Julie has a difficult time seeing her computer Screen and uses adaplive technology tools to help he see better. One of the tools she uses in word is the zoom feture. To see the text in the document larger, julie should change her zoom to this presentage 50% 75% 100% 200%

Answers

Answer 1

Answer:

200%

Explanation:

While Julie has some difficulties reading short words, she can zoom the size of the texts by two hundred percent to make the process faster. A hundred percent or less would have much more difficulty reading short words.

Answer 2

Answer:

The correct answer is 200.

Explanation:

I just took the test and got it correct.

Julie Has A Difficult Time Seeing Her Computer Screen And Uses Adaplive Technology Tools To Help He See

Related Questions

Fibonacci Numbers A restaurant owner knows that customers are fickle and each year is equally likely to be "good" or "bad." Looking over his records for the past eight years he notices that he never had two bad years in a row. How likely was this to happen? Hint: Fibonacci numbers. Solve the problem for 1 year, 2 years, 3, 4, 5, etc., by hand and look for a pattern.

Answers

The likelihood of never having two bad years in a row can be determined by analyzing the pattern of Fibonacci numbers. By examining the problem for different numbers of years, we can identify a recurring pattern and calculate the probability.

For 1 year, there are two possibilities: either a good year or a bad year. In this case, the likelihood of not having two bad years in a row is 100% since there is only one year to consider.

For 2 years, we still have two possibilities. Let's denote G as a good year and B as a bad year. The valid combinations are GB and GG, where the first letter represents the first year and the second letter represents the second year. So, the likelihood of not having two bad years in a row is 100% again.

For 3 years, we have three possibilities: GGB, GGG, and GBG. Out of these, only GGB and GBG satisfy the condition of not having two bad years in a row. So, the likelihood is 66.7% or 2 out of 3 possibilities.

If we continue this pattern, we can observe that for each subsequent year, the number of valid combinations without two bad years in a row follows the Fibonacci sequence: 1, 2, 3, 5, 8, 13, and so on.

To calculate the likelihood for 8 years, we can look at the 8th Fibonacci number, which is 21. This represents the total number of possible combinations of good and bad years without two bad years in a row. However, we need to consider that the first year can be either good or bad, so we multiply the Fibonacci number by 2. Thus, the likelihood of never having two bad years in a row over 8 years is 42.9% or 9 out of 21 possibilities.

In conclusion, by examining the pattern of Fibonacci numbers, we can determine the likelihood of never having two bad years in a row for different numbers of years. In the case of 8 years, the probability is 42.9%. This demonstrates the importance of analyzing patterns and leveraging mathematical sequences to solve probability problems.

Learn more about likelihood here

https://brainly.com/question/30390037

#SPJ11

could you tell me the family link app code to unlock a phone please?

Answers

The family link app code needed to unlock a child's phone is typically generated on the parent's device.

Family Link

The family link app is an innovative feature which allows parents to lock and control their child's devices such as restricting the contents or apps on their child's phone, setting screen times, and many other parental control features.

You can learn more from a related question about parental control options here https://brainly.com/question/23509933

#SPJ1

when setting image viewer preferences, how do you ensure that your changes do not impact users with a different windows login?

Answers

To access your information, select Start > Settings > Accounts. Select a file > Browse files under "Adjust your photo" to choose an already-existing image. Instead, if your device has a camera, choose Take a picture > Open camera to snap a fresh picture.

How can user permissions be disabled?

Click the user's name by going to Dashboard > User Management > Users. To remove a permission, select the Permissions view, then click the trash can icon next to it.

What Windows command-line programme is used to manage the permissions of the NTFS file system?

Windows comes with a built-in command-line utility called iCacls that reports on NTFS access permissions.

To know more about camera visit:-

brainly.com/question/29692195

#SPJ1

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

The _________ scheduler determines which programs are admitted to the system for processing.

Answers

The admission scheduler is responsible for determining which programs are allowed to enter the system for processing.

Its main task is to manage the limited resources of the system efficiently. When a program is submitted for execution, the admission scheduler checks if there are sufficient resources available, such as memory, CPU time, and I/O devices, to accommodate the program's requirements.

The admission scheduler also considers the priority or urgency of the program in the decision-making process. It may use various algorithms to prioritize programs based on factors like their deadlines, importance, or user privileges. Programs that are deemed suitable and can be accommodated within the available resources are admitted into the system for further processing.

In summary, the admission scheduler plays a crucial role in managing program submissions and resource allocation in the system. Its primary objective is to ensure optimal utilization of resources while considering program priorities and system constraints.

Learn more about admission scheduler here: https://brainly.com/question/29833150

#SPJ11

could someone please help me with this?

could someone please help me with this?

Answers

Answer:

See explanation

Explanation:

Given

if(fish > 400) {

Required

What is the condition checking?

The above statement is an if conditional statement. Analysing the statement in bits:

if -> This represents the beginning of the conditional statement

fish -.> The variable that is being checked

> 400 -> The condition which the variable is being measured by.

So, the statement above is checking if the value of variable fish is greater than 400.

If the condition is true, the instructions associated to that if statement will be executed.

WHO WANTS TO PLAY AMONG THE CODE IS VXPSDF NORTH AMERICA

Answers

I- jaylelyekyeykehdjftgjfjf.
(Rn)

What do Cc and Bcc stand for?
O Clear Copy and Binary Clear Copy
O Counter Claim and Best Counter Claim
O Crystal Clear and Binary Crystal Clear
O Carbon Copy and Blind Carbon Copy

Answers

Carbon copy and Blind carbon copy
Its Carbon Copy and Blind Carbon Copy.
Thank You!

state how to transfee information from website to el processing document in computers and technology.​

Answers

Answer:

This is typically done either by downloading or by copying and pasting.

Explanation:

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?answer choices- terminal monitor- logging console- logging buffered- logging synchronous

Answers

These messages must be sent to the terminal lines using the terminal monitor command.

What do you meant by terminal monitor ?

On the VTYSH session, the terminal monitor is utilized to dynamically display a selection of logs. Only the live or active logs are seen when the switch's terminal monitor capability is activated. On the SSH session or console session, these logs are visible.

Description. For the current terminal session (i.e., VTY or asynchronous line), this command permits the display of debugging messages and system error messages.

The command no logging console can be used to turn off console logging; it does not apply to the console itself. How do I access Ubuntu Monitor from the terminal? Simply enter any name for System Monitor followed by the command gnome-system-monitor, apply. As soon as you click disabled, select any keyboard shortcut, such as Alt + E. Pressing Alt + E will quickly launch System Monitor.

To learn more about terminal monitor refer to:

https://brainly.com/question/29650773

#SPJ4

Which of the following is a tip for effective website design that marketers should generally follow?
O Use large, readable fonts
Avoid scrolling as much as possible
Test the site on multiple platforms
All of the above
Question 3 There are a number of metrics that internet marketers can use to measure their traffic including which is the number of times and ad banner is requested by a browser.
Impressions
Sessions
Hits
Click-throughs

Answers

Marketers should generally follow the tip of using large, readable fonts for effective website design. This tip is essential because using small fonts can make the website look unpleasant, leading to poor user experience.

Users should not struggle to read the website content as they might leave and never come back to the website. An appropriate font size is usually around 14-16 pt, which is easy to read and does not strain the user's eyes.For effective website design, marketers should use large, readable fonts. When designing a website, one should use fonts that are easy to read. It is advisable to use Sans-Serif fonts such as Arial and Helvetica. It is essential to use a font size that is easy to read and does not cause the user to strain their eyes.

Most web designers use font sizes that range from 14pt to 16pt.Testing the site on multiple platforms is a tip for effective website design that marketers should generally follow. This tip is important because it ensures that the website is accessible on all devices, including computers, tablets, and mobile phones. Also, it ensures that the website is compatible with different web browsers. Testing the website on different devices and browsers guarantees that the website's design and layout remain consistent, regardless of the platform.

To know more about marketers visit:

https://brainly.com/question/33627472

#SPJ11

Benefits of donating computer equipment include Select all that apply. A. extending the useful ife of the device B. heiping someone who can't afford a new deviceC. keeping e-waste out of landfills D. avoiding having the device waste space in your homeloflice

Answers

Benefits of donating computer equipment include:

B. helping someone who can't afford a new deviceC. keeping e-waste out of landfills D. avoiding having the device waste space in your home office

What is a Donation?

This refers to the term that is used to define the act of giving a thing out to someone else who usually needs it more as a form of helping them or emancipation.

Hence, it can be seen that when it comes to computer equipments, donations can be made and this helps the person to prevent e-waste and also help someone else.

Read more about donations here:

https://brainly.com/question/13933075

#SPJ1

what is the worst-case runtime complexity of listadt's get(int index) operation when the listadt is implemented as an oversize array, assuming that the problem size n is the number of elements stored in the list? group of answer choices

Answers

The worst-case runtime complexity of listadt's get(int index) operation is O(1), because accessing an element in an array by index is a constant time operation, independent of the size of the array.

What is the worst-case runtime complexity of listadt's get(int index) operation ?

The worst-case runtime complexity of listadt's get(int index) operation when the listadt is implemented as an oversize array would be O(1), assuming that the problem size n is the number of elements stored in the list.

This is because accessing an element in an array by index is a constant time operation, regardless of the size of the array.

Therefore, the complexity of listadt's get operation is independent of the number of elements stored in the list.

Learn more about worst-case runtime complexity

brainly.com/question/30848213

#SPJ11

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation (multiplication and addition and maybe parenthesis)?

Answers

#include <iostream>

int main(int argc, char* argv[]) {

   //One line

   std::cout << "\t\t*\t\t\n\t\t\b* *\t\t\b\n\t\t\b\b*   *\t\t\b\b\n\t\t\b\b\b*     *\t\t\b\b\b\n\t\t\b\b\b\b*       *\t\t\b\b\b\b\n\t\t\b\b\b\b\b* * * * * *\t\t\b\b\b\b\b\n";

   return 0;

}

Yes, it is possible with a single line and using escape sequences, but it is tedious and not recommended. Instead, you can use loops to write more readable and easy on the eyes code. We only used the cout  method (C++). Good luck!

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation

What keyword can we use within a form to pass it as an argument to a JavaScript snippet? A. form B. onSubmit C. send D. this

Answers

Answer:

the answer is: this

Explanation:

trust me

Why is the following in the order of o(n2)? for (int count = 0; count < n; count ) for (int count2 = 0; count2 < n; count2 ) { // some sequence of o(1) steps }

Answers

In simpler terms, the code snippet has an "order" or time complexity of O(n^2) because the number of iterations of the inner sequence of steps increases quadratically as the input size "n" increases.

The given code snippet consists of two nested loops. The outer loop iterates "n" times, and the inner loop also iterates "n" times. The sequence of steps inside the inner loop is described as having a time complexity of O(1).

To determine the overall time complexity of the code, we need to consider the number of times the inner sequence of steps will be executed. Since the inner loop depends on the outer loop variable "count2", it will execute "n" times for each iteration of the outer loop.

Therefore, the total number of iterations of the inner sequence of steps can be calculated as follows:

1st iteration of the outer loop: 1 iteration of the inner loop (n = 1)
2nd iteration of the outer loop: 2 iterations of the inner loop (n = 2)
3rd iteration of the outer loop: 3 iterations of the inner loop (n = 3)
...
nth iteration of the outer loop: n iterations of the inner loop (n = n)

To find the total number of iterations, we need to sum the number of iterations of the inner loop for each value of "n". This can be expressed as:

1 + 2 + 3 + ... + n

The sum of the first "n" positive integers can be calculated using the formula:

Sum = (n * (n + 1)) / 2

So, the total number of iterations of the inner sequence of steps is (n * (n + 1)) / 2.

Since the inner sequence of steps has a time complexity of O(1), the overall time complexity of the given code snippet can be expressed as O(n * (n + 1) / 2) or simplified as O(n^2).

In simpler terms, the code snippet has an "order" or time complexity of O(n^2) because the number of iterations of the inner sequence of steps increases quadratically as the input size "n" increases.

To know more about the word outer loop, visit:

https://brainly.com/question/29331437

#SPJ11

Explain the 7 Layers of OS

Answers

The 7 Layers of OS is also known as the OSI (Open Systems Interconnection) model. The seven layers of OS model is: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer.

The 7 Layers of the Open Systems  (OS) model represent a conceptual framework that defines the functions and interactions of different components in a networked communication system. Each layer has a specific role and provides services to the layers above and below it.

Physical Layer:

This is the lowest layer of the OSI model and deals with the physical transmission of data over the network. It defines the electrical, mechanical, and physical aspects of the network, including cables, connectors, and signaling.

Data Link Layer:

The data link layer provides reliable transmission of data between directly connected nodes. It breaks data into frames, performs error detection and correction, and manages flow control. Ethernet and Wi-Fi protocols operate at this layer.

Network Layer:

The network layer is responsible for logical addressing and routing of data packets. It determines the best path for data transmission across different networks using routing protocols. The Internet Protocol (IP) operates at this layer.

Transport Layer:

The transport layer ensures reliable, end-to-end communication between hosts. It breaks data into smaller segments, provides error recovery and flow control, and establishes connections. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.

Session Layer:

The session layer establishes, manages, and terminates connections between applications. It provides mechanisms for session establishment, synchronization, and checkpointing.

Presentation Layer:

The presentation layer handles data formatting and ensures compatibility between different systems. It translates, encrypts, and compresses data to be transmitted. It also deals with data representation and manages data syntax conversions.

Application Layer:

The application layer is the highest layer and interacts directly with users and applications. It provides network services and protocols for various applications, such as email (SMTP), web browsing (HTTP), file transfer (FTP), and remote login (SSH).

These 7 layers of the OSI model provide a modular and hierarchical approach to network communication, allowing for standardized protocols and seamless interoperability between different network devices and systems.

To learn more about OS model: https://brainly.com/question/22709418

#SPJ11

Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.
makeOutWord("<<>>", "Yay") → "<>"
makeOutWord("<<>>", "WooHoo") → "<>"
makeOutWord("[[]]", "word") → "[[word]]"

Answers

Answer:

The following are the answer to this question.

Explanation:

In the given code, a "makeOutWord and word" is already used to hold some value. In this code, we define a string method "makeOutWord" that accepts two string variables "out and the word" in its parameter.

Inside the method, a return keyword is used that uses the string variable "out and the word" with the "substring" method, this method is used to returns a new string from an old string value, and it also uses the "word" string variable for the return value.  

please find the attached file for code:

Given an "out" string length 4, such as "&lt;&lt;&gt;&gt;", and a word, return a new string where the

Theatre seat plan. The New Theatre has 3 rows, row 1 has 12 seats, row 2 has 16 seats and row 3 has 20
seats. The stage is in front of row 1.) Create a new project named Theatre with a class (file) called Theatre (Theatre.java)
with a main method that displays the following message ‘Welcome to the New Theatre’ at
the start of the program. Add 3 arrays (one for each row) in your program to keep record
of the seats that have been sold and the seats that are still free. Row 1 has 12 seats, row
2 has 16 seats and row 3 has 20 seats. 0 indicates a free seat, 1 indicates an occupied
(sold) seat. At the start of the program all seats should be 0 (free). This main method will
be the method called when the program starts (entry point) for all Tasks described in this
coursework.

Answers

Note the code that execute the above is given as follwos;

public class Theatre {

   public static void main(String[] args) {

       int[][] seatPlan = new int[][] {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},

                                        {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},

                                        {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}};

       System.out.println("Welcome to the New Theatre");

   }

}

What is the rationale for the above response?

We create a new class called "Theatre" and define the main method inside it.

We create a 2D array called "seatPlan" with 3 rows and 12, 16, and 20 seats in each row respectively, to keep track of the seat status.

We initialize all the elements of the array to 0, which represents a free seat.

Finally, we print the welcome message.

Learn more about Code at:

https://brainly.com/question/30429605

#SPJ1

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

i. Suresh participated in a 100m race and won a prize. This motivated him to go for practice every morning. What type
of Motivation is this?
a) None of these
b) Internal
c) Intermediate
d) External
ii. Rekha gets up at 5 am and goes for her dance classes. Then she comes home and finishes her homework before going
to school. This an example of ________.
a) Self Motivation
b) None of these
c) Self Awareness
d) Self Regulation
iii. The file name and file name extension are separated by a ________.
a) semicolon
b) none of these
c) period
d) comma

Answers

1. C - Internal motivation
2. D - Self Motivation
3. C - period, (word.doc)

the hardware implementation of a program uses three different classes of instructions: 4 of class a, 2 of class b, and 3 of class c, that require 1, 1.5, and 2 cycles, respectively (table below). this program is run on processor cpu a which has a clock rate 4.8 ghz and processor cpu b that is 25% slower than cpu a. what is the cpi (cycles per instruction) for the program? what is the execution time for the program on cpu a? what is the clock cycle time of cpu b?

Answers

Cycle count for the first code is equal to (10 cycles)(2 × 1)+(1 × 2)+(2 × 3) Number of cycles for second code = ((4 × 1) + ((1 × 2) + ((1 × 3)) = 9 cycles 10/9=1.11 times CPI for the first code, which is 10/5=2. CPI for the second code is 9 / 6 = 1.5.

What are the 3 things the CPU does to instructions?

Processor operations include fetch, decode, execute, and write back. These are the four main tasks that a processor performs. Getting instructions from programme memory via a system's RAM is known as fetching.

The P1 processor runs at 3 GHz and has a 1.5 CPI. P2 has a CPI of 1.0 and a 2.5 GHz clock rate. P3 has a CPI of 2.2 and a 4.0 GHz clock rate. In comparison to the M1, the M2 offers 18% more multicore CPU performance, up to two additional GPU cores, a 50% increase in memory bandwidth, 25% more graphics performance at the same power level as M1 and up to 35% more performance at its maximum, a 25% increase in transistor count, and 2.3x faster performance at the same power.

To learn more about programming refer to :

https://brainly.com/question/30297247

#SPJ4

Write a program to accept two numbers
in two lines and find Square root of Squares
of thion​

Write a program to accept two numbersin two lines and find Square root of Squaresof thion

Answers

Answer: Here you go, change it however you like :)

Explanation:

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

print(f"square root of num1: {num1**0.5}")

print(f"square root of num2: {num2**0.5}")

What is Digital Health

Answers

Answer: Digital health technologies use computing platforms, connectivity, software, and sensors for health care and related uses. These technologies span a wide range of uses, from applications in general wellness to applications as a medical device. They include technologies intended for use as a medical product, in a medical product, as companion diagnostics, or as an adjunct to other medical products (devices, drugs, and biologics). They may also be used to develop or study medical products.

(576)8. In to ( )16 ( )8

Answers

Answer:

around ()72381 approx

Explanation:

approximately not accurate

Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?

Answers

The section of a PCM that is responsible for sending the proper reference voltage to many of the sensors is the input sensor section.

What are PCM inputs?

The Powertrain Control Module (PCM) is known to be an input section of the PCM.

It is made up of the engine's ignition system, fuel injection system and also emission controls. The PCM is known to receives inputs a lot from different kinds  of sensors and switches.

Learn more about sensors from

https://brainly.com/question/26320121

Determine the cardinality.
1. |{}|
2.|{∅, {{1}}}|
3. |{1, 2, 2, 3, 5, 5}|
4. {5, 1}∪{1, 2, 5}
5. {2, 3}, {1, 2, {3}}}|

Answers

The given set of problems requires the determination of the cardinality.

Sure! Here's the code to determine the cardinality of each set:

# Set 1: {}

set1 = set()

cardinality1 = len(set1)

print("Cardinality of set 1:", cardinality1)

# Set 2: {∅, {{1}}}

set2 = {frozenset(), frozenset({1})}

cardinality2 = len(set2)

print("Cardinality of set 2:", cardinality2)

# Set 3: {1, 2, 2, 3, 5, 5}

set3 = {1, 2, 2, 3, 5, 5}

cardinality3 = len(set3)

print("Cardinality of set 3:", cardinality3)

# Set 4: {5, 1}∪{1, 2, 5}

set4 = {5, 1}.union({1, 2, 5})

cardinality4 = len(set4)

print("Cardinality of set 4:", cardinality4)

# Set 5: {2, 3}, {1, 2, {3}}

set5a = {2, 3}

set5b = {1, 2, frozenset({3})}

cardinality5a = len(set5a)

cardinality5b = len(set5b)

print("Cardinality of set 5a:", cardinality5a)

print("Cardinality of set 5b:", cardinality5b)

Output :

Cardinality of set 1: 0

Cardinality of set 2: 2

Cardinality of set 3: 5

Cardinality of set 4: 3

Cardinality of set 5a: 2

Cardinality of set 5b: 3

The code uses Python's built-in set data type and the 'len()' function to calculate the cardinality of each set. In the case of set 2 and set 5b, the elements containing inner sets are represented as 'frozenset()' objects, which are immutable and can be added to a set.

#SPJ11

Learn more about cardinality: "Cardinality" here:

brainly.com/question/23976339

[10 pts] how do you have to set up the control signals to transfer a numeric value from the main memory (ram) to the accumulator register on the brainless microprocessor?

Answers

STEPS :

To transfer a numeric value from the main memory (RAM) to the accumulator register on the brainless microprocessor, the appropriate control signals must be set up as follows:

1. Set the memory address register to the address of the numeric value in RAM.

2. Set the memory data register to the numeric value.

3. Set the memory read signal high.

4. Set the memory write signal low.

5. Set the accumulator write signal high.

6. Set the accumulator read signal low.

7. Set the accumulator address to the address of the accumulator register.

8. Clock the memory and accumulator control signals.

To know more about RAM
https://brainly.com/question/11411472
#SPJ1

For questions 1-3, consider the following code:
x = int (input ("Enter a number: "))
if x 1 = 7:
print("A")
if x >= 10:
print("B")
if x < 10:
print("C")
if x % 2 == 0:
print("D")

For questions 1-3, consider the following code:x = int (input ("Enter a number: "))if x 1 = 7:print("A")if

Answers

Answer:

A

Explanation:

Technology is causing a change in the customer assessment of value because its cost is plummeting, resulting in ?

Answers

Technology is causing a change Instead, consumers emphasize relationships with the retailer, quality, and service.

What impact do supply and demand have on the cost of goods?

The interaction of a market's demand and supply factors determines its price. Demand and supply are indicators of how ready consumers and producers are to buy and sell. A product exchange takes place when buyers and sellers can reach an agreement on a price.

The entire increase in prices or the cost of living in a nation are two examples of broad metrics that are frequently used to define inflation. For specific things like food or services like a haircut, for instance, it can also be calculated more precisely.

To know more about Technology  visit:-:

brainly.com/question/13811023

#SPJ4

Other Questions
Does anyone have remind if so i will give u a code ??? iii Which lines from Passage 2 most help the reader determine how the speaker feels about youth and what the word youth might mean?A. "Float in the garden when no wind blows, / Come to us, go from us, whence no one knows" (lines 23)B. "And go from me leaving no trace behind / Like fragrance borne on the hush of the wind." (lines 56)C. "I know the laughter and the pain / Of times that will not come again." (lines 89)D. "Like petals of light fallen from the moon, / Broken and bright on a dark lagoon," (lines 1112) A quotient is a multiple of 5. The dividend is a multiple of 4. The divisor is a factor of 8. -Increasing CO2 levels -What should we do to restore the environment? At a candy shop, a bag of gummy worms costs $2.54. If you pay with a $10 bill, what willyour change? Show your work for 24 points please thank you what is the distinction between an intrinsic and an extrinsic semiconductor? Rip van Winkle fell asleep for a very long time. The length of his beard ( In millimeters ) and a function of time ( in weeks ) is graphed.How fast did Rip van Winkle's beard grow? 5x4x5x3+56help ma pls why they got such long multipictacion in -8th garde Make a prediction.Which surface causes the most friction?a) wood b) tile c) carpet Lisa recorded a 2-hour television show. When she watched it, she skipped the commercials. It took her84 minutes to watch the show. How many minutes did she save by skipping the commercials? a school has 36 fish swamps 4/6 of them's are boys how much are girls The side length of the base of a square pyramid is 30 centimeters. The height of the pyramid is 45 centimeters. What volume of the pyramid in cubic centimeters A 13,500B 40,500C 900D 1,350 HELP!! Emma made punch with14How many gallons of ginger ale does she need to add to make a total of 4 gallons of punch?Part AWhich diagram can Emma use to help find the number of gallons of ginger ale she needs?OB.A.4 galgg9g127834gOD.gg 10. If an atom's atomic number is 12 , how many electrons does it have? How many electrons are in the outer most shell? a finer sense of discrimination usually is made possible by having larger receptor cells. a. true b. false No unreasonable searches or seizures.*O Amendment 1Amendment 2Amendment 3Amendment 4O Amendment 5com 1700 The speed of a car when passing a point P is 30 m s and changes uniformly over a distance of 323 m to 60 m s. Calculate the acceleration of the car. Which component of weather results in stormy, cloudy weather? 18. The diagram below shows a design for a memory stick.The design consists of a rectangle, RSTU and part of a circle, centre C.12 mmRSmemorysticklength.c20 mmRS=UT = 12 millimetresRUST 30 millimetresThe diameter of the circle is 20 millimetres.UT is a chord of the circleCalculate the length of the memory stick.U30 mmTIk