convert the decimal number 191 into an binary number

Answers

Answer 1

Answer:

Binary: 10111111

Explanation:


Related Questions

Which of the following does not reflect the second step of effective communication?
a.
Ken bows to a Japanese businessman when he greets him.
b.
Joy lowers her voice when she asks about her friend’s condition.
c.
KC interrupts his teacher’s lecture to ask a question.
d.
Eric conducts himself in a professional manner during his interview.

Answers

Answer:

c

Explanation:

Effective communication is the process of communication. The correct option is C.

What is Effective Communication?

Effective communication is the process of communication, where the idea, thought, or concept shared by the speaker is properly received and understood by the listener.

The condition which does not reflect the second step of effective communication is that KC interrupts his teacher’s lecture to ask a question. Hence, the correct option is C.

Learn more about Effective Communication:

https://brainly.com/question/1423564

#SPJ2

When numbers are formatted in percent format, they are multiplied by _______ for display purposes.

1000
100
10
20

Answers

They are multipled by 100
They are multiplied by 100

As a network administrator, Lea helps a small start-up set up a temporary network at a rented space. She configures a host computer with the IP address provided by the ISP to act as a router. Other computers in the network share the Internet connection through the host computer. After few hours, the owners of the start-up complain that they are not able to connect to the Internet.

Required:
What would Lea do to resolve the problem?

Answers

Business often needs internet connections to run their businesses online. What Lea should do to resolve the problem is that since the host computer was manually configured using ICS which was one of the major cause of the internet sharing. The best thing to do is to disable the ICS and then there will be no internet sharing.

Internet Connection Sharing (ICS) is known as a Windows service that helps an individual in their Internet-connected computer so as to share its Internet connection with other computers on a Local area network (LAN).

The Host computer often shares its Internet connection and acts as a gateway means. All traffic between other computers and the Internet go through this computer due to this connection. It gives Dynamic Host Configuration Protocol (DHCP) and network address translation (NAT) services for the LAN computers.

Conclusively, ICS enable a host computer to share the internet connection with other computer within the area and as such it's internet connection make have issues when a lot of other connects to it.

Learn more from

https://brainly.com/question/18543195

What properties can be standardized when a theme is applied to a document? Check all that apply. the font styles used in a document the colors of the text in a document the size of the pages in a document the number of words in a document the color of the pages in a document

Answers

Answer:

✓the font styles used in a document

✓the colors of the text in a document

✓the color of the pages in a document

Explanation:

Standardizing a document are ways to bring the best out of the documents, and this can be achieved in various levels when working on the documents. Standardization can be performed on the structure and the content of the documents as well as the layout. Information models can be of use when standardizing. A theme can also be applied which which gives overall look for the documents in term of fonts, effect as well as colors. Some properties can be standardized when applying theme to a document, and these properties are ;

✓the font styles used in a document

✓the colors of the text in a document

✓the color of the pages in a document

To use Microsoft word in application of theme to a document, these steps can be followed;

✓click on " Design tab"

✓click on "theme" to select choices.

Answer:

case, color, size, and style

Explanation:

edge2021

how might b2b and b2c companies approach meeting customer needs differently

Answers

Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.

What distinguishes B2B customers from B2C clients?

What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.

How do the purchasing processes for B2B and B2C differ?

B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical

To know more about consumers  visit:-

https://brainly.com/question/28671114

#SPJ1

Several key people were involved in programming-language development in the 1970s and 1980s.

Choose all that apply.

Bjarne Stroustrup released C++ programming language in the1980s.

John McCarthy developed LISP for artificial intelligence.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Answers

Answer: 1,3,4

Explanation: These are correct answers

Several key people were involved in programming-language development in the 1970s and 1980s:

Bjarne Stroustrup released C++ programming language in the 1980s.

John McCarthy developed LISP for artificial intelligence.

Niklaus Wirth developed Pascal to teach programming.

Thus, options A, B and D are the correct options.

In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.

Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.

Thus, options A, B and D are the correct options.

Learn more about programming-language here:

https://brainly.com/question/32901513

#SPJ3

PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regarding medications, treatments, and diets are accurate. the first websites he finds has a lot of information about a diet plan to help diabetic live healthy lifestyle. Omar can't figure out who the author of the site is and he notices that matches the one described on the website. Which of these are red flags that he should continue doing more research elsewhere? choose the right answer

a. the content is biased towards a particular diet plan that the site is advertising

b. Omar cant find the author so there is no proof that the writer can be trusted to provide medical advice.

c. both A and B

d. none of the above. the website can be trusted.


Nikolas is doing research on U.S visas for a school project. he has found conflicting information on two sites. the first site is travel.state.gov and the other is traveldocs.com which site should Nikolas trust more? choose the answer

a. Travel.state.gov

b. Traveldocs.com

Answers

Not sure on the first question, but the second would be answer choice a: Travel.state.gov since a website with .gov at the end tend to be trustworthy sources

Answer: 1. C. both A and B.

2.  Travel.state.gov

Explanation: i took the test!

When you turn on your computer, a message appears on your display that says, "Keyboard Error." You press the ENTER key to bypass the message and continue the startup process, but nothing happens.
How will you attempt to troubleshoot the problem before calling technical support?

Answers

Answer:

Firstly, I'd unplug and plug the keyboard back in, and if that doesn't help immediately, I'd restart the computer.

If that still doesn't work, I'd try another keyboard.

If even after that it doesn't work, I'd probably then call tech support.

8.6 Code Practice: Question 2

Instructions

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.


After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.


Sample Run

How many values to add to the array:

8

[17, 99, 54, 88, 55, 47, 11, 97]

Total 468

Answers

Answer:

import random

def buildArray(a, n):

   for i in range (n):

      a.append(random.randint(10,99))

     

arr = []

def sumArray(a):

   tot = 0

   for i in range(len(a)):

       tot = tot + a [i]

   return tot

       

   

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

print("Total " + str(sumArray(arr)) )

Explanation:

The program is an illustration of lists

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs to the array

n = int(input("How many values to add to the array: "))

#This initializes the sum to 0

sumArray = 0

#This initializes a list

myList = []

#This iterates through n

for i in range(n):

   #This gets input for the list elements

   num = int(input())

   #This appends the input to the list

   myList.Append(num)

   #This calculates the sum

   sumArray+=num

#This prints the list elements

print(myList)

#This prints the sum of the list elements

print("Total",sumArray)

Read more about lists at:

https://brainly.com/question/24941798

in a three-tier database architecture, what tier is used to model data?

Answers

The middle/application tier is used to model data in a three-tier database architecture.

In a three-tier database architecture, the middle tier, also known as the application tier, is typically used to model data.

The three tiers in a database architecture are:

Presentation tier: This tier is responsible for presenting data to the user and receiving input from the user. It includes user interfaces such as web browsers, mobile apps, or desktop applications.Application tier: This tier contains the business logic and processing logic for the application. It handles requests from the presentation tier, processes the requests, and sends them to the data tier. The application tier is where the data modeling occurs, with entities and relationships defined in code.Data tier: This tier stores and retrieves data from the database. It is responsible for managing the data storage and ensuring data consistency and integrity.

The middle tier is where the application logic resides, including the data modeling code. The application tier interacts with the data tier to retrieve, modify, and store data as needed. Data modeling in this tier involves defining classes, attributes, relationships, and constraints that map to the database schema in the data tier.

Learn more about database here:

https://brainly.com/question/30634903

#SPJ4

To delete a row, you must first___.
*select the row
* select the table
*modify the cell size
* select the adjacent column

Answers

Select the row or select the adjacent column

Answer:

select the row

What are the types of connection we can set up?

Answers

Answer:
WiFi Hotspots

Dial-Up

Broadband

DSL

Cable

Satellite

ISDN

what is the fastest way to iterate through a long array python

Answers

Answer:

array = [3, 7, 69, 42, 21, 46, 23, 84, 52, 73, 38, 97, 13]

for i in range(len(array)):

   print(array[i])

Explanation:

(Java) Which of the following code segments correctly declare a Strings and gives it a value of "fortran".
A. String s;
s = "fortran";
B. String s = "fortran";
C. s = new String();
s= "fortran";
D. s= new String();
String s="fortran";
E. String s = ("fortran");
F. String s= new "fortran";

Select all that apply​

Answers

In Java, variables must be declared before they are used. The correct declarations of string variable s are:

String s; s = "fortran";String s = "fortran";String s = ("fortran");

There are several ways to declare and initialize a string variable in Java. Some of them are:

String var_name; var_name = "string value"String var_name = "string value";String var_name = ("string value");String var_name = new String(); var_name = "value";

By comparing the above variable declaration formats, to the list of given options; the correct declarations of string variable s are:

A. String s;  s = "fortran";

B. String s = "fortran";  

E. String s = ("fortran");

Read more about variable declarations at:

https://brainly.com/question/12987017

Which of the following statements a), b) or c) is false?

A) The preferred mechanism for accessing an element's index and value is the built-in function enumerate, which receives an iterable and creates an iterator that, for each element, returns a tuple containing the element's index and value.
B) The following code uses the built-in function list to create a list of tuples containing enumerate's results: colors = ['red', 'orange', 'yellow']
Colors_list = list(enumerate(colors))
C) The following for loop unpacks each tuple returned by enumerate into the variables index and value and displays them: for index, value in enumerate(colors):
Print(f'{index}: {value}')
D) All of the above statements are true.

Answers

Statement (C) "The following for loop unpacks each tuple returned by enumerate into the variables index and value and displays them: for index, value in enumerate(colors): Print(f'{index}: {value}')" is false.  

The correct syntax for the print function is lowercase "print," not uppercase "Print."  So, the correct code would be:

for index, value in enumerate(colors):

   print(f'{index}: {value}')

Statement A) is true. The preferred mechanism for accessing an element's index and value is the built-in function enumerate. It creates an iterator that, for each element, returns a tuple containing the element's index and value.

Statement B) is true. The given code uses the built-in function list to create a list of tuples containing the results of enumerate applied to the colors list.

Option C is answer.

You can learn more about loop at

https://brainly.com/question/26568485

#SPJ11

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

A hacker is trying to break into a password-protected website by randomly trying to guess the password. Let "m" be the number of possible passwords.
a) Suppose for this part that the hacker makes random guesses (with equal probability), with replacement. Find the average number of guesses it will take until the hacker guesses the correct password (including the successful guess).

Answers

Given that, a hacker is trying to break into a password-protected website by randomly trying to guess the password. Let "m" be the number of possible passwords. The average number of guesses it will take until the hacker guesses the correct password is the mean of the geometric distribution.

Geometric distribution is given by: P(X = k) = (1 - p)^(k - 1) * p Where P(X = k) is the probability of the kth trial being the first success, 1 - p is the probability of the kth trial being a failure, k - 1 is the number of failures before the kth trial, and p is the probability of success.

So, the mean of geometric distribution is Mean of geometric distribution = 1/pa) Suppose for this part that the hacker makes random guesses (with equal probability), with replacement. Find the average number of guesses it will take until the hacker guesses the correct password (including the successful guess).

For this case, the probability of guessing the correct password is 1/m.Therefore, p = 1/mMean of geometric distribution = 1/p = 1/(1/m) = mThus, the average number of guesses it will take until the hacker guesses the correct password (including the successful guess) is m.

Learn more about password-protected at https://brainly.com/question/24327414

#SPJ11

what should you do to a user account if the user goes on an extended vacation? answer monitor the account more closely delete the account remove all rights from the account disable the account

Answers

To protect a user account if the user goes on an extended vacation, you should disable the account to prevent any unauthorized access.

The appropriate action would be to disable the account. This would ensure that the account remains inactive until the user returns and reactivates it themselves. Disabling an account is a process that is performed to prevent a user from accessing their account. This is often done when a user is going on an extended vacation, is no longer with the company or organization, or when there is suspicion that the account has been compromised or hack. This action is reversible, and once the user returns or the reason for the account being disabled is resolved, the account can be reactivated by the administrator or user themselves, depending on the system's configuration.

Learn more about unauthorized access: https://brainly.com/question/28809596

#SPJ11

Information stored on CD-ROM disc must be read and then erased.True or false?​

Answers

Answer:

False

Explanation:

the term __________ refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

Answers

The answer is: objective function.

the term “objective function” refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

the term objective function refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

What is objective function?

The objective function is a mathematical equation that describes the target production output that corresponds to profit maximization in relation to production.

It then uses the correlation of variables to calculate the final outcome value. Based on a collection of constraints and the relationship between one or more decision variables, an objective function attempts to maximize profits or minimize losses.

Therefore, In a linear programming model, the term objective function refers to the expression that defines the quantity to be maximized or minimized.

Learn more about the objective function, refer to:

https://brainly.com/question/29185392

#SPJ5

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

What is another term for the notes that a reader can add to text in a word- processing document?

Answers

Answer:

Comments

.....

9. What are the arguments for and against Java's implicit heap storage recovery, when compared with the explicit heap storage recovery required in C++? Consider real-time systems 10. Analyze and write a comparison of using C++ pointers and Java reference variables to refer to fixed heap-dynamic variables. Use safety and convenience as the primary considerations in the comparison

Answers

The implicit heap storage recovery feature in Java allows for automatic object memory allocation and deallocation without the need for explicit programming. Nevertheless, C++ demands explicit heap storage recovery through the use of new and delete or malloc and free.

Supporters of Java's implicit heap storage recovery include:

1) Safety: Java's implicit heap storage recovery lowers the possibility of memory leaks, which can cause crashes or unpredictable behavior in C++ programs. Memory leaks happen when memory is allocated but not released, resulting in memory loss and possible instability.

2) Convenience: Java's implicit heap storage recovery does away with the necessity for explicit memory management code, which speeds up and improves the convenience of programming. Instead of worrying about memory management minutiae, developers may concentrate on the logic of the program.

Detractors of Java's implicit heap storage recovery include:

1) Performance: Because the JVM must handle memory allocation and deallocation at runtime, Java's implicit heap storage recovery might result in overhead. Real-time systems or applications that need minimal latency may suffer as a result.

2) Predictability: As the garbage collector decides when memory will be allocated or deallocated, Java's implicit heap storage recovery may make it more challenging to forecast when memory will be allocated or deallocated. This can result in unexpected behavior and make memory consumption optimization more challenging.

Comparison of Java reference variables and C++ pointers for fixed heap-dynamic variables

1) Safety: Due to the fact that they cannot be dereferenced to null or random memory locations, Java reference variables are usually thought to be safer than C++ pointers. This removes the chance of accessing erroneous memory and resulting in segmentation issues.

2) Convenience: Java reference variables are easier to use than C++ pointers since they take care of memory management automatically. Programming becomes quicker and simpler as a result of the removal of the necessity for explicit memory management code.

3) Performance: Because C++ pointers allow for direct memory access and manipulation, they are typically faster than Java reference variables. This can be crucial in real-time systems or programs that need to have little latency.

4) Predictability: Because C++ pointers allow for direct control over memory allocation and deallocation, they offer greater predictability than Java reference variables. This can make it simpler to forecast program behavior and optimize memory use.

To know more about Java

brainly.com/question/12974523

#SPJ4

True or False? A list can be linear (items are arranged one after the other) or linked (each item has a pointer to the next item in the list).

Answers

Answer:

True

Explanation:

True

Reasoning it’s true because a list can be linear items arranged one after the other one

Which routing protocol is considered a link-state protocol?A. RIPv1B. RIPv2C. EIGRPD. IS-ISE. BGP

Answers

IS-IS (Intermediate System to Intermediate System) is a routing protocol that is regarded as a link-state protocol.

IS-IS, Intermediate System to Intermediate System, is a routing protocol used in computer networking, specifically in Internet Protocol (IP) networks. It was developed by the ISO as a result of their work on the OSI protocol suite.IS-IS is a routing protocol that falls under the link-state category. Link-state protocols keep track of topology changes in the network by exchanging link-state advertisements (LSAs) among routers to form a complete picture of the network. The routing table on each router is then created from these LSAs.BGP (Border Gateway Protocol) is another protocol that is used in the internet to exchange information between autonomous systems.

IS-IS is the correct answer for the question "Which routing protocol is considered a link-state protocol?" and it is classified as a link-state protocol as it employs link-state routing technology to update routing tables.

To know more about protocol visit,

https://brainly.com/question/16224929

#SPJ11

What should a scrum master do if he or she notices disruptive behavior during a scrum?

Answers

A Scrum Master plays a crucial role in ensuring the smooth functioning of a Scrum team. If a Scrum Master notices disruptive behavior during a Scrum, they should take immediate action to address the issue and maintain the team's productivity. Here are the steps a Scrum Master should follow:

1. Identify the disruptive behavior: Recognize the specific actions or attitudes causing disturbance in the team dynamics. This could include lack of participation, constant interruptions, or resistance to collaboration.

2. Address the issue privately: Speak with the disruptive individual privately to discuss the issue. Be objective and non-confrontational in your approach, focusing on the behavior rather than the person.

3. Foster a culture of respect: Emphasize the importance of respect and collaboration within the team. Encourage open communication and constructive feedback, ensuring that all team members feel comfortable sharing their thoughts and concerns.

4. Provide support and guidance: Help the disruptive team member understand the impact of their behavior on the team and guide them towards adopting a more collaborative and respectful attitude.

5. Monitor progress: Continuously assess the situation to ensure that the disruptive behavior has been resolved. If necessary, involve other stakeholders, such as management or human resources, to provide additional support or interventions.

By addressing disruptive behavior promptly and professionally, a Scrum Master can maintain the integrity of the Scrum process and ensure the team's success.

Learn more about Scrum here:

https://brainly.com/question/31172682

#SPJ11

Which program runs on a computer when the computer boots up?

Answers

Operating System

An operating system runs on a computer when the computer boots up.

Basically, operating systems are used to run programs like browsers and video players.

Some examples of operating systems:

Windows LinuxAndroidmacOS

Hope this helps :)

Answer:

Operating system

Explanation:

which is the best software program

Answers

Answer:

The question "which is the best software program" is quite broad, as the answer can depend on the context and what you're specifically looking for in a software program. Software can be developed for a myriad of purposes and tasks, including but not limited to:

- Word processing (e.g., Microsoft Word)

- Spreadsheet management (e.g., Microsoft Excel)

- Graphic design (e.g., Adobe Photoshop)

- Video editing (e.g., Adobe Premiere Pro)

- Programming (e.g., Visual Studio Code)

- 3D modeling and animation (e.g., Autodesk Maya)

- Database management (e.g., MySQL)

- Music production (e.g., Ableton Live)

The "best" software often depends on your specific needs, your budget, your experience level, and your personal preferences. Therefore, it would be helpful if you could provide more details about what kind of software you're interested in, and for what purpose you plan to use it.

What is a definition of a two-tier lan network design?

Answers

access,distribution and core layers collapsed into one tier

you receive an email from your bank informing you that their privacy policy has been updated and asking you to review it on their website. what is the safest way to visit your bank's website?

Answers

Here is the safest way that you can follow when visiting your bank's website:

Ensure the bank's website uses an HTTPS web address. Change your password regularly. Use multi-factor authentication. Don't open your bank account on public computers. Use a secured wifi connection.

The safest way when visit a bank's website is to access your bank's official online or mobile banking app using a secured Wi-Fi connection. Banking with unverified or untrusted apps or over unsecured Wi-Fi connections could leave you vulnerable to cyberattacks.

You can learn more about the cyberattacks at https://brainly.com/question/27726629

#SPJ4

Other Questions
Let A and B be disjoint compact subspaces of a Hausdorff space X. Show that there exist disjoint open sets U and V, with AU and BV. Carolyn answered 23 questions correctly for a score of 92%. How many questions were on the test? when meditating, you should set an alarm to alert you when 20 minute has passed. true false 1. The sides of a square 1 cm, have lines drawn between them connecting adjoining sides with their midpoints. This creates another square within the original and this process is continued indefinitely. (Given, Pythagoras theorem: Hypotenuse 2 = Perpendicular 2 + Base 2) a. Show the sequence of the sides for first 4 terms. [1] b. Show the sequence for the areas of the squares for first 4 terms. [1] c. Calculate the sum of the areas of the infinite squares. Use log, 20.327, log, 3 0.503, and log, 5 0.835 to approximate the value of the given logarithm to 3 decimal places. Assume that b>0 and b# 1. log, 45 X 3 All of the following expressions simplify to -5x + 7, except( x - 2) - (6 x - 9)(5 x + 1) - (-10 x + 6)-4 x + 2 x + 7 - 3 x(4 x + 3) + (-9 x + 4) PLEASE HELP MEH I NEED THIS HELP PLSSSSSSSSSSSSS a teacher has a lesson on first aid in JHS 1 class,the teacher decides to let a resource person handle the topic in class. as a professional teacher explain to her three advantages and three disadvantages of using a resource person in handling the first aid lesson For each of the sets in Exercises 1 to 8, determine whether or not the set is (a) open, and (b) connected.1. A = {z = x+iy : x 2 and y 4} 2. B = {2 : |2| < 1 or |z 3| 1} 3. C = {z = x+iy : x < y} 4. D = {z : Re(z) = 4} 5. E= {z: zz-2 0} 2 6. F = {z : 2 2z + 5z - 4 = 0} 7. G = {z = x + iy : |z + 1| 1 and x < 0} 8. H = {z = x+iy : y < }11. A set S in the plane is bounded if there is a positive number M such that |z| < M for all z in S; otherwise, S is unbounded. In exercises 1 to 8, six of the given sets are unbounded. Find them. WHICH DECIMAL IS EQUIVALIENT TO 13/20 Manga japonesa inventanda I need help :((((((, please help me :((((( when a ___externality exists, the socially optimal level of output will be than that resulting from a private market. positive or negative to determine how much to pay for each position in a new division, trey placed all the jobs in rank order, from the one that was worth the most to the one that was worth the least. trey used the job evaluation method. a. external b. job ranking c. factor comparison d. point-factor A ball bounces off a wall with a velocity whose magnitude is less than it was before hitting the wall. Is the collision elastic? Explain. O Yes, momentum is conserved so the co n must be elastic. ONo, there is a loss of kinetic energy in the collision, so it is inelastic. O There is not enough information to determine whether or not the collision is elastic. 11. O -2 points GriEPS 7.TB 23 Q3 Submissions Used The principle that total momentum does not change during a brief collision is a result of Newton's first law and Newton's third law Newtc's first law and Newton's second law. the definition of the kilogram. Newton's second law and Newton's third law the defintion of the newton. 2 peints Gv 7TD.07 o3 Submissiens Used 12 Which of the following mathematical expressions should be used to calculate the momentum of an auto mass x velocity mass acceleration weight speedi welght force t.. 30.. 9 7 3 4 2 T Y R E W ab K H F A caps lock N B V C X z shift alt optie commond. command option control fn A V . Individuals suffering from depression with _____ features show strange behaviors ranging from a complete lack of movement to excited agitation. what is the increased calorie recommendation during the second trimester? A car and a plane are racing each other. Both start at the same position, with the plane being 500m above the car. The car has a maximum speed of 200km/h and the plane has a maximum speed of 300km/h. What is the rate of change of the distance between the plane and the car when both are maximum speed and the plane is ahead by 70m? Which of the following statements describe(s) the importance of environmental protection in North America? MULTIPLE CHOICE!!! Environmental protection affects the quality of people's lives. Environmental protection in North America will not affect Europe or Asia. Environmental protection efforts today will affect future generations. Environmental protection policies must consider economic development. Environmental protection policies need only consider what is best for the environment. Tipo de narrador de Quien se a llevado mu queso