Step 2: Go to the "References" tab in the Microsoft Word ribbon at the top of the window.

Step 3: Click on the "Table of Contents" button, which is located in the "Table of Contents" group. This will open a drop-down menu with different options for TOC styles.

Step 4: Choose the TOC style that best fits your needs. If you want aligned numbers, select a style that includes the word "Classic" in its name, such as "Classic," "Classic Word," or "Classic Format." These styles come with aligned numbers by default.

Step 5: Click on the TOC style to insert it into your document. The TOC will be automatically generated based on the headings in your document, with numbers aligned on the right side of the page.

Step 6: If you want to update the TOC later, simply right-click on the TOC and choose "Update Field" from the context menu. This will refresh the TOC to reflect any changes you made to your headings.

Note: If you're using a different version of Microsoft Word or a different word processing software, the steps and options may vary slightly. However, the general process should be similar in most word processing software that supports the creation of TOCs.

Read more about customer service here:

https://brainly.com/question/1286522

#SPJ1

See text below

I am doing a customer service manual and need a toc. I can't get the numbers lined up. Can someone please help me? I am using Microsoft word

Welcome Statement

Getting Started

Ways to discern customers' needs and concerns

Telephone communication....

Transferring a customer's call

Sending an email

Self-Care after the job

How to manage your time wisely

Fundamental duties of a Customer Service Worker

Enhancing Customer Impressions and Satisfaction

N

5

.5

6

Difference between Verbal and Nonverbal Communication

.6

Key Traits.....

.7

Best speaking speed

7

Knowing the different problems and how to manage them

Extraordinary Customer Problems

Fixing Extraordinary Customer Problems

Knowing Customer Diversity

Tactics for serving diverse and Multicultural customers

Knowing how to handle challenging customers.

Sure! Here's a Table of Contents (TOC) for your cu

where do you think data mining by companies will take us in the coming years

Answers

In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse  facets of our daily existence.

What is data mining

There are several possible paths that data mining could lead us towards.

Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.

Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ1

How does beamforming improve network service?

• by using device locations to better target service signals

• my sharing service signals between devices on network

• my connecting device is directly to power sources

• are using multiple antennas to increase range in bandwidth

Answers

Beamforming can improve network service by using device locations to better target service signals.

This is because, beamforming helps to deliver higher signal quality to the target receiver.

What is beamforming?

beamforming can be regarded as application of different radiating elements that is transmitting the same signal.

This signal is usually identical in wavelength and phase, and  by reinforcing the waves in a specific direction the goal can be acheived.

Learn more about beamforming at:

https://brainly.com/question/12809344

The unit of measure for current is the Ampere, or Amp for short. true or false

Answers

Answer:

TRUE

Explanation:

Believe me. its true

You’re a project manager of a small team looking to hire. You have received many resumes to review, and while most of them look well qualified, two of the resumes are very poorly formatted and use wacky fonts and graphics. Would you consider these individuals as qualified candidates and be willing to interview them? Please justify your answer by briefly summarizing the discussion you might have with these candidates. Consider the following prompts as you develop your post: Explain why professional formatting matters on a resume or explain why it doesn’t. Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

No, you never consider those resumes that use wacky fonts and graphics. This is because it is the primary criterion that candidates have to fulfill in the hiring process.

What is the responsibility of a project manager?

Project managers are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.

Professional formatting justifies the capabilities and strength of candidates with respect to their qualifications. It increases your chances for the hiring process with the selection of your resumes.

A candidate’s ability to work in a professional environment based on his or her resume’s formatting is significantly based on their curiosity and willingness to do work in the same culture.

To learn more about Professional formatting, refer to the link:

https://brainly.com/question/17971683

#SPJ1

Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?

Answers

Answer:

the answer is B (AZ down arrow)

Explanation:

Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space. Your program's output should only include the two words and a space between them.

Hint: To print both words on one line, remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a space between the words as well.

Sample Run

Enter a word: Good
Enter a word: morning
Good morning

Answers

word1 = input("Enter a word: ")

word2 = input("Enter a word: ")

print(word1 + " " + word2)

I hope this helps!

in 3to 5 sentences describe how technology help business professionals to be more efficient

Answers

Be about 236749hahahha

(d) Assume charArray is a character array with 20 elements stored in memory and its starting memory address is in $t5. What is the memory address for element charArray[5]?

Answers

Answer:

$t5 + 5

Explanation:

Given that ;

A character array defines as :

charArray

Number of elements in charArray = 20

Starting memory address is in $t5

The memory address for element charArray[5]

Memory address for charArray[5] will be :

Starting memory address + 5 :

$t5 + 5

Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network

Answers

An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.

An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.

This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.

Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.

The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.

Thus, the correct option is C.

For more details regarding network, visit:

https://brainly.com/question/29350844

#SPJ1

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = 'q' and numPresses = 2, print:

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

Answers

You can find in the photo. Good luck!

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

For this project, you have to write 3 functions. C++

1. remove_adjacent_digits. This takes in 2 arguments, a std::vector, and a std::vector of the same size. You need to return a std::vector, where each of the strings no longer has any digits that are equal to, one more, or one less, than the corresponding integer in the 2nd vector.

2. sort_by_internal_numbers. This takes in a single argument, a std::vector, and you need to return a std::vector, which is sorted as if only the digits of each string is used to make a number.

3. sort_by_length_2nd_last_digit. This takes in a std::vector>. It returns a vector of the same type as the input, which is sorted, first by the length of the string in the pair, and if they are the same length, then the second last digit of the int.

See the test cases for examples of each of the above functions.

You need to submit a single file called main.cpp that contains all these functions. You can (and should) write additional functions as well. There is no need for a main function.

No loops (for, while, etc) are allowed. You must use only STL algorithms for this project.

Answers

Find the given attachments

For this project, you have to write 3 functions. C++ 1. remove_adjacent_digits. This takes in 2 arguments,
For this project, you have to write 3 functions. C++ 1. remove_adjacent_digits. This takes in 2 arguments,

Which of the following represents an input on a smartphone?
A pressing the volume key
B an appointment displayed by your calendar
C your phone ringing
D your screensaver turning on

Answers

Answer:

Pressing the volume key.

Explanation:

The appointment is and output. It is being shown to you from the smartphone.

The volume key is an input. Your telling the smartphone to raise its volume.

The phone ringing is also an output, and so is the screensaver turning on.

Answer:

A. Pressing the Volume Key

Hope this helped (~0>0)~

You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle’s database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don’t know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.

Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision-making.

Answers

A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:

Hello, Ms. Roye,

I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.

One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.

I would urge you to rethink your use of this version of Oracle

What is a Memo?

This refers to the written message that is usually used in a professional setting to communicate.

Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.

Read more about memo here:

https://brainly.com/question/11736904

#SPJ1

A backup operator wants to perform a backup to enhance the RTO and RPO in a highly time- and storage-efficient way that has no impact on production systems. Which of the following backup types should the operator use?
A. Tape
B. Full
C. Image
D. Snapshot

Answers

In this scenario, the backup operator should consider using the option D-"Snapshot" backup type.

A snapshot backup captures the state and data of a system or storage device at a specific point in time, without interrupting or impacting the production systems.

Snapshots are highly time- and storage-efficient because they only store the changes made since the last snapshot, rather than creating a complete copy of all data.

This significantly reduces the amount of storage space required and minimizes the backup window.

Moreover, snapshots provide an enhanced Recovery Time Objective (RTO) and Recovery Point Objective (RPO) as they can be quickly restored to the exact point in time when the snapshot was taken.

This allows for efficient recovery in case of data loss or system failure, ensuring minimal downtime and data loss.

Therefore, to achieve a highly time- and storage-efficient backup solution with no impact on production systems, the backup operator should utilize the "Snapshot" backup type.

For more questions on Recovery Time Objective, click on:

https://brainly.com/question/31844116

#SPJ8

Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.

Answers

Answer:

virtual reality

Explanation:

Virtual reality is basically a simulated or virtual environment. This environment is implemented by compute technology for the users that can interact with the virtual 3 dimensional objects instead of just watching them on the screen. With the use of multi-sensory input and output devices the senses of the user are simulated.

Virtual reality devices are the products used for interacting with a virtual environment for the users. Some of the multisensory input/output devices include:

data gloves

jumpsuits

track pads

joysticks

treadmills

multi-speaker audio

visual displays

controller wands

head set

For example a data glove enables the users to interact with virtual objects and feel the object rather than just a movement of hand in the air and it is also used in virtual gaming. Jumpsuits are also used to feel sensations in the virtual reality environment. It stimulates different body parts in response to any action taken by user in a virtual environment.

Answer:

virtual reality

Explanation:

yeah this is correct

list the steps to create a new folder in windows

Answers

Navigate to where you want to create the new folder, and click New Folder. Type the name of your folder, and press Enter. To save a document to the new folder, open the document, and click File > Save As, and then browse to the new folder, and click Save.

Supervisor: "If you need anything in the interim, please contact my assistant.”

Answers

Answer:

?? what and where the questions

If T1.bh = T2.bh, what color should we make x to get a red-black tree? If T1.bh > T2.bh, what color should we make x so that properties 1, 2, 3, 5 are maintained? Briefly describe how to enforce property 4 in O(logn) time.

Answers

Answer:

T1.bh = T2.bh

Explanation:

Answer:T1.bh=t2.bh

Explanation:

Other Questions
required: using the accompanying explanations of each it strategic role, suggest the appropriate it strategic role (automate, informate, or transform) for the following types of it investments. (if more than one strategic role applies to a particular investment, select the appropriate option from the dropdown choice that represents both possible roles.) During the american revolution, the continental congress designated one or more days of thanksgiving a year, and in 1789 __________ issued the first thanksgiving proclamation by the national government of the united states; in it, he called upon americans to express their gratitude for the happy conclusion to the countrys war of independence and the successful ratification of the u. S. Constitution. Which expression is equivalent to 12(2 - 3y + 4 )? Convert the following measurement.g 3 cm kg 3 m 0.0088 =X? financial statements that show a column for the current year and the prior year are known as financial statements. Select the correct answer. Which of these should a writer avoid when writing for very young (3 to 6 years of age) children? A. use of complex words B. use of pictures C. talking down to the reader D. using long sentences solve the following exercise8ab -3ab depths of processing refers to encoding producing better memory than encodingT/F What is the group containing nitrogen called ? A. Nucleic Avis group. B. Amino group. C. Polypeptide group. D. Saccharide group. A 2.80 F capacitor is charged to 460 V and a 3.50 FF capacitor is charged to 545 V. These capacitors are then disconnected from their batteries, and the positive plates are now connected to each other and the negative plates are connected to each other. What will be the potential difference across each capacitor? What will be the charge on each capacitor?What is the voltage for each capacitor if plates of opposite sign are connected?What is the charge on each capacitor if plates of opposite sign are connected? What are the solutions of the quadratic equation below ? x^2-8x+11 Explain the different ways you can name an angle. What are the different names for this angle? What is the equation of the line graphed below? QUESTION 45 The Remainder R when divided by x + 1 is: a. 12 b. 16 c. 20 d. 22 e. 30 20x30 - 4x3+x - 3x +2 s H A committee of four is to be randomly selected from a group of seven teachers and eight students. Determine the probability that the committee will consist of two teachers and two students. Write the answer as a fraction in lowest terms. A Ping-Pong ball has a mass of 2.3 g and a terminal speed of 9.3 m/s. The drag force is of the form bv2 What is the value of b? (d) Rewrite in reported speechxvi ) They said, We want to learn English."(xvii) Raju said to me, I am not going to help you Isabella uses the equation V = one-third (12) squared (9) pi to find the volume of the cone below.A cone has a height of 9 centimeters and base of 12 pi centimeters squared.What is Isabellas error?Isabella should have divided 12 by 2 before squaring to get V = one-third (6) squared (9) pi.Isabella should have squared 9 instead of 12 to get V = one-third (9) squared (12) pi.Isabella should have divided the product of 12 and 9 by 3 to get V = StartFraction 12 (9) Over 3 EndFraction.Isabella should have divided the product of 12 pi and 9 by 3 to get V = StartFraction 12 pi (9) Over 3 EndFraction. What structural feature of cells can allow molecules to flow directly from the inside of one cell to the inside of the next?gap junctionsmicrotubulesneuronssynapses 1.What is demand? Law of demand?2.What are the factors that affect demand?3.What is elasticity of demand?4.What are substitutes, /Complements, normal/inferior goods5. Substitution effect6. Factors that effect elasticity7. Factors that shift the demand curve?8.Be able to determine total revenue and elasticity.