One of the most popular rad methods is:_____.
a. automated design.
b. structured walkthrough.
c. crafting.
d. prototyping.

Answers

Answer 1

One of the most popular RAD methods is d. prototyping.

Rapid Development Approach (RAD) can be described as a kind of software development that focuses more on rapid prototyping instead of the past strict rules in order to make more software in lesser time.

Rapid Development Approach (RAD) is a more adaptable technique for software development that allows new knowledge to be integrated into the formation of new software.

The most flexible and popular technique on which Rapid Development Approach (RAD) works is prototyping. A prototyping method is an approach where designers make a design a model, experiment with it, and get feedback. Similarly, using the prototype, new software is designed, experimented with, and after approving results, is launched.

To learn more about Rapid Development Approach (RAD), click here

https://brainly.com/question/19166973

#SPJ4


Related Questions

find the output in python
a=10
b=8*2
c=9.0/4.0
d="All the best"
print("Values are: ", a,b,c,d)​

Answers

This results in the output: `Values are: 10 16 2.25 All the best`.

The output of the given Python code would be:

```Values are:  10 16 2.25 All the best

```Explanation:

- `a` is assigned the value `10`.

- `b` is assigned the value `8 * 2`, which is `16`.

- `c` is assigned the value `9.0 / 4.0`, which is `2.25`. The use of floating-point numbers (`9.0` and `4.0`) ensures that the division result is a floating-point number.

- `d` is assigned the string value `"All the best"`.

- The `print()` function is used to display the values of `a`, `b`, `c`, and `d`. The output statement is `"Values are: ", a, b, c, d`, where the values are separated by commas.

For more such questions on output,click on

https://brainly.com/question/28498043

#SPJ8

you have logged on to alien vault application. after configuring the location, what is the next step that you need to perform?

Answers

You have logged on to alien vault application, after configuring the location, you need to add the sensors.

Powered by AT&T, the fantastic platform Alienvault offers Unified Security Management (USM). It mixes services and protocols, in other words. such as SIEM, log management, intrusion detection, and incident reporting all under one roof for asset identification. on a single platform. Alienvault is currently one of very few platforms of its sort.Alienvault is intended to secure your system from multiple cyberthreats and cyberattacks on a single platform. The majority, if not all, of the services you could require to establish a strong cybersecurity presence are provided by the platform. You may analyze dangers in your digital environment with the aid of the free IT security tools and dashboards provided by Alienvault. Because it is an open-source system, it has a very large number of players, which contributes to its strength. With each person providing the system with the most recent intelligence and fresh danger detections.

Learn more about the Unified security management with the help of the given link:

https://brainly.com/question/6957939

#SPJ4

Define a class Sphere to input radius of a sphere and compute the volume of it. Volume = πr3 (where π=3.14)​

Answers

Lets use Python

Program:-

\(\tt r=(float(input("Enter\:the\:radius\:of\:Sphere=")))\)

\(\tt V=4/3*3.14*r**3\)

\(\tt print("Volume\:of\:the\:sphere=",V)\)

Output:-

\(\tt Enter\:the\:radius\:of\:the\:sphere=3\)

\(\t Volume\:of\:the\:Sphere=103.4\)

Need the answer rn!!!!

Need the answer rn!!!!

Answers

Answer:

what language is this? english or no

Explanation:

you want to implement an access control list in which only the users you specifically authorize have access to the resource. anyone not on the list should be prevented from having access. which of the following methods of access control should the access list use? answerA. implicit allow,explicit denyB. explicit allow, implicit denyC. explicit allow,explicit denyD. implicit allow, implicit deny

Answers

Explicit allow, explicit deny is the method of access control that should be used in the implementation of an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access.

What is Access Control List (ACL)?

Access Control List (ACL) is a type of security solution that controls access to an operating system, network, or file system by utilizing a list of permissions or rules. It is used to verify the authorization of a user or process to resources, ensuring that only authorized users can access these resources.ACL enables users to monitor and regulate network traffic by giving or restricting access to network services to specific users, applications, or systems. ACL can also be used in protecting files and directories from unauthorized access, reducing the risk of malicious activities that could compromise system security.In an ACL that uses an explicit allow, explicit deny method of access control, only the users authorized to access a resource are permitted to do so. All other users are explicitly denied access. Hence, if the user is not specifically listed, they cannot access the resource; only those who are explicitly authorized to do so can gain access. Therefore, this is the method that should be used.

Learn more about  authorize  here: https://brainly.com/question/14306929

#SPJ11

After a business transaction has been analyzed, which of the following must occur for the analysis to have been done correctly?

A. Equity must equal the difference between assets and liabilities.
B. Equity must be greater than the sum of assets and liabilities.
C. Equity must be greater than the difference between assets and liabilities.
D. Equity must equal the sum of assets and liabilities.​

Answers

Answer:

A. Equity must equal the difference between assets and liabilities.

Explanation:

Assets are things a company or business owns while liabilities are things person or company owes.

Thus, Equity is the difference between the assets and the liabilities.

So, option A which is Equity must equal the difference between assets and liabilities is the answer.

which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it?

Answers

Freeware is a type of useful and legitimate software that is distributed by a developer without charging any fees, but without including the source code.

Freeware allows users to use the software for free but does not grant them the ability to modify or redistribute the code. It is often developed by individuals or companies as a way to gain popularity, showcase their skills, or provide a limited version of a more comprehensive software package. Freeware can be found in various forms, including productivity tools, utilities, games, and multimedia applications. Freeware is a term used to describe software that is distributed at no cost to users. Unlike open-source software, which provides access to the source code and allows modifications and redistributions, freeware does not include the source code. This means that users cannot view or modify the underlying code of the software. However, they can use the software for personal or business purposes without any charges. Freeware is a popular way for developers to introduce their products to a wide audience and gain recognition. It often serves as a limited version of a paid software or as a standalone application with certain functionalities.

Learn more about freeware here:

https://brainly.com/question/24274991

#SPJ11

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

Select all items that represent characteristics of website navigation menus.
consist of a group of hyperlinks
are essential for any website
always contain a link to a site map
use clearly labeled links
are optional if search is available

Answers

Answer:

A B D on edge 2020

Explanation:

Answer:

A- consist of a group of hyperlinks

B- are essential for any website

D- use clearly labeled links

which is true?a.oversize arrays require fewer parameters than perfect size arraysb.oversize arrays may have unused elementsc.perfect size arrays may have unused elementsd.oversize arrays can be returned from a method

Answers

Note that it is TRUE to state that "Perfect size arrays may have unused elements." (Option C).

How is this so?

Oversize arrays may have unused elements, but perfect size arrays are precisely sized to accommodate the exact number of elements needed.

Therefore, perfect size arrays may have unused elements if not all the allocated positions are filled. This can occur when the array is initialized but not all positions are populated with data.

Learn more about arrays at:

https://brainly.com/question/28061186

#SPJ4

If you are logged on to Windows Live Messenger, why would you be unable to engage

in an instant messaging session with your brother, who is logged on to his AOL

Instant Messenger account?

a. Because you use Windows and your brother uses Apple OS X

b. Because Windows Live Messenger has built-in security and AOL Instant

Messenger does not

c. Because AOL Instant Messenger and Windows Live Messenger use their own

proprietary protocols

d. Because AOL Instant Messenger encrypts

Answers

Answer:

C: Because AOL Instant Messenger and Windows Live Messenger use their own  proprietary protocols

Explanation:

shae wants to implement antivirus in her cloud environments. where should she look at installing this protection to be most effective?

Answers

To be most effective, Shae should look at installing antivirus protection at multiple layers within her cloud environments.

Installing antivirus protection at multiple layers provides a defense-in-depth strategy, ensuring comprehensive coverage and increasing the chances of detecting and preventing threats at different stages. The layers where antivirus protection should be considered include:

Endpoint Protection: Installing antivirus software on individual endpoints (e.g., servers, virtual machines, desktops, laptops) within the cloud environment is crucial. This helps protect against malware and other malicious activities that may target specific devices.

Network Perimeter: Deploying antivirus solutions at the network perimeter, such as firewalls or intrusion prevention systems (IPS), can help identify and block malware and malicious network traffic before it reaches the cloud environment.

Cloud Infrastructure: Utilizing antivirus protection specifically designed for cloud platforms can help safeguard the underlying infrastructure and protect against threats that may target virtual machines, storage, or other cloud resources.

Email and Web Filtering: Implementing antivirus scanning for email attachments and web content can help detect and prevent malware from being delivered via these channels, reducing the risk of infection within the cloud environment.

By implementing antivirus protection at multiple layers, Shae can enhance the overall security posture of her cloud environments and mitigate potential threats effectively.

Learn more about antivirus protection here:

https://brainly.com/question/29997905

#SPJ11

Find a mistake in this sentence. Rewrite the sentence correctly.
Doesn’t no one want to enter the robotics design contest?

Answers

Answer:

Doesn't anyone want to enter the robotics design contest?

the following is a legal command, which would allow to provide audio in ogg vorbis, mp3 and wave formats to support a. firefox
b. chrome
c. opera
d. safari,
e. and ie9

Answers

To provide audio in Ogg Vorbis, MP3, and WAV formats to support Firefox, Chrome, Opera, Safari, and IE9, a combination of audio elements with appropriate source elements can be used in HTML.

To support multiple browsers and audio formats, you can use the HTML audio element along with source elements to specify different audio formats. Here's an example of how you can achieve this:

<audio controls>

 <source src="audio.ogg" type="audio/ogg">

 <source src="audio.mp3" type="audio/mpeg">

 <source src="audio.wav" type="audio/wav">

 Your browser does not support the audio tag.

</audio>

In the above example, the audio element is used with three source elements, each specifying a different audio file format (Ogg Vorbis, MP3, and WAV). The browser will attempt to play the audio in the first supported format it encounters. If the browser does not support any of the specified formats, the fallback message "Your browser does not support the audio tag" will be displayed. This approach allows you to provide audio in Ogg Vorbis, MP3, and WAV formats, which are widely supported by modern browsers including Firefox, Chrome, Opera, Safari, and IE9. Each browser will choose the appropriate source format based on its compatibility, ensuring audio playback across different platforms and browsers.

learn more about Ogg Vorbis here:

https://brainly.com/question/30725379

#SPJ11

Which of the following methods of using PHP to connect to a MySQL database only provides an object-oriented interface?
mysql extension
mysqli extension
PDO MySQL driver extension
none of these

Answers

The correct answer is: PDO MySQL driver extension. It is the only option among the given choices that exclusively provides an object-oriented interface for PHP's interaction with a MySQL database.

Among the given options, the only method of using PHP to connect to a MySQL database that provides an object-oriented interface is the PDO (PHP Data Objects) MySQL driver extension.

The mysql extension, which was available in older versions of PHP, does not provide an object-oriented interface. It uses procedural style functions to interact with the database.

The mysqli extension, on the other hand, provides both procedural and object-oriented interfaces. It offers additional features and improved security compared to the mysql extension. While the mysqli extension does support an object-oriented interface, it also supports procedural style functions for backward compatibility.

The PDO MySQL driver extension is a more modern and versatile option. It provides a consistent object-oriented interface for connecting to and interacting with various databases, including MySQL. PDO allows you to write database code that is independent of the specific database being used, making it easier to switch between different database systems if needed.

Therefore, the correct answer is: PDO MySQL driver extension. It is the only option among the given choices that exclusively provides an object-oriented interface for PHP's interaction with a MySQL database.

Visit here to learn more about MySQL brainly.com/question/30763668

#SPJ11

PART B: Computing Fibonacci Numbers With Threads
This programming project is based on a problem given in our textbook. The Fibonacci sequence is the series of numbers 0, 1, 1, 2, 3, 5, 8,.... Formally, it can be expressed as: fib0 = 0 fib1 = 1 fibn = fibn-1 + fibn-2 Write a multithreaded program that generates the Fibonacci series using the pThreads library. This program should work as follows: The user will enter on the command line the number of Fibonacci numbers that the program will generate. The program will then create a separate thread that will generate the Fibonacci numbers placing the sequence in data that is shared by the threads (an array or vector is probably the most convenient data structure). When the thread finishes execution, the parent thread will output the sequence generated by the child thread. Because the parent thread cannot begin outputting the Fibonacci sequence until the child thread finishes, this will require having the parent thread wait for the child thread to finish, using the techniques discussed in the class

Answers

Here's an example implementation of a multithreaded program in C++ using pThreads library to generate the Fibonacci series:

#include <iostream>

#include <vector>

#include <pthread.h>

using namespace std;

vector<int> fib_sequence;

void* fib(void* arg) {

   int n = *(int*)arg;

   fib_sequence.push_back(0);

   if (n == 0) {

       pthread_exit(NULL);

   }

   fib_sequence.push_back(1);

   if (n == 1) {

       pthread_exit(NULL);

   }

   int prev = 0, curr = 1;

   for (int i = 2; i <= n; i++) {

       int next = prev + curr;

       fib_sequence.push_back(next);

       prev = curr;

       curr = next;

   }

   pthread_exit(NULL);

}

int main(int argc, char* argv[]) {

   if (argc < 2) {

       cerr << "Usage: " << argv[0] << " <number of Fibonacci numbers>" << endl;

       return 1;

   }

   int n = atoi(argv[1]);

   pthread_t tid;

   pthread_create(&tid, NULL, fib, &n);

   pthread_join(tid, NULL);

   for (int i = 0; i <= n; i++) {

       cout << fib_sequence[i] << " ";

   }

   cout << endl;

   return 0;

}

To get a similar answer on Fibonacci:

https://brainly.com/question/29775564

#SPJ11

Write a program which takes a string input, converts it to lowercase, then prints
the same string without the five most common letters in the English alphabet (e, t, a, i o).

Answers

Answer:

Seeing as i don't know what language you want this made in, so I'll do it in two languages, Py and C++.

Here is a solution in C++:

#include <iostream>

#include <string>

#include <map>

int main() {

 // prompt the user for a string

 std::cout << "Enter a string: ";

 std::string input;

 std::getline(std::cin, input);

 // convert the input string to lowercase

 std::transform(input.begin(), input.end(), input.begin(), ::tolower);

 // create a map to keep track of the frequency of each letter in the string

 std::map<char, int> letter_counts;

 for (const char& c : input) {

   letter_counts[c]++;

 }

 // create a string of the five most common letters in the English alphabet

 // (e, t, a, i, o)

 std::string most_common_letters = "etai";

 // remove the five most common letters from the input string

 for (const char& c : most_common_letters) {

   input.erase(std::remove(input.begin(), input.end(), c), input.end());

 }

 // print the resulting string

 std::cout << "Resulting string: " << input << std::endl;

 return 0;

}


Here is a solution in Python:

import string

# prompt the user for a string

input_str = input("Enter a string: ")

# convert the input string to lowercase

input_str = input_str.lower()

# create a string of the five most common letters in the English alphabet

# (e, t, a, i, o)

most_common_letters = "etai"

# remove the five most common letters from the input string

for c in most_common_letters:

 input_str = input_str.replace(c, "")

# print the resulting string

print("Resulting string: ", input_str)

Explanation: Hope this helped

how can robots help us with online learning? 3 reasons please thank u :)​

Answers

Answer:

The use of robots increases the practicality of online education, such that the difference between in person attendance and online learning is minimized

In elementary school, robots can help deliver teaching materials in a class like setting, to students  who are unable to attend classes due to their current situation

In high school, simulators can give driving (and flying) lessons to would be drivers, without the exposure of the students to risk

Robots in higher education, such as medicine, can be used to carry out operational procedures with students where, there are no subjects to perform the surgical procedure on

The use of simulators makes possible training in disaster and crisis management

Explanation:

The invention of computers as a technological tool has completely changed our lives. Name any three areas to support this statement and explain how computers have made our lives better

Answers

Answer:

-They allow huge amounts of information to be stored in a small space

-They also allow a person to calculate mathematical problems with ease

-They allow people to communicate with one another through internet sites

-Finally, computers provide teachers and students the means to communicate quickly via email. Online grading systems also make it easier to view and audit a student's progress

Hope i helped!

As a photographer, what will be the driving force behind everything that you produce?

Answers

Explanation:

What is Photography?

Photography is basically an art of generating the pictures by the reaction of the light and radiant energy on the specific surface.

It is also a science of creating a long-lasting image by capturing the light, which can be done in either of the ways, such as  chemically or electronically using a light-sensitive substance like photographic film or an image sensor.

It is the power of the vision through which the photographer is able to produce the perfect and beautiful pictures of any object or the human beings.

Therefore, it can be concluded that The photographer's vision serves as the inspiration for all he creates. Hence, option

Answer:

It your vision :)

Explanation:

have a nice day

A knowledge management system should encourage open communication and the exchange of ideas.
Question 17 options:
True
False

Answers

True. A knowledge management system should encourage open communication and the exchange of ideas.

What is knowledge management system

A knowledge management system is a software platform or information system that helps organizations to capture, store, share, and utilize knowledge and information within the organization. The primary objective of a knowledge management system is to enable organizations to better manage their knowledge assets, which include data, information, experience, and expertise.

A knowledge management system typically includes a range of tools and technologies such as databases, content management systems, collaboration tools, search engines, and analytics software. These tools enable organizations to create, capture, store, organize, and retrieve information and knowledge from various sources, including internal and external sources.

Learn more about knowledge management system at

https://brainly.com/question/30353366

#SPJ1

the person who receives an e-mail​

Answers

i believe the answer to your question is email recipient!!

Write a program that takes a decimal number from the user and then prints the integer part and the decimal part separately. For example, if the user enters 2.718, the program prints: Integer part = 2 and decimal part = .718 in python

Answers

Answer:

Explanation:

The following was coded in Python as requested. It is a function that takes in a number as a parameter. It then uses the Python built-in math class as well as the modf() method to split the whole number and the decimal, these are saved in two variables called frac and whole. These variables are printed at the end of the program. The program has been tested and the output can be seen below.

import math

def seperateInt(number):

   frac, whole = math.modf(number)

   print("Whole number: " + str(math.floor(whole)))

   print("Decimals number: " + str(frac))

Write a program that takes a decimal number from the user and then prints the integer part and the decimal

Which sentence will be parsed by the following CFG?
s a NOUN VERB
ОА.
cats walk
ОВ.
a cat walks
Ос.
A cat walks
OD. cat walking

Answers

I think that cats and walk are the right answer because it is the one that makes the most sense to put hope it helps

4.03 Data Analysis
1} You are writing a program to average a student's test scores after discounting the highest and lowest scores. What is the missing code required to produce the correct result?
def find_average(x):
result = /*missing code*/
print(result)
find_average([98, 80, 70, 65, 34, 59, 81])

A) (mean(x) − min(x) − max(x))
B) (mean(x) − min(x) − max(x))/(len(x)−2)
C) (sum(x) − min(x) − max(x))/(len(x)−2)
D) (sum(x) − min(x) − max(x))/len(x)

2} A file "text.csv" contains the following single line: "1X2X3X4X5." What should X be so the code prints "5"?
import csv
with open('text.csv') as csvfile:
text = csv.reader(csvfile, delimiter=",")
for line in text:
print(len(line))

A) 1;2;3;4;5
B) 1.2.3.4.5
C) 1,2,3,4,5
D) 1n2n3n4n5n

Answers

The correct answers are :

(1) C) (sum(x) − min(x) − max(x))/(len(x)−2)  

(2)  C) 1,2,3,4,5

The missing code required to produce the correct result for averaging a student's test scores after discounting the highest and lowest scores is option C) (sum(x) − min(x) − max(x))/(len(x)−2). This code calculates the average by summing all the scores and subtracting the highest and lowest scores before dividing by the number of scores minus 2. This method ensures that the two outliers do not significantly affect the average.The character X should be replaced with the delimiter "," so that the code reads the file correctly and counts the number of characters in the single line. Option C) 1,2,3,4,5 is the correct replacement for X. The delimiter is used to separate values in a file, and by using "," as the delimiter, the code can correctly read the single line in the file and count the number of characters as 5.

To know more about coding visit:

https://brainly.com/question/17293834

#SPJ1

Domain local groups are primarily used to hold global groups and provide access to domain resources. group of answer choices true false

Answers

True , Domain local groups are primarily used to hold global groups and provide access to domain resources.

What is Domain local groups ?

Domain local groups are Windows Server groups whose scope is limited to the specific domain in which they are defined. Domain local groups are used to deliver users with access to network help and to assign permissions to control access to these resources.

What can domain local groups contain?

Members from any domain may be counted to a domain local group. The domain's local scope can contain user accounts, universal groups, and global groups from any domain. In addition, the scope can both hold and be a member of domain local groups from the same domain.

To learn more about Domain local groups, refer

https://brainly.com/question/14364696

#SPJ4

A ______ device makes it possible for multiple computers to exchange instructions, data, and information.

Answers

A communications device makes it possible for multiple computers to exchange instructions, data, and information.

We can define a communication device as a kind of hardware device that makes it possible to transmit information between multiple computers.

Data, information, and instructions are passed from a sending system to a receiving system through communication devices. A communication device can exchange information with other kinds of electronic devices.

An example of a communication device is a modem. A modem is a hardware device that can change digital information from a computer to a signal that can be transmitted over the telephone. The modem also has the capability to transfer an analog system into a digital system so that it can be viewed on a computer.

To learn more about communication devices, click here:

https://brainly.com/question/14891213

#SPJ4

WD9102 Apply a shape style.

Answers

If you want to apply a shape style, you must require to tap on the Format tab followed by clicking the More drop-down arrow in the Shape Styles group.

How to know the actual or real style of shape?

To know the actual or real style of shape, go to the Drawing Tools menu in the ribbon. Then, Click on the Format tab. Observe the Shape Styles grouping of commands. Here, you will see three icons on the right side, they are Shape Fill, Shape Outline, and Shape Effects.

After clicking the More drop-down arrow in the Shape Styles group, a complete menu of styles will appear in front of you on the screen. Choose the style you want to use. The shape will appear in the selected style.

Therefore, the process of applying shape style is well described above.

To learn more about Word Shape styles, refer to the link:

https://brainly.com/question/938171

#SPJ1

(a) Contruct instruction to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and explain the difference between the two instructions. (5 marks)

Answers

Here are the instructions to load the 16-bit number 2036H in the register pair DE using LXI and MVI opcodes and an explanation of the difference between the two instructions: Instruction using LXI opcode: LD DE, 2036HLXI instruction is used to load 16-bit data into a register pair.

LXI opcode is used to initialize the registers BC, DE, and HL with 16-bit data. The instruction has a format of LXI RP, data16. Here RP represents register pair (BC, DE, HL or SP) and data16 represents the 16-bit data.Instruction using MVI opcode:LD E, 36HLD D, 20HMVI instruction is used to load 8-bit data into a register. The instruction has a format of MVI R, data8. Here R represents the destination register and data8 represents the 8-bit data that will be loaded into the register.

The difference between the two instructions is that the LXI opcode is used to load 16-bit data into a register pair while the MVI opcode is used to load 8-bit data into a single register. Additionally, the LXI opcode requires two bytes of memory to store the 16-bit data while the MVI opcode only requires one byte of memory to store the 8-bit data.

To know more about 16-bit data visit:

https://brainly.com/question/31325908

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Other Questions
Read the excerpt from paragraph 3 of A Gut Visible All the Way from the 18th Century by A.O. Scott, then answer the question.But such unhappy Matters need not detain us here. Indulge, rather, my views on Gullivers Travels, which somewhat cleverly converts my great Satire into a gaudy, puerile Toy. My avowed purpose in composing that text, as any swot who has suffered the Duty and Dullness rampant in our Schools must know, was to employ my modest pen as a scourge against human Folly and the vanities of the Age. Having deemed itself unable to defeat those foes, this rendition of Gullivers Travels chuses rather to join them.A Gut Visible All the Way from the 18th Century by A.O. ScottWrite a paragraph to explain how A.O. Scott uses the same satirical style as Jonathan Swift in Part I of Gullivers Travels. Be sure to use evidence from each text to support your response. How does the color of fur relate to helping animals survive?The color of their fur indicates which animal is the strongest.The colors help animals be able to see other animals while hunting.The colors help animals blend in with their environment.The color of the fur helps animals run, swim, and walk. Malachy rolls a fair dice 720 times.How many times would Malachy expect to roll a five? how much money should be invested in an account that earns 6% interest, compounded monthly, in order to have $13,000 in 6 years? (round your answer to two decimal places.) : Which word is wrong in the sentence. "We was caught good and proper." was proper good caught Tche 3:Transform the following sentences intothe simple future tense. Use thephrase highlighted in red to supportyou.J'ai un ordinateur moderne.J'utilise mon nouveau portable pour sefaire des amis virtuels. According to experts, most people are hired for their qualifications and fired for their ________.A) physical limitationsB) lack of aptitudeC) nonperformanceD) psychological issues What connection can be drawn between the disenfranchisement of African Americans in Georgia and the use of the white primary system? Calculate the vehicle deduction for 2021 Income Tax purposes when the UCC on a class 10 vehicle was $22,000 at the end of 2019.The total vehicle expenses are $13,000.00 in 2021. In 2021 18,000km were driven for business, 12,000km were driven for personal use. WhiCh of the following is an CORRECT statement32. Which of the following is a CORRECT atcitcut? 1) the atrial stretch rellex stimulates bradycardia. B) The atrial strctch reflex leads to reduced urine formation. C) When using a sphygmomanomcter t paragraph on healthy living Andrea ordered a pizza for dinner. She ate 1/4 of the pizza. Her brother ate 35% of the pizza. Her mom ate .10 of the pizza. How much pizza is left? middle which diagram shows the changes in appearance of a plant cell when a remains in a concentrated sugar solution for thirty minutes? what is th answer Give me unique name brands for coffee that doesn't exist. underline the topic sentence in each paragraph below 1. i like most types of books however the books i enjoy the most are travel books i like reading about different countries and famous places there when i go on holiday i always buy lots of books about the place i am visiting travel books help me out to understand the place2.my favourite drink is tea and i drink a lot of it.I always have a tea in the morning for breakfast.I make a pot of tea then i drink it all myself.Sometimes I have another pot before lunch.At four o'clock , i make a cup of mint tea.Mint tea is good for waking up and studying. A rectangular block has a length of 8 inches, a width of 3.5 inches, and aheight of 2 inches.Five blocks are stacked to create a tower. What is the volume of the tower?A. 140 in 3B. 280 in 3C. 56 in 3D. 336 in 3 Which step shows the result of applying the subtraction property of equality?One-fourth (12 x + 8) + 4 = 3StepSolution13 x + 2 + 4 = 323 x + 6 = 333 x = negative 34x = negative 1 which of these responses to colonialism was supported by H.o. Chi Minh but not by Mohandas Gandhi? A. Violent military conflicts B. labor strikes C. Organized civilian protests D. boycotting of European goods Simplify and write each expression Fully. Show(a) (3xy-)(2xy). Iodine-131, with an isotopic mass of 130.906125 amu, is a major fission product in a nuclear power plant. It undergoes radioactive decay with a half-life of 8.04 days, giving out a beta particle and gamma radiation, producing a daughter isotope with mass determined to be 130.905084 amu.a) What is the amount of energy released during the decay of iodine-131 in J and in keV.b) Name the element of this daughter isotope, giving your explanation.c) A sample of iodine-131 was found to give an activity of 1.85 x 10^4 dps. What is the number and the mass (in g) of I atoms present in the sample?d) What is the activity of the sample in (b) after 100 days?