Software products such as microsoft office, adobe premiere, and quicken are also called ________.

Answers

Answer 1

Software products such as Microsoft office, adobe premiere, and quicken are also called COTS.

What is Microsoft Office?Microsoft Office, sometimes known as just Office, is a group of client software, server software, and services.Bill Gates made the initial announcement on August 1, 1988, at COMDEX in Las Vegas. Microsoft Word, Microsoft Excel, and Microsoft PowerPoint were included in the initial edition of Office, which was originally marketed as an office suite.With shared capabilities like a common spell checker, Object Linking and Embedding data integration, and the Visual Basic for Apps scripting language, Office applications have become significantly more integrated over time.Under the Office Business Applications moniker, Microsoft also promotes Office as a platform for the creation of line-of-business applications.

To learn more about Microsoft Office refer to the following link:

https://brainly.com/question/15131211

#SPJ4


Related Questions

Question 11
1 pts
Which of the following programming scenarios would benefit most from the use of lists?
Writing a program which calculates the length of an inputted number of days in seconds.
Writing a program which needs to make use of various properties of a car (e.g. its fuel efficiency,
year of manufacturer and model name).
O Writing a program to find the value of 1453 cubed.
O Writing a program to calculate statistics about a large set of exam scores (e.g. highest/lowest
score, median average score).
Question 12
1 pts

Answers

The programming scenarios which would benefit most from the use of lists is: D. writing a program to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score).

Computer programming involves the process of designing, writing and developing executable codes (instructions) or collection of data to perform a specific task on a computer.

In Computer programming, a list refers to an abstract data type that represents a finite number of either ordered or unordered values. Also, a list can be used to perform the following tasks:

Add data items.Delete data items.Store data items.

In this context, a computer program that is used to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score) would benefit most from the use of lists because it contains series of numerical value that can be sorted as an ordered or unordered array.

Read more on lists here: https://brainly.com/question/15092271

What year did polaroid introduce one-step photography with the SX-70

Answers

Answer:

I first saw the Polaroid SX-70—the one-step instant camera introduced in 1972 by the company's co-founder, Dr.

Explanation:

What is the force that resists the motion of an object through a fluid?

Answers

Answer:

Friction (drag)

Explanation:

The force resisting motion through a fluid is a type of friction, that is called drag.

This project will extend your Lab 5B on packing boxes with books that a customer has ordered. Remember that there is only one book per layer, that is, you do not have to worry about the length and width of the box or the book, only the height. Each box is packed with a stack of books that are all the same size. You have boxes that are all the same width and length that fits the book exactly, but they are 2 different heights

Answers

The project to extend Lab 5B on packing boxes with books that a customer has ordered will include two different heights of boxes that are all the same width and length and fits the book exactly. Remember that there is only one book per layer, so you do not have to worry about the length and width of the box or the book, only the height.

Each box is packed with a stack of books that are all the same size. You have boxes that are all the same width and length that fit the book exactly, but they are 2 different heights. You can assume that the books are of a uniform size. The project will extend the concept of packing the books in a stack of height h in a box of height H, where h ≤ H, to the case where two boxes with different heights are available.

The goal of the project is to minimize the amount of space that is left empty in the boxes while still ensuring that all the books can be packed and that the weight limit of each box is not exceeded. There are several approaches to solving the problem. One possible method is to start by packing the books in the taller box, with height H, as if the shorter box does not exist.

Then pack the books that cannot fit in the taller box in the shorter box, with height h, and adjust the packing in the taller box accordingly. This method ensures that all the books can be packed and that the taller box is used as much as possible before resorting to the shorter box.

You can learn more about heights at: brainly.com/question/29131380

#SPJ11

Angela wrote some lines of code that she wants to test. She will need to use __________. IDLE open source a prompt a file path

Answers

Answer:

Python Interpreter

Explanation:

Angela wrote some lines of code that she wants to test. She will need to use a python interpreter. IDLE open source a prompt a file path

A python interpreter helps a programmer to debug his/her codes line by line i.e to check if there are any error present in the code for necessary adjustment. Codes cannot be understood ordinarily by computer because they are are machine languages hence the reason why python interpreter is needed to translate the line of codes of the programming language.

Note that python interpreter will be used to interpret the lines of code due to the learning environment/filepath used which is IDLE.

There are different options to use in programming. Angela wrote some lines of code that she wants to test. She will need to use an  IDLE.

IDLE is known to be a short term for Integrated Development and Learning Environment. This is defined as is an integrated development environment mainly for  Python, which has been compressed together with the default implementation of the language.

IDLE is meant to be a simple IDE and can be used by any beginners, most those from the educational sector or environment.

Learn more about  IDLE from

https://brainly.com/question/16074586

What is omitted from a typical triathlon to create a duathlon?

Answers

A duathlon involves running, riding, and then running again, whereas a triathlon comprises swimming, cycling, and running.

A triathlon combines swimming, cycling, and running whereas a duathlon consists of running, riding, and running again. In a duathlon, the swimming leg is skipped, and competitors begin with a running leg before moving on to cycling and another running leg. This alteration to the classic triathlon format may be necessary owing to the lack of sufficient swimming facilities, or it may be done to make the competition more accessible to people who dislike swimming or would rather concentrate on running and cycling. As an alternative to triathlons, duathlons are well-liked and give competitors a demanding but doable multisport experience.

learn more about duathlon here:

https://brainly.com/question/31238755

#SPJ4

Which is true about font use in presentation slides? bright font colors should always be used. only one font size should be used. font size should be at least 24 point. font and background color should contrast.

Answers

font and background color should contrast is the true statement about font use in presentation slides.

Because Contrast is the synonym for different things. If the font color is the same as the present background, no one will be able to see the text because it will blend into the background.

What is presentation slides?

A slide in a slide show or slide presentation is a single page or image displayed in a slideshow. When watching a ten-picture slideshow, for example, a single image is considered a slide.

A slide is one page of text, images, or animations in a presentation or program such as Microsoft PowerPoint. For example, the slide layout to the right shows four slides.

To learn more about presentation slides, visit: https://brainly.com/question/938745?referrer=searchResults

#SPJ4

Answer: Bright font colors should always be used.

Explanation:

Which of the following data structures can erase from its beginning or its end in O(1) time?

Answers

Where all "the following" i can help you but you said which of the folllowing and ther no picture or anything?

The stack data structure can erase from its beginning or its end in O(1) time.

The O(1) complexity is an illustration of getting operations done in a constant time.

Stack data structure uses the push and pop operations for inserting and deleting items in a linear or constant time.

This implies that, inserting an item into a stack happens in O(1) time, and also; removing an item from the stack, irrespective of the item location (beginning, end, or in between) happens in O(1) time.

Read more about data structure at:

https://brainly.com/question/21287881

how to unlock apple watch without passcode without resetting?

Answers

It's not possible to unlock an Apple Watch without the passcode and without resetting it. To regain access, you'll need to perform a factory reset, which will erase all your data and settings.

For this the following steps can be followed:
1. Put your Apple Watch on the charging dock
2. To make the Power Off slider appear, you should press and hold the side button for a certain period of time..
3. Press firmly on the Power Off slider and release. Now you will see a new screen that displays the option to "Erase all content and settings".
4. To perform a factory reset, you need to select the option "Erase all content and settings" and tap on it.

After the reset, you can pair the watch with your iPhone and restore from a previous backup if you have one available. Keep in mind that this process will erase all data on your watch, and you will need your Apple ID and password to complete the setup.

To know more about factory reset visit:

brainly.com/question/30167370

#SPJ11

) A block of byte long data residing in between and including the consecutive addresses $1000 to $4FFF are to be used to turn on two LEDs that are individually connected to two separate output ports of a system designed around the 68000 microprocessor. Each data byte has a logic 'l' for bit 7 and bit 0 to turn on the LEDs. However, it is known that only bits 7 and 0 of all of the byte long data set in the memory block is corrupted. Write an assembly language program for the 68k that checks the values of bits 7 and 0 of each data byte residing in the memory block in question. The program must change the value of bit 7 and 0 to '1'if they are '0', resulting in a new data value that must be restored back at same address position. On the other hand, if bits 7 and 0 are already '1', the data byte should be retained. The program must also indicate the number of bit 7 and 0 that has been corrected from the data block. The BTST instruction may not be used in your program.

Answers

Here's an assembly language program for the 68000 microprocessor that checks and corrects the values of bits 7 and 0 of each data byte in the memory block while keeping track of the number of corrections made:

```assembly

ORG $1000    ; Start address of the memory block

DATA_BLOCK  DC.B $00,$00,$00,$00   ; Initialize the data block with zeros

RESULT      DC.B $00,$00,$00,$00   ; Resultant data block with corrected bits

CORRECTIONS DS.W 1                 ; Variable to store the number of corrections made

START:

   MOVEA.L #$1000, A0             ; Address of the start of the memory block

   MOVEA.L #$1000, A1             ; Address of the resultant data block

   MOVE.W #0, CORRECTIONS         ; Initialize the corrections counter

   

LOOP:

   MOVE.B (A0)+, D0               ; Get a byte from the memory block

   MOVE.B D0, D1                  ; Make a copy of the byte

   

   ANDI.B #$81, D0                ; Mask out all bits except 7 and 0

   BNE NO_CORRECTION              ; Skip correction if bits 7 and 0 are already '1'

   

   ORI.B #$81, D1                 ; Set bits 7 and 0 to '1' in the copy

   

   ADD.W #1, CORRECTIONS          ; Increment the corrections counter

   

NO_CORRECTION:

   MOVE.B D1, (A1)+               ; Store the corrected byte in the resultant data block

   

   CMPA.L #$5000, A0              ; Check if the end of the memory block has been reached

   BLO LOOP                       ; Repeat the loop if not

   

   RTS                            ; Return from subroutine

```

The program starts at the label `START`, which sets up the necessary registers and initializes the corrections counter.The memory block starts at address `$1000`, and we use the `A0` register to point to the current byte in the memory block.

The `A1` register is used to point to the current byte in the resultant data block, where the corrected bytes will be stored.The `CORRECTIONS` variable is initially set to zero using the `MOVE.W #0, CORRECTIONS` instruction.

Inside the `LOOP`, each byte from the memory block is loaded into the `D0` register using `MOVE.B (A0)+, D0`. A copy of the byte is made in the `D1` register using `MOVE.B D0, D1`. The `ANDI.B #$81, D0` instruction masks out all bits except 7 and 0, allowing us to check their values.

If the result of the `ANDI` operation is nonzero (i.e., bits 7 and 0 are already set to '1'), the program branches to `NO_CORRECTION` to skip the correction step. If the result of the `ANDI` operation is zero (i.e., bits 7 and 0 are '0'), the program proceeds to `NO_CORRECTION` and sets bits 7 and 0 to '1' using `ORI.B #$81, D1`.

After the correction (or no correction), the corrected byte in `D1` is stored in the resultant data block using `MOVE.B D1, (A1)+`. The program then checks if the end of the memory block ($4FFF) has been reached using CMPA.L #$5000, A0 and repeats the loop if it hasn't.

Once the end of the memory block is reached, the program returns from the subroutine using RTS. The number of corrections made is stored in the CORRECTIONS variable, which can be accessed after the program finishes execution.

Learn more about assembly language: https://brainly.com/question/13171889

#SPJ11

ASAP

The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?

- The Great Depression

- World War I

- World War II

- the popularity of television

The first to answer correctly gets a crown and 5 stars. Please help.

Answers

Answer:

The Great Depression and The popularity of television  and the event was The Great Animation Strike  

Explanation:

What security measure is used to slow the movement of personnel when entering or leaving a secure area

Answers

When entering or exiting a secure area, mantrap security measures are utilized to slow down personnel movement.

What kind of physical security precautions are used to make portable gadgets more improbable to be stolen?

In order to prevent theft, loss, and resale, portable equipment like laptops should be properly secured with a lock. The majority of desktop and laptop computers feature built-in slots that can be connected using a cable lock. Most computer stores carry these locks in their inventory.

Which security element is host- or network-based?

Network-based or host-based IDS are both options. Network-based IDSs examine network, transport, and application protocols while keeping track of network traffic for specific network segments or devices in order to spot suspicious activities.

To know more about mantrap security visit :-

https://brainly.com/question/29744068

#SPJ4

In a _error,solution is working but not giving required results

Answers

Answer:

it is a random error

Explanation:

I HOPE THAT THIS ANSWER HELPS YOU

Which one of these is an example of unnecessary debt?
A. You buy a perfectly good used car instead of an expensive new car
B. You buy your groceries on Friday instead of coupon Monday.
C. You charge clothes you don't really need on a high-interest store card.
D. You save up all year to take a great surfing vacation.

Answers

c. you charge clothes you don’t really need on a high-interest store card

hope this helps :)

An example of unnecessary debt is when you change your clothes and don't really need on a high-interest score. Thus option C is correct.

What is unnecessary debt?

An unnecessary debt can be caused by a variety of issues such as expensive life events, having children, or moving to a new house. It may also be due to poor money management. The debt is due to those things that are not needed and hence are unnecessary.

Find out more information about unnecessary debt.

brainly.com/question/3566270

what is the correct java syntax to output the sentence: My dog's name is "dee-dee"?

Answers

Answer:

System.out.println("My dog's name is \"dee-dee\"");

Explanation:

You need to use the backslash to use quotes inside a string.

which of the following is not a type of tab stop? left center justified decimal

Answers

The type of tab stop that is not included in Microsoft Word is Justified. Option c is correct.

The different types of tab stops available in Microsoft Word are:

Left tab stop - aligns text at the left end of the tab stop.Center tab stop - aligns text at the center of the tab stop.Right tab stop - aligns text at the right end of the tab stop.Decimal tab stop - aligns numbers at the decimal point in a column.Bar tab stop - adds a vertical line that starts at the tab stop.

Tab stops are utilized in word processing software like Microsoft Word to enable users to align text at specific points. To view and modify tab stops, select the “View” tab from the ribbon menu and click the “Ruler” checkbox in the “Show” section. The ruler that appears above the document shows the tab stops.

Therefore, c is correct.

Learn more about tab stop https://brainly.com/question/30276904

#SPJ11

Exception in invoking authentication handler User password expired. The Appliance was deployed more than 90 days ago with default settings.

Answers

Answer:

This error message indicates that the user's password has expired, and it needs to be reset to access the appliance. It also suggests that the appliance was deployed more than 90 days ago with default settings, which may have caused the password expiration.

To resolve this issue, follow these steps:

Log in to the appliance using the administrator account or an account with administrative privileges.

Navigate to the user management section and find the user whose password has expired.

Reset the user's password to a new one that meets the password complexity requirements.

Ask the user to log in with the new password and change it to a more secure one.

If the appliance was deployed with default settings, review and update the password expiration policy to avoid similar issues in the future.

It's important to regularly review and update security settings on your appliance to prevent security vulnerabilities and ensure the safety of your data

Suppose users share a 3 mbps link. also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time .

Answers

Each user can transmit data at a rate of 150 kbps on a shared 3 mbps link, with each user transmitting only 10 percent of the time.

In this scenario, the shared link has a capacity of 3 mbps (megabits per second). Each user requires 150 kbps (kilobits per second) when transmitting data. However, each user only transmits 10 percent of the time.

To calculate the maximum number of users that can be supported on this link, we need to consider the effective bandwidth available for each user. Since each user transmits only 10 percent of the time, we can multiply the required bandwidth (150 kbps) by 10 to find the effective bandwidth per user during their transmission periods.

150 kbps * 10% = 15 kbps

Now, we can calculate the maximum number of users using the available link capacity:

3 mbps / 15 kbps = 200 users

Therefore, the shared 3 mbps link can support a maximum of 200 users, with each user transmitting at a rate of 150 kbps during their active periods.

Learn more about transmit data

brainly.com/question/28837869

#SPJ11

Although computers excel at numerical calculations, they are even better at dealing with symbols and three-dimensional objects.
False True

Answers

False, While it is true that computers excel at numerical calculations and can perform them faster and more accurately than humans, it is not necessarily true that they are better at dealing with symbols and three-dimensional objects.

Computers can certainly manipulate symbols and work with three-dimensional objects, but their ability to do so is limited by the algorithms and software programs that are available to them. In some cases, they may be able to perform these tasks more efficiently than humans, but in other cases, they may struggle or be unable to do so without specialized hardware or software.

Additionally, computers lack the context and understanding that humans have when working with symbols and objects. For example, while a computer can recognize a written character or object in an image, it may not understand the meaning or significance behind it in the way that a human can.

new features for microsoft word/excel:https://brainly.com/question/24749457

#SPJ11

Which media example would be best for mayas presentation

Answers

Answer: c. a diagram that explains the steps involved in photosynthesis

Explanation:

The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.

The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.

As a basic user of SAP Business One, which feature of the application do you like most? Elaborate on your answer.

Answers

Answer:

Accounting and financial management

Explanation:

The feature of SAP Business One I like most is "Accounting and financial management"

This is because as a new user I always find it helpful as SAP Business One, assists me in perfecting and automating the financial administration of my small business by using the business software algorithms that easily incorporate and combine accounting, sales, and purchasing data.

Generally, the Accounting and financial management features assist me in enhancing margins, decrease or totally remove errors, and helps in the process of taking efficient short-term and long-term decisions.

put true or false..

1. Static web pages cannot be edited or visitor makes any handle with them. ( )

2. Name attribute used for display a text on the button. ( )

3.submit button used to clear input fields from any previous data ( )

4.HTML language isn't enough to make a confirmation to the data entry ( )​

Answers

1.) False

2.) False

3.) False

4.) False

Describe the contents of a basic program outline.

Answers

Answer:

Oneday

Explanation:

ONEDAY WE WILL BE ABLE TO DO IT!

What is the imitation of representing numbers with fixed point representation?

Answers

Answer:

Hello your question is not complete, The complete question is ; what is the Limitation of representing numbers with fixed point representation

answer:  Limited range of values that can be represented

Explanation:

The limitation of representing numbers with fixed point representation is that there is a Limited range of values that can be represented using this method of representation

Fixed point  representation is a type of representation whereby there is a  fixed number of bits for both integer parts and fractional part.

Critics of technology-assisted distance supervision argue that:
a. technology is a part of the future and the ability to supervise many trainees at one time is important.
b. the inability of distance supervisors to physically assist their supervisees in a crisis response is unacceptable.
c. it is important for supervisors to become adept at utilizing technology in their supervisory relationships because
it will become a necessity in the near future.
d. all professionals must begin educating on technology-assisted distance supervision because all states now have
regulations for this issue.

Answers

While it is true that all states now have regulations regarding technology-assisted distance supervision, critics argue that simply requiring professionals to educate themselves on this issue may not be sufficient. Critics contend that there are potential risks and downsides to using technology-assisted distance supervision, such as the potential for miscommunication or misinterpretation due to technological glitches or limitations.

Additionally, critics argue that relying too heavily on technology-assisted distance supervision could undermine the data  of face-to-face interactions and relationship-building between supervisors and their supervisees. Thus, critics of technology-assisted distance supervision believe that it is important to carefully consider the potential drawbacks and limitations of this approach, and to approach it with caution and a critical eye.

To learn more about data click here: brainly.com/question/29117029

#SPJ11

what do you think about the cursed cat?

i like it :3

what do you think about the cursed cat?i like it :3

Answers

Answer:

Explanation:

looks amazing

Answer:

thats me but low cost lol

-CC

Please help with this code!

Please help with this code!

Answers

import random

months = ["jan", "feb", "mar", "apr", "may", "june", "july", "aug", "sept", "oct", "nov", "dec"]

pick1 = random.choice(months)

pick2 = random.choice(months)

if months.index(pick1) < months.index(pick2):

   print(pick1)

   print(pick2)

else:

   print(pick2)

   print(pick1)

Since the months are already in chronological order in the list, we can compare their index and print the string with the smaller index first. I wrote my code in python 3.8. I hope this helps.

What is the default file setting for quick export with transparency?.

Answers

Answer:

Go to Edit > Preferences > Export. Select File > Export > Export Preferences.

the configuration will be Edit > Preferences > Export. Select File > Export > Export Preferences in photoshop.

what is photoshop  ?

Photoshop is a graphic editor software developed by Adobe Incorporation  popular software and used in any industries in editing digital art and raster graphics now a days.

several color compositions like CMYK,  RGB, CIELAB, duotone can be supported by this software which involve in conversion and change of the color values of the graphics.

There are multiple number of application of Photoshop which show many benefits like the versatility to mix and mix picture content and textual content, create a content effect,  shadows, textures, and embosses, manipulation of images in creative ways and re-create images

Photoshop can Correct color, Reduce red eye, Add borders, Change to grayscale, Work with layers

For more details regarding photoshop, visit

brainly.com/question/15385979

#SPJ2

I need an open response pleaseeeeeee

The format is "Describe‌ ‌the‌ ‌smart‌ ‌home‌ ‌devices‌ ‌impact‌ ‌of‌ ‌technology‌ ‌on education"

Answers

Answer:

Explanation:

Smart Home devices have had a large impact on education. It has allowed students of all ages to better understand the concept of interconnected devices and artificial intelligence. This alone has also opened up a new door of information by allowing for instant answers to question through such smart home devices as Alexa or Home. Which are artificial intelligence virtual assistants.

re write the program below and correct all the errors

one = 1
two = 2
three = 3
four = one + two + 3
print(Four).

hello = "hello
world = "world"
helloWorld = hello + " " world
Print((helloworld))

Answers

one = 1

two = 2

three = 3

four = one + 3

print(four)

hello = "hello"

world = "world"

helloWorld = hello + " " + world

print(helloWorld)

Other Questions
Name of the first colony that the British tried to build, it would later beabandoned and known as, The Lost Colony". PLEASE HELP ME WITH THIS QUESTION PLEASE PLEASE PLEASE Why is modern species extinction often linked to livestock production (meat consumption)?O fences and containment borders needed for livestock productionvaccinations and antibiotic usage in livestock productionThe consumption of corn by livestockDemand for water consumption in livestock Five of the 25 girls on Alden Middle Schools soccer team are seventh-grade students. Find the percentage of seventh graders on the team. A system of equations consists of a line s of the equation y = x 5 and a line t that passes through the points (0, 2) and (8, 4). Answer the questions about line t to write the equation.What is the slope of line t?A. -0.75B. -0.5C. 0.5D. 0.75What is the y-intercept of line t?A. -4 B. 0 C. 2 D. 8 What is the equation in slope-intercept form of line t?A. y = 0.75x + 2B. y = 0.5x 4C. y = 0.5xD. y = 0.75x + 8 What does Swift tell his readers is his proposed solution to the social problem?Group of answer choicesa. Eat the poor Irish childrenb. Eat the poor English childrenc. Eat the rich Irish landlordsd. Eat the rich English landlord Mike Jaddoo presented "magic" performances in South Africa in February 2019. He presented 10 performances up to and including one on 29 February 2019 and was paid R5 000 for each performance. Part of each performance is to pick pocket a R200 note from a member of the audience. This R200 note he keeps until the following day when he approaches his "victim" and bets R200 that the victim will be given R200 within three minutes. Although Mike has performed this trick for 18 years throughout South Africa and the rest of the world all his victimsaccept the bet. At the point in time he produces the R200 note that he had stolen that night before from "his" victim and gives it back to him. Mike therefore wins the bet. As a result, he keeps the R200 he would otherwise have had to return. Indicate in which year or years of assessment the amounts in question may be said to have "accrued" to the various taxpayers. Brief reasons should be furnished to support your answer. the antonine wall, the northernmost boundary of the roman empire, is located in what country? Family VisitsEvery two months, Renaldo's family buys a pool passso they can use the park district swimming pools. Renaldosay that they spend more than $400 per year for the pass.His brother Oscar says they spend $244.4. Analyze and Persevere How many times did the family buya pool pass during a year? Explain. thomas jefferson attempted to decrease the public debt by a. increasing excise taxes b. reducing government spending c. raising import duties d. freezing the size of the army e. increasing the size of the military * seafloor spreading causes rock that is closer to oceanic ridges to be younger in age than rock that is farther away * subducting plates cause old crust to melt as it rejoins the mantle * colliding continental crust is thrust upwards to build mountains what can best be concluded from this information? Light intensity (I) is proportional (a) to the inverse square of distance (d) of a subject from a lightsource. The relationship in intensities for subjects at different distances from the same source canbe likewise seen as a ratio or proportional relationship.I xA proportional relationship can be mathematically expressed as follows for light intensity (I) inlumens when a subject is at the light source.Lumens at current distanceLumens at origin or sourceSo, if a light intensity (I) is 516 lumens at the source and 4 lumens at a specific distance from thesource, what is that distance?Round the value to the nearest tenth if necessary. You do not need to include a label for distance.Only the number, rounded to the tenth, will be necessary. What action did the French take to begin trading in Texas? an advantage to joining a family business is ... What will these look like? Based on the title, what can you infer is the structure of the text?"Democracy in America"descriptioncomparisoncause and effectsequenceproblem and solution Existe relaciones entre las caractersticas de la participacin sealadas en la lectura y las experiencias de participacin vivenciadas por las y los estudiantes de las instituciones educativas List any examples of poetic devices or figurative language that you've found.The Charge of the Light BrigadeHalf a league, half a league,Half a league onward,All in the valley of DeathRode the six hundred:'Forward, the Light Brigade!Charge for the guns' he said:Into the valley of DeathRode the six hundred.'Forward, the Light Brigade!'Was there a man dismay'd ?Not tho' the soldier knewSome one had blunder'd:Theirs not to make reply,Theirs not to reason why,Theirs but to do and die,Into the valley of DeathRode the six hundred.Cannon to right of them,Cannon to left of them,Cannon in front of themVolley'd and thunder'd;Storm'd at with shot and shell,Boldly they rode and well,Into the jaws of Death,Into the mouth of HellRode the six hundred.Flash'd all their sabres bare,Flash'd as they turn'd in airSabring the gunners there,Charging an army whileAll the world wonder'd:Plunged in the battery-smokeRight thro' the line they broke;Cossack and RussianReel'd from the sabre-stroke,Shatter'd and sunder'd.Then they rode back, but notNot the six hundred.Cannon to right of them,Cannon to left of them,Cannon behind themVolley'd and thunder'd;Storm'd at with shot and shell,While horse and hero fell,They that had fought so wellCame thro' the jaws of Death,Back from the mouth of Hell,All that was left of them,Left of six hundred.When can their glory fade?O the wild charge they made!All the world wonder'd.Honour the charge they made!Honour the Light Brigade,Noble six hundred!---------------------------------------------------summarize the poemput the poem into your own words What do science students call a DNA molecule produced by combining DNA from different sources?A) a mutantB) a hybrid) a polyploidD) recombinant DNA Policies emphasizing neighborhood enhancement, better education, and job opportunities are based on ______ theoriesa. classical b. psychological c.biological d. sociological