Answers

Answer 1

1. There are satellites that work with Antennas In the sky.

2. They help with recipes, They are good for games, They are also great for chatting. But, they run out of battery fast, they also radiate the room, they costt alot.

3. You can see definitions, But it can be false


Related Questions

C
A digital footprint is all of the information on-line about a person posted by that person or others,
unintentionally or accidentally
recklessly
intentionally
intentionally or unintentionally

Answers

Answer:

hello asan pic para masagutan ko

Explanation:

when a user has determined their destination, gis can assist in providing directions. this is called

Answers

When a user has determined their destination, GIS (Geographic Information System) can assist in providing directions. This is called routing. GIS uses spatial data to calculate the most efficient route from the starting point to the destination.

First, GIS collects information about the road network, such as street names, speed limits, and traffic conditions. It also considers other factors like road closures, construction, and one-way streets.

Next, GIS analyzes this data and applies algorithms to find the best route. It considers various factors like distance, travel time, and traffic congestion.

Once the route is determined, GIS can generate step-by-step directions. These directions may include instructions like turning left or right at specific intersections, taking highways, or using public transportation.

In conclusion, GIS assists users by providing accurate and efficient directions from their starting point to their destination. It combines spatial data, algorithms, and real-time information to calculate the optimal route.

To know more about routing visit:

brainly.com/question/30409461

#SPJ11

the administrator at ursa major solar has created a custom report type and built a report for sales operation team. however, none of the user are able to access the report. which two options could cause this issue?

Answers

Since none of the user are able to access the report, the two options that could cause this issue include the following:

The custom report type is in development.The user’s profile is missing view access.

What is a DBMS software?

DBMS software is an abbreviation for database management system software and it can be defined as a software application that is designed and developed to enable computer users to create, store, modify, retrieve and manage data (information) or reports in a database.

In this scenario, we can reasonably infer and logically deduce that the most likely reason the end users (customers) were not able to access the report is because their profile is missing view access or the custom report type is still in development.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

The administrator at Ursa Major Solar has created a custom report type and built a report for sales operation team. However, none of the user are able to access the report.

Which two options could cause this issue? Choose 2 Answers

The custom report type is in development.

The user’s profile is missing view access.

The org has reached its limit of custom report types.

The report is saved in a private folder

What is Relational Computerized Database

Answers

Answer:

Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases

when asking a question how do u add a photo for others to also see​

Answers

Click on the bottom button

Answer:

click on the thing that looks like a paper clip and select a file (microsoft computers)

Explanation:

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

who is ur bestfriend and why

Answers

My best friends name is Sarah (<3) bc she always laughs at my jokes but is also honest with me in ways that others aren't

While loop project
Reference codeacademy lesson called loops
Need help writing this code
Create a program that
1) outputs the name priya 100 times (all on different lines)
2) output the name priya 100 times (10 on 10 lines)
3) output the sum of numbers from 1 to 1000
4) output the product of numbers from 1-8
5) list all the numbers from 100 down to 1
Complet in this order

Answers

Answer: Change this however you'd like :)

Explanation:

for n in range(100):

   print("priya")

print()

for n in range(10):

   for i in range(10):

       print("priya", end= " ")

   print()

print()

tempList = []

for n in range(1, 1001):

   tempList.append(n)

print(sum(tempList))

print()

for n in range(1, 9):

   for i in range(1, 9):

       print(n*i)

print()

x = 100

while x != 0:

   print(x)

   x -= 1

A computer is an electronic device that can accept data and process it according to specified rules, but that cannot produce information. Group of answer choices False True

Answers

It is false that a computer cannot produce information.

Computer

Computer is an electronic device that operates (works) under the control of programs stored in its own memory unit.

A computer is an electronic machine that processes raw data to give information as output.

An electronic device that accepts data as input, and transforms it under the influence of a set of special instructions called Programs, to produce the desired output (referred to as Information).

Find out more on Computer at: https://brainly.com/question/24540334

Augmented reality users are immersed in the virtual world while interacting with objects.
a. True
b. False

Answers

The statement is false. Augmented reality (AR) users are not fully immersed in a virtual world.

Unlike virtual reality (VR), where users are completely immersed in a simulated environment, AR overlays digital content onto the real world, enhancing the user's perception of reality.

In AR, users can see and interact with virtual objects or information while still being aware of their physical surroundings. AR technology typically involves the use of devices like smartphones, tablets, or smart glasses, which project digital elements onto the real world through a camera or display. The goal of AR is to enhance the real-world experience rather than replace it with a virtual one.

Learn more about Augmented reality, here:

https://brainly.com/question/31903884

#SPJ1

no matter which eap authentication method is used, which additional type of authentication must occur? question 11 options: a) eap-light b) mutual c) psk d) open system

Answers

Regardless of the specific EAP authentication method being used, mutual authentication is always required to provide a secure connection between the client and the server in a network environment. The correct option is option b.

EAP (Extensible Authentication Protocol) is a protocol used in wireless networks to provide secure authentication. There are various types of EAP authentication methods available, each with its own unique features and benefits. No matter which EAP authentication method is used, an additional type of authentication must occur, which is mutual authentication. This means that both the client and the server must authenticate each other to establish a secure connection. Mutual authentication helps to prevent unauthorized access to the network and ensures that both parties are legitimate and trusted. In summary, mutual authentication is an essential component of EAP authentication regardless of the specific method used. It helps to ensure a secure connection between the client and the server, preventing unauthorized access to the network.

To learn more about EAP authentication, visit:

https://brainly.com/question/31764290

#SPJ11

in a cloud security model, who is responsible for securing access management and firewall configurations?

Answers

In a cloud security model, the responsibility for securing access management and firewall configurations typically falls on the cloud service provider (CSP) and the customer organization.

In a cloud security model, access management involves controlling and managing user access to cloud resources. The cloud service provider is responsible for implementing robust access management systems and mechanisms to ensure that only authorized individuals can access the cloud infrastructure and data. This includes features such as user authentication, authorization, and identity management.

Firewall configurations, on the other hand, are responsible for enforcing network security policies and filtering network traffic. The cloud service provider is responsible for implementing and maintaining the underlying network infrastructure, including firewalls, to protect the cloud environment. They are responsible for configuring and managing firewall rules and policies to prevent unauthorized access and protect against potential threats.

However, it is important to note that while the cloud service provider has a certain level of responsibility, the customer organization also plays a role in securing access management and firewall configurations. The customer organization needs to define and implement its own access control policies and ensure that they align with the security requirements of their applications and data.

They should also regularly review and monitor the access management and firewall configurations to identify and address any vulnerabilities or misconfigurations.

In summary, both the cloud service provider and the customer organization have shared responsibilities for securing access management and firewall configurations in a cloud security model. The cloud service provider provides the underlying infrastructure and implements security measures, while the customer organization defines access control policies and actively monitors and maintains the security of their cloud environment.

Learn more about cloud service provider here:

https://brainly.com/question/32091995

#SPJ11

Cloud backup software periodically saves your files and settings to an external hard drive. True False

Answers

False. Cloud backup software does not save files and settings to an external hard drive; instead, it stores them on remote servers hosted by a third-party service provider.

Cloud backup solutions offer users the ability to securely back up their data over the internet, providing an off-site storage solution for important files, documents, and settings.

Cloud backup software typically works by encrypting and transmitting the data over a network connection to the remote servers. These servers are managed and maintained by the service provider, ensuring data redundancy and availability.

The software can be configured to automatically back up files at regular intervals or in real-time, depending on the user's preferences.

One of the key advantages of cloud backup is the ability to access the backed-up data from anywhere with an internet connection. In case of data loss, such as hardware failure, theft, or natural disasters, users can restore their files and settings from the cloud backup service.

Overall, cloud backup software provides a reliable and convenient solution for data backup and recovery, offering peace of mind and protection against potential data loss.

For more such questions on Cloud backup,click on

https://brainly.com/question/13152446

#SPJ8  

The ______ moving air alone will charge suspended particles and cause the buildup of static electrical charges on people and objects in the environment​

Answers

Answer:

friction

Explanation:

the resistance that one surface or object encounters when moving over another. Alsothe action of one surface or object rubbing against another.

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. Group of answer choices

Answers

Answer:

Hi there. A tech savvy here, the answer to your question is certificate authority.

Cheers,

Heyy28

One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed. Since all files are contiguous, copying a
file squires a seek and rotational delay to read the file, followed by the transfer at full speed. Writing the file back requires the same work. Assuming a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and an average file size of 8 KB, how long does it take to read a file into main memory and then write it back to the disk at a new location? Using these numbers, how long would it take to compact half of a 16-GB disk?

Answers

Answer:

The answer is below

Explanation:

a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB

Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec

The time required to read and write is twice the sum of the seek and transfer time.

Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec

b) half of 16 GB = 8 GB = 8000000 KB

number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000

Transfer rate = 8 MB/sec = 0.008 GB/sec

Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec

Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec

differences between binary, decimal and hexadecimal

Answers

Answer:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Explanation:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Binary number systems use a base of two while hexadecimal uses a base of 16. In a hexadecimal system, it is necessary to count to 15. To represent the numbers 10 – 15, the letters A – F are used respectively. To distinguish the different number systems, suffixes or subscripts are often used.

Using the code to the right, which best describes the piece of code labeled my_graphic?

Answers

Answer:

a property

Explanation:

A JavaScript property is a characteristic of an object, often describing attributes associated with a data structure. There are two kinds of properties: Instance properties hold data that are specific to a given object instance. Static properties hold data that are shared among all object instances

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

Identify the correct way to cite the careeronestop web page that lists the highest-paying occupations. careeronestop. us department of labor and the state of minnesota, 2013. “top 50 highest-paying occupations by median hourly wages.†web. 1 may 2013. “careeronestop.†us department of labor and the state of minnesota, 2013. “top 50 highest-paying occupations by median hourly wages.†web. 1 may 2013. “top 50 highest-paying occupations by median hourly wages.†careeronestop. us department of labor and the state of minnesota, 2013. web. 1 may 2013. top 50 highest-paying occupations by median hourly wages. “careeronestop.†us department of labor and the state of minnesota, 2013. web. 1 may 2013.

Answers

The correct citation for the careeronestop website's list of the highest-paying jobs is B. "Careeronestop," US Department of Labor and the State of Minnesota, 2013. Top 50 highest-paying occupations by median hourly salaries." Web. 1 May 2013.

What exactly is a citation?The last name of the author and the year of publication are used in APA in-text citations, for instance: (Field, 2005). Include the page number with any direct quotations, as in: (Field, 2005, p. 14). Use a paragraph number for sources without page numbers, such as websites and electronic books.A citation is known more colloquially as a "ticket." A citation is the same as a ticket, there is no distinction. In both situations, a police officer normally issues a written document in this manner. In some circumstances, a speeding camera may alert the authorities if you were breaking traffic regulations, and they may issue a citation.

To learn more about citation, refer to:

https://brainly.com/question/23310255

what is the output of the following?
x = 7
print ("the number is: " + str(x * 2))

a. the number us: 14
b. the number is: x*2
c. none there is an error
d. 14​

Answers

Answer: a. the number is: 14

Explanation:

i mean just try to write in 7 instead of x in the second line

then it would say the number is: ....

what is 7 times 2?

14

so the answer is a

Task 5: Repeat Task 4, but this time use the EXISTS operator in your query

Answers

To see if there is at least one matching row in the Orders table for each customer, use the EXISTS operator. For any matching row, the subquery inside the EXISTS operator returns a single result (1), which is enough to meet the requirement.

Yes, here is a Task 5 sample query that makes use of the EXISTS operator:

sql SELECT Customers, c.CustomerName, and o.OrderID (SELECT 1 FROM Orders) WHERE EXISTS WHERE, o (o.CustomerID = c.CustomerID AND (o.ShipCountry) = "Germany"

All customers who have at least one order with the shipping country of "Germany" will have their name and order ID selected by this query. To see if there is at least one matching row in the Orders table for each customer, use the EXISTS operator. For any matching row, the subquery inside the EXISTS operator returns a single result (1), which is enough to meet the requirement.

Learn more about EXISTS operator here:

https://brainly.com/question/25211092

#SPJ4

what type of security ticket is used to establish the session with servers in an ad ds network?

Answers

Kerberos tickets are used to established the session with servers in an ad ds network.

An encryption key is first kept private between the client and server. A client relies on the authentication server to create a new encryption key and securely distribute it to both parties each time it authenticates itself to a new verifier.

The Kerberos ticket is used to give the verifier access to this new encryption key, which is known as a session key. An authentication server's certificate that has been encrypted with the server key is the Kerberos ticket. The ticket includes a random session key, the name of the principal to whom it was issued, and an expiration time after which the session key is no longer valid.

These details will be used to authenticate the principal to the verifier. Kerberos tickets are distributed to authenticated users by a key distribution center (KDC).

To know more about Kerberos ticket click on the link:

https://brainly.com/question/20733895

#SPJ4

The information below is the number of daily emergency service calls made by the volunteer antoulance service of Boerne, Texas, for the jast 85 days. To explain, there were 35 days when there were two emergency calls, and 18 days when there were thred emergency calls. a. Convert this information on the number of calls to a probability distribution. (Round your answers to 2 decimal places.) b. Is this an example of a discrete or continuous probability distribution? c. What is the probab-ity that 3 or more calls are mpde in a day? (Round your answer to 2 decimal places) d. What is the mean number of emergency calls perday? (Round your answer to 2 decimal places) e. What is the standard deviation of the number of calls made daily? (Round your answer to 3 decimal places).

Answers

a. To convert the information on the number of calls to a probability distribution, we need to find the probability of each number of calls occurring.


First, let's calculate the total number of days: 35 + 18 + 32 = 85.
Now, let's calculate the probability for each number of calls:
- Probability of 2 calls: 35/85 ≈ 0.41 (rounded to 2 decimal places).
- Probability of 3 calls: 18/85 ≈ 0.21 (rounded to 2 decimal places).
- Probability of 0 calls: (85 - 35 - 18)/85 = 32/85 ≈ 0.38 (rounded to 2 decimal places).


b. This is an example of a discrete probability distribution because the number of emergency calls can only take on specific whole numbers (0, 2, or 3) in this case.

c. To find the probability of 3 or more calls, we need to add the probabilities of 3 calls and 0 calls since 0 is also considered "3 or more calls." So, the probability of 3 or more calls is 0.21 + 0.38 = 0.59 (rounded to 2 decimal places).

d. The mean number of emergency calls per day can be calculated by multiplying the number of calls by their respective probabilities and summing them up. So, the mean is (2 * 0.41) + (3 * 0.21) + (0 * 0.38) = 1.41 (rounded to 2 decimal places).

e. The standard deviation of the number of calls made daily can be calculated using the formula:
√[Σ(x - μ)²P(x)], where x represents each number of calls, μ represents the mean, and P(x) represents the respective probability.
Let's calculate it step by step:

1. Calculate (x - μ)² for each number of calls:
- For 2 calls: (2 - 1.41)² * 0.41
- For 3 calls: (3 - 1.41)² * 0.21
- For 0 calls: (0 - 1.41)² * 0.38

2. Calculate Σ(x - μ)²P(x) by summing up the results from step 1.

3. Take the square root of the result from step 2.
Calculating these steps will give us the standard deviation of the number of calls made daily.

To know more about probability visit:

https://brainly.com/question/31828911

#SPJ11

Alex discovers that the network routers that his organization has recently ordered are running a modified firmware version that does not match the hash provided by the manufacturer when he compares them. What type of attack should Alex categorize this attack as

Answers

A type of attack which Alex should categorize this attack as is: a supply chain attack.

What is a supply chain attack?

A supply chain attack can be defined as a type of attack that typically occurs before software or hardware (equipment) are delivered to a business firm.

In this context, we can infer and logically deduce that a type of attack which Alex should categorize this attack as is: a supply chain attack because the network routers were compromised before they received them.

Read more on chain attack here: https://brainly.com/question/25815754

#SPJ1

question 10 http status codes are codes or numbers that indicate some sort of error or info message that occurred when trying to access a web resource. when an http request is successful, what number does the http status code start with?

Answers

The HTTP status code that indicates a successful HTTP request starts with the number "2". A "2xx" HTTP status code is used to indicate a successful HTTP request.

For example, the most common "2xx" status code is "200 OK", which signifies that the request was successful and the server was able to fulfill the request and return the requested information to the client.

Additionally, "201 Created" indicates that the request was successful and a new resource was created, and "204 No Content" signifies that the request was successful, but there is no representation to return. Knowing the different types of HTTP status codes can help you diagnose and troubleshoot issues with web resources.

Learn more about HTTP: https://brainly.com/question/22219649

#SPJ4

Answer: The status code starts with 2xx.

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

while cad programs such as solidworks allow to print directly from inside the cad softwware, the export of files is still sometimes necessary. what is the most common file type for exporting a part to a 3d printing slicer program

Answers

The most common file type for exporting a part to a 3D printing slicer program is the STL (Standard Tessellation Language) file format.

STL files are a standard file format that represents the surface geometry of a 3D object as a collection of triangles, which can be easily interpreted by 3D printing software. Many CAD programs, including SolidWorks, can export parts or assemblies as STL files, making it a widely used file format in the 3D printing industry.

Other file formats that are commonly used for 3D printing include OBJ, AMF, and 3MF, but STL remains the most widely used due to its simplicity and compatibility with most 3D printing software.

For more question on STL click on

https://brainly.com/question/23612476

#SPJ11

Has anyone done 7. 3. 4 Animated pokey on cmu? I don't understand put to code for the pokeys. BodyPieceDx. Any help?

Answers

One possible approach would be to use a 3D modeling software such as Blender or Maya to create a 3D model of Pokey and then import that model into CMU's animation software to add animations to it.

How to code an animated version of Pokey

Assuming you are referring to the animated character "Pokey" from the Super Mario Bros. video game series, there are several ways you could go about coding an animated version of this character using the Carnegie Mellon University (CMU) animation software.

Another approach would be to create a 2D sprite animation of Pokey using an image editor like Photoshop or GIMP and then import that animation into CMU's animation software to create a 2D animated version of the character.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Answer:

Hi I have answers to units 1-6 of cmu academy but I am struggling on unit 7.3 and 7.4 exercises if you have them is there anyway you can send me some of the answers, I am willing to help with another subject as a trade!

Explanation:

TRUE / FALSE. when casting o to s in string d = (string)o, the contents of o is changed.

Answers

The given statement is FALSE.

When casting o to s in string d = (string)o, the contents of o are not changed. Casting simply creates a new variable of a different type, but it does not alter the original variable or its contents.The line d = (string)o is performing an explicit type cast, where o is being cast from its original type to a string. The cast is based on the assumption that the object o is of a type that can be successfully converted to a string. The resulting value is then assigned to the variable d.The contents of o itself are not modified during the cast. The cast only creates a new instance of a string object with the converted value from o and assigns it to d. The original value and state of o remain unchanged.

For further information on Casting visit:

https://brainly.com/question/32343122

#SPJ11

Other Questions
Write a post about vocal health and include links to three websites that include factual information to support your claims. Read the posts of your classmates and comment on information you learned from reading them. Add supporting information that supports or refutes the information they presented. PLS HELP ME ASAP THIS DUE NOW which of the following properties is (are) intensive properties? i. mass ii. temperature iii. volume iv. concentration v. energy what the answer for the thing Use the diameter (d) or the radius (r) to find the area The bone marrow cell from which all formed elements are derived is considered to be a ______ because it can differentiate into many different kinds of cells. a split-brain patient has a picture of a cow flashed to her left hemisphere and that of a fork, to her right hemisphere. she will be able to how many grams of pure water must be added to 40 grams of a 10% saline solution to make a saline solution tha is 5% salt? Combine the like terms to create an equivalent expression.7+4c+2d+3=7+4c+2d+3= Given that almost all organisms obtain energy from food by the process of cellular respiration, which is the most likely explanation for what prevents Earth from running out of oxygen? A. The net effects of the reactions of photosynthesis and cellular respiration are the opposite of one another, therefore the products of one are the reactants of the other, creating a cycle. B. The energy flowand thus oxygen flowfor cellular respiration and photosynthesis take place in the same direction, and therefore build upon one another. C. Cellular respiration is a process that releases energy and oxygen, while photosynthesis withdraws energy and uses oxygen, therefore keeping each process in balance. D. Oxygen readily accepts electrons, so cellular respiration uses a negligible amount of oxygen. the sale at a loss of machinery that was used in a trade or business and held for more than one-year results in which of the following types of loss? What is 5 7/12 + 1 4/5Show your work What is meant by a man of letters? Find the numbers b such that the average value of f(x) = 8 + 10x 9x2 on the interval [0, b] is equal to 9. Can you have more than oneculture? A local restaurant wants to expand its patio dining area. It has walls on two sides so it can only expand out to the North and East (2 directions). The current patio is 30 feet by 30 feet. They need to expand to cover 2500 square feet. What is the inverse of the function f(x) = 2x 12?h(x) = 48x - 4h(x) = 48x + 4h(x) = 4x - 48h(x) = 4x + 48 c+2c+12=75 find the value of c What were the summary, causes and effects of the Byzantine empire? 400 mL of gas is contained at 300 mmHg and 0 C. What will its volume be at 140 mmHg and 100 C? 0C 100C