Identify the common features of software applications. (choose all that apply)
a pointer
toolbars
an operating system
buttons
hardware
a mouse

Answers

Answer 1

Answer:

a pointer, toolbars and buttons

Explanation:

got it correct

Answer 2

Answer:

Pointer, toolbars, and buttons

Explanation:


Related Questions

Explain two options you have in order to abide by the move over law??? PLEASE HELP ME ASAP!! ​

Explain two options you have in order to abide by the move over law??? PLEASE HELP ME ASAP!!

Answers

Answer:

you can either move over if on an interstate into a different lane safely. if there is only one lane you must reduce your speed

A program can only create one object of each class.
True
False

Answers

False is the answer to the question

What is the purpose of the Define Custom Show dialog box?

to select the animations that will be shown
to determine the show type of a slide show
to select which presentation will be displayed
to select the specific slides that will be shown

Answers

Answer:

To select the specific slides that will be shown

Explanation:

I just did it

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

33 points!! i will report if answer is wrong.



Beatrice is a graphic designer. She wants to become a user experience developer. However, her current project keeps her too busy to attend classes.
Which type of course should she take to train to be a user experience developer?
O college degree course
self-paced online course
high school diploma
freelancing project

33 points!! i will report if answer is wrong.Beatrice is a graphic designer. She wants to become a user

Answers

Answer:

self paced online course

Explanation:

Self paced online course is assured because it is done by your choice.You have control to arrange your class timings.By which you will be able to manage time

hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?

Answers

The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.

A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).

Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.

To know more about SSTP click here:

https://brainly.com/question/4674025

#SPJ4

the delineates the chain of command, indicates departmental tasks and how they fit together, and provides order and logic for the organization. a. employee directory b. structural table c. structural chart d. organizational chart

Answers

Organizational chart is a visual representation of the chain of command, tasks, and their relationships within an organization.

Organizational chart is a visual representation of the chain of command, tasks, and their relationships within an organization. It is used by managers to understand the structure of the organization, the roles and responsibilities of each department, and who reports to whom. It also serves to quickly identify the decision-makers and decision-making processes in the organization. The chart usually contains the names of the people who hold positions in the organization and their titles, as well as the name of the organization itself. It also shows the relationships and lines of authority between departments and individuals. This helps to clarify the roles and responsibilities of each person and ensures that everyone is aware of who they should contact if they need to discuss something with someone in another department or division. The organizational chart also helps the organization to stay organized and efficient.

Learn more about Commands here-

https://brainly.com/question/30319932

#SPJ4

""" How Incumbents Survive and Thrive "" .
Three key points - What are the three key points the author
is trying to make about how technology is impacting an industry or
adding value?"

Answers

The three key points the author is trying to make about how technology is impacting an industry or adding value in the context of "How Incumbents Survive and Thrive" are:

Adaptation and Innovation: The author highlights that incumbents in an industry need to adapt to technological advancements and innovate their business models to stay competitive. By embracing new technologies and finding innovative ways to leverage them, incumbents can enhance their operations, improve customer experiences, and maintain their market position.

Strategic Partnerships and Collaborations: The author emphasizes the importance of forming strategic partnerships and collaborations with technology companies or startups. By partnering with external entities, incumbents can gain access to cutting-edge technologies, expertise, and resources that can help them drive innovation, develop new products or services, and address industry challenges effectively.

Customer-Centric Approach: The author underscores the significance of adopting a customer-centric approach in the face of technological disruptions. By understanding customer needs, preferences, and behaviors, incumbents can leverage technology to provide personalized experiences, offer tailored solutions, and build stronger relationships with their customers. This customer-centric focus allows incumbents to differentiate themselves in the market and retain customer loyalty.

Adaptation and Innovation: The author emphasizes that incumbents need to adapt to new technologies and innovate their business models. This can involve adopting emerging technologies such as artificial intelligence, blockchain, or cloud computing to enhance operational efficiency, automate processes, or develop new products/services. By continuously monitoring technological trends and embracing relevant innovations, incumbents can stay ahead of the competition.

Strategic Partnerships and Collaborations: The author suggests that incumbents should forge strategic partnerships and collaborations with technology companies or startups. These partnerships can enable access to specialized knowledge, expertise, and resources that incumbents may not possess internally. By collaborating with external entities, incumbents can leverage their partner's technological capabilities to develop innovative solutions, explore new markets, or create synergies that benefit both parties.

Customer-Centric Approach: The author stresses the importance of adopting a customer-centric approach in the age of technological disruptions. Incumbents should invest in understanding their customers' needs, preferences, and behaviors to tailor their offerings accordingly. Technology can facilitate the collection and analysis of customer data, enabling incumbents to personalize experiences, provide targeted solutions, and deliver exceptional customer service. By focusing on customer satisfaction and building strong relationships, incumbents can maintain a loyal customer base and withstand competitive pressures.

These three key points collectively highlight the significance of embracing technology, forming strategic partnerships, and prioritizing customer-centricity as essential strategies for incumbents to survive and thrive in an evolving industry landscape.

To learn more about technology: https://brainly.com/question/7788080

#SPJ11

A USB flash drive uses solid
technology to store data and programs.

Answers

Answer:

This is true.

brainly needs captcha before answering questions right?​

Answers

No, atleast I haven’t seen it

A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement elsewhere in the program.

Answers

Based on computer operation analysis, A sequence control structure changes the order in which instructions are carried out by directing the computer to execute a statement elsewhere in the program.

Generally, the sequence control structure is characterized by its line-by-line execution features.

It is a process of command by which statements are executed in a chronological order they are placed in the program.

Sequence control structure can be used for many operations, including the following:

Read or write operations, Arithmetic operations, Assignments to variables, etc.

Hence, in this case, it is concluded that the correct answer is "Sequence control structure."

Learn more about Sequence control structure here: https://brainly.com/question/24694068

What type of device is a keyboard?

Input
Memory
Output
Storage

Answers

Answer:

a keyboard is an input device

it's an input

Explanation:

There are three different types of peripherals: Input, used to interact with, or send data to the computer (mouse, keyboards, etc.) Output, which provides output to the user from the computer (monitors, printers, etc.) Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

which one of the following is not a part of media in deaf culture? group of answer choices deaf image: digital arts deaf image: photography deaf filmmaker deaf motion: cinema and film

Answers

"deaf motion: cinema and film" is not a part of media in deaf culture. The other options - "deaf image: digital arts," "deaf image: photography," and "deaf filmmaker" - are all forms of media that are important in deaf culture.

"Deaf motion: cinema and film" is not typically included in the realm of media in deaf culture because it is often inaccessible to deaf individuals due to the lack of closed captioning or sign language interpretation. In conclusion, it's important to recognize the various forms of media that are significant in deaf culture, including digital arts, photography, and filmmaking, while also acknowledging the limitations and barriers that exist in accessing certain types of media.

To know more about photography visit:

brainly.com/question/31166522

#SPJ11

The Apple iPhone was a revolutionary product when it was introduced in 2007. To what extent do you agree or disagree with this statement?

Answers

Answer:

below

Explanation:

I agree

Brian is a computer engineer who writes security software for a banking system. The

pathway in the Information Technology career cluster that Brian's job falls into is

Network Systems

Information Support and Services

Web and Digital Communications

Programming & Software Development

Answers

Answer:

Programming & Software Development

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model.

II. An incremental model.

III. A spiral model.

Also, programming refers to a software development process which typically involves writing the sets of instructions (codes) that are responsible for the proper functioning of a software.

In this scenario, Brian is a computer engineer who writes security software for a banking system.

Thus, the pathway in the Information Technology career cluster that Brian's job falls into is Programming & Software Development.

Answer: D) Programming and Software Development.

Explanation:

Hope this helps, please mark me brainliest!

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.

Answers

Bro where is the table

Which of the following candidates would most likely be hired as a graphic artist?
o a visual design artist with seven years of experience in advertising
a multimedia artist with five years of experience in multimedia design
O a recent college graduate with a degree in multimedia design
O a recent college graduate with a degree in film design

Answers

Answer:

a multimedia artist with five years of experience in multimedia design

Explanation:

Write a constructor with parameters self, num_mins and num_messages. Num_mins and num_messages should have a default value of 0.

Answers

Write a constructor with parameter

class Messaging:

txt = ""

first = 0

second = 0

 def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

 self.second = num_messages

 def print_Something(self):

       print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

https://brainly.com/question/27727622

#SPJ4

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

How to constructor with parameter?

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

List of constructor parameters When creating an object, the constructor is employed. The majority of the effort involved in creating an object is completed automatically by Java.

class Messaging:

txt = ""

first = 0

second = 0

def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

self.second = num_messages

def print_Something(self):

print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

brainly.com/question/27727622

#SPJ4

Do all of the packets in your sent messages always follow the same path? If not, describe at least two different paths packets took.

Answers

It should be noted that all the packets in the sent messages do not always follow the same path.

It should be noted that data travels in packets across the internet. There can be about 1500 bytes in each packet. The packets have wrappers that contains information about the kind of data in the packet.

When an email is sent, the message sent will then be broken up into packets which then travel across the network. It should be noted that different packets do not take the same path.

This is required in order to help manage the traffic of the network. For example, when there's a fail in connection, an alternate route can be taken for the data to travel.

In conclusion, the packets in your sent messages do not always follow the same path.

Read related link on:

https://brainly.com/question/17882992

Does anyone know what to do when your PC is having internet connection issues and shuts down when you didn't even press the power button? This is happening to me and I don't know what to do! My PC is new too.

Answers

Answer: I think you need to reset your pc

Explanation: or get it fixed at a shop

It is possible for a computing device to be exposed to malicious software (malware) or reveal sensitive information:

Answers

Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks.

What happens if your computer is infected by malware?

In short, malware can wreak havoc on a computer and its network. Hackers use it to steal passwords, delete files and render computers inoperable. A malware infection can cause many problems that affect daily operation and the long-term security of your company.

What is malicious software known as?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

To learn more about malicious software, refer

https://brainly.com/question/1308950

#SPJ4

Assume there is a food bank who receives a single commodity of food from a donor. The donations are random and can be modeled as a random variable with the following values
D = {0, 1, 2, 3} with probability of (0.1, 0.3, 0.3, 0.3), respectively.
The demand is constant and is 3 units every day.
Each morning, the food bank manager will inspect the inventory at 6:00 am, at 7:00 the beneficiaries arrive at the food bank to receive their food. The food bank manager decides on how much to allocate each day based on the available inventory. Then at noon, the donor will send the food items to the food bank and then the food bank will update its inventory stocks.
Assume that the utility of the beneficiaries is Ua-a0.1 where a is how many units of food items are received by the beneficiaries.

Answers

The food bank manager assesses the inventory at 6:00 am and allocates the available units of food to beneficiaries at 7:00 am, aiming to maximize their utility based on the formula Ua = a - 0.1, where "a" represents the received units of food.

In this scenario, the food bank receives a single commodity of food with varying quantities (0, 1, 2, 3) and corresponding probabilities (0.1, 0.3, 0.3, 0.3). The constant demand is 3 units every day. The food bank manager inspects the inventory at 6:00 am, allocates the available inventory to beneficiaries at 7:00 am, and then receives the donor's shipment at noon to update the inventory.

The utility of the beneficiaries, denoted as Ua, is given by Ua = a - 0.1, where "a" represents the number of units of food items received by the beneficiaries.

Based on this information, the food bank manager needs to assess the available inventory at 6:00 am, determine the allocation for the day, considering the constant demand of 3 units, and aim to maximize the beneficiaries' utility by allocating the appropriate quantity of food items to them.

To know more about shipment, visit:

https://brainly.com/question/29034625

#SPJ11

A ___ type presents a set of programmer-defined operations that are provided mutual exclusion within it.

Answers

A "Mutex" type presents a set of programmer-defined operations that are provided mutual exclusion within it.

In computer science, a mutex, short for mutual exclusion, is a programming concept used to prevent two or more threads from executing a critical section of code simultaneously. A mutex provides a locking mechanism that allows only one thread to access a shared resource at a time, while other threads are blocked until the mutex is released.

Mutexes are commonly used in multithreaded programming environments to protect shared resources, such as global variables, from simultaneous access and modification by multiple threads. When a thread wants to access a shared resource, it must acquire the mutex associated with that resource. If the mutex is already held by another thread, the requesting thread will be blocked until the mutex is released.

Mutexes can be implemented using various techniques, such as semaphores or monitors, depending on the programming language and environment used. In addition to mutual exclusion, mutexes can also provide synchronization and communication between threads, allowing them to coordinate their activities and avoid race conditions.

To learn more about Programming, visit

https://brainly.com/question/26497128

#SPJ11

In the planning process of the product development life cycle, what is it important to inventory?

Answers

Answer:

The product life cycle is represent to the various stages of the market such as growth, introduction, decline and maturity.

Explanation:

Product development life cycle is the process of a product in which there are different stages.  From the side of inventory there are management viewpoint is very important. It works according to season.

Every product goes under the life cycle and it is important for the primary optimization.

It is seen that at the inventory level the life cycle may be dwarfed by the pattern.

Thus at the inventory level the management is very important.

You will hear a series of activities typical of Candela's life. After listening to and repeating each one, rewrite the entire sentence using the change of subject indicated. ¡OJO! You must write the correct verb form and all of the other sentence elements that you hear

Answers

These are the complete sentences using the correct forms of the verbs conjugated in the simple present tense:

Nosotros escribimos correos electrónicos desde diferentes partes del mundo.Tus padres deben tener mucho dinero.Sus amigas asisten al gimnasio todos los días.Tú no comprendes a las otras abuelitas.Yo también vivo la vida loca.What is the simple present tense?

The Spanish simple present tense (''presente del indicativo'' in Spanish) is used to talk about habitual situations, routines, universal truths and facts.

All the verbs in the exercise are conjugated using this tense.

I was able to find the complete instructions for the exercise online. Here are the sentences that had to be changed:

Candela escribe correos electrónicos desde diferentes partes del mundo. (Nosotros)Candela debe tener mucho dinero. (Tus padres)Candela asiste al gimnasio todos los días. (Sus amigas)Candela no comprende a las otras abuelitas. (Tú)Candela vive la vida loca. (Yo también)

Check more information about the simple present tense here https://brainly.com/question/26436711

WILL GIVE BRAINLIEST!! If a flowchart has a diamond with the words “yes” and “no” to the sides of it, then it is representing a program that is a sequence.
true
false

Answers

Answer:

false

Explanation:

a flowchart with a diamond and with the words “yes” and “no” to the sides of it, then it is representing a program with branches.

it represents branch, like an if , else statement.

It is not in sequence.

Answer:

True

Explanation:

what is the worst case runtime of adding an element to a darray? assume the capacity is much larger than the number of elements.

Answers

Appending array elements has a complexity of O(1) if the allocated array is not smaller than the element being appended.

The Reason behind this is:

If the preceding condition is met, no elements must be moved to insert elements at the end of an array, which is an append operation. Inserting elements anywhere else necessitates the movement of n/2 elements on average, making insertion in that case O(n).

What is Array?

An array is a collection of numbers, pictures, or objects that are organized into rows and columns based on their type. An array is a collection of items, or data, stored in contiguous memory locations, also known as database systems, in coding and programming.

An array's purpose is to store multiple pieces of data of the same type together. An array can be used to demonstrate a mathematical property known as the commutative property of multiplication, which shows that the order of the factors or elements can be changed while the product of the elements remains constant.

To learn more about Array, visit: https://brainly.com/question/19634243

#SPJ4

System. Invalidcastexception: unable to cast object of type 'system. Directoryservices. Accountmanagement. Groupprincipal' to type 'system. Directoryservices. Accountmanagement. Userprincipal'

Answers

Answer:

The error message "System.InvalidCastException: Unable to cast object of type 'System.DirectoryServices.AccountManagement.GroupPrincipal' to type 'System.DirectoryServices.AccountManagement.UserPrincipal'" typically occurs when you try to cast an object of the wrong type.

In this case, it seems that you are trying to cast a GroupPrincipal object to a UserPrincipal object, which is not possible because they are different types. Make sure you are working with the correct type of object and use the appropriate casting method.

Alternatively, you can try using a different approach or method that is better suited to the type of object you are working with.

Explanation:

eileen is a web app developer. all the apps that eileen builds run in linux containers on the cloud. she currently uses a windows 7 operating system. why should eileen consider upgrading to windows 10?

Answers

Eileen should consider upgrading to Windows 10 for several reasons, including: Support, Compatibility, Performance and Features.

Reason to upgrading Windows 10:Support: Microsoft has ended support for Windows 7, which means it is no longer receiving security updates or technical assistance. Upgrading to Windows 10 will ensure that Eileen has access to the latest security updates and technical support.Compatibility: Windows 10 offers better compatibility with modern hardware and software. This means that Eileen will have an easier time running the latest development tools and applications.Performance: Windows 10 is designed to be faster and more efficient than Windows 7, which means that Eileen's computer will run faster and smoother with the newer operating system.Features: Windows 10 has a number of features that are not available in Windows 7, including Cortana, a virtual assistant, and the ability to run multiple virtual desktops.Cloud integration: Windows 10 has better integration with cloud services such as OneDrive, which is important for a developer like Eileen who is building web apps that run in containers on the cloud.

Overall, upgrading to Windows 10 will provide Eileen with a more secure, compatible, and feature-rich environment for her web app development work.

Learn more about windows

https://brainly.com/question/25243683

#SPJ11

Other Questions
next question get a similar question a car is driving at 85 kilometers per hour. how far, in meters, does it travel in 3 seconds? A roulette wheel has 383838 slots, of which 181818 are red, 181818 are black, and 222 are green. In each round of the game, a ball is tossed in the spinning wheel and lands in a random slot. Suppose we watch 777 rounds of this game, and let RRR represent the number of rounds where the ball lands in a red slot. which action is an example of bribery, a tactic used by companies to stop unions from forming? a company hires workers known as "scabs" to replace striking workers. company management secretly pays a worker to tell them which coworkers have discussed forming or joining a union. copy of the data frame df looks the following: a b c a 1 2 3 b 2 3 4 c 3 4 5 what is the subset produced by [:,'a':'b']? Dad says that he is a night owl.This is an example of what? After fertilization the embryo will leave the oviduct to be _________in the uterus *CulturedimplantedFertilizedPollinated the ______ was enacted to prohibit employers from refusing to hire, discharging, or discrimination in terms and conditions of employment against employees or applicants age ______ or older. Triangle JKL has coordinates J(-2, 1), K(3, 2), and L(-4, -2). Determine the coordinates of the vertices of the image after each translation: translation along the vector (-4, 3) Which of the following is a benefit of effective time management?A. Decreased reliance on a to-do listB. Faster ability to multi-task responsiblyC. Lower overall levels of stress and anxietyD. Reduced concerns over quality Neurons do not require {{c1::insulin}} to import glucose into the cell to promote realistic self-esteem, it is important to enhance children's self-efficacy and: I NEED THE ANSWER NOW! PLEASE! THE QUESTION IS DUE TOMMOROW. Find the area of the shaded polygon: The pitcher has a capacity of 6 2. cups. 1 pint 1 pint Marshall Cavendish International (Singapore) Private Limited 1 pint ipint 1 pint 3. The vase can hold S S pints of water. 4. The vase has a capacity of 5 pints. Directions: If G is the midpoint of AB, classify each triangle by its angles and sides. 1. ACFE. i need this asap lol thank you helppppppppppppppppppppppppp please help me :(Picture is below:)These are the answer choices:A. 12/13B. 12/5C. 13/5D. 5/13 Tom and Sarah share some money in the ratio 3 : 5. If Sarah has 12 more than Tom, how much money does Tom have?so Please answer this question correctly and i'll mark you as brainlilest! Thank you. Anita raced down the stairs, frightening the cat along the way. she threw on her jacket and grabbed her backpack before running out the door. anita's alarm had not gone off that morning, making her very late. when she turned the corner, anita saw the bus just as it pulled away from the curb. she waved her hands frantically, hoping that the driver would see her. luckily, he spotted her just in time to stop the bus. anita jumped on board, and the bus driver gave her an understanding smile as she took a seat. one conflict in the story is that a) anita races down the stairs. b) anita threw down her jacket c) anita grabs her backpack d) anita is late for the bus.