Choose the missing words in the code below.
quotient = numA/ numB
ZeroDivisionError:
print("You attempted to divide by zero")
print ("Quotient", quotient)

Answers

Answer 1

Answer:

try

except

else

Explanation:

just got it right

Answer 2

Answer:

try

except

else

Explanation:


Related Questions

Match each item
1)assigns an IP address to a computer when it first attempts to initiate a connection to the network
2)a command that can be used to display the TCP/IP configuration
3)a technique designed to conserve the number of public IP addresses needed by a network
4)commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
5)a protocol used by various client applications when the application needs to query a database
6)designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
7)identifies a computer and the network to which it belongs, such as www.cengage.com
8)protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
9)A group of computers on a peer-to-peer network that are sharing resources
10)Used by a computer or other device to determine if an IP address of another computer is on its network or another network

Answers

The correct matching of each item to their adequate representation is shown:

The Correct MatchingDHCP (Dynamic Host Configuration Protocol)ipconfig (Windows) or ifconfig (Linux/Unix)NAT (Network Address Translation)SSH (Secure Shell)SQL (Structured Query Language)WPS (Wi-Fi Protected Setup)Domain NameVPN (Virtual Private Network)WorkgroupSubnet Mask

The Dynamic Host Configuration Protocol (DHCP) is responsible for allocating an IP address to a computer as soon as it establishes a connection with a network.

The TCP/IP configuration details can be shown by executing the "ipconfig" command on Windows or the "ifconfig" command on Linux/Unix.

NAT (Network Address Translation) is a data transfer process that saves public IP addresses from exhaustion by converting the private IP addresses employed in a network.

SSH (Secure Shell) is a method employed in Linux, enabling remote access and management of a different computer through a network.

Client applications employ SQL (Structured Query Language) as a protocol to extract information from databases.

Read more about IP address here:

https://brainly.com/question/14219853

#SPJ4

Identify a method that extracts array items that match a specified condition. a. sort() b. filter() c. splice() d. reverse(). filter()

Answers

The method that extracts array items that match a specified condition is the "filter()" method.

The "filter()" method is a built-in JavaScript array method that creates a new array with all elements that pass a given condition or criteria. It takes a callback function as an argument, which evaluates each element in the array. If the callback function returns true for a particular element, that element is included in the new filtered array. If the callback function returns false, the element is excluded. This method is useful when you need to extract specific elements from an array based on a condition. It allows you to create a new array containing only the elements that satisfy the specified criteria, while omitting the rest. The original array remains unchanged.

Here's an example usage of the "filter()" method:

const numbers = [1, 2, 3, 4, 5];

const evenNumbers = numbers.filter(num => num % 2 === 0);

console.log(evenNumbers); // Output: [2, 4]

In this example, the "filter()" method is used to create a new array called "evenNumbers" that contains only the even numbers from the original "numbers" array.

Learn more about JavaScript here: https://brainly.com/question/16698901

#SPJ11

List the steps you can use to change a word document to a Pdf document.​

Answers

Answer:

This can be achieved using any of the following ways

1. Save As

2. Export

Explanation:

This can be achieved in any of the aforementioned ways.

# Save As

# Export

The breakdown step is as follows;

#Using Save As

- Open the word document

- Click the FILE tab

- Select Save As

- Browse file destination directory

- Enter file name

- Choose PDF in Select File type

- Click Save

#Using Export

- Open the word document

- Click the FILE tab

- Select Export

- Click Create PDF/XPS Document

- Browse file destination directory

- Enter file name

- Choose PDF in Select File type

- Click Save

. In an airport, a system consisting of sensors, bar code readers and remote controls is MOST LIKELY used for

aircraft boarding
baggage handling
border control.
passenger check-in.​

Answers

Answer:

baggage handling

.......

Answer:

baggage handling

Explanation:

When adopting and implementing a saas platform such as salesforce for your business, which responsibility falls on you, as the client company

Answers

When adopting and implementing a SaaS platform such as salesforce for your business, the responsibility falls on you, as the client company to Hosting data storage and backups.

What is SaaS and how does it work?

Software as a service (or SaaS) is said to be a method that is often used in the act of delivering applications in course of the Internet.

Note that it serves as a service and as such, When adopting and implementing a SaaS platform such as salesforce for your business, the responsibility falls on you, as the client company to Hosting data storage and backups.

Learn more about SaaS platform from

https://brainly.com/question/24852211

#SPJ1

Clarice has 7 new CDs; 3 are classical music and the rest are pop music. If she randomly grabs 3 CDs to listen to in the car on her way to school, what is the probability that she will select only classical music

Answers

The probability that she will select only classical music is 2.86%.

To find the probability that Clarice will select only classical music CDs from the 7 new CDs, we'll use the concept of combinations.

There are 3 classical CDs and 4 pop CDs.

She wants to choose 3 CDs, so we'll calculate the total number of possible combinations and the number of desired combinations.

Total combinations (classical and pop) can be represented as C(7, 3) = 7! / (3! * (7-3)!) = 35.

Desired combinations (only classical) can be represented as C(3, 3) = 3! / (3! * (3-3)!) = 1.

The probability of selecting only classical CDs is the ratio of desired combinations to total combinations: P(classical) = 1/35.

So, the probability is approximately 0.0286 or 2.86%.

Learn more about probability at https://brainly.com/question/16834067

#SPJ11

Which one of the following Boolean equations states that "Q proves true only when every input value is true?" A. Q=A⊕B⊕C B. Q=A×B×C C. Q=A⋅B \& buil: C D. Q=A+B+C

Answers

The Boolean equation that states that "Q proves true only when every input value is true" is B. Q = A × B × C.

The equation Q = A × B × C is the Boolean equation that states that "Q proves true only when every input value is true." This is a simple Boolean equation with three inputs, A, B, and C, and the output, Q, is true only if all the inputs, A, B, and C, are true. In other words, the output, Q, is true only when every input value is true.

The multiplication sign in the equation represents the AND operator, which means that all inputs must be true to produce a true output. Therefore, if any input is false, the output, Q, will be false. This equation is an example of a Boolean expression and is commonly used in digital logic circuits.

Know more about Boolean equation here:

https://brainly.com/question/33315144

#SPJ11

Hoá học 9 giải hộ mềnh vơiz:))

Ho hc 9 gii h mnh viz:))
Ho hc 9 gii h mnh viz:))
Ho hc 9 gii h mnh viz:))

Answers

Answer:

sorry di ko alam

A file organization where files are not stored in any particular order is considered a:_________
a. multi-indexed file organization.
b. hash key.
c. hashed file organization.
d. heap file organization.

Answers

Explanation:

a.multi-indexed file organization

HELP!!!
To see the shortcuts on the ribbon in MS Word, hold down the _____ keys at the same time. A) CTRL & X B) Shift & Alt C) Shift & Delete D) CTRL & ALT

Answers

To see the shortcuts on the ribbon in MS Word, hold down the  D) CTRL & ALT keys at the same time.

How can I display keyboard shortcuts in Word?

When you hit Alt, tabs or Quick Access buttons on the ribbon display letters or KeyTips. To open ribbon tabs, use the keyboard shortcuts shown in this table. There may be more KeyTips visible depending on the tab you choose.

Therefore, Control+Alt+Delete is seen as the combination of the Ctrl key, the Alt key, and the Del key that a user can press simultaneously on a personal computer running the Microsoft Windows operating system to end an application task or restart the operating system.


Learn more about shortcuts  keys from

https://brainly.com/question/28223521
#SPJ1

you can use ____ to convert two or more basic disks to dynamic disks

Answers

In Windows, you can use the Disk Management tool to convert basic disks to dynamic disks. Disk Management is a built-in Windows utility that allows users to manage hard disks, partitions, and volumes.

When you have two or more basic disks in Windows, you can use the Disk Management tool to convert them to dynamic disks. Converting a basic disk to a dynamic disk has a few benefits. First, you can create volumes that span multiple disks, which can help you make use of all the storage space you have. Second, you can use the Disk Management tool to create fault-tolerant volumes, such as mirrored volumes and striped volumes. Finally, dynamic disks can have more than four partitions, which can be useful if you need to create many partitions.

To convert two or more basic disks to dynamic disks, follow these steps:

1. Open Disk Management. You can do this by right-clicking on the Start button and selecting Disk Management from the menu that appears.

2. In Disk Management, locate the disks that you want to convert to dynamic disks.

3. Right-click on each basic disk and select Convert to Dynamic Disk.

4. Follow the prompts to complete the conversion process. Note that you may need to reboot your computer for the changes to take effect. When the conversion process is complete, you should see your disks listed as dynamic disks in Disk Management. You can then create volumes that span multiple disks or create fault-tolerant volumes as needed.

To know more about Windows visit:

https://brainly.com/question/33363536

#SPJ11

What will be displayed in the console when this program runs?
var numList = [10,20,30];
console.log(numList[numlist.length-1]);
A. 2
B. 3
C. 20
D. 30

Answers

Answer:

D

Explanation:

I ran it through app lab and it returned 30

The display in the console when the program runs is (D) 30

The first line of the program initializes numList to [10,20,30]

The second line of the program contains three instructions.

The first instruction calculates the length of numList; the length is 3The next instruction gets the element at index 3 - 1; i.e. the element at the 2nd index; the element is 30The next instruction prints this element i.e. displays 30

Hence, the display in the console is (D) 30

Read more about programs at:

https://brainly.com/question/19105374

What is the most widely accepted biometric authorization technology? Why do you think this technology is acceptable to users?

Answers

The most widely accepted biometric authorization technology is fingerprint scanning. Fingerprint scanning is accepted by users because it is a non-invasive method of authentication that is both quick and easy to use. Fingerprint scanning also provides a high level of accuracy and security, which is important in today's world of cyber threats and identity theft.

Additionally, many smartphones and other devices already incorporate fingerprint scanners, making it a familiar and convenient method for users.

Biometric authentication is a cybersecurity method that uses a user's unique biological characteristics, like their fingerprints, voices, retinas, and facial features, to verify their identity. When a user accesses their account, biometric authentication systems store this information to verify their identity.

Unique mark acknowledgment and iris checking are the most notable types of biometric security. However, facial recognition and vein pattern recognition (of the fingers and palms) are also gaining popularity. The advantages and disadvantages of each of these biometric security methods are discussed in this article.

Know more about biometric authorization technology, here:

https://brainly.com/question/30498635

#SPJ11

Which ribbon tab is not a default in Outlook 2016's main interface?
Home

Send/Receive

Folder

Review

Answers

Answer:

Review

Explanation:

The ribbon tab is not a default in Outlook 2016's main interface is Review.

What is ribbon tab?

The Ribbon tab in outlook has the options or commands used to do the  tasks. Like creating new email, deleting emails, opening a new meeting request, defining category to an item. However, The Ribbon takes up a lot of space on Outlook 2016 screen.

It has Home,  Send/Receive mails and Folder options on the ribbon tab except Review.

Thus, the ribbon tab is not a default in Outlook 2016's main interface is Review.

Learn more about ribbon tab.

https://brainly.com/question/24481253

#SPJ2

Darren is hoping to get search results that begin with the words "art history." Which of the following search terms will help
him?
A. art history
C. lart history
B. "art history"
D. -art history-

Answers

Answer: B

Explanation: In order to get specific results in answers it is best to put quotes around it

What is displayed when you run the following program?
print("30 + 10")
print(5 +8)

Answers

Answer:

print("30 + 10") will print 30 + 10 print(5+8) will print 13

Explanation:

This is in python the "print" will simply print text.

Describe military training standards and pipelines for UAS operators.

Answers

Military training standards and pipelines for UAS operators include basic military training, technical training, flight training, and certification to ensure safe and effective operation.

Define the term military.

The term military refers to the armed forces of a nation or state, which are organized and trained to defend and protect the country's security and interests. Military organizations typically include ground, naval, and air forces, and may also encompass special operations units, intelligence agencies, and other support personnel. The military is responsible for maintaining order, protecting citizens and the nation's borders, and responding to external threats, such as aggression or terrorism. Military personnel undergo specialized training and follow strict codes of conduct and discipline, and are often deployed in combat or peacekeeping missions both within their own country and abroad.

Military training standards and pipelines for unmanned aircraft systems (UAS) operators vary depending on the branch of the military and the specific type of UAS being operated. However, most UAS operator training programs include a combination of classroom instruction, simulator training, and hands-on flight training.

The training typically covers a range of topics, including UAS mission planning, airspace restrictions, UAS capabilities and limitations, weather conditions, emergency procedures, and various aspects of UAS operation, maintenance, and repair. Operators may also be trained in other relevant skills, such as intelligence gathering, target tracking, and communication with ground troops.

UAS operator training pipelines generally start with basic training, where new recruits receive an introduction to UAS operation and aviation concepts. This is typically followed by specialized training, where operators learn to fly specific UAS models and perform various mission-specific tasks. Some UAS operators may also receive advanced training, which can include leadership skills, tactics, and advanced mission planning.

To initial training, UAS operators are also required to maintain ongoing proficiency through regular training and testing. This can involve periodic simulations and evaluations, as well as live training exercises in various environments and scenarios.

Therefore, military training standards and pipelines for UAS operators are designed to ensure that operators have the knowledge, skills, and experience needed to effectively and safely operate UAS in support of military missions.

To learn more about the military click here

https://brainly.com/question/29553308

#SPJ1

Which type of switch connects all devices in a rack to the rest of the network? choose the answer: a. ToR switch b. Spine switch c. EoR switch d. Core switch

Answers

In top of rack architecture, a network fibre switch is typically installed in each rack to facilitate connections between all of the equipment there.

Which switch type can link all devices?

Any network device, including PCs, IP cameras, and smart lighting systems, can operate without the need to be close to an AC access point or router since the PoE switch transmits both data and power to the connected devices.

A switch in a rack is what?

A switch that is rack-mounted resembles a second-class lever with a 90-degree bend in the "beam" in terms of design. Gravity is the source of the force acting on the switch's body.

To know more about network visit:-

https://brainly.com/question/29350844

#SPJ4

what features allows the user to insert individual names in a primary document​

Answers

I believe its copying, pasting, moving and deleting text within a document. Formatting text such as font type, bolding, underlining or italicizing.

React native graphql unsubscribe when app closed.

Answers

Yeah I just woke him down I didn’t know he got it done and I didn’t want him he got me out of the shower he got mad at me he was just talking to Ty

Glossaries are usually located at the front of a text or document. please select the best answer from the choices provided t f

Answers

Glossaries are usually located at the front of a text or document: False.

What is an informational text?

An informational text can be defined as a literary work that presents factual information about an event, people, places or things.

Generally speaking, some examples of an informational text feature include the following:

CaptionTable of contentsHeadingsGlossaryPicturesIndexSidebars

What is a glossary?

In English literature, a glossary can be defined as an alphabetical list of words (terminologies) that are related to a specific subject, an informational text, or dialect, with accompanying explanations of their meanings.

In conclusion, glossaries are generally located at the end of an informational text or document, rather than at the front, which contains the table of contents.

Read more on glossary here: https://brainly.com/question/21683659

#SPJ1

Unit 3 Critical thinking questions (Game Design)

3. We usually think of conflict as bad or something to be avoided. How can conflict be used to a game’s advantage in game design? Include an example.

Answers

Although conflict is frequently thought of negatively, it may also be employed to develop captivating and immersive gameplay experiences. Conflict can be utilised in game design to create tension and test players.

Conflict in video games: What is it?

These are the numerous conflict kinds, along with some instances from video games. Each poses a challenge for the player to resolve. Two or more people who support opposing viewpoints. If the environment makes it impossible for a person to be in the location or state they desire.

What kind of conflict does a video game often feature?

Yet, disagreements can also be caused by fear, particularly the fear of losing something—either what you already have or an opportunity.

To know more about game design visit:-

https://brainly.com/question/28753527

#SPJ1

PLEASE HELP!!!

If you try to ______
PowerPoint while there are unsaved changes, you will be
asked whether you want to save them.
fill in the blank.

Answers

leave (i'm pretty sure this is the answer)

If you try to close PowerPoint while there are unsaved changes, you will be asked whether you want to save them.

What is a PowerPoint presentation?

You may create projects, write text, and create presentations online using the software called PowerPoint Presentation. Slides may be created, transitions can be included, and ideas can be presented to friends or professors.

A businessman can present what he thinks or has to say by using a PowerPoint to keep his thoughts and ideas organized. Yes, I am aware. PowerPoint is something I've been using for a while now.

Basically, you press the home button in the upper-left corner of your screen, and an option that says "create a new slide" should appear there.

Therefore, if you attempt to close PowerPoint with modifications that have not been saved, you will be prompted to do so.

To learn more about PowerPoint presentations, refer to the link:

https://brainly.com/question/14498361

#SPJ5

A student is reading a book for language arts. She has to finish three chapters by class tomorrow, because there will be a quiz. She glances at the pages, and then checks a social media network to get her mind off of things. She then goes back to the book for a few minutes before deciding to go fix a snack. Then, she puts on a movie and gets back to her book. She ends up finishing the chapters in time for the quiz, but she does not do very well on the quiz because she cannot remember what she read.

This student is reading in blank way.

Answers

Based on the above, Since the  student is reading a book for language arts, the student is reading in Passive way.

What is passive reading?

The term is known to be linked to the act of officially reading the words, it is one where a reader who engages in passive reading retains very little of what is written.

Note that Active readers start out reading with a curiosity about what will be said. The passive reader is one that is a sluggish reader Make your writing lively, orderly, logical, and easy to know, but avoid becoming hurried.

Therefore, Based on the above, Since the  student is reading a book for language arts, the student is reading in Passive way.

Learn more about passive reading from

https://brainly.com/question/17488541
#SPJ1

Give three general features of application software

Answers

Answer:

Three general features of application software are:

1. User Interface: Application software has a user interface that allows users to interact with the program. This interface can include menus, icons, buttons, and other graphical elements that make it easy for users to navigate the software and access its features.

2. Functionality: Application software is designed to perform specific tasks or functions. Examples of application software include word processors, spreadsheet programs, graphic design software, and web browsers. Each of these programs has a specific set of features and functions that are tailored to the needs of its users.

3. Customization: Application software can often be customized to meet the specific needs of individual users or organizations. For example, a spreadsheet program can be customized to include specific formulas and calculations that are unique to a particular business or industry. Customization allows users to tailor the software to their specific needs, making it more efficient and effective for their particular use case.

With the range e2:e30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font to values that sold for less than or equal to 70% of the sticker price. be sure to select a rule type that will use a formula to determine which cells to format. 5

Answers

What is layout rule in Excel?

In a comparable fashion, you may create a conditional formatting rule to examine the values of  cells. For example: =$A2<$B2 - layout cells or rows if a fee in column A is much less than the corresponding fee in column B. =$A2=$B2 - layout cells or rows if values in columns A and B are the same.

The process of a new conditional formatting rule that uses a formula to apply yellow fill and bold font to values is given in the picture attached.

Read more about the formatting :

https://brainly.com/question/3653791

#SPJ1

                                                                                 

With the range e2:e30 selected, create a new conditional formatting rule that uses a formula to apply

A Simple Blood Bank Management System stores donors' information (Name, mobile and blood group). Users can add new donors and search & list donor information based on a specific blood group. Perform the following tasks: Task1: Your program should offer a menu like the one shown below. The program should display the same menu options repeatedly until the user enter option 3 and the program exits. ****** Welcome to the Blood Bank Management System ****** 1 Add Donor 2 Search Blood Group 3 Exit Task2: Your program should have addDonor () function to add new donor data kept in file donor.txt. ****** Welcome to the Blood Bank Management System ****** 1 add Donor 2 Search Blood Group. 3 Exit Enter your choice: 1 Enter the name, mobile and blood group. >> Mona 053123456 A Task 3: Your program should have searchBloodGroup() function which aske the user a requested blood group then list all the matched records from the (donor.txt) file, if there is no record found, the program should display an error message saying "There is no donor for the requested blood group" Welcome to the Blood Bank Management System ****** add Donor 1 2 Search Blood Group 3 Exit Enter your choice: 2 Enter the blood group: A Mona 0511111111 A ****** Welcome to the Blood Bank Management System ****** 1 add Donor 2 Search Blood Group 3- Exit Enter your choice: 2 Enter the blood group: B There is no donor for the requested blood group.

Answers

Blood Bank Management System is a simple program that stores donors' information like name, mobile number and blood group. Users can add new donors and search the donors' information based on the blood group. To complete this project, the following tasks need to be performed:Task 1: The program should offer a menu to the user with three options.

The menu should be displayed repeatedly until the user enters option 3 to exit the program.Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. ExitTask 2: An addDonor() function is required to add new donor information to the donor.txt file.  Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 1 Enter the name, mobile and blood group. >> Mona 053123456 ATask 3: A searchBloodGroup() function is required which asks the user to enter the blood group to list all the matching records from the donor.txt file.

If no records are found, the program should display an error message stating that there is no donor for the requested blood group.Welcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 2 Enter the blood group: A Mona 0511111111 AWelcome to the Blood Bank Management System 1. Add Donor 2. Search Blood Group 3. Exit Enter your choice: 2 Enter the blood group: B There is no donor for the requested blood group.

To know more about program visit:-

https://brainly.com/question/30613605

#SPJ11

joe wants to allow guests to use his organizations wireless network by providing a preshared key. what solution can he deploy to allow users to access his open network?

Answers

A communications protocol called ANT+ was created to make it simple to link fitness sensors like cycle computers and heart rate monitors.

AES encryption with a 128- or 256-bit key is used to encrypt whole drives with Bitlocker, a popular Windows-only program. Bitlocker cannot produce encrypted containers, in contrast to TrueCrypt and VeraCrypt. Partitions must be encrypted in their entirety. The ideas of risk management, threat modeling, the security model, security governance principles, business continuity needs, and policies and procedures are all covered in the domain of security and risk management.

The most secure VPN protocol is OpenVPN. It works with a variety of ciphers for encryption, including AES-256, Blowfish, and ChaCha20. It is supported by nearly every VPN service natively and has no known vulnerabilities.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

to split a merged cell, select the cell and click the ____ button.

Answers

Answer:

Split cell button

Explanation:

Hope this helps!

Which phase in the systems life cycle involves designing a new or alternative information system?

Answers

The phase in the systems life cycle that involves designing a new or alternative information system is the "Design" phase. During this phase, the focus is on creating a detailed blueprint or plan for the system based on the requirements gathered during the previous phases.

In the Design phase, several activities take place to ensure that the new or alternative information system meets the needs of the users and the organization. These activities include:

1. Architectural Design: This involves determining the overall structure and components of the system. It includes defining the hardware and software infrastructure, network architecture, and database design.

2. Interface Design: This focuses on designing the user interface of the system, ensuring that it is intuitive, user-friendly, and meets the usability requirements of the users. This includes designing screens, menus, forms, and navigation.

3. Database Design: This involves designing the structure and organization of the system's database. It includes defining the tables, fields, relationships, and data storage requirements.

4. System Design: This encompasses the design of the system's modules, functions, and processes. It includes specifying how data flows through the system, defining the algorithms and logic, and determining the system's performance requirements.

5. Security Design: This involves designing the security measures and controls to protect the system and its data from unauthorized access, data breaches, and other security threats.

During the Design phase, various tools and techniques are used, such as flowcharts, entity-relationship diagrams, wireframes, and prototypes, to visualize and communicate the design.

In summary, the Design phase of the systems life cycle involves creating a detailed plan and design for a new or alternative information system. This includes architectural design, interface design, database design, system design, and security design. The goal is to ensure that the system meets the requirements of the users and the organization.


Learn more about blueprint here:-

https://brainly.com/question/21844228

#SPJ11

Other Questions
On July 1, 2007, East Company purchased as a long-term investment P5,000,000 face amount, 8% bonds of Rand Company for P4,615,000 to yield 10% per year. The bonds pay interest semiannually on January 1 and July 1. In its December 31, 2007 balance sheet, East should report interest receivable of? A supervisor receives regular information about a sales employee's performance (e.g., sales volume, incomplete paperwork, etc.) and must complete a performance appraisal of the person's work. The supervisor has a complete description of the employee's job but has never worked in the field as a sales representative. Moreover, the supervisor is relatively new to this job and therefore, has little experience observing or appraising the performance of salespeople. What attribution error is likely to occur under these conditions, and what effect would it have on the performance appraisal results name the following compounds TeF4 Haji rows his canoe 10 mph in still water. He noticed one day that he could row 4 miles upstream in the same amount of time he could row 6 miles downstream. What was the approximate speed of the current that day? 2. 0 mph 3. 3 mph 5. 0 mph 10. 0 mph. Determine the intercepts of the line.y-intercept:r-intercept:help pls Which techniques does stravinsky use to evoke mysticism and mystery? HELP i need help with number 4 The word choice that the landlady uses shows a positive connotation about previous guests, but by the end of the story we are left to infer something negative has happened to them. Why did the author choose to have the landlady speak using only positive connotation words? can someone please answer i will mark brainliest during a staff shortage you hire an rn from a temporary agency the rn In what ways did Native Americans assimilate through participating in slavery? What do scholars believe was the purpose of stonehenge and what does it reveal about the state of civilization at that point? a sample of helium effuses through a porous container 8.40 times faster than does unknown gas x. what is the molar mass of the unknown gas? answer in units of The college-aged female in the case study may have an eating disorder. Which eating disorder best describes her behavior?. What Are 5 Usual/Common Side Effects When Taking Medicine In General? What did Trump and his insurrectionist mob teach the world? Do you mean by radius of curvature? need help asap need help asap need help asap need help asap need help asap need help asap need help asap need help asap need help asap need help asap How many perpendicular bisectors are required to be constructed to devide a line segment into four equal parts? HELP!!! I RLY NEED HELP WITH THIS!