Compared to relationships established in person, what is a significant finding about romantic relationships initiated on the internet?

Answers

Answer 1

A significant finding about romantic relationships initiated on the internet is that despite the prevalence of dishonesty, they are more likely than to last for more than two years.

According to a study made at the University of Chicago and then many other institutes, it was found that people who build a romantic relationship over the internet are more likely to continue long-term and also are happier. John Cacioppo, who is the author of this paper, says that the results from these studies might show a new dynamic in marriages.

Studies have shown that after building a basic relationship online and meeting once, couples would have a higher chance of meeting again and again.

These studies are a shock because many people might think that initially there can be some dishonesty in indulging in an online relationship.

To learn more about relationships, click here:

https://brainly.com/question/10286547

#SPJ4


Related Questions

Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.

Answers

Answer:

B. Creating a cloud based customer service application app

Explanation:

Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.

The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.

In the question above, the correct answer is option-B.

the abbreviation of the fluoroscopic features that changes the kv and mas according to part thickness is

Answers

The abbreviation of the fluoroscopic features that changes the kv and mas according to part thickness is AEC, which stands for Automatic Exposure Control.

is a technology used in medical imaging, including fluoroscopy, to automatically adjust the radiation dose based on the thickness and density of the part being imaged. This helps to ensure that the images produced are of high quality, while minimizing the radiation exposure to the patient and healthcare providers. AEC works by measuring the amount of radiation that passes through the patient, and then adjusting the kv and mas settings accordingly. This technology has become a standard feature in modern fluoroscopy machines, and has greatly improved the safety and effectiveness of medical imaging procedures.

learn more about Automatic Exposure Control here:

https://brainly.com/question/24177640

#SPJ11

Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0.
Which of the following are true concerning this network? (Select two.)
answer choices
254 IP addresses can be assigned to host devices.
256 IP addresses can be assigned to host devices.
172.17.0.255 is the network broadcast address.

Answers

With a subnet mask of 255.255.255.0, your network's network address is 172.17.0.0. In addition, this network's 172.17.2.0 subnet is genuine, and there are 254 accessible host addresses.

What is subnet?A subnet, which is another name for a subnetwork, is a portion of a larger network that has been divided up. Subnets are the logical partition of an IP network into several smaller network segments, or subnets in more technical words.The protocol used to transport data from one computer to another via the internet is called the Internet Protocol (IP). A logical division of an IP network is called a subnetwork or subnet. Subnetting is the process of splitting an existing network into two or more separate networks. In their IP addresses, computers with the same subnet address use the same most-significant bit-group. A subnet is a subnetwork that belongs to a network and is in the class A, B, or C range. A class B network, for instance, is 172.16.0.0/16. Starting with 172.16, this network is quite large.

To learn more about subnet, refer to:

https://brainly.com/question/29527004

Which term describes a means of separating the operation of an application from the rest of the operating system?

A. Complete mediation

B. Separation of duties

C. Sandboxing

D. Reverse-engineering

Answers

Answer: reverse-engineering (d)

the bitmap index improves the query performance if the selectivity is high. group of answer choices true false

Answers

The statement is false.

A bitmap index improves query performance when the selectivity is low, not high. Selectivity refers to the number of distinct values in a column compared to the total number of rows in the table. If the selectivity is high, which means there are many distinct values in the column, then the bitmap index may not be very effective because there will be many bitmaps to search and merge, which can slow down query performance. However, if the selectivity is low, which means there are relatively few distinct values in the column, then the bitmap index can be very effective because there will be fewer bitmaps to search and merge, resulting in faster query performance.

Learn more about bitmap here:

brainly.com/question/619388

#SPJ11

Which of the following is considered a variable?
(1 point)
O size
O collisions
O particles
O lights

Which of the following is considered a variable?(1 point)O sizeO collisionsO particlesO lights

Answers

Answer:

the following that is considered that is a variableis c particles

Explanation:

Ramesh goes to market for buying some fruits and vegetables .He

purchases Apple, Mango and Tomato from a shop. Write an algorithm to

help Ramesh find the total amount to be paid to the shopkeeper if he

buys 2 kgs of apples, 2 kgs of mangoes and 1 kg tomatoes.​

Answers

Answer:

The algorithm is as follows

1. Start

2. Input Apple unit price

3. Input Mango unit price

4. input Tomato unit price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

6. Display Total

7. End

Explanation:

Start the algorithm

1. Start

The next three lines gets input for the price of each fruit

2. Input Apple unit price

3. Input Mango unit price

4. input Tomato unit price

This calculates the total price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

This displays the total price

6. Display Total

Stop the algorithm

7. End

what process does a penetration tester rely on to access an ever higher level of resources?

Answers

A penetration tester relies on persistence processes to get access to resources at ever-higher levels. Penetration testing is a type of security investigation that looks at a vulnerability in an application. It is done to find any potential security vulnerabilities in the system.

If a system is not secure, any attacker can meddle with it or be given access to it. Unintentional errors produced during the software's development and implementation are often what cause security issues. For instance, incorrect configuration, poor design, and software issues, among others.

Penetration testing is a crucial process that must be performed on a regular basis to secure a system's operation. Additionally, it must be done whenever Penetration testing is a crucial step that must be completed on a regular basis to safeguard a system's functionality.

You may efficiently and accurately manage your security system by allocating the security resources as necessary.

To learn more about penetration tester click here:

brainly.com/question/13147250

#SPJ4

Which media example would be best for mayas presentation

Answers

Answer: c. a diagram that explains the steps involved in photosynthesis

Explanation:

The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.

The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.

the information-level design methodology involves representing the individual user view as a collection of tables, refining them to eliminate any problems, and then merging them into a cumulative design

Answers

The information-level design methodology involves refining user views represented as tables and merging them into a cumulative design.

What is the process of information-level design methodology?

In information-level design methodology, the individual user view is initially represented as a collection of tables. These tables are then refined and scrutinized to identify and eliminate any potential issues or inconsistencies.

Once the tables have been thoroughly reviewed and optimized, they are merged together to form a cumulative design. This approach helps ensure that the resulting design accurately represents the intended user views and provides a cohesive and comprehensive solution.

Learn more about design methodology

brainly.com/question/28731103

#SPJ11

Type the correct answer in the box. Spell all words correctly.
Which tool should Jules use to encourage her reader's interaction on her website?
Jules should use the_____
tool to encourage her reader's interaction on her website.

Answers

Jules should use various tools to encourage her reader's interaction on her website. One of the most effective tools for this purpose is the comments section.

By allowing readers to comment on blog posts or articles, Jules can create a space for discussions and feedback. This can also help her build a community around her website.

Another tool that Jules can use is social media integration. By adding social media sharing buttons on her website, readers can easily share content on their own social media platforms. This can help increase the reach of Jules' content and also encourage readers to engage with her website.

Jules can also consider adding polls or surveys to her website to encourage reader participation. This can provide valuable insights and feedback on her content and also help her understand her audience better.

Lastly, Jules can use interactive features such as quizzes, games, and contests to engage her readers. This can add a fun and interactive element to her website and also incentivize readers to participate and share with others.

Overall, there are various tools that Jules can use to encourage reader interaction on her website. By using a combination of these tools, she can create a dynamic and engaging website that encourages participation and feedback from her readers.

For more question on website

https://brainly.com/question/28431103

#SPJ11

How many bits do we have in the MAC address of an Ethernet card?

Answers

Answer: It is 6 bytes (48 bits) long

Detailed Explanation:

In a LAN, each node is assigned a physical address, also known as a MAC/Ethernet address. This address is unique to each of the nodes on the LAN and is 6 bytes (48 bits) long, which is burned on the Ethernet card (also known as the network interface card)

What is the author's purpose for writing this article? A to persuade readers to consider a career in aerospace engineering and at NASA B to caution readers about the difficulties that aerospace engineers encounter C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer D to promote Tiera Fletcher's book and her nonprofit organization, Rocket With The Fletchers

Answers

Answer:

C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer

Explanation:

Dream Jobs: Rocket Designer, a Newsela article by Rebecca Wilkins was written with the intent of informing the readers of how Tiera Fletcher developed a love for mathematics at an early age and further developed a desire to be a Space Engineer which she succeeded at. She highlighted the different steps she took before she realized her goal. Some of these steps included working as an intern in several space establishments and performing research.

Today, she is very successful in her career and hopes  that young ones can pursue a career in any STEM careers of their choice.

Answer:

c on newsella

Explanation:

What kind of route is created when a network administrator configures a router to use a specific path between nodes?.

Answers

The route is created when a network administrator configures a router to use a specific path between nodes is  Static route.

what is static route?A type of routing known as "static routing" involves explicitly specifying routes while configuring a router. No routing protocols are involved in any routing; it just happens. An administrator-defined route known as a "static route" directs packets traveling between the source and destination to follow the designated path.Gamma and neutron radiation are real-time detected and identified by the Static Node, which offers these services in a portable, small frame.The Node can be readily left on to enable inconspicuous neutron radiation detection and gamma isotope identification in any place that requires additional security. The SIGMA Network receives the alerts and other reports.

know more about static route click here:

https://brainly.com/question/6783973

#SPJ4

Which feature is used to change how a presentation moves from slide to slide?

Answers

Answer:

Click Slide Sorter on the View menu. On the Window menu, click Arrange All to display both presentations. Click the slide you want to move, and drag it to the other presentation. If you want to copy the slide across then hold down Ctrl as you drag the slide.

Explanation:

-(PROJECT: SHADOW_ACTIVATED.)-

Answers

Answer:

OH NO!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Explanation:

WE'RE GONNA DIE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

(?_?)             o_O               O_o              (¯(●●)¯)

______ is a disk storage technique that improves performance and fault tolerance.

Answers

The disk storage technique that improves performance and fault tolerance is called Redundant Array of Independent Disks (RAID).

RAID is a technology used to improve the storage system's performance, reliability, and availability by grouping two or more hard drives to work as a single logical unit. RAID can be used to store the same data in different places, which is called redundancy.RAID has several levels, each with its own configuration and fault-tolerance characteristics. These include RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and RAID 50.RAID 0 is the simplest type of RAID that improves the system's performance by distributing data across two or more disks, allowing for faster data access. However, RAID 0 does not provide fault tolerance since there is no redundancy.RAID 1 uses disk mirroring, which involves duplicating data on two or more disks, ensuring data is always available even if one disk fails. However, RAID 1 is expensive because it requires twice the amount of storage.RAID 5 uses striping and parity data across multiple disks to improve performance and provide fault tolerance. In this level, parity data is used to rebuild data in case one disk fails. RAID 5 can survive the failure of one disk, and it requires at least three disks.RAID 6 is an extension of RAID 5 that can survive the failure of two disks. It uses striping with double parity, which ensures data can be rebuilt even if two disks fail. RAID 6 requires at least four disks.RAID 10, also known as RAID 1+0, combines disk mirroring and striping to provide both performance and fault tolerance. It requires at least four disks.RAID 50, also known as RAID 5+0, combines the block-level striping of RAID 0 with the distributed parity of RAID 5. It provides high performance and fault tolerance and requires at least six disks.RAID technology is widely used in modern storage systems and is an essential tool in ensuring data availability, integrity, and performance.

To know more about RAID visit :

https://brainly.com/question/31935278

#SPJ11

Which statement describes a disadvantage of e-government?

Answers

Answer:

Setting up and maintaining the online systems can be expensive

Explanation:

Answer:

It can be expensive to set up and maintain the online systems

Explanation:

Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system.--True--False

Answers

True. Power failure during a BIOS upgrade can cause irreversible damage to the computer system. It is crucial to ensure that there is a stable power source and backup power supply during the process to avoid any interruption.

A BIOS upgrade is the process of updating the firmware that controls the basic input/output system (BIOS) of a computer. The BIOS is responsible for initializing and testing hardware components, loading the operating system, and providing a user interface for configuring system settings.

A BIOS upgrade can be performed to fix bugs or compatibility issues, add new features, or improve system performance. Before upgrading the BIOS, it is important to check the manufacturer's website for information on the specific upgrade and to make sure that the upgrade is necessary and compatible with the system.

To learn more about BIOS Here:

https://brainly.com/question/13993432

#SPJ11

Need the answer ASAP!!!!!!!!
I’ll mark brainliest if correct

Drag each label to the correct location on the image. Match the correct component to the part on the flowchart

Procedure 1

subroutine

procedure 2

decision

input

End

Start

Need the answer ASAP!!!!!!!! Ill mark brainliest if correct Drag each label to the correct location on

Answers

Answer:

i answerd this on a diffrent page

Explanation:

which transport layer protocol is used by ntp servers to provide time synchronization?

Answers

The Network Time Protocol (NTP) servers use the User Datagram Protocol (UDP) as the transport layer protocol to provide time synchronization.

NTP is a networking protocol designed to synchronize the clocks of computers on a network. NTP servers use the UDP protocol because it is lightweight and efficient for transmitting small packets of data. The UDP protocol operates at the transport layer of the OSI model and is connectionless, which means that it does not require a dedicated connection before transmitting data. Instead, data is sent in the form of packets or datagrams, which are routed based on the destination address. NTP uses the UDP protocol on port number 123 to communicate time information between servers and clients. The use of UDP in NTP helps to ensure that time synchronization is achieved quickly and accurately across the network.

To learn more about synchronization
https://brainly.com/question/30270846
#SPJ11

Guys can anyone tell me answer from this photo Get Branilliest

Guys can anyone tell me answer from this photo Get Branilliest

Answers

Answer:

1. A computer itself

2.I don't no

the wireless technology that can be used to transmit data between 2 different network​

Answers

Answer:

most probably that's wifi.

Wifi is the correct answer

Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.

Answers

Answer:

It should have high color contrast.

Which situations make use of interactive multimedia and which do not? Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister. Roy is going through a tutorial on his laptop that explains a do-it-yourself project. Jaden is listening to a presentation on early music in his class. Fred is answering an online quiz that requires him to select correct answers. Linear Multimedia Kristen is watching an educational film on her tablet. Non-linear Multimedia​

Answers

The situation that make use of interactive multimedia is Roy is going through a tutorial on his laptop that explains a do-it-yourself project, and that do not is Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister.

What is an interactive multimedia?

Interactive multimedia is a type of interaction in which the user can operate, control, and change the text, image, and picture, and function in a  phone or computer.

Thus, the correct options are A and B.

Learn more about interactive multimedia

https://brainly.com/question/26090715

#SPJ1

10. In this problem, you will generate simulated data, and then perform PCA and K-means clustering on the data.

###DO NOT COPY THE SAME ANSWER FROM OTHER QUESTIONS###
please solve b,c and f. I am struggling with visualization with a different color on PCA

(a) Generate a simulated data set with 20 observations in each of three classes (i.e. 60 observations total), and 50 variables. Hint: There are a number of functions in R that you can use to generate data. One example is the rnorm() function; runif() is another option. Be sure to add a mean shift to the observations in each class so that there are three distinct classes.

(b) Perform PCA on the 60 observations and plot the first two principal component score vectors. Use a different color to indicate the observations in each of the three classes. If the three classes appear separated in this plot, then continue on to part

(c). If not, then return to part (a) and modify the simulation so that there is greater separation between the three classes. Do not continue to part (c) until the three classes show at least some separation in the first two principal component score vectors. (c) Perform K-means clustering of the observations with K = 3. How well do the clusters that you obtained in K-means clustering compare to the true class labels? Hint: You can use the table() function in R to compare the true class labels to the class labels obtained by clustering. Be careful how you interpret the results: K-means clustering will arbitrarily number the clusters, so you cannot simply check whether the true class labels and clustering labels are the same.

(f) Now perform K-means clustering with K = 3 on the first two principal component score vectors, rather than on the raw data. That is, perform K-means clustering on the 60 × 2 matrix of which the first column is the first principal component score vector, and the second column is the second principal component score vector. Comment on the results.

Answers

(a) Simulated data set with 20 observations in each of the three classes (i.e. 60 observations total), and 50 variables can be generated as follows:#creating data set.

seed(123)X1 <- rnorm(20, mean = 0, sd = 1)X2 <- rnorm(20, mean = 0, sd = 1)X3 <- rnorm(20, mean = 0, sd = 1)Y1 <- rnorm(20, mean = 1.5, sd = 1)Y2 <- rnorm(20, mean = 1.5, sd = 1)Y3 <- rnorm(20, mean = 1.5, sd = 1)Z1 <- rnorm(20, mean = 3, sd = 1)Z2 <- rnorm(20, mean = 3, sd = 1)Z3 <- rnorm(20, mean = 3, sd = 1)data <- data.

frame(c(X1, Y1, Z1), c(X2, Y2, Z2), c(X3, Y3, Z3))

(b) Performing PCA on the 60 observations and plotting the first two principal component score vectors using a different color to indicate the observations in each of the three classes can be done as follows: library (ggplot)

2)library (pracma) library (mclust) library (FactoMineR) library (factoextra) # for clustering visualization # centering the data before PCA# standardizing the data before PCA data.

pca <- pr comp(data, center = TRUE, scale. = TRUE) # the center and scale variables are optional, they standardize the data# check the summary of PCAdata.

pca# plot the first two principal components fviz_pca_var(data.pca, col.var = "contrib", gradient.

cols = c("#00AFBB", "#E7B800", "#FC4E07"), repel = TRUE, gg theme = theme_minimal(),)PCA visualization is shown below:# creating a color vector based on the first column of the datacol_vector <- c("#00AFBB", "#E7B800", "#FC4E07") [unclass (data[,1])]# plot the PCA scores with a color based on the first column of the datafviz_pca_ind(data.pca, col.ind = col_vector, repel = TRUE, gg theme = theme_minimal())

Visualization of the PCA scores with a different color on PCA is shown below:

(c) Performing K-means clustering of the observations with K = 3 and comparing the clusters that you obtained in K-means clustering to the true class labels can be done as follows:## K means clustering## k-means with 3 clusters k means.

res <- k means(data, centers = 3, n start = 25)kmeans.res## table of comparison of true classes with k-means clustering labe stab(kmeans.

res$cluster, cl)# visualizing the clustersfviz_cluster(kmeans.res, data = data, palette = c("#00AFBB", "#E7B800", "#FC4E07"),ggtheme = theme_minimal())

K-Means Clustering Results:#Now perform K-means clustering with K = 3 on the first two principal component score vectors, rather than on the raw data.

That is, perform K-means clustering on the 60 × 2 matrix of which the first column is the first principal component score vector, and the second column is the second principal component score vector. Comment on the results.

K-means clustering with K = 3 on the first two principal component score vectors can be done as follows:# Creating the PCA data with 2 column spca 2 = data.

pca$x[,1:2]head(pca2)# K-means clustering with k = 3 on PCA datakmeans.pca2 <- k means(pca2, 3, n start=25)kmeans.pca2## compare true and predicted classes using table()table(kmeans.pca2$cluster, cl)# plot k-means clustering with k = 3 on PCA data library(cluster) clu splot(pca2, k means.

pca2$cluster, color=TRUE, shade=TRUE, labels=2, lines=0)

The results show that the K-means clustering with K = 3 on PCA data provide better separation than K-means clustering with K = 3 on raw data.

Know more about PCA and K-means clustering, here:

https://brainly.com/question/30455726

#SPJ11

user complains that when she prints a document in any application, the printer prints garbage. what is the most likely cause of the problem?

Answers

It appears that the user is experiencing issues with their printer printing garbage. The most likely cause of the problem is a corrupted printer driver or a mismatch between the printer driver and the application being used.

When a user complains that their printer is printing garbage instead of their document, the most likely cause is a problem with the printer driver or a mismatch between the printer driver and the application being used. Here are some steps to troubleshoot and resolve the issue:

Check the printer connection: Ensure that the printer is properly connected to the computer and is turned on. If the printer is connected via a USB cable, try a different cable or USB port to rule out any connectivity issues.

Check the ink/toner levels: Low ink or toner levels can sometimes cause printing issues. Check the levels and replace if necessary.

Check for paper jams: Make sure there are no paper jams or other obstructions in the printer that could be causing the problem.

Check the printer driver: The printer driver could be outdated, corrupted or incompatible with the operating system or the application being used. Try updating or reinstalling the printer driver to see if this resolves the issue.

Check application settings: Ensure that the correct printer is selected in the application being used and that the print settings are appropriate for the document being printed.

By following these steps, the user should be able to identify and resolve the issue with their printer printing garbage.

Know more about the printer driver click here:

https://brainly.com/question/31921645

#SPJ11

Consider the following macro: Sub SoaxTooHigh() 'go to top left cell Range ("A1"). Select 'go up one cell Activece11. Offset (−1,0). Select What will happen when you run this? a. The selection will loop round to row 1,048,576 of the worksheet b. Nothing - you can not go beyond the top of a worksheet, so the active cell won't change c. You will see the error message APPLICATION-DEFINED OR OBJECT-DEFINED ERROR d. You will see an error message explaining that you can't go beyond the edge of the worksheet

Answers

The answer to the given question is that you will see an error message explaining that you can't go beyond the edge of the worksheet when you run this macro. When you run the given macro, it starts by going to the top left cell (i.e., A1). Then it goes up one cell.
The "Activece11" is a typo and should be corrected as Activecell. It is an offset of -1 row and 0 columns. This means that it is trying to go to a cell above cell A1, which is not possible to achieve. Thus, you will see an error message explaining that you can't go beyond the edge of the worksheet. To avoid this error message, the code should be changed so that it doesn't try to move to a cell that is outside the worksheet

Learn more about "Activece11" here,
https://brainly.com/question/7282790

#SPJ11

Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by darkening the background color by reducing the amount of text in each bullet

Answers

This slide would best be improved: D. by reducing the amount of text in each bullet.

What is a slide?

A slide refers to a single-page document of a presentation that consist of text-based information or images, which can be used to teach, explain and educate an audience on a subject matter, event or idea.

This ultimately implies that, a slide can enhance communication effectively and efficiently when used with the right features and settings.

In accordance with the six by six guideline, the best way to improve the slide would be by reducing the amount of text in each bullet, so as to make them concise and less cluttered in .

Read more on slides here: https://brainly.com/question/26187618

#SPJ2

Answer:

D

Explanation:

d o double g

Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting from that number "What is the hailstone sequence?" you might ask. Well, there are two rules: • If n is even, then divide it by 2 • If n is odd, then multiply it by 3 and add 1 Continue this sequence until you hit the number 1.​

Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting

Answers

n=int(input("Enter number: "))

while n != 1:

   print(n)

   if n%2==0:

       n//= 2

   else:

       n = (n*3)+1

print(n)

I wrote my code in python 3.8. If you want to print the 1, keep the last line of code otherwise delete it.

Other Questions
5. A random variable X N (, 2 ) is Gaussian distributed with mean and variance 2 . Given that for any a, b R, we have that Y = aX + b is also Gaussian, find a, b such that Y N (0, 1) Which of the following is an example of an introductory statement? A.The plan costs too much to start. B.However, only three members will be in attendance. C.Finally, we should keep in mind that the vote will determine how much money the city will receive. D.At present time, the council will meet on Thursday to decide if they should put the matter up for a vote. please answer all requirements and follow any rounding or wholenumber instructionsIntel Textiles Company makes silk banners and uses the weighted average method of process costing. Direct materials are added at the beginning of the process, and conversion costs are added evenly dur help with my questions,please List Two of Jonas' reactions In the Book THE GIVERPLEASE HELP ME ANSWER THESE 10. Why were marriages between European royal families sought after at the time?(in elizabeth movie) An inflated balloon contains X air molecules.After some time the volume of the balloon is found to be the half at the same temperature and pressure when a few air molecules are expelled out. a)How many molecules will be there in the balloon now? b) Which is the gas law associated with this? when a group o patients serum is not compatible with donor o red blood cells and the auto control is negative, what is the most likely cause? Find the PERIMETER of the following shape. A population of 120,000 grows 3% per year for 16 years. How much will the popluation be after 16 years? Fix this run-on by adding a period. "Brutus missed his bus he has to ride a drooling mule to school" NEED HELP ASAP!! ( NEED DONE WITHIN THREE MINS OF POSTING) bescribe the journey from hile to Mangmaya river Laws and rules governing searches and seizures by the police or other government agents stem from the Fourth Amendment to the United States Constitution. During the nineteenth century search warrants became a way to limit police authority. In the 1914 U.S. Supreme Court case Weeks v. United States, the Court determined that "where letters and papers of the accused were taken from . . . premises by an official of the United States . . . without any search warrant," a violation of constitutional protections had occurred.In 1957, Cleveland police officers forcibly entered the home of Dollree Mapp and conducted a warrantless search for a bombing suspect. Although no suspect was found, officers discovered allegedly obscene materials, the possession of which was prohibited under Ohio state law. Mapp was later convicted of possessing obscene materials. She appealed her conviction on the basis that the officers admitted to using a false warrant and the confiscated materials were protected from seizure by the Fourth Amendment.In 1961, the Supreme Court ruled in Mapp v. Ohio that the exclusionary rule, which prevents prosecutors from using evidence in court obtained in violation of the Fourth Amendment, applied in Mapps case because the Ohio police officers had obtained the evidence illegally.After reading the scenario, please respond to A, B, and C below.Referencing the scenario, describe how selective incorporation applies to this scenario and explain how that process impacted the Mapp v. Ohio decision.Explain how state legislatures could minimize the impact of the Courts decision in Mapp v. Ohio.Describe how due process relates to the scenario and explain how changes in the membership of the Court could affect future rulings on this constitutional protection. Is hyperinflation gradual or exponential? Please explain this question and the answer. A shipping container will be used to transport several 60-kilogram crates across the country by rail. The greatest weight that can be loaded into the container is 23000 kilograms. Other shipments weighing 3200 kilograms have already been loaded into the container. Use the drop-down menu below to write an inequality representing cc, the total number of 60-kilogram crates that can be loaded into the shipping container. there are fourteen juniors and thirteen seniors in the service club. the club is to send four representatives to the state conference. if the members of the club decide to send two juniors and two seniors, how many different groupings are possible? A car moves at a constant speed on a straight but hilly road. The car crosses over a hill and then a dip both of radius R. a) As the car passes over the crest of the hill the normal force on the car is half the weight of the car. What is the normal force on the car as it passes over the center of the dip How many mL of 0.013 M potassium hydroxide are required to reach the equivalence point in the titration of 75 mL 0.166 M hydrocyanic acid?