Please pleas please help!!
What is an Error caused by trying to open a file that cannot be found.

exception

syntax error

logical error

Answers

Answer 1

Answer:

#404

Explanation:

logical

Answer 2
Well It's logical error

Related Questions

so can u please follow my new ig acc i just started it yesterday its called stunnerspamz

Answers

Answer:

why are you advertising in brainly?????

Ohhhhhhhh okay uh sure

PLS HELPPPPPP, my iPod touch 7gen is broken and glitched… i was using it and suddenly I dropped it on the floor. the screen started turning red with streaks and it turned black with some glitchy screen. btw there is no cracks on the iPod. What has happened to it?



ill give u 25 points for this!!!!!!!! pls helppppppppp

PLS HELPPPPPP, my iPod touch 7gen is broken and glitched i was using it and suddenly I dropped it on

Answers

Answer:

To start, try a couple things:

1. Reset the iPod by holding down the power and volume up button for a few seconds to first turn it off, then hold the power button for a few seconds to turn it back on. If the problem doesn't resolve itself, try:

2. Go into settings and turn off auto-brightness. This may help the issue. Also, sometimes turning your screen brightness high up reduces the frequency of the flickering. If that doesn't work try taking it to an Apple Store

Answer:

If there's no way to turn it back on, then maybe the internal was damaged. You can set up an appointment at your local Apple Store and see if they can fix it.

Live Preview, found in the Font group, uses which method for seeing different font sizes without committing to them.
double-clicking the sizes on the Size drop-down list
pointing the mouse pointer to the sizes on the Size drop-down list
right-clicking the cell and clicking Preview Size on the drop-down list
clicking the sizes on the Size drop-down list

Answers

Answer:

B- pointing the mouse pointer to the sizes on the Size drop-down list

Explanation:

Answer:

B

Explanation:

got it right on edge

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Suppose the two syringes and the tube is filled with water If the plunger on the left is pushed in 1 cm will the object on the right move out by 1 cm or not

Answers

It should be noted that the two syringes and the tube is filled with water If the plunger on the left is pushed in 1 cm will not have the object on the right move out by 1 cm or not. Therefore, it's false.

How to explain the information

As the syringes tube have different diameter as right one is thicker as compared to left one.

So due to volume consistency in 1 case ,(as water is incompressible) the left plunger will move less than 1 cm ,suppose zcm ( Area1 x 1cm= Area2 x zcm) as area 2 is more than area 1 so Z will be less than 1 cm.

Learn more about syringe on:

https://brainly.com/question/28221550

#SPJ1

Which type of storage disk and disk drive can you use in the given situation?

Amy wants to borrow an interesting movie from Bruce so that she can watch it in her leisure time. Amy can hand over a (BLANK) to Bruce to copy 900 MB file. Bruce needs to have a (BLANK) drive to record data on the used DVD.


BLANK 1

CD
hard disk
DVD

BLANK 2

DVD-RR
DVD-recordable
DVD-RW​

Answers

I : DVD

II:DVD-R

A DVD-RW would work too.

The types of storage disk drives that can use in the given situation are as follows:

Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.

What do you mean by Storage disk?

Storage disk may be defined as a type of hardware device that can be used to store and save digital data and applications which may be in the form of images, video, audio, etc. For example, CDs, DVDs, hard disks, pen drives, etc.

Hard disks generally store a large quantity of data like 120GB to 30.72 TB. But here the data required to be stored is only 900 Mb, so DVD is the most accurate choice for this storage. It stores 500Mb of data to 8.5 Gb. A single-layer HD-DVD stores up to 15GB of storage capacity.

Therefore, Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.

To learn more about Storage Disk, refer to the link:

https://brainly.com/question/14762201

#SPJ2

Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

The answer is D
Ik this cause I took the test

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

\(...\)

Which step needs to be done before changing the font type, size, and color of a particular set of text

Answers

Answer:

You need to select the text that needs changing.

Explanation:

I hope this helps!

please briefly compare bagging and boosting from the following perspectives: (a) assumption; (b) construction process; (c) final aggregation of classifiers.

Answers

Bagging assumes that classifiers are independent and have equal weight, Bagging involves creating multiple classifiers. In bagging, the final aggregation is done by taking a majority vote of the individual classifiers

To compare bagging and boosting from the given perspectives:

(a) Assumption:
Bagging assumes that classifiers are independent and have equal weight. Boosting assumes that classifiers can be weighted according to their accuracy and focuses on misclassified instances.

(b) Construction process:
Bagging involves creating multiple classifiers by training them on different subsets of the training data, obtained by resampling with replacement. Boosting trains classifiers sequentially, focusing on the misclassified instances from the previous classifier by adjusting their weights in the training data.

(c) Final aggregation of classifiers:
In bagging, the final aggregation is done by taking a majority vote of the individual classifiers or averaging their predictions. In boosting, the final aggregation is done by taking a weighted majority vote or a weighted average of the classifiers' predictions, based on their accuracy or assigned weight.

Learn more about Classification: brainly.com/question/385616

#SPJ11

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats

Answers

A security information and event management (SIEM) system in an SOC helps fight security threats by combining data from varying technology sources and analyzing logs in real time, which helps in managing resources to implement protective measures against threats.

Features of a SIEM

They are tools used to promote information security through the provision of reports that display malicious intrusion attempts and alerts that are triggered in case of violation of established rules for security.

Therefore, through SIEM tools there is greater analysis and collection of data that can impact information security, generating a better classification of threats and investigative capacity to carry out actions to combat system insecurities.

Find out more information about security information here:

https://brainly.com/question/26282951

Which of the following vehicles has no emissions? (Select the best answer.)

Question 5 options:

An ethanol vehicle


A propane vehicle


A natural gas vehicle


An electric vehicle

Answers

The vehicle that has no emission is an electric vehicle. The correct option is d.

What are electric vehicles?

Electric vehicles are vehicles that run on chargeable batteries. These vehicles produce very fewer noise and the batteries are charged with electricity. A form of transportation that runs on electricity is known as an electric vehicle (EV).

Electric vehicles have no emissions, and thus they do not pollute the environment. They are cheaper than other vehicles, but they have limited driving charges, and you have to find charge stations.

Therefore, the correct option is d. An electric vehicle.

To learn more about no-emissions vehicles, refer to the link:

https://brainly.com/question/27346452

#SPJ1

someone please tell me if you watch drag race (rupauls drag race) I need someone to talk to about it ​

Answers

I’m gonna watch it soon

a ________ is a device that connects two or more networks together.

Answers

A router is a piece of equipment that joins two or more networks. In order to facilitate communication between several networks and to direct data flow between them, routers are crucial.

A router is a piece of hardware that links various networks and controls data traffic between them. In order to find the fastest route for data transmission across the network, routers use routing tables at the network layer (Layer 3 of the OSI model). They can link networks that employ various network protocols and offer security measures, such firewalls and connections to virtual private networks (VPNs), to shield networks from outside threats. Routers are an important part of contemporary networking architecture since they enable communication and data transmission between various networks and devices. They are used in households, businesses, and organisations to link devices to the internet and to other networks, enabling seamless communication and data exchange.

Learn more about  router here:

https://brainly.com/question/30618543

#SPJ4

Instant Search can NOT be used to search through archived messages.
Please select the best answer from the choices provided
True or false

Answers

Answer: False

Explanation:

Instant Search can be used to search through archived messages!

You carried out a PERT analysis of a very large activity-event network using only slightly skewed or symmetric beta distribution models for the activity durations. Your analysis yields a mean duration of 56.2 time units for the critical path with a variance of 3.4. What is your best estimate of the probability of successful project completion in 57 time units or less? Provide your answer as a number between 0 and 1 with 3 decimals (3 digits after the decimal point, for example: 0.123).

Answers

PERT (Program Evaluation and Review Technique) is a network analysis technique commonly used in project management.

It is particularly useful when there is a high level of uncertainty surrounding the duration of individual project activities. PERT uses probabilistic time estimates, which are duration estimates based on using optimistic, most likely, and pessimistic estimates of activity durations, or a three-point estimate.

These estimates help to identify the likelihood of meeting project deadlines and can assist project managers in developing effective project schedules and resource allocation plans. Overall, PERT is an important tool for managing complex projects with uncertain activity durations.

To know more about project management, refer to the link:

brainly.com/question/4475646#

#SPJ4

Animations in an html5 page are created by defining ________________ properties for a specific css selector.

Answers

Animations in an HTML5 page are created by defining animation properties for a specific CSS selector. These animation properties include:


1. `animation-name`: This property specifies the name of the animation. It refers to the keyframes that define what happens during the animation.
2. `animation-duration`: This property sets the duration of the animation in seconds or milliseconds.
3. `animation-timing-function`: This property defines the timing function used for the animation. It determines how the animation progresses over time.
4. `animation-delay`: This property specifies the delay before the animation starts.
5. `animation-iteration-count`: This property sets the number of times the animation should repeat. You can specify a finite number or use `infinite` to make it repeat indefinitely.

To know more about Animations visit:

https://brainly.com/question/29996953

#SPJ11

Anonymous User
Anonymous User
Last Edit: August 19, 2020 6:10 AM
18.9K VIEWS
Question 1: String Compression
Different compression techniques are used in order to reduce the size of the messages sent over the web. An algorithm is designed to compress a given string by describing the total number of consecutive occurences of each character next to it. For example, consider the string "abaasass". Group the conescutive occurence of each character:
'a' occurs one time.
'b' occurs one time.
'a' occurs two times consecutively.
's' occurs one time.
'a' occurs one time.
's' occurs two times consecutively.
If a character only occurs once, it is added to the compressed string. If it occurs consecutive times, the character is added to the string followed by an integer representing the number of consecutive occurences. Thus the compressed form of the string "aba2sas2".

Answers

The algorithm compresses a given string by describing the consecutive occurrences of each character with an integer.

This compression algorithm represents each character in the input string with its consecutive occurrence count. If a character occurs only once, it is directly added to the compressed string, otherwise, the character is added along with the count of its consecutive occurrences. For example, the input string "abaasass" is compressed to "aba2sas2". The algorithm compresses a given string by describing the consecutive occurrences of each character with an integer.  This compression technique reduces the size of the input string, making it efficient for sending over the web.

learn more about algorithm here:

https://brainly.com/question/22984934

#SPJ11

What is the most influential model of our memory system? the short-term memory model the three-stage model the long-term memory model the temporal integration model

Answers

The most influential model of our memory system is the three-stage model. The three-stage model, also known as the Atkinson-Shiffrin model.

The three-stage model of memory, also known as the Atkinson-Shiffrin model, is the most influential model of our memory system. It proposes that memory consists of three stages: sensory memory, short-term memory, and long-term memory.

Sensory memory is the initial stage where information from the environment is briefly held. Short-term memory is the second stage, characterized by limited capacity and duration, where information is actively processed. Long-term memory is the final stage, responsible for the storage of vast amounts of information over extended periods.

The three-stage model provides a comprehensive framework for understanding how information is encoded, stored, and retrieved in our memory system. It has significantly influenced research and theories related to human memory and forms the basis for many subsequent models and studies.

The three-stage model, also known as the Atkinson-Shiffrin model, is widely recognized as the most influential model of our memory system. It revolutionized our understanding of memory processes and continues to shape research and theories in the field of cognitive psychology.

Learn more about  three-stage model here:

https://brainly.in/question/44305424

#SPJ11

how to make a benefit analysis paper

Answers

The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

What is a benefit analysis report?

A cost-benefit analysis is known to be the act of making a comparison of the projected or the  estimated costs as well as the benefits (or a given opportunities) that is known to be linked with a project decision to know or tell if if it makes any sense from a given business perspective.

Note that the  Benefit Analysis report gives a kind of clear and concise form of comparisons of work scenarios to reduce over payment and as such, The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

Learn more about benefit analysis from

https://brainly.com/question/199821
#SPJ1

how do you non-destructively adjust the color of an image with cool colors?

Answers

To non-destructively adjust the color of an image with cool colors, you can use adjustment layers in image editing software.

When adjusting the color of an image with cool colors, you can create a new adjustment layer, such as a Curves or Hue/Saturation layer, and make the desired color adjustments without permanently altering the original image. Adjustment layers allow you to modify specific aspects of the image, such as color balance, saturation, or brightness, while preserving the original image data. By working with adjustment layers, you can experiment with different color adjustments, easily revert back to the original image, and have more control over the final result.

You can learn more about image editing software at

https://brainly.com/question/9834558

#SPJ11

Please help me with these definitions!!!!!!

Type 1 Hypervisor

Type 2 Hypervisor

Virtual Box

Virtual Machine

Virtual Machine Escape

Virtual Machine Monitor

Virtual Machine Sprawl

VMWare

Application Cell

Answers

Answer:

1st one . A bare-metal hypervisor (Type 1) is a layer of software we install directly on top of a physical server and its underlying hardware. mainly found in enterprise environments.

2nd. A Type 2 hypervisor, also called a hosted hypervisor, is a virtual machine manager that is installed as a software application on an existing operating system (OS). ... Examples of this type of hypervisor include VMware Fusion, Oracle Virtual Box, Oracle VM for x86, Solaris Zones, Parallels and VMware Workstation.

3rd. VirtualBox is open-source software for virtualizing the x86 computing architecture. It acts as a hypervisor, creating a VM (virtual machine) where the user can run another OS (operating system).

4th.  a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination.

hope it helps x

Explanation:

4

specification: a student has many advisers and an advisor any students.
The above specifications indicates a relationship between student and advisor having the type:

Answers

The specifications suggest a many-to-many relationship between students and advisors, meaning that a student can have multiple advisors and an advisor can advise multiple students. This relationship is commonly seen in academic settings where students seek guidance and support from various advisors with expertise in different areas.

Having multiple advisors allows students to benefit from a diverse range of perspectives, experiences, and skills. This type of relationship can help students navigate their academic journey, make informed decisions, and develop their skills and knowledge in a particular field. On the other hand, advisors can benefit from advising multiple students as they gain a better understanding of the needs, challenges, and aspirations of students. This can enable them to provide more tailored advice and support to each individual student.

Overall, the many-to-many relationship between students and advisors emphasizes the importance of collaboration, communication, and mutual respect. It enables students to receive comprehensive and personalized guidance while allowing advisors to engage with and support a diverse range of students.

Learn more about communication here-

https://brainly.com/question/29811467

#SPJ11

widely used in the areas of business-to-business (b2b) electronic commerce and supply chain management (scm), what term is used to describe a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the internet using virtual private networks (vpns)?

Answers

The term used to describe this network is a Virtual Extranet.

What is network?

Network is a system of computers or other devices connected to each other, usually via cables or wireless technology, that can communicate and share data. It allows users to access, store and exchange information, resources and services. Networks can be local or wide area, private or public, and can range from a single connection between two computers to millions of connected devices spanning the globe. Networks are used for a variety of purposes, including file sharing, streaming audio and video, video conferencing, online gaming and more.

To learn more about network
https://brainly.com/question/29506804
#SPJ4

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

What is the process of locating a IP address for a personal device or a domain?

Answers

Answer:

you go to device settings and theres a thing that says what my ip adress or find a ip adress tracker put in your pc info and find out be carefull tho

Explanation:

you have logged on to alien vault application. after configuring the location, what is the next step that you need to perform?

Answers

You have logged on to alien vault application, after configuring the location, you need to add the sensors.

Powered by AT&T, the fantastic platform Alienvault offers Unified Security Management (USM). It mixes services and protocols, in other words. such as SIEM, log management, intrusion detection, and incident reporting all under one roof for asset identification. on a single platform. Alienvault is currently one of very few platforms of its sort.Alienvault is intended to secure your system from multiple cyberthreats and cyberattacks on a single platform. The majority, if not all, of the services you could require to establish a strong cybersecurity presence are provided by the platform. You may analyze dangers in your digital environment with the aid of the free IT security tools and dashboards provided by Alienvault. Because it is an open-source system, it has a very large number of players, which contributes to its strength. With each person providing the system with the most recent intelligence and fresh danger detections.

Learn more about the Unified security management with the help of the given link:

https://brainly.com/question/6957939

#SPJ4

How are satellite radio, Internet radio, and podcasting different?

Answers

Satellite radio is a subscription-based service, while HD radio is provided at no cost by current radio providers. Internet radio and podcasting have allowed many new programs and stations to be broadcast at low cost.

Exam Instructions
Question 6 of 20:
Select the best answer for the question.
6. Which of the following would most likely indicate the sequence in which milk
travels through a production plant to each stage of a cheese manufacturing
process?
OA. A single-line diagram
OB. A piping schedule
OC. Manufacturer's drawings
OD. A process schedule
Mark for review (Will be highlighted on the review pago)

Answers

A diagram which indicates the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process is: D. A process schedule

What is a process schedule?

A process schedule can be defined as a type of diagram (schematic) which is designed and developed to illustrate the various processes and stages (steps) that are associated with manufacturing of a particular product.

In this context, a process schedule is a diagram which would most likely indicate the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process.

Read more on cheese manufacturing here: https://brainly.com/question/21148228

#SPJ1

Other Questions
What was the main reason(s) spain created colonies in the new world? to find gold and resources to convert people to catholicism to capture people to send to spain as enslaved persons to increase its knowledge of the world The cost C of building a house is related to the number k of carpenters used and the number x of electricians used by the formulaC=15,000+50k2+60x2.(a) Assuming that 10 carpenters are currently being used, find the cost function C, marginal cost function C', and average function C, all as a function of x.C(x) = _____C'(x) = _____C(x)=_____(b) Use te functions you obtained in part (a) to compute C'(16) and C(16).C'(16) = $ _____ per spotC(16) = $ _____ per spot (Round your answer to two decimal places.)Use these two answer to say whether the average cost is increasing or decreasing as the number of electricians increases.a. The average cost is increasing as x increases.b. The average cost is decreasing as x increases. F(x) = 1/3(4-x)2 what is the value of f (16) What's the difference between a major arc and a minor arc? .The management of KSmall Industries is considering a new method of assembling a computer. The current assembling method requires a mean time of 88 minutes with a standard deviation of 7.9 minutes. Using the new method, the mean assembly time for a random sample of 24 computers was 72 minutes.What is the probability of a Type II error? (Round "Critical values" to 2 decimal places and round your final answer to 4 decimal places.) write the sum as a fraction whole number or mixed number in lowest terms 5/14 + 5/14 + 2/14 Which of the following elements is the most reactive metal? a. Aluminumb. Zincc. Carbond. Lithium you buy 6 roses for 2.45 each. 12 carnations for $.99 each and 9 tulips. your total cost is $40.08 how much does each tulip cost? how do scientists make the migration rates of proteins reflect their molecular weights (sizes) and not their charges or shapes? Read this extract and select the 3 complex sentences.It only feels like two minutes since we all waved goodbye to school or college for the summer holiday. Sadly, we're halfway through the break already. Before you know it, youll be cursing your alarm clock and be making your way back to class. In order to get you mentally prepared for your first day back, weve put together a bumper pack of spelling resources to see how many not-so-common words you know. Download the material from the link below, or go to the app or play stores and download the vocab app. Geometry help please !!! I need this for extra credit in school firm a has assets that are mainly in financial securities and liabilities that carry variable interest rates. firm b has the same assets as firm a and the same amount of liabilities, but its liabilities are all at fixed interest rates. if the central bank lowers interest rates, everything else constant, then The second last character in a String str can be accessed bya) str[-3] b) str[-2] c) str[2] d) str[3] a bus travels from El Paso, Texas to Chihuahua Mexico in 6.7 h with an average velocity of 84 km/h to the south. What is the buss displacement? To get the benefits of vertical integration without the accompanying risks, companies can ______. (Check all that apply.) Under the right conditions, it is possible, due to surface tension,to have metal objects float on water. Consider placing a shortlength of a small diameter steel ( = 490 lb/ft3)rod on a surface of water. What is the maximum diameter that therod can have before it will sink? Assume that the surface tensionforces act vertically upward. Note: A standard paper cliphas a diameter of 0.036 in. Partially unfold a paper clip and seeif you can get it to float on water. Do the results of thisexperiment support your analysis? Answer ASAP and only if you know its correctBrainliest to the correct answer! what is the slope of the line that passes through the points -10, 8 and -15 , -7 write your answer in simplest form 20 points help please, giving brainliest!! which of the following statements includes a reasonable refinement that researchers could use in repeating the experiment?responsesstart each population with genetically identical bacterial cells from a single culture to make sure that the initial genetic variation in all of the populations was exactly the same.start each population with genetically identical bacterial cells from a single culture to make sure that the initial genetic variation in all of the populations was exactly the same.start each population with a different species of bacteria to determine whether the same environment has an effect on genetic differentiation.start each population with a different species of bacteria to determine whether the same environment has an effect on genetic differentiation.start each population with bacterial cells that have different genotypes to make sure there is enough genetic variation for selection to occur.start each population with bacterial cells that have different genotypes to make sure there is enough genetic variation for selection to occur.start each population with bacteria that differ from one another by a single mutation to ensure that the initial genetic variation in all populations is known.