Information needed comes from one source or method true or false?

Answers

Answer 1

Answer: This is in fact false.

Answer 2
the correct answer is false

Related Questions

Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our system will run your program several times, automatically providing different input values each time, to ensure your program works for any input values. See How to Use zyBooks for info on how our automated program grader works.

Answers

Answer:

Explanation:

The following code is written in Java and simply grabs the three inputs and saves them into three separate variables. Then it multiplies those variables together and saves the product in a variable called product. Finally, printing out the value of product to the screen.

import java.util.Scanner;

public class Main{

   public static void main(String[] args){

       Scanner in = new Scanner(System.in);

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int num3 = in.nextInt();

       int product = num1 * num2 * num3;

       System.out.println(product);

   }

}

Answer: Python

Explanation:

num1 = int(input())

num2 = int(input())

num3 = int(input())

product = num1 * num2 * num3

print(product)

Which of the following policy guidelines specifies the restrictions on user access
regarding access to read, write, execute, or delete permissions on the system?
Least privilege
Accountability
Default use
Specific duties

Answers

The policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

What is the Least Privilege Principle?

The least privilege principle can be described as a concept in information security and policy guidelines that gives a user minimum permission or levels of access that they are needed to execute a tasks.

Therefore, the policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

Learn more about least privilege on:

https://brainly.com/question/4365850

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

How can a user delete a drawing object?

° Left-clicking on the shape and pressing the Delete key

° Right-clicking on a slide and selecting Delete Shapes

° Dragging a box around the shape, right-clicking on the shape, and selecting Delete

° Double-clicking on a shape, unlocking it for editing, and pressing the Delete key​

Answers

Answer:

Dragging a box around the shape, right-clicking on the shape, and selecting Delete

100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the following:

An outline with the following items:
information about plants and animals that have become extinct or endangered because of a loss of habitat
information about habitats that have changed radically over the last few decades
ways students can lead a "greener" lifestyle
Recycle. There are many things you use each day that can be recycled. Some of these include paper, plastics, glass, and aluminum cans.
Conserve water. Take shorter showers. Turn off the water when brushing your teeth. This will reduce the amount of water that you use.
Don't pollute. Hold on to that helium balloon. Balloons that are released into the air can kill wildlife. Animals swallow the balloons, causing them to suffocate or starve.
Use energy wisely. Replace your incandescent light bulbs with fluorescent bulbs. They are more efficient than regular light bulbs. Turn off the lights, computers, and music when you're not using them.
Reduce consumption. Use both sides of the paper when taking notes in class. If your printer has a feature that lets you print on both sides of a sheet of paper, use it.
Presentation slides with text, graphics, and special effects such as animation and transitions
Support materials
Presentation delivery

Answers

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.

Answer:

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.Explanation:

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It should have an init method that takes four values and uses them to initialize the data members. It should have get methods named get_name, get_ID_number, get_salary, and get_email_address. Write a separate function (not part of the Employee class) named make_employee_dict that takes as parameters a list of names, a list of ID numbers, a list of salaries and a list of email addresses (which are all the same length). The function should take the first value of each list and use them to create an Employee object. It should do the same with the second value of each list, etc. to the end of the lists. As it creates these objects, it should add them to a dictionary, where the key is the ID number and the value for that key is the whole Employee object. The function should return the resulting dictionary. For example, it could be used l

Answers

Solution :

class Employee:

   #Define the

   #constructor.

   def __\($\text{init}$\)__(\($\text{self, nam}e$\),  ID_number, \($\text{salary}$\), email):

       #Set the values of

       #the data members of the class.

       \($\text{self.nam}e$\) = name

       \($\text{self.ID}$\)_number = ID_number

       \($\text{self.salary}$\) = salary

       self.email_address = email

#Define the function

#make_employee_dict().

def make_employee_dict(list_names, list_ID, list_salary, list_email):

   #Define the dictionary

   #to store the results.

   employee_dict = {}

   #Store the length

   #of the list.

   list_len = len(list_ID)

   #Run the loop to

   #traverse the list.

   for i in range(list_len):

       #Access the lists to

       #get the required details.

       name = list_names[i]

       id_num = list_ID[i]

       salary = list_salary[i]

       email = list_email[i]

       #Define the employee

       #object and store

       #it in the dictionary.

       employee_dict[id_num] = Employee(name, id_num, salary, email)

   #Return the

   #resultant dictionary.

   return employee_dict

List three types of information that may be downloaded form a website.

Answers

Answer:is it a safe website, is it a well known website and is it a updated website

Explanation:

The three types of information that may be downloaded from a website are A picture or some content or some videos.

What is a Website?

A website is a collection of web pages and related material that is published on at least one web server and given a shared domain name. The World Wide Web is the aggregate name for all publicly accessible websites.

On the World Wide Web, a web page (also known as a website) is a hypertext document. A web server sends web pages to the user, who then sees them on a web browser. A website is made up of several web pages connected by a common domain name. The term "web page" refers to a collection of paper pages that have been bound into a book.

A website is a collection of several HTML-written web pages that are stored digitally (HyperText Markup Language). Your website must be saved or hosted on a computer that is always linked to the Internet if you want it to be accessible to everyone in the world. Web servers are this kind of machine.

The World Wide Web is made up of all websites. The website may be of numerous forms, such as an e-commerce website, social networking website, or blog website, and each plays a unique role. However, each website contains a number of connected web pages.

To read more about the Website, refer to - https://brainly.com/question/14408750

#SPJ2

A(n)
is a fast compute with lots of storage. pls help

Answers

Answer:

That last answer was amazing, but the answer you're looking for is server

Explanation:

On a network, a server is a computer that distributes files to numerous clients. The opposite of storage is a device where you keep data that you can access when you require it.

What is the role server in fast compute with storage?

A cloud server is a pooled, centrally placed server resource that is hosted and made available through an Internet-based network—typically the Internet—for use by a variety of users.

The same ways that a traditional physical server would be able to provide processing power, storage, and applications are also possible with cloud servers.

One system may include both servers and storage. The purpose of storage is to provide long-term access to files. Distributing work, sharing resources, and exchanging data are the duties of a server.

Therefore, a server is a fast compute with lots of storage.

Learn more about server here:

https://brainly.com/question/28560376

#SPJ2

Where do I look for a deep learning mentor who can assist me in my career?​

Answers

The answer:

You have to pay for it man!

Explanation:

You can find a lot of services from Fiverr and Upwork etc. But that would need to pay a lot for it.

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!

Answers

The question is about identifying the various ways of manipulating numbers. One of such is using following pair:

Input Format: Decimal ASCIITransformed Output String.

Using the above process, the result given is 50.

What is ASCII?

ASCII is the acronym for American Standard Code for Information Interchange.

Another way of approaching the above problem is by bucketizing.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem solving.

Similarly, bucketizing is a data organizing technique that decomposes the space from which geographic data is gathered into areas.

Some criteria for selecting area borders include the amount of things contained inside them or their physical arrangement (e.g. minimizing overlap or coverage).

A bucket data structure utilizes key values as bucket indices and stores things with the same key value in the appropriate bucket.

As a result, the job necessary to address the problem is completed.

Learn more bout Decimal ASCII:
https://brainly.com/question/26307436
#SPJ1

Write code that outputs variable numTickets. End with a new line (Java) output 2 and 5

Answers

Answer:

public class Main {

public static void main(String[] args) {

int numTickets = 2;

System.out.println(numTickets);

numTickets = 5;

System.out.println(numTickets);

}

}

what does this mean on a tamagotchi lol (this is the hello kitty one)

what does this mean on a tamagotchi lol (this is the hello kitty one)

Answers

I not sure but I think it’s an apple.

I don't have that tamagotchi

But I do have 2 tamagotchi's

I think it's a cherry on your tamagotchi

Hoped this helped!

Have a wonderful day-

The binary number system is suitable for computer system. Give reason.

Answers

Answer: It enables devices to store, access, and manipulate all types of information directed to and from the CPU or memory.

THIS DOES NOT BELONG TO ME!

Explanation:

Which of the following is not a term used as a synonym for module?
O a. procedure
O b. object
O c. subroutine
O d. method

Answers

C is correct I hope you get A

which of the following is not a feature of the most popular web browsers? group of answer choices A. pinned tabs B. session restore C.tacked browsing D. thumbnail preview

Answers

Tacked browsing is not  a feature of the most popular web browsers. Therefore, the correct option is C.

What are web browsers?

Web browsers are the applications that are used to access various websites. It is usually a software that is used to display, explore, and retrieve the information that is available on the World Wide Web (WWW).

There are many features in the web browsers such as pinned tabs, session restore, thumbnail preview, bookmarks, home button, etc. but tacked browsing is not the feature of a web browser. Therefore, the correct option is C.

Learn more about web browsers, here:

https://brainly.com/question/10002469

#SPJ1

You have decided that the complexity of the corporate network facility and satellite offices warrants the hiring of a dedicated physical security and facilities protection manager. You are preparing to write the job requisition to get this critical function addressed and have solicited some ideas from the PCS working group members regarding physical and environmental security risks. Discuss the operational security functions that the physical security and facilities protection manager would be responsible for. Discuss how these functions would inform the development and implementation of system related incident response plans. Further discuss how these incident response plans fit into business continuity planning. Include at least one research reference and associated in-text citation using APA standards. In yourreplies to your peers further discuss how the concepts improve the security posture of PCS.

Answers

Answer:

All organizational security functions are as follows:  

i) Classify any vital data  

ii) Analyze of the hazard  

iii) Analyze vulnerability  

iv) Assess the risk  

v) Take the appropriate risk prevention measures.

Explanation:

These methods described the incident that will fit into this business model was its ongoing support and control of its system that involves the improvements and fix bugs.  For above-mentioned mechanisms aid in evaluating potential events/attacks and help reduce the risk involved with these, as well as promote network security by reducing the likelihood of any harm.  In this case, appropriate monitoring and monitoring should be a must.

write a program using one-dimensional array that get the smallest input value from the given array. Array size is 10.​

Answers

Here is an example of a program that uses a one-dimensional array to find the smallest input value from an array of size 10 in Python:

def find_smallest_value(arr):

   smallest = arr[0] #initialize the first element of array as the smallest

   for i in range(1, len(arr)): # start the loop from 1 as we already have the first element as the smallest

       if arr[i] < smallest:

           smallest = arr[i]

   return smallest

arr = [5, 2, 8, 9, 1, 3, 4, 6, 7, 10]

print("The smallest value in the array is:", find_smallest_value(arr))

This program defines a function find_smallest_value() that takes an array as an input. Inside the function, it initializes the first element of the array as the smallest. Then it uses a for loop to iterate through the array, starting from the second element. For each element, it checks if the current element is smaller than the current smallest value. If it is, it updates the smallest value. After the loop is finished, it returns the smallest value. In the last line, we call the function and pass the array and print the result.

You can change the elements of the array and test it again to see the result.

Need help with this what am I doing wrong.

Need help with this what am I doing wrong.

Answers

Answer:

You program was good until line 8 where it suddenly appear you let your young sibling write the code for you, why did you put a comma in there? and wth is "ind"?

Further more in line 9, the +eggs+ don't go inside quotation marks, because it's a variable, not a literal string value. And again with that silly "ind" just to confuse you with the "int" type of variable.

You can only do this: int a, b, c; (and that's not recommended)
You cannot do int a = 2, b = 3, c = 4;
Not only the languge doesn't allow but that is extremelly dirty way of writing. Write line by line, don't rush and try to jam everything together.

int a = 2;

int b = 3;

int c = 4;

You have plenty of space, use it.

Explanation:

You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.

Answers

E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.

What happens with  e-commerce

Contrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.

While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.

Read mroe on  e-commerce here  https://brainly.com/question/29115983

#SPJ1

How different is the shift key and the caps lock key ​

Answers

The capsule key is different from the shift key to type in capital letters you press the caps lock key and then type but when you press the shift key with the letter that letter becomes capital and the rest text remains small

Shift key = Capitalizes the single letter that you type while pressing the Shift key. Also allows other options on the number keys to be activated. For example: 7 also equals &

Caps lock key = Capitalizes all of the letters you type after the caps lock key is activated. Unlike the Shift key, the caps lock key does not allow the other options on the number keys to be used.

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

Explain the factors affecting computer performance

Answers

Answer:

They include: the speed of the CPU, the space on the hard disk, the size of the RAM, the type of the graphics card, the speed of the hard disk,, if the computer is multitasking, the defragmenting files

52 is same as 5x5 or 25

Answers

Answer:

25

Explanation:

Answer:

i would say none of them

bc 5 time 5 is 25 so they both dont equal to 52

This program is half of your final exam!! make sure it is syntax free before submission. Take time to test the program to ensure your logic is correct. Write a program that can be used to calculate the federal tax. The tax is calculated as follows: For single people, the standard exemption is $4,000; for married people, the standard exemption is $7,000. A person can also put up to 6% of his or her gross income in a pension plan. The tax rates are as follows: If the taxable income is: Between $0 and $15,000, the tax rate is 15%. Between $15,001 and $40,000, the tax is $2,250 plus 25% of the taxable income over $15,000. Over $40,000, the tax is $8,460 plus 35% of the taxable income over $40,000. Prompt the user to enter the following information: Marital status If the marital status is “married,” ask for the number of children under the age of 14 Gross salary (If the marital status is “married” and both spouses have income, enter the combined salary.) Percentage of gross income contributed to a pension fund Your program must consist of at least the following functions: Function getData: This function asks the user to enter the relevant data. Function taxAmount: This function computes and returns the tax owed. To calculate the taxable income, subtract the sum of the standard exemption, the amount contributed to a pension plan, and the personal exemption, which is $1,500 per person. (Note that if a married couple has two children under the age of 14, then the personal exemption is $1,500 * 4 = $6,000)

Answers

Here's a Python program that implements the requirements:

def getData():

 marital_status = input("Enter marital status (single/married): ")

 gross_salary = float(input("Enter gross salary: "))

 pension_contribution_rate = float(input("Enter percentage of gross income contributed to a pension fund: "))

 if marital_status.lower() == "married":

   children_under_14 = int(input("Enter number of children under age 14: "))

   personal_exemption = 1500 * (2 + children_under_14)

 else:

   personal_exemption = 1500

 

 return marital_status, gross_salary, pension_contribution_rate, personal_exemption

def taxAmount(marital_status, gross_salary, pension_contribution_rate, personal_exemption):

 if marital_status.lower() == "married":

   standard_exemption = 7000

 else:

   standard_exemption = 4000

 taxable_income = gross_salary * (1 - pension_contribution_rate/100) - standard_exemption - personal_exemption

 if taxable_income <= 15000:

   tax = taxable_income * 0.15

 elif taxable_income <= 40000:

   tax = 2250 + (taxable_income - 15000) * 0.25

 else:

   tax = 8460 + (taxable_income - 40000) * 0.35

 return tax

# Main program

marital_status, gross_salary, pension_contribution_rate, personal_exemption = getData()

tax = taxAmount(marital_status, gross_salary, pension_contribution_rate, personal_exemption)

print("Tax owed: $%.2f" % tax)

The getData() function prompts the user for the relevant information and returns it as a tuple. The taxAmount() function takes in the data provided by getData() and calculates the tax owed based on the provided formula. The main program calls getData() and taxAmount() and prints the result.

Note that the program assumes that the input values are valid and does not perform any error checking. It also assumes that the user enters the percentage of gross income contributed to the pension fund as a decimal number (e.g., 6% is entered as 0.06).

Select the correct answer from each drop-down menu.
Which two components help input data in a computer and select options from the screen, respectively?
✓inputs data into computers in the form of text, numbers, and commands. However, a
commands from the screen.
A
Reset
Next
✓selects options and

Answers

Which two components help input data in a computer and select options from the screen, respectively?

✓ Keyboard inputs data into computers in the form of text, numbers, and commands. However, a

✓ Mouse selects options and commands from the screen.

A

Reset

Next

To know more about input data refer here

https://brainly.com/question/30256586#

#SPJ11

Give an example of a class and an example of an object. Describe what a class is, what an object is, and how they are related. Use your examples to illustrate the descriptions.

Answers

Answer:

Science. Science is where you learn about the worlds enviroment.

Book. A Book is a object that has words in it that you can read. It has sometimes thick pages or thin pages.

Sasha is viewing a primary component of her Inbox in Outlook. She sees that the subject is “Meeting Time,” the message is from her co-worker Trevon, and the message was received on Monday, January 10th. Sasha can also see the contents of the message. Which part of the Inbox is Sasha viewing?

the status bar
the Reading Pane
the message header
the Task List

Answers

sasha is viewing the status bar

Answer:  Its B, The reading pane

3. What is a process in software engineering

Answers

a process of dividing software development work into smaller,parallel, or sequential steps or sub-processes to improve design, product management

package Unit3_Mod2;


public class Array3DExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{1,2,3,4},
{5,6,7,8},
{9,10,11,12}
},
{
{13,14,15,16},
{17,18,19,20},
{21,22,23,24}
},
};

System.out.println ("Array A");
print (A);
int[][][] B = copy (A);
System.out.println ("Array B");
print (B);
}

// INSERT YOUR CODE HERE

static void print (int[][][] A)
{
for (int i=0; i for (int j=0; j for (int k=0; k System.out.print (" " + A[i][j][k]);
}
System.out.println ();
}
System.out.println ();
}
}

}
Add a copy method to make a copy of the 3d array model

Answers

The output of the first statement in the main method is 23.

In this question, the answer is 23 because In java (+) concatenation is used for joining two strings together. If we use statement ("i + j is " + (i + j)) like this then the output will change.but the output of the first statement in the main method is 23.because it print (i) value first that is 2.after that It will print (j) value that is 3.So, the output is 23.

package Unit3_Mod2;

public class Array3DExample3 {

public static void main (String[] argv)

{

int[][][] A = {

{

{1,2,3,4},

{5,6,7,8},

{9,10,11,12}

},

Learn more about output on:

brainly.com/question/14227929

#SPJ1

Other Questions
Berjaya Kenanga Investment Berhad has 25 million shares of 50 cents par value. With the same number of shares outstanding, last year's earnings per share was RM1.30. Last year net profit after tax was RM2 million. Due to their rapid expansion, net profit margin expected to increase by 5%. Its asset turnover ratio was 4 times. Berjaya increases its assets by 25% in this year and it expects sales to increase by 3% in this year from RM10 million in last year. The firm decides its retention rate for this year is is 45% and current market price is RM5 per share. Total amount dividend paid for last year is RM2.5 million. The firm's growth rate of dividend for the first two years is 20% and it reduced by 5% in year 3 and reduced by 10% in year 4 and thereafter. Its beta is 1.1, the expected market return of portfolio is 12%, the Treasury bill rate of return is 3%. Required: a. Assess last year and this year of its return on assets (ROA). Justify with calculation. b. Calculate both years of its EPS and the dividend per share (DPS) of the firm. Is the firm improved of its EPS and retention rate in this year? c. From (b), the changes of its EPS and DPS are benefits to the firm and its shareholders? d. Calculate the intrinsic value of the stock. Use the DPS from (b) for the DO. e. Evaluate Berjaya stock and is it worth to invest in this stock? A container of water holds 128 fluid ounces. Tyler drinks 4 fluid ounces of water every hour. How many fluid ounces are in the container after 8 hours? Write a letter to a friend in Japan telling him or her about hazard preparedness and risk reduction. (9) marks 1.Which of the following does not affect how fast a sound travels?the density and pressure of the medium in which it travelsthe stiffness of the medium in which it travelsMacBook Airthe direction that the sound waves travelthe temperature of the medium in which it travel What modern day country did Persia include? Read the passage from The Importance of Being Earnest.Cecily. [Coming over very slowly.] But I dont like German. It isnt at all a becoming language. I know perfectly well that I look quite plain after my German lesson.Miss Prism. Child, you know how anxious your guardian is that you should improve yourself in every way. He laid particular stress on your German, as he was leaving for town yesterday. Indeed, he always lays stress on your German when he is leaving for town.Cecily. Dear Uncle Jack is so very serious! Sometimes he is so serious that I think he cannot be quite well.From the passage, the reader can conclude that Cecilyplans on traveling abroad.wishes she were smarter.values looks over knowledge.wants to be more responsible. 1. Describe how transformation happened in the mice used in Griffiths experiments? WILL GIVE BRAINLIEST FIVE STARS LIKE ETC THE WHOLE SHEBANG BRAINLIEST BRAINLIEST BRAINLIEST;PLZ ANSWER AS SOON AS YOU CAN!!!!!!!!!!!The tables show the numbers of white and yellow flowers Cara and Hector used in 5 different arrangements.Cara's Flower ArrangementsWhite 3 6 9 12 15Yellow 5 10 15 20 25Hector's Flower ArrangementsWhite 4 8 12 16 20Yellow 6 10 14 18 22Part AAre the numbers of white and yellow flowers in Cara's arrangements proportional?Which equation relates the number of white flowers, w, to the number of yellow flowers, y?A. Yes; y=35wB. Yes; y=53wC. No; y=3w+5wD. No; y=5+3wPart BAre the numbers of white and yellow flowers in Hector's arrangements proportional?Write an equation to relate the number of white flowers, h, to the number of yellow flowers, e.A. Yes; e=32hB. Yes; e=23hC. No; e=h+2D. No; e=h2 problem 10-24 (modified) Construct confidence intervals of theappropriate confidence level for the following sample proportion(P) results:(a)(b)n275700P0.820.1995% Lower Confidence Bound95% Upper Confidence Bound99% Lower Confidence Bound99% Upper Confidence Bound 13. "In framing a government which is to be administered by men over men, the great difficulty lies in this, you must first enable the government to control the governed; and in the next place, oblige it to control itself. " This passage from James Madison refers to the need for when the decision accuracy of a selection battery is examined, the number of applicants who were not hired but who would have been successful performers can be labeled as: Brenna writes a product of six negative factors. She uses the following steps to determine that the product of the six numbers will be positive. Step 3 is missing.Group the factors into pairs.The numbers in each pair have the same sign._____________________________________The product of three positive numbers is positive.Therefore, the product of the original six factors is positive.What is step 3? A. The product of two numbers with the same sign is positive. B. The product of two numbers with different signs is negative. C. The factors in a product can be grouped in any way without changing the value of the product. D. The factors in a product can be written in any order without changing the value of the product. define cholesterol in your own words Wai keong's monthly salary is twice the amount he save in April he save $3500 in April. In may, he saved $4200 less than the amount he spent. How much is his monthly salary? How much did he save in may? Which statement about rectangles and rhombuses is always true?ABoth figures are squares.BBoth figures are quadrilaterals.Both figures have four right angles.VuodennoDBoth figures have four congruent sides.w babeQueen Find the line tangent to f(x)=esinh(x) at (0, How to find first earthquake aftershock on seismogram. The kitchen wall is a rectangle measuring 7m by 2m.Each tile is 50cm by 50cm. How many tiles is needed? How do the wavelength and frequency of colors change when moving from red to violet through the visible light spectrum? One innovation leading for the Industrial Revolution that had a great impact on the American economy was???