GIVING 10 or 20 POINTS for brainliest HELP ASAP!! Instructions Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network folder. Upload each file separately. Your work will not be submitted to your teacher until you click Submit. Documents Upload Instructions File Upload Accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg

Answers

Answer 1

Answer:

sorry it wont let me do it

Explanation:


Related Questions

Tonya is creating a program that will allow the user to input their work address. Which kind of variable should Tonya use for this?

A.
a syntax variable

B.
a float variable

C.
a string variable

D.
an alphabetic variable

Answers

Answer:

B.

a float variable is the answer

Explanation:

becouse it is float variable

A string variable is what Tonya should use.

What will be the result of the following lines of CSS?

body{

background-color:yellow;

}

A.
The background of the header will be yellow.

B.
The text will be highlighted yellow.

C.
The background of the body of the webpage will be yellow.

D.
The photo will change to a yellow box if the user clicks on the photo.

Answers

Answer:

C.

Explanation:

The correct option that explains the result of the given lines of CSS is:

C. The background of the body of the webpage will be yellow.

The CSS code provided sets the background color of the body element to yellow. The "body" selector targets the entire body of the webpage, and the "background-color" property sets the background color to yellow. This means that the background of the entire webpage will be displayed in yellow.

Answer:

C. The background of the body of the webpage will be yellow.

Which of the following events happened first?

Which of the following events happened first?

Answers

Answer:

D. ARPANET was created

Explanation:

The correct answer is D because ARPANET was created in October 1969, Web 2.0 was created in 1999, email was invented in 1971, and the world wide web was created in 1989

Answer:

D. ARPANET was developed

Explanation:

lol took the quiz just now

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

Mario forgot to do his book report until midnight the night before it was due, so he used a couple of paragraphs from a book review he found online as part of his report. What sort of ethical violation is he guilty of?

Question 3 options:

A hacking


B data breach


C plagiarizing


D piracy

Answers

Answer:

Explanation:

the answer is C

Answer:

c.

Explanation:

he is copying someone else's work that is ILLEGAL

What process is a project manager doing when she or he defines and documents the stakeholders' needs to meet the project objectives?

Answers

The person is organizing the docs

The point on the middle of an edge in SketchUp is called a...
midsurface
midpoint
midline
midplane

Answers

Answer:

.

Explanation:

.

The answer is two3988140

Which best describes desktop publishing? the process of designing and laying out printed material the positioning of text, graphics, and white space on a page the style of letters and how they are arranged the use of images and colors

Answers

Explanation:

the process of designing and laying out printed material.

Answer:A photographic proof where all colors are shown in blue, best used for spot color jobs, and it is used primarily to ... WYSIWYG is technical jargon that describes.

Explanation:

Write the importance of software in computer . In 6 points ​

Answers

Answer:

Software is a set of instructions, data or programs used to operate computers and execute important tasks but can also help you work more efficiently.

Uses of Software

Uses of Software in Office.Uses of Software in Business.Uses of Software for Play Game.Uses of Software in Shop.Uses of Software for Entertainment.

Explanation:

I think most important software in computer is terminal because it can control any part to computer and can do things we cannot de with other apps

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces says a name is optional though.
1: I tried typing a name in (didn’t work)
2: tried restarting the computer (don’t work)
3: logging out doesn’t work either.
HELPPP!!

I was logging into my origin account and this popped up. I cant seem to click the NEXT button at the

Answers

Answer:

Contact the company to find out what the problem is.

Explanation:

This happened to me. I just emailed them and they sorted it out

Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?

Answers

Answer:

A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:

Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.

Online petitions: Collect signatures and demonstrate public support.

Video campaigns: Engage viewers emotionally through compelling videos.

Mass media advertising: Utilize TV, radio, or print media for broader reach.

Advocacy websites: Provide information, resources, and a platform for action.

Public demonstrations and rallies: Gather supporters for visible advocacy.

Answer:

Explanation:

Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.

what is a logic circuit?

Answers

Answer:

A logic circuit is an electronic circuit that performs a specific logical operation on one or more binary inputs to produce a binary output. Logic circuits are made up of electronic components, such as transistors, diodes, and resistors, which are arranged in a specific way to implement a particular logical function, such as AND, OR, NOT, and XOR.

Logic circuits are used in many digital electronics applications, such as computers, calculators, and electronic control systems. They are designed to process digital signals, which consist of binary data represented by voltage levels or current flow. By manipulating these signals with logical operations, logic circuits can perform arithmetic, comparison, and decision-making functions, among others.

There are many different types of logic circuits, ranging from simple gates that perform basic logical functions, to more complex circuits that implement more advanced functions, such as flip-flops and registers that can store and manipulate data. The design and analysis of logic circuits is an important area of study in electrical engineering and computer science.

Explanation:

Answer: a circuit for performing logical operations on input signals.

Explanation: Pleas give brainliest

If you want to develop an Android app, you need to become a registered developer with which platform?

If you want to develop an Android app, you need to become a registered developer with which platform?

Answers

C is the correct answer
The answer is C
Check photos

what is 8 4/7 divided by 15

Answers

84/7 divided by 15 is 0.8

Answer: 4/7

Explanation:

8 4/7 ÷ 15

60/7× 1/15

=4/7

ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.

Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.

then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.

I hope this help you to understand

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Which device would help someone train for a marathon?

Drone
Navigation system
Smart watch
VR headset

Answers

i think a smart watch because it can help track you steps and it can tell you how many calories and fat you burn.
i hope this is correct and i hope it helps

I think Smart watches will be good as it will track your breathing, heartbeat, and steps. VR head set will not make you go so far, drones can look at the track you are running but it is not helping you run, and i don’t know about navigation systems.

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

1 What was the first European colony in the western part of North America?
Santa Fe
Rio Grande
Albuquerque
St. Augustine






2 What did the Spanish bring to the New World?
Furs
Honeybees and tobacco
Barley, oats, wheat, and oranges
Gold and Juniper



3 What was used to cure skin irritations?
Horehound
Carrots
Garlic
Cornstarch



4 Why did Hernando de Soto explore Florida?
To establish permanent settlements
To find both gold and a water passage to China and Japan
To find a mythical group of seven cities made of gold
To spread Christianity


.
5 What did the Proclamation of 1763 do?
Prevented French from going past the mountains
Prevented fur trade from going on past the mountains
Prevented settlers from going past the mountains
Prevented Native Americans from going past the mountains




6 What did a joiner do?
Taught school
Built houses
Joined wood together into things like cupboards and staircases
Introduced members of the colony to the church


7 Which of the plants below was used to cure diseases?
Carrots
Horehound
Potatoes
Garlic


8 How did the False Face society heal people?
1They would wear very frightening masks to scare the evil spirits away. They believed that evil spirits caused illness.
2They would use various herbs and wild plants to create a paste which they would rub all over the sick person.
3They were the first of all Native Americans to practice conventional medicine.
4They would have patients wear a mask for 30 days and nights to ward off the evil spirits that they believed caused illness.

PLS HELP ME!


Who was the greatest enemy of the Susquehannock?
Iroquois
Cherokee
Mohawk
Apache

Answers

1. St. Augustine

2.Barley, Oats, Wheat, and Oranges

3. Horehound

4. To find a mythical group of seven cites made of gold

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Advantages and disadvantages of using the command-line interface to manage files and folders

PLZ HELP I WILL MARK YOU AS BRAINLIEST ASAP

Answers

Some advantages are that you will have more control, you can quickly access documents and files, and you can easily preform more advance commands. Some downside are not GUI, you have to know exactly what to type to do the action you need, and you have to experience error codes sometimes with will need you to google what they mean


Hope this helps! And I hope to get brainliest!
you have more control is an advantage

Which statements properly describe hackers? Check all that apply.

Hackers secretly get into other people’s computers.
Hackers make their identities known.
Hackers fix peoples’ broken computers.
Hackers steal information and cause damage.
Hackers are the same as computer viruses.

Answers

Answer:

1,4

Explanation:

took the test

Hackers secretly get into other people’s computers and Hackers steal information and cause damage.

What are Hackers?

Iain Softley's 1995 criminal thriller Hackers, starring Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard, Laurence Mason, Renoly Santiago, Lorraine Bracco, and Fisher Stevens, is an American production.

The movie follows a group of high school hackers as they seek to steal something. It echoes the ideas stated in the Hacker Manifesto, which is cited in the movie and was written in the middle of the 1990s when the Internet was just starting to gain widespread public acceptance.

The world of the electron and the switch. We exist without regard to our race, nation of origin, or place of worship, and you still refer to us as criminals.

Therefore, Hackers secretly get into other people’s computers and Hackers steal information and cause damage.

To learn more about Hackers, refer to the link:

https://brainly.com/question/30563643

#SPJ3

give me a random piece of Binary code to translate

Answers

Answer:

100110

Explanation:

Answer:

01001000 01000001 01001000 01000001 00100000 01000011 01001111 01001101 01010000 01010101 01010100 01000101 01010010 01010011 00100000 01010111 01001001 01001100 01001100 00100000 01010010 01010101 01001100 01000101 00100000 01010100 01001000 01000101 00100000 01010111 01001111 01010010 01001100 01000100

create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.

Answers

1. Report post
2. Block or unfollow user
3. Tell parent

Answer:

Report. Block. Tell mommy or dada

Explanation:

Eliza is the head instructor at a ballet academy. Eliza works in the ______ pathway of the Arts, AV Technology, and Communication cluster.

Question 11 options:
A. AV Technology and Film
B. Printing Technology
C. Journalism and Broadcasting
D. Performing Arts

Answers

D.Performing arts because ballet is a type of art
The answer is the first option A

Identify each situation as either internal conflict or external conflict.
a teacher thinking about
whether to call the parents
of a misbehaving child
siblings fighting over the
television remote
a man on a diet wondering if
it would be OK to eat a
cheeseburger
two strangers arguing at the
supermarket over who will
check out first

Answers

Answer:

internal

external

internal

external

A) Internal Conflict

B) Internal Conflict

C) Internal Conflict

D) External Conflict

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

multiple choice q: pls answer

Marco has just written an algorithm for how to solve a Sudoku puzzle. He says that he just written a computer program. Is Marco correct?


A.
Yes, because an algorithm is a computer program

B.
No, because Marco’s algorithm is most likely incorrect

C.
No, because an algorithm for a Sudoku puzzle cannot be run by a computer

D.
No, because a program must be written in computer code, and algorithms are not code

Answers

Answer:

D

Explanation:

No, because a program must be written in computer code, and algorithms are not code

The algorithm is a computer program so therefore marco is correct
Other Questions
Which Information Systems (IS) career oversees integrating different technologies and systems within an organization it seems like we hear about hip fractures occurring often in elderly people. why are hip fractures likely in this strong joint? A recent college graduate interviewed for a job at Lirn Industries and Mimstoon Corporation. The chance of being offered a position at Lirn is 0.32, at Mimstoon is 0.41, and from both is 0.09. What is the probability that the graduate receives a job offer from Lirn or Mimstoon? mixing alcohol solutions a pharmacist needs to obtain a 70% alcohol solution. how many ounces of a 30% alcohol solution must be mixed with 40 ounces of an 80% alcohol solution to obtain a 70% alcohol solution? hint add x ounces of 30% solution to 40 ounces of 80% solution to get x 40 ounces of 70% solution. What was the name for the 1965 immigration law that abandoned the national origins quota system and established racially neutral criteria for immigration? you want to create a diluted 0.275 m perchloric acid solution from a more concentrated 12.0 m solution. how many ml of the original acid do you need to obtain 75.0 ml of the new solution? what information is provided in the study guide found at the end of the chapter? how to read a chemistry text on november 1 of this year, jaxon borrowed $52,000 from bucksnort savings and loan for use in his business. in december, jaxon paid interest of $4,680 relating to the 12-month period from november of this year through october of next year. note: do not round intermediate calculations. b. how much interest, if any, can jaxon deduct this year if his business uses the accrual method of accounting for tax purposes? Help me help me help me pls pls pls Cul es su ________? Es 121 Napier Lane, Ringgold GA. a. direccin b. lugar de nacimiento c. estado civil d.fecha de nacimiento Your answer: Simplify the expression. Give your answer using only positive exponents. Brandon asked Janet for general advice on homework. Then he asked her to let him see specific problems. Now he wants to copy her assignment, claiming he has no time and the content is too difficult. This is an example of __________. a merry-go-round rotates at the rate of 0.12 rev/s with an 92 kg man standing at a point 2.8 m from the axis of rotation. what is the new angular speed when the man walks to a point 0 m from the center? consider the merry-go-round is a solid 13 kg cylinder of radius of 2.8 m. answer in units of rad/s. king costume uses a periodic inventory system. The company started the month with 9 masks in its begining inventory that cost %8 each. During the month, King Costume purchased 41 additional masks for $10 each. At the end of the month, King counted its inventory and found that 3 masks remained unsold. Using the LIFO method, its cost of goods sold for the month is:______. a. $434. b. $440. c. $24. d. $428. 5.00 g of solid silver nitrate AgNO3 is added to 100ml of deionized H2O to make a substance that can test the presence of chlorine in water. Identify in the word problem each of the following: (1pt each).What is the solvent?What is the solute?What is the solution? how can I determine whether fractions are considered decimals how can I convert fractions into decimals maria had $150 in gift certificates to use in a record store.she bought fewer than 20 recordings.each tape cost $5.95 and each cd cost $8.95. how many of each type of recordings might she have bought(it has to be graphed so i need points to plot) Hello, I need to answer this question for an assignment."What is a real-world example in your life where a piecewise function might be used?" On September 1, 2015, Richard started a small business called "Ricky Rock Wrestling for Fun". "Ricky Rock" offers a party package designed for active kids, teen and adults that want to learn and practice wrestling activities for fun by learning how to perform headlocks, leg scissors and other tricks.The following transaction occurred during the first month of operations, please indicate what's the effect on the accounting equation:September Description Amount1 Verbally agreed to sign a 12 month commercial insurance contract for any liability that might emerge from the activity. $600 per month for 1 year An automobile manufacturer is concerned about a possible recall of its best selling four-door sedan. If there were a recall, there is 0.20 probability that a defect is in brake system, 0.22 in the transmission, 0.18 in the fuel system, and 0.40 in some other area.a) what is the prob. that the defect is in the brakes or the fueling system if the prob. of defects in both system simultaneously is 0.15.b) what is the prob. taht there are no defects in either the brakes or the fueling system?