In this challenge, you'll make a flash card to help remember fun facts. You'll display the answer when the mouse is pressed, and the question when it isn't. Hint: Use the mouseIsPressed variable to check if the mouse button is pressed.

Answers

Answer 1

Answer:

ok so just tell me what r u gonna do.? I mean just want to press mouse?


Related Questions

Which office setup would be difficult to host on a LAN?
hardware.

RAM.

storage.

software.

Answers

The office setup would be difficult to host on a LAN  is option C: storage.

What is the office LAN setup like?

A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.

Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.

Learn more about LAN   from

https://brainly.com/question/8118353
#SPJ1


Pls help! 7th grade pythin fyi

Pls help! 7th grade pythin fyi

Answers

Answer:

There should be a colon at the end of the if statement, ie:

if x > 100:  print("...")

Define the term editing​

Answers

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

define types of hacker ?plz help me with this question​

Answers

Answer:

the types of hacker attacks and techniques. White Hat Hackers. Black Hat Hackers. Gray Hat Hackers. Script Kiddies.

Explanation:

i don't know if this can help you

Answer:

White Hat Hackers

Black Hat Hackers

Gray Hat Hackers

Script Kiddies

Green Hat Hackers

Blue Hat Hackers

Red Hat Hackers

State/Nation Sponsored Hackers

Hacktivist

Malicious insider or Whistleblower

Pre-Test
Active
1
2
3
4
5
6
17
Which features should a study schedule include? Check all that apply.
classes
due dates
duration
old test scores
instructors' names
time of day

Answers

Answer:

classes

due dates

duration

Explanation:

because

classes and due dates, duration are required.

What is Schedule?

A schedule, often known as a timetable, is a fundamental time management tool that consists of a list of potential times for activities, events, or actions, or of a sequence of events that will occur in the order that they are meant to occur.

Scheduling is the process of choosing how to prioritize work and allocate resources among the many options, and the person in charge of producing a schedule is sometimes referred to as a scheduler. Making and adhering to timetables is a long-standing human tradition.

In some cases, making plans entails developing practical skills. When people need to know what time they must be somewhere, schedules are essential or at least helpful.

Therefore, classes and due dates, duration are required.

To learn more about schedule, refer to the link:

https://brainly.com/question/30012511

#SPJ6

What does this scatter plot indicate about the relationship between precipitation and cucumber yield

Answers

Generally speaking, a scatter plot is used to observe and show relationships between two numeric variables.

The aim is to see if there is a correlation or pattern between the two variables, which could be precipitation and cucumber yield in your case.

If we had a scatter plot, we would look for trends in the plotted points. If the dots trend upward as you move from left to right, this typically indicates a positive correlation, suggesting that as precipitation increases, so does cucumber yield. Conversely, if the dots trend downward, there's a negative correlation, suggesting that as precipitation increases, cucumber yield decreases. If the dots form a random pattern, there's likely no correlation between the two variables.

Learn more about scatter plots here:

https://brainly.com/question/29231735

#SPJ11

a log shows that a powershell iex process attempted to create a thread in the target image c:\windows\system32\lsass.exe. what is the aim of this attack?

Answers

The goal of this attack is to gain unauthorized access to the system or cause damage to the target image. The aim of this attack is to exploit a vulnerability in the Windows Local Security Authority Subsystem (LSASS) using a PowerShell IEX process.

PowerShell IEX is an abbreviation for "PowerShell Invoke-Expression." It allows a PowerShell script to run a string as a PowerShell command. It's similar to the eval() function in other languages like JavaScript.What is an attack on a target image?Malware is a type of malicious code that is designed to damage, disrupt, or gain unauthorized access to a computer system. An attacker may use a PowerShell IEX process to execute malicious code on a target system. The target image refers to the file or program that the attacker is attempting to exploit in this case.In this scenario, the log shows that a PowerShell IEX process attempted to create a thread in the target image c:\windows\system32\lsass.exe. This indicates that the attacker is attempting to exploit a vulnerability in the Windows Local Security Authority Subsystem (LSASS) using a PowerShell IEX process.

Learn more about PowerShell here:

https://brainly.com/question/30619095

#SPJ11

______Is the visual computer display of the essential information related to achieving a marketing objective. (one word)

Answers

Main Answer:

A marketing dashboard is the visual computer display of the essential information related to achieving a marketing objective

Sub heading:

what is marketing dashboard?

Explanation:

1.A marketing dashboard is the visual computer display of the essential information related to achieving a marketing objective.

2.marketing means sharemarket

Reference link:

https://brainly.com

Hashtag:

#SPJ4

scenario for keypad, firewall, anti-spyware

Answers

An example of a scenario for keypad, firewall, anti-spyware is given below

What is the scenario

At a financial company, security measures protect against access and data breaches. The company uses a keypad for server room entrance, requiring authorized employees to enter a unique code.

Keypad adds protection from physical server access. Robust network with firewall in place. The firewall blocks harmful connections and filters malicious data packets between the internal network and internet. Keypad and firewall provide security to server room.

Anti-spyware software is crucial in identifying and eliminating malicious programs that could compromise sensitive information and contribute to a secure environment for handling financial data.

Learn more about firewall from

https://brainly.com/question/13693641

#SPJ1

See full text below

Create an hypothetical scenario for keypad, firewall, anti-spyware of a computer system

A good scenario will be "Securing a Computer System with Keypad, Firewall, and Anti-Spyware"

Explaining the Scenarios

In a corporate environment, let's consider a scenario where a company aims to enhance the security of its computer system to protect sensitive information and prevent unauthorized access. To achieve this, they employ a combination of a keypad for physical access control, a firewall for network security, and anti-spyware software for protection against malicious software.

1. Keypad:

The company installs a keypad system at the entrance of their server room. Only authorized personnel with the correct access code or keycard can enter the room physically. This physical security measure ensures that only authorized individuals can gain physical access to the servers, reducing the risk of theft, tampering, or unauthorized modifications.

2. Firewall:

To protect the computer system from external threats, the company implements a robust firewall solution. The firewall acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic. It analyzes data packets, filters out potentially malicious traffic, and enforces security policies to prevent unauthorized access, data breaches, and intrusion attempts.

For instance, the firewall can be configured to block unauthorized incoming connections, such as attempts to access sensitive company data from external sources. It can also restrict outgoing traffic to prevent data exfiltration or communication with suspicious or blacklisted IP addresses.

3. Anti-Spyware:

To safeguard against malicious software, including spyware, the company deploys anti-spyware software on all their computers and servers. This software scans and monitors the system for any signs of spyware or other malware. It can detect and remove existing infections and prevent new infections by regularly updating its database of known threats.

By implementing a combination of physical access control through a keypad, network security with a firewall, and protection against spyware with anti-spyware software, the company significantly strengthens the security of their computer system. This multi-layered approach helps mitigate risks, safeguard sensitive data, and defend against potential security threats.

Learn more about spyware here:

https://brainly.com/question/3171526

#SPJ1

what is the big o of the following code i=0 loop (i

Answers

The given code has a loop that starts with an initial value of i=0 and continues until i reaches n. This means that the loop runs n times, where n is the input size. Therefore, the time complexity of the code can be expressed as a function of n, which is O(n).

This is because the running time of the code grows linearly with the size of the input. As the input size increases, the number of iterations in the loop also increases linearly, leading to a linear increase in the overall running time. In summary, the big O of the given code is O(n) because its time complexity grows linearly with the size of the input. The big O notation is used to express the upper bound of the worst-case scenario for the time complexity of an algorithm. It describes the rate of growth of the algorithm's running time with respect to the size of the input.

In this case, the code has a single loop that runs n times, making the time complexity of the code proportional to the size of the input. Therefore, we can say that the time complexity of the code is O(n).  It's important to note that the big O notation only provides an upper bound on the time complexity of an algorithm. It does not describe the exact running time of the algorithm for a particular input size. The actual running time of the algorithm may be lower than the upper bound provided by the big O notation.

To know more about initial value visit :

https://brainly.com/question/17613893

#SPJ11

I need help please.
.

I need help please..

Answers

Answer:

yes

Explanation:

157 > 145

Answer:yes

Explanation:12

a stable sorting can only sort an array of unique values. (True or False)

Answers

A stable sorting can only sort an array of unique values.

False.

A stable sorting algorithm is a sorting algorithm that maintains the relative order of equal elements in the sorted array. This means that if two elements have the same value, their relative order in the original array will be preserved in the sorted array. However, the presence of duplicate values does not affect the stability of the sorting algorithm. The stability of the algorithm depends on the algorithm itself, not on the values in the array. So, a stable sorting algorithm can sort an array with duplicate values and still maintain the relative order of equal elements.In fact, many stable sorting algorithms, such as merge sort and insertion sort, are well-suited for sorting arrays with duplicate values because they can handle them without losing stability.Therefore, it is not necessary for the array to contain only unique values in order to use a stable sorting algorithm. The presence of duplicates does not affect the stability of the algorithm, and the algorithm will still be able to sort the array while maintaining the relative order of equal elements.

For such more questions on stable sorting algorithm

https://brainly.com/question/31480169

#SPJ11

Which data structure is most useful for looking up people by their social security number?

Answers

Hash tables are the most useful data structure when looking up people in databases by their social security number.

Hash table is a data structure where data is stored in an associative way. In a hash table, data is kept in an array format, in which each data value is associated with its own unique index value. If the index of the desired data is known, it becomes very fast to access the data from the hash table. Therefore, the hash table is known to be the quicker method for searching a bulk of data such as searching social security number of people in the database.

Thus, in the context of this question, a hash table is the most suitable data structure to use for looking up persons by their social security number.  The social security number of the persons in the hash table represents a unique index value, with associated records of each individual person.

Whenever, the specific person is to be searched by  social security number, the hash table simply maps the entered social security number with that of index value in the hash table. Upon getting a matched value, the hash table returns the record of the person to be looked up.  

You can learn more about hash table at

https://brainly.com/question/4478090

#SPJ4

Basic python coding
What is the output of this program? Assume the user enters 2, 5, and 10.
Thanks in advance!
:L

Basic python codingWhat is the output of this program? Assume the user enters 2, 5, and 10. Thanks in

Answers

Answer:

17.0

Explanation:

after first loop numA = 0.0 + 2 = 2.0

after second loop numA = 2.0 + 5 = 7.0

after third loop numA = 7 + 10 = 17.0

Which statement is not true for a good algorithm?
A. It is clear and cannot be interpreted in more than one way by
different people or machines.
B. It successfully solves the desired problem or performs the desired
task.
C. It can perform a task or solve a problem even if various inputs are
involved.
O D. It uses more resources and more time than it needs to.

Answers

Answer:

D. It uses more resources and more time than it needs to.

Explanation:

A, B, and C each show the workload of an algorithm in positive light. However, D shows it using more resources and time than it needs to; something a "good" algorithm would not do.

Select the correct text in the passage.
Select the sentence that is not the correct use of technology in parenting.
Technology has helped parents to access a vast information resource due to the presence of the internet. They can show a range of education
material like nursery rhymes, stories, scientific concepts, and so on conveniently on their smartphones. Teachers can coordinate with the
parents about the child's progress due to smartphones and various applications on it. Some parents have replaced the customary practice of
reading a bedtime story to children with a television show of the child's choice.
Reset
Next

Answers

Answer:

some parents have replaced the customary practice of reading a bedtime story to childern with a television show of the child's choice

Explanation:

write a method that takes rows and columns as a parameter, and returns a 2d array of the designated size, filled with empty strings.

Answers

According to the given statement, Here is a Python implementation: (Scroll down to view)

What is python ?

Python is a well-known computer coding language used to create applications and websites, automate processes, and analyze data. Since Python is a speech known, it may be used to develop a wide range of programs and isn't tailored for any particular issues.

def create_2d_array(rows, columns):

if I is in the range of rows, return [[" " for J in the range of columns]]

The arguments rows and columns, which represent the number of rows and columns in the 2D array, respectively, are sent to the method create 2d array. The function returns a 2D array with the specified number of rows and columns and no data in any of the columns.

Example usage:

>>> create_2d_array(3, 4)

[['', '', '', ''], ['', '', '', ''], ['', '', '', '']]

To know more about Python visit :

https://brainly.com/question/14378173

#SPJ4

Classify the following skills: communication, creativity, and independence.

Hard skills
Interpersonal skills
People skills
Soft skills

Answers

Answer:

Communication, creativity, and independence are people skill

Explanation:

Soft skills depict the quality of a person and classify his/her  personality trait or habit.

Communication - Interpersonal skill

Interpersonal skill allows one to interact and communicate with others effortlessly.

Both soft skill and interpersonal skill comes under the umbrella term i.e people skill.

Hence, communication, creativity, and independence are people skill

Answer:

It's not people skills I got it wrong on my test

Explanation:

CHOOSE THE CORRECT CONTINUOUS TENSES( PRESENT CONTINUOUS,PAST CONTINUOUS AND FUTURE CONTINUOUS) : 1. I saw a snake while I ____________________ in the forest. am walking was walking will be walking will walk

Answers

Answer:

Explanation:

joe biden>

Assignment 4: Evens and Odds (FIX PLEASE)

Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd. Continue doing this as many times as the user indicated. Once the loop ends, output how many even numbers were entered and how many odd numbers were entered.

Hint: For a number to be even, when the number is divided by 2, there should be no remainder - so you will want to use the modulus (%) operator.

Hint: You will need two count variables to keep track of odd and even numbers.

Sample Run 1
How many numbers do you need to check? 5
Enter number: 20
20 is an even number.
Enter number: 33
33 is an odd number.
Enter number: 4
4 is an even number.
Enter number: 77
77 is an odd number.
Enter number: 8
8 is an even number.
You entered 3 even number(s).
You entered 2 odd number(s).
Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Benchmarks
Prompt the user to answer the question, “How many numbers do you need to check? “
Create and initialize two count variables - one for odd and one for even.
Based on the previous input, create a for loop that will run that exact number of times.
Prompt the user to “Enter number: “
If that number is even, output “[number] is an even number.”
Update the even count variable.
Or else if the number is odd, output “[number] is an odd number.”
Update the odd count variable.
Output “You entered [number] even number(s).”
Output “You entered [number] odd number(s).”

Assignment 4: Evens and Odds (FIX PLEASE)Write a program that will ask a user for how many numbers they

Answers

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

for x in range(n):

   num = int(input("Enter number: "))

   if num % 2 == 0:

       even += 1

       print(str(num)+" is an even number")

   else:

       odd += 1

       print(str(num)+" is an odd number")

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

This uses a for loop. Sorry about the previous answer. Also, you may want to check the text inside the input functions. For instance, int(input("Enter number: ")) might have different capitalization similar to int(input("Enter Number: "))

In this exercise we have to write a python code requested in the statement, like this:

find the code in the attached image

We can write the code in a simple way like this below:

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

for x in range(n):

  num = int(input("Enter number: "))

  if num % 2 == 0:

      even += 1

      print(str(num)+" is an even number")

  else:

      odd += 1

      print(str(num)+" is an odd number")

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

See more about python at brainly.com/question/26104476

Assignment 4: Evens and Odds (FIX PLEASE)Write a program that will ask a user for how many numbers they

How do astronomers use spectrographs to identify the composition and movement of a star.

Answers

Explanation:

Astronomers can split light from space into a spectrum an examine its structural line to infer

what compounds are emitted or absorbed

HELP MEEE PLEASE!!!
Match the description with the information system it represents.

1. The use of a computer program to determine the diagnosis of a patient

2. The use of a computer program to forecast an earthquake

3. The use of a computer program to create a presentation

Decision support systems
Knowledge-based system
Office automation system

Answers

Answer:

b goes with 1 c goes with 3 and a goes with 2

Explanation:

a hard disk drive provides multiple for data storage that are sealed inside the drive case to prevent airborne contaminants from interfering with the read-write heads

Answers

Overall, the sealed enclosure in a hard disk drive protects the internal components from airborne contaminants, ensuring the integrity and longevity of the stored data.

A hard disk drive (HDD) is a storage device that uses multiple platters, which are sealed inside the drive case.

This design helps prevent airborne contaminants from interfering with the read-write heads.

Here's a step-by-step explanation of how this works:

1. HDD structure: A hard disk drive consists of several platters made of a magnetic material, typically coated with a thin layer of magnetic material.

The platters are stacked on a spindle and rotate at high speeds.

2. Read-write heads: Positioned above and below each platter, the read-write heads are responsible for reading and writing data onto the platters.

They are mounted on an actuator arm that moves them across the platter surface.

3. Sealed enclosure: The hard drive case is designed to be airtight, sealing the platters and read-write heads inside. This prevents dust, moisture, and other contaminants from entering the drive and interfering with the delicate mechanisms.

4. Contaminant prevention: By keeping the platters and read-write heads sealed, the hard drive minimizes the risk of airborne contaminants settling on the platter surface or coming into contact with the read-write heads.

This helps maintain the reliability and performance of the drive.

To know more about airborne contaminants, visit:

https://brainly.com/question/32018381

#SPJ11

18) write a query that produces the first name, last name, address, city, postal code of every customer who made a payment between $10 and $12. each customer should be listed only once.

Answers

Here is the SQL query that produces the first name, last name, address, city, postal code of every customer who made a payment between $10 and $12.

Each customer should be listed only once.`

``SELECT c. first_name, c. last_name, a. address, a. city, a. postal_code

FROM customer c INNER JOIN address a ON c. address_id = a. address_idINNER JOIN payment p ON c. customer_id = p.customer_id

WHERE p. amount BETWEEN 10 AND 12GROUP BY c. customer_id;

```Here is the explanation for the code:

We use the SELECT statement to display the first name, last name, address, city, and postal code of every customer.

The INNER JOIN is used to join the customer table with the address table and the payment table. Then we use the WHERE clause to get only those records where the payment amount is between $10 and $12.

Finally, we use the GROUP BY clause to get unique records by customer_id.

For more such questions on SQL query , Visit:

https://brainly.com/question/25694408

#SPJ11

Exam Instructions
Question 6 of 20:
Select the best answer for the question.
6. Which of the following would most likely indicate the sequence in which milk
travels through a production plant to each stage of a cheese manufacturing
process?
OA. A single-line diagram
OB. A piping schedule
OC. Manufacturer's drawings
OD. A process schedule
Mark for review (Will be highlighted on the review pago)

Answers

A diagram which indicates the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process is: D. A process schedule

What is a process schedule?

A process schedule can be defined as a type of diagram (schematic) which is designed and developed to illustrate the various processes and stages (steps) that are associated with manufacturing of a particular product.

In this context, a process schedule is a diagram which would most likely indicate the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process.

Read more on cheese manufacturing here: https://brainly.com/question/21148228

#SPJ1

Which of the following is an example of a prediction:

Answers

Answer:

You need to include the examples so we can answer :)

Explanation:

when a retrieval operation is performed from a hard disk, the disk directory is first referenced before the file can be copied into ram. (T/F)

Answers

Statement "When a retrieval operation is performed from a hard disk, the disk directory is first referenced before the file can be copied into RAM." This is true because the disk directory contains information about where the file is stored on the disk.

Without this information, the system would not be able to locate the file on the disk and retrieve it. Therefore, the disk directory must be referenced first in order to perform the retrieval operation.The disk directory is used to locate the required file, and then the file is retrieved and stored in RAM for use. RAM is also known as read write memory, main memory, or primary memory. RAM performs two types of operations: read and write. In general, faster RAM equals faster processing speed. You can increase the speed at which memory transfers information to other components by using faster RAM.

Learn more about RAM: https://brainly.com/question/28483224

#SPJ11

20.5.24 (Diamond-Printing Program) Write an application that prints the fol- lowing diamond shape. You may use output statements that print a single as- terisk (* ), a single space or a single new-line character. Maximize your use of iteration (with nested for statements), and minimize the number of output statements. *** ***** ******* ********* ******* ***** *** *

Answers

Given below is a Java program that prints the diamond shape using nested for loops -

public class   DiamondPrintingProgram {

   public staticvoid main(String[] args) {

       int rows = 5; // Number of rows in the diamond

       // Upper half of the diamond

       for (int i =   1; i <= rows; i++) {

           for (int j =1; j <= rows - i; j++) {

               System.out.print(" ");

           }

           for (int k = 1; k <= 2 * i - 1; k++) {

               System.out.print("*");

           }

           System.out.println();

       }

       // Lower half of the diamond

       for (int i =rows   - 1; i >= 1; i--) {

           for (int j = 1; j <= rows - i; j++) {

               System.out.print(" ");

           }

           for (int k = 1; k <= 2 * i - 1; k++) {

               System.out.print("*");

           }

           System.out.println();

       }

   }

}

How  does it work ?

The program   uses nested for loops to control the number of spaces and asterisks in each row,resulting in the diamond pattern.

When you run this program, it will output the followingdiamond shape -

   *

  ***

 *****

*******

*********

*******

 *****

  ***

   *

Learn more about application at:

https://brainly.com/question/24264599

#SPJ4

PLEASE HELP! WILL GIVE BRAINLIEST

PLEASE HELP! WILL GIVE BRAINLIEST

Answers

Answer:

Explanation:find out

what will be the output for;
for i in range(1,6):
if i==3:
print('hello')
break
else:
print(i)
print('done')

Answers

The output for; for i in range(1,6): if i==3: print('hello') break else: print(i) print('done') the output for the given Python program is 001020340.

What is range () in Python?

The python range() function creates a collection of numbers on the fly, like 0, 1, 2, 3, 4. This is very useful, since the numbers can be used to index into collections such as string. The range() function can be called in a few different way.

The given program is as:i =0while i < 5print(i)i +=1if i==3 :breakelse:print(0)It will give the following as result 001020340Hence, the answer is 001020340.

Read more bout the python :

https://brainly.com/question/26497128

#SPJ1

Other Questions
7.28How is kineticmolecularmodel of matter helpful indifferentiating various statesof matter?V 4) Nicole spent half of her weekly allowanceon candy. To earn more money herparents let her wash the car for $4. Whatis her weekly allowance if she ended with$8? (A): Find the currents I1, I2, I3, I4, and the voltage v, in the circuit of figure (2.1). [Hint: Use Nodal analysis method (Node-voltage method)]. [5 Marks] vo 11 12 13 14 20 A 15 22 20 25 4 A 50 W Figure (2.1) how do the lyrics to the song blue skies represent the feeling of the decade? Use the disk method or the shell method to find the volume of the solid generated by revolving the region bounded by the graphs of the equations about each given line. y = x y = 0 x = 3 (a) the x-axis 2187 7 (b) the y-axis 486T 5 (c) the line x = 9 Point located A is located -11 -7 on the coordinate plane is reflected over the X axis to form point B in point is reflected over the Y axis to form point C what are the coordinates of point B and c How are your memories and senses connected?1. The spinal cord transmits the memories all over the body.2. Your brain organizes memories tied to events.3. Memories connected to other senses are also activated (e.g., the taste and texture of a warm chocolate chip cookie takes you back to grandmas house).4.A familiar smell or sound may take you back to the memory of a person or event. Simplify |x+3| , if x>5 Write an expression that is equivalent to 2 (4x +9) Read the paragraph.Tortillas are delicious round flatbreads made with cornmeal or wheat flour. Although they are most often used in tacos, enchiladas, and tostadas, tortillas can __________ any dish.If the purpose of this paragraph is to persuade readers to eat tortillas, which word or phrase best fits in the blank?enhanceaccompanybe served withbe combined with You have $39,819.67 in a brokerage account, and you plan to deposit an additional $4,000 at the end of every future year until your account totals $240,000. You expect to earn 13% annually on the account. How many years will it take to reach your goal7 Round your answer to the nearest whole number. ___ years Find the measure of the indicated angle. a rectangular prism has a length of 6cm, a height of 8cm, and a width of 17cm. what is its volume, in cubic cm? According to research, an increase in which of the following nonverbal behaviors is indicative of deception?A. Genuine smilesB. Forward leansC. BlinkingD. Vocal fluency someone help answer the bottom 4 pls I'll brainlist u !! Find an equation of the line passing through the pair of points. Write the equation in the form Ax+By = C.(-6,3), (-7, - 7) air pollutants often cause irritation in the blank system what percent of students with multiple disabilities spend all of their time in separate educational settings? What are the x-intercept and the y-intercept of this function?f(x) = 4x + 12A. The x-intercept is (3,0), and the y-intercept is (0,-12).B. The x-intercept is (-3,0), and the y-intercept is (0,-12).C. The x-intercept is (3,0), and the y-intercept is (0,12).D. The x-intercept is (-3,0), and the y-intercept is (0,12). describe the relationship between the parent and daughter cells by comparing their DNA