List 5 different options after high school

Answers

Answer 1

Answer:

Work

Gap year

The military

Trade and certificate programs

College


Related Questions

What happens when a thread is interrupted? Are there any conditions under which interrupts are ignored?

Answers

When a thread is interrupted, it is essentially being told to stop what it is doing and perform a different task instead. This can occur for a variety of reasons, such as when a higher-priority thread needs to run, or when a user requests that a thread be terminated.

When a thread is interrupted, it typically enters a "interrupted" state, which means that it is no longer actively executing code but is instead waiting for the interrupt to be handled. The thread will then resume execution once the interrupt has been processed.

There are some conditions under which interrupts may be ignored. For example, if a thread is in a critical section of code where it must complete a specific task without interruption, interrupts may be temporarily disabled. Additionally, certain interrupts may be ignored if they are deemed low priority or if they would cause a significant delay in the execution of the thread.

Overall, interrupts are an important part of multitasking and allow multiple threads to share resources and execute simultaneously. However, it is important for developers to carefully manage interrupts to ensure that they do not cause unintended consequences or interfere with critical system processes.

When a thread is interrupted, it receives an indication that it should stop what it is doing and perform a different task, typically to handle an event or to terminate. There are conditions under which interrupts are ignored, such as when the thread is not in a waiting, sleeping, or blocked state. In these cases, the interruption status will be set to true, but the thread will continue its execution until it checks for the interruption and responds accordingly.

to know more about interrupted here:

brainly.com/question/29770273

#SPJ11

Terrance is looking for a storage device to be used for backup storage. The device has to have a large storage capacity and be portable. What is the best device for Terrance's needs?

External hard drive
Disk drive
Hard drive
USB flash drive

Answers

Answer:

its external hard drive  and flash drive

Your welcome

Explanation:

Computer has brought radical change in every field​

Answers

Answer:

Yes it has brought change in every field

Explanation:

1.Menciona tres factores o variables que consideras influirán en el oscurecimiento del alimento cortado o pelado expuesto a la intemperie

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se incluyen opciones o incisos para responder a la pregunta, podemos comentar lo siguiente.

Los tres factores o variables que considero influyen en el oscurecimiento del alimento cortado o pelado expuesto a la intemperie son los siguientes.

1.- La exposición al elemento "oxígeno" cuando están a la intemperie.

2.- La temperatura del medio ambiente que afecta directamente al alimento.

3.- Los minerales y los metales que constituyen al alimento cuando tienen contacto con el medio ambiente.

En estos momentos, las sustancias que componen al alimento comienzan a tener reacciones químicas y se empiezan a oxidar cuando permanecen abiertas a temperaturas ambiente.

Es por eso que los expertos recomiendan que una vez abierta la comida -la fruta, la verdura- tiene que refrigerarse lo más pronto posible para poderse conservar un poco más de tiempo.

_____ is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen

Answers

Answer:

form filling

Explanation:

form filling is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen

u can use quizlet for this or any thing

1) What did you leam from reading The Life we Buyy? Be specific and give at least two examples. 2) What overall theme(s) or idea(s) sticks with you as a reader? Highlight or underline your answers CHO

Answers

Allen Eskens' novel, The Life We Bury, reveals numerous character secrets and demonstrates how honesty and truth always triumph.

The story centers on the characters Joe and Carl and how their shared secrets cause them to become close. Examples that illustrate the book's concept and lessons include those Carl's conviction will be overturned after his innocence has been established.

Joe receives the money since there was a financial incentive for solving the crimes, which he can use to take care of Jeremy and pay for Jeremy's education.

Learn more about the novel "The Life We Buy here:

https://brainly.com/question/28726002

#SPJ4

Which term does the osi model use that's different from the tcp/ip model in reference to the terms frame, packet, and segment?

Answers

The term that OSI model use is protocol data unit (PDU). A PDU is a data unit that includes headers and trailers for the specific layer as well as the encapsulated data.

What is OSI model?

The Open Systems Interconnection (OSI) framework depicts 7 layers that data centers use to connect via a network.

It was the first general framework for network communications, and it was adopted by all major computer and telecommunications companies in the early 1980s.

The term used by the OSI model is data protocol unit (PDU). A PDU is a data unit that includes the specific layer's headers and trailers as well as the encapsulated data.

Thus, the answer is protocol data unit.

For more details regarding OSI model, visit:

https://brainly.com/question/14433133

#SPJ1

What is the main difference between wpa and wpa2? what configuration information is required on an access point to authenticate users joining the wireless network against a network authentication server? widget corporation has provided wireless access for its employees using several aps located in different parts of the building. employees connect to the network using 802.11g-compatible network cards. on thursday afternoon, several users report that they cannot log on to the network. what troubleshooting step would you take first? why might an attacker launch a disassociation attack against an access point? your company has a lobby area where guest access is provided so that visitors can get internet access. the open guest wlan is currently connected to the production network. the only protection against visitors and hackers getting into the organization's data is file and directory rights. what steps should be taken to provide guest access and better protect the organization's data?

Answers

WPA2 is simpler to configure than the previous alternatives and provides higher security. WPA2 differs from TKIP primarily by using the Advanced Encryption Standard (AES).

A more powerful encryption technique supported by WPA2 is based on the Advanced Encryption Standard (AES). AES is implemented using the Message Authentication Code Protocol in Counter Mode with Cipher Block Chaining (CCMP). The RC4 cipher is used by both WEP and WPA. The safest kind of WPA is WPA2. WPA2 is the finest choice for securing your wireless (Wi-Fi) network. One drawback of WPA2 is that it takes more processing power, which may prevent some older hardware from supporting it.

Learn more about Advanced Encryption Standard (AES). from

https://brainly.com/question/14784819

#SPJ4

Explain the difference between file and folder (in your own words)

Answers

Answer:

the difference is one is online and one is not

Explanation:

A file is usually what you find online. And a folder is what you put papers into.

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the audience attention?

1. Arrow
2. Ink Color
3. Eraser
4. Laser Pointer

Answers

A laser pointer provides the ability to convert the mouse icon when giving a presentation:)

What is a torque?
A. A linear force
B. Push or pull in a circular direction
C. A jumping force
D. A friction test

Answers

Answer:

D. A friction force

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Protect system access of users.

Do no harm to a company when leaving.

Be fair and honest with customers.

Answers

Answer:

"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"

A: Respect confidentiality of data

Explanation:

correct on Edg

Answer:

Respect confidentiality of data.

And

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Explanation:

A workstation has been moved from the first floor to the fifth floor within an organization. The user is now reporting that the workstation cannot connect to the network. A technician suspects that the workstation could not obtain an IP address from a DHCP server. What is a possible cause of the problem?

Answers

Answer:

The workstation has been configured with a static IP address.

Explanation:

A computer network connects two or more computers together. It provides this interconnection between them using several protocols.

A computer in a network is called a node or workstation and must have an IP address. IP addresses can be assigned statically or dynamically. The static IP address permits the administration to manually configure the IP address, while dynamic addressing is done by the DHCP server protocol.

If a workstation is moved from a network of workstations with static addresses to a dynamically assigned address network, it should be configured to a DHCP server or its static address may conflict or not exist in the network.

what is the difference between relay controls and communicating controls?

Answers

Explanation:

Control Relay is more commonly used in control circuits which are single phase circuits. Contactors are typically built for switching 3-phase load. A Contactor consists of a minimum one set of three phase power contacts and in some cases additional in built auxiliary contacts are also provided.

1
2 points
When might an organization use a WAN?
When it has a network with very low
bandwidth
When large files are sent frequently over its
network
When a wide variety of devices are in its
network
When it has multiple locations that are far
apart

Answers

An organization might use a Wide Area Network (WAN) in several situations.

WANs are designed to connect geographically dispersed locations over long distances, often using public or private telecommunication links. If an organization has a network with low bandwidth, such as limited capacity for data transmission, a WAN can help improve connectivity and facilitate data transfer between different locations.

If an organization frequently needs to send large files across its network, a WAN can provide the necessary infrastructure to handle the high volume of data and ensure efficient transmission. WANs typically offer higher bandwidth and optimized routing for such file transfers, enabling faster and reliable delivery.

Learn more about Wide Area Network on:

https://brainly.com/question/18062734

#SPJ1

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?
A. It ensures network resources such as printers are used correctly
B. It allows individualized configuration through manual input
C. It increases physical access to all network devices
D. It automates configuration, policy management and other tasks

Answers

By automating setup, policy administration, and other duties, software-defined networking (SDN) decreases both the possibility of human mistake and overall network support and operations expenses.

What is the purpose of software defined networking?

Software-defined networking refers to the use of software-based controllers or application programming interfaces (APIs) to communicate with the network's underlying hardware architecture and control traffic (SDN).

What security benefits can Software Defined Networking SDN offer customers?

Specific Security: More visibility across the network is one of the main benefits of SDN networking. Any security that affects traffic in traditional networking is encompassing. SDN makes it granular. This implies that engineers can finely target and prevent harmful data across your network.

To know more about software visit:-

https://brainly.com/question/1022352

#SPJ1

my chrome book computer clock is an hour off how do I fix that

Answers

Go to settings, Click on the advanced settings on the left, then on date and time, and time zone, and then choose which ever one you like the most (if you want it automatic, or a fixed one).

Answer:

go in settings and hit daylight savings time or sync with network time

Explanation:

what is the chrmical bond of water​

Answers

hydrogen 2 oxygen 1 (h2O)
the answer is H2o :)

There are two types of do not call list. What are they and how long do names stay on the list?

Answers

Two types of do not call lists are broker-dealer lists and national lists.

Although phones have made our lives better by letting us communicate with each other, yet there are certain drawbacks to this system. One of the drawbacks is the unknown calls from spammers who keep bugging us.

However, there are two types of do not call lists that users can utilize to avoid calls from numbers that they do not want to communicate with.

The broker-dealer list is a do not call list in which the name or number stays for a period of five years.

The other type of do not call list is the national do not call list. The name or number in this list remains until the user himself removes it.

To learn more about national do not call, click here:

https://brainly.com/question/7202537

#SPJ4

Where is the importance of eating well Genshin?

Answers

Starting location is Inazuma City :)

Answer: eating gives you buffs which may change the whole outcome

Explanation: eating in genshin impact is very important you can heal from foods instead of bringing a healer. You can also grab foods like the adeptus temptation to buff your damage into a whole nother world espically if you're lower leveled as it adds base damage and crit damage i believe. Foods like these can drastically change the scope of the whole battle even if you are considerably weaker than your said opponent.

you are not sure if a certain word has an"e"at the end

Answers

What exactly are you asking ?

consider a class that uses the following variables to implement an array-based stack: string [ ] s = new string[100]

Answers

The given code represents a class that is utilizing an array-based stack that uses the following variables: string[] s = new string[100].Here, `string[] s` is an array of strings that can hold up to 100 elements. By using this array, an array-based stack can be implemented.

An array-based stack is a simple data structure that uses an array as its primary storage device. Elements are inserted and deleted from the top of the stack. As a result, the stack can be implemented using an array in which the top element is stored at the last index of the array. `Push()`, `Pop()`, and `Peek()` are the most typical operations in a stack. `Push()` - This operation adds an element to the top of the stack.

`Pop()` - This operation removes the element from the top of the stack .`Peek()` - This operation returns the top element of the stack without removing it .In the provided code, the following procedures can be used to implement the above operations :

public void Push(string value)if (top == 99) Console .WriteLine("Overflow error!");

else s[++top] = value;

public string Pop()if (top == -1) { Console. WriteLine("Underflow error!");

return null; }

else { return s[top--]; }

public string Peek()if (top == -1) { Console .

WriteLine("Underflow error!");return null; }else { return s[top]; }

Note: In this code, `top` represents the index of the top element in the stack. When no element is in the stack, `top` is set to `-1`.

To learn more about array-based stack:

https://brainly.com/question/32290335

#SPJ11

Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?

Planning
Filtering
Ordering
Sequencing

Answers

Answer: Sequencing

Explanation: I did test!

Sequencing step does she need to review.

What is Sequencing?

Sequencing is the act of placing a process's phases in order from start to finish. It is a crucial ability that is employed in math, physics, and other subject areas in addition to reading comprehension.

Look at a few sequence structures that can be used to structure instructions in a passage.

Students simply arrange a series of stages in a process or method in the proper order as part of sequencing activities. They might include topics like how to assemble equipment, set up and name a word processing file, or install an electrical switch.

Therefore, Sequencing step does she need to review.

To learn more about Sequencing, refer to the link:

https://brainly.com/question/30586864

#SPJ3

What is an IP adress

Answers

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network. ... The internet needs a way to differentiate between different computers, routers, and websites.

Answer/Step-by-step explanation:

"An IP address is a unique address that identifies a device on the internet or local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network."

Project stem 4.1 code practice
Python!!
Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.


Sample Run

Please enter a city name: (Nope to end) San Antonio

Oh! San Antonio is a cool spot.

Please enter a city name: (Nope to end) Los Angeles

Oh! Los Angeles is a cool spot.

Please enter a city name: (Nope to end) Portland

Oh! Portland is a cool spot.

Please enter a city name: (Nope to end) Miami

Oh! Miami is a cool spot.

Please enter a city name: (Nope to end) Nope

Answers

A program that the user to enter a city name, and then prints Oh! CITY is a cool spot as follows:

City_name = input("Please enter a name or type Nope to terminate the program: ")

while( user_name != "Nope" ):

print("Oh! CITY is a cool spot" , City name)

City name = input("Please enter a name or type Nope to terminate the program: ")

What is a Computer Program?

A computer program may be defined as a series or set of instructions in a programming language that are utilized by the computer to execute successfully.

The variable "City_name" is used to store the input of the user. He might input his name or "NOPE" to terminate. Then we used a while loop to check if the user input NOPE. Then, we print Oh! CITY is a cool spot for "users input".

Therefore, a program that the user to enter a city name, and then prints Oh! CITY is a cool spot is well-described above.

To learn more about Computer programs, refer to the link:

brainly.com/question/1538272

#SPJ1

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the output should be capitalized only if the original word was capitalized. Specifications Challenge.toCamelCase(str) given a string with dashes and underscore, convert to camel case Parameters str: String - String to be converted Return Value String - String without dashes/underscores and camel cased Examples str Return Value "the-stealth-warrior" "theStealthWarrior" "A-B-C" "ABC"

Answers

Answer:

I am writing a Python program. Let me know if you want the program in some other programming language.

def toCamelCase(str):  

   string = str.replace("-", " ").replace("_", " ")  

   string = string.split()

   if len(str) == 0:

       return str

   return string[0] + ''.join(i.capitalize() for i in string[1:])

   

print(toCamelCase("the-stealth-warrior"))

Explanation:

I will explain the code line by line. First line is the definition of  toCamelCase() method with str as an argument. str is basically a string of characters that is to be converted to camel casing in this method.

string = str.replace("-", " ").replace("_", " ") . This statement means the underscore or dash in the entire are removed. After removing the dash and underscore in the string (str), the rest of the string is stored in string variable.  

Next the string = string.split()  uses split() method that splits or breaks the rest of the string in string variable to a list of all words in this variable.

if len(str) == 0 means if the length of the input string is 0 then return str as it is.

If the length of the str string is not 0 then return string[0] + ''.join(i.capitalize() for i in string[1:])  will execute. Lets take an example of a str to show the working of this statement.

Lets say we have str = "the-stealth-warrior". Now after removal of dash in by replace() method the value stored in string variable becomes the stealth warrior. Now the split() method splits this string into list of three words the, stealth, warrior.

Next return string[0] + ''.join(i.capitalize() for i in string[1:])  has string[0] which is the word. Here join() method is used to join all the items or words in the string together.

Now i variable moves through the string from index 1 and onward and keeps capitalizing the first character of the list of every word present in string variable from that index position to the end.  capitalize() method is used for this purpose.

So this means first each first character of each word in the string starting from index position 1 to the end of the string is capitalized and then all the items/words in string are joined by join() method. This means the S of stealth and W of warrior are capitalized and joined as StealthWarrior and added to string[0] = the which returns theStealthWarrior in the output.

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The

working on a python assignment, not sure what i did wrong can anyone help?

working on a python assignment, not sure what i did wrong can anyone help?

Answers

Answer:

Explanation:

line 13 should be changed to:

print(“Item 1: “ + item1 + “ - $” + str(float(const1)))

You cannot concatenate a string to float type.

Which type of mic is durable, versatile and does not rely on power?
Dynamic

B.
Decibals

C.
Ribbon

D.
Condenser

Answers

Answer:

Dynamic

Explanation:

Dynamic Mics are the workhorses of the microphone world. They're cheap, durable and sound fantastic on some of the most common sources in recording.

Hope this helps! :)

Answer:

Dynamic

Explanation:

They are cheap, versatile, durable, and doesnt rely on power

Describe each of the four methodologies and give an example of software that you might development using each of the methods. For one, explain why you chose that method and what would be in each area of the methodology.

Agile development methodology
DevOps deployment methodology
Waterfall development method
Rapid application development

Answers

Agile Development Methodology: Agile development is a iterative and incremental approach to software development that emphasizes flexibility and collaboration between the development team and stakeholders. Agile methodologies prioritize customer satisfaction, working software, and continuous improvement. An example of software that might be developed using agile methodology is a mobile application, where requirements and priorities can change frequently and the development team needs to adapt and deliver new features quickly. Agile methodologies are well suited for projects that have rapidly changing requirements or are highly dependent on external factors.

DevOps Deployment Methodology: DevOps is a set of practices that combines software development and IT operations to improve the speed, quality and reliability of software deployments. DevOps focuses on automation, continuous integration and continuous deployment. An example of software that might be developed using DevOps methodology is an e-commerce platform, where it's important to have a reliable, fast, and secure deployment process, and that is also easily scalable.

Waterfall Development Methodology: The Waterfall methodology is a linear sequential approach to software development where progress is seen as flowing steadily downwards through the phases of requirements gathering, design, implementation, testing and maintenance. An example of software that might be developed using Waterfall methodology is a large enterprise software system that has well-defined requirements and a long development timeline. This methodology is well suited for projects where requirements are well understood and unlikely to change, and the development process can be divided into distinct phases.

Rapid Application Development (RAD): Rapid Application Development (RAD) is a methodology that emphasizes rapid prototyping and rapid delivery of working software. RAD methodologies prioritize rapid iteration and delivery of working software. An example of software that might be developed using RAD methodology is a startup's MVP (Minimum Viable Product), where the goal is to quickly develop a basic version of the product to test with customers and gather feedback. This methodology is well suited for projects where time-to-market is a critical factor and requirements are not fully understood.

What are the methodology  about?

Each methodology has its own advantages and disadvantages, and choosing the right methodology depends on the nature of the project, the goals of the development team, and the available resources.

Therefore, Agile methodologies, for example, prioritize flexibility and continuous improvement, while Waterfall methodologies prioritize predictability and a linear development process. DevOps methodologies prioritize automation, speed, and reliability while RAD methodologies prioritize rapid delivery and customer feedback.

Learn more about Agile development  from

https://brainly.com/question/23661838

#SPJ1

Other Questions
an agent for a broker-dealer tells a customer that the price of a stock is higher than it actually is. based on this information, the customer sells the stock. which statement is true? Identify the unnecessary or redundant preposition in the following sentence chief Grady was no either warm nor sweet so accordingly he took his coffee cold and without sugar In ANOP, P = 2.5 cm, n = 2.3 cm and 20=71. Find the area of ANOP, to the nearest10th of a square centimeter. 100 points for correct awnser Brummer Corporation makes a product whose variable overhead standards are based on direct labor-hours. The quantity standard is 0.20 hours per unit. The variable overhead rate standard is $8.90 per hour. In January the company produced 4,900 units using 1,010 direct labor-hours. The actual variable overhead rate was $8.80 per hour. The variable overhead efficiency variance for January is Which of the following sentences is written in subjunctive mood?a. Turn the lights off when you leave the room.b. If you're leaving the room, then turn the lights off.c. I wish you'd turn the lights off when you leave the room.d. Will you turn the lights off when you leave the room? 57) All of the following are reasons why the movie industry is likely to be less disrupted by theInternet than the music industryexcept:A) movies are more difficult to move around the Web without detection.B) movies typically have far larger file sizes than music tracks.C) the movie industry is a concentrated oligopoly.D) there are fewer firms competing for distribution rights. two high precision pendulums move through their equilibrium positions once each second, so that the periods of each is precisely 2.000 s. one of them is in stockholm, sweden and has a length of 0.99542 m. the other is in singapore and has a length of 0.99050 m. what is the ratio of the free-fall acceleration of gravity g at these two cities? (give your answer to at least 5 decimal places.) All are key differences between political parties and interest groups, except: a. Parties want to win elections c. Interest groups nominate candidatesb. Interest groups focus on one issued. Parties focus on a range of issues Can someone help me please?:) A woman walks into a carpet store wearing high-heeled shoes with a circular heel of diameter 0.987 cm. To the dismay of the store manager, she balances on one heel on an expensive carpet sample. If she has a mass of 45.5 kg, determine the pressure she exerts on the carpet sample. Read the poem.Song of the Open Roadby Walt WhitmanAfoot and light-hearted, I take to the open road,Healthy, free, the world before me,The long brown path before me, leading wherever I choose.Henceforth I ask not good-fortuneI myself am good-fortune;Henceforth I whimper no more, postpone no more, need nothing,Strong and content, I travel the open road. . . .From this hour, freedom!From this hour I ordain myself loosd of limits and imaginary lines,Going where I list, my own master, total and absolute,Listening to others, and considering well what they say,Pausing, searching, receiving, contemplating,Gently, but with undeniable will, divesting myself of the holds that would hold me.I inhale great draughts of space;The east and the west are mine, and the north and the south are mine.I am larger, better than I thought;I did not know I held so much goodness.All seems beautiful to me;I can repeat over to men and women, You have done such good to me, I would do the same to you.I will recruit for myself and you as I go;I will scatter myself among men and women as I go;I will toss the new gladness and roughness among them;Whoever denies me, it shall not trouble me;Whoever accepts me, he or she shall be blessed, and shall bless me.Read this line from "Song of the Open Road. From this hour I ordain myself loosd of limits and imaginary lines,How do the words ordain and loos'd affect the tone of the poem?They give the poem a resigned tone.They make the poem sound more reserved.They give the poem a cautious tone.They provide a liberated tone. Find the slope of the line that passes through Point A(3, -9) and the origin using m=rise/run Consider a circuit with a main wire that branches into two other wires. If the current is 10 A in the main wire and 4 A in one of the branches, how much current is in the other branch Describe what is meant by an objective tone. please help just number 1 not 2 Which statement accurately describes the Yalta Conference?a. The purpose was for the Allied leaders to discuss plans for the future of Europe after they defeat Hitler. b. They all wanted democracy and capitalism to spread throughout Europe.c. They all wanted to see communism spread throughout Europe. d. The purpose was to discuss the terms of the Allies' surrender to Hitler. Which solar panel layout would allow for machinery to plant crops directly underneath the solar arrays?Question 6 options:Greenhouse Solar ArraysStilted Solar ArraysVertical Double Sided Solar Panel Arrays with space between for cropsNone of the above Hydrogen and oxygen react to produce water. Which of the following is the correctly balanced chemical equation for this reaction? Please awnser asap I amStuck