The largest social networking site, ________, originally had a focus of connecting friends and family.

Answers

Answer 1

The largest social networking site Face-book originally had a focus of connecting friends and family.

What is a social network?

A collection of social actors, groups of dyadic links, and other social interactions amongst actors make form a social network, which is a type of social structure.

As we know,

Social networking is the practice of maintaining contact with friends, family, or colleagues using online social media platforms.

Face-book, the most widely used social networking platform in the United States.

Marketers utilize social media to build brand awareness and foster customer loyalty.

Thus, the largest social networking site Face-book originally had a focus of connecting friends and family.

Learn more about the social network here:

https://brainly.com/question/14312767

#SPJ4


Related Questions

A post made to your favorite social media application 5 years ago can add information to your digital footprint.

Answers

Answer:

True

Explanation:

Anything you search, or post, etc, is added to your digital footprint.

For Questions 2-4, consider the following program:

def tryIt(x, y = 1):

return 10 * x * y

#MAIN

n = int(input('Enter a number: '))

ans = tryIt(n) + 1

print (ans)


What is output if the user enters 5?

Answers

The output is 251 if the user enters 5.

What is the outcome of this code?

Output, put simply, is the outcome obtained after all the code has been executed. That is what is entered into the console after all calculations are complete. In essence, it is what is discharged.

Here is how we obtain that result:

The user is initially asked to provide a number, and we suppose they enter 5.

Then, with n as the argument, we call the tryIt function. For y, the default value of 1 is used because we did not supply a second option. Hence, the tryIt function outputs:

10 * 5 * 1 = 50

To the tryIt(n) result, we add 1:

50 + 1 = 51

The value of ans, which is 51, is printed last.

To know more about output visit:-

https://brainly.com/question/18133242

#SPJ1

A predefined formula that performs calculations by using specific values in a particular order or structure.

Answers

Using specified values in a predetermined order or structure, a function is a formula that already exists and executes calculations.

A function is a predefined formula in mathematics, engineering, computer science, and other fields that performs a specific task by using a set of inputs, known as arguments or parameters, and returns a result. Functions are used to simplify complex calculations or operations, and they typically follow a specific syntax or structure that determines how the inputs and outputs are processed.

Functions can perform a wide range of tasks, from basic arithmetic operations like addition and subtraction to complex statistical analysis, data processing, and machine learning algorithms. They can take any number of inputs and return any type of output, depending on their specific purpose and implementation.

Functions are widely used in programming languages like Python, Java, and C++, as well as in spreadsheet applications like Ms Excel and Sheets, where they provide a powerful tool for performing calculations and automating tasks.

Learn more about  function here:

https://brainly.com/question/29796477

#SPJ4

Cloud architects have been largely replaced by ScrumMasters.

True

False

Answers

True much larger than scrum masters

The answer is False

Took the test

12 / 4 * 3 div 2 tin học

Answers

Answer:

9/2 is the answers for the question

Explanation:

please mark me as brainlest

You need some software for an advanced math class that you are taking. You have the option of locally-installed, the local network hosted, or cloud-based. Considering your own personal circumstances, which would you choose, and why?

Answers

Any software that is stored, controlled, and made accessible through the cloud is simply referred to as "cloud-based software."

What is cloud computing?In layman's terms, cloud computing is a collection of services made available via the internet, or "the cloud." It entails using remote servers to store and access data rather than local hard drives and personal datacenters.Before cloud computing, businesses had to buy and operate their own servers to satisfy business demands. In order to accommodate peak traffic levels and limit the likelihood of disruptions and downtime, this needed purchasing enough server capacity. As a result, a lot of server space was unused. With the aid of modern cloud service providers, businesses can do away with expensive onsite servers, maintenance staff, and other IT resources.

To Learn more About cloud-based software refer to:

https://brainly.com/question/19057393

#SPJ4

A blank is a source of data where collections of information are stored.

Answers

Answer:

The correct answer is database

Explanation:

I just did the assignment on edge and got it right

Answer:

database

Explanation:

hope you have an awsome day :)

Write a program in c to print the individual characters of a string in reverse order, separated by commas. note: you need to input the string (size <= 100) from the terminal. the input doesn't have spaces.

Answers

Here's an example program in C that prints the individual characters of a string in reverse order, separated by commas:

#include <stdio.h>

#include <string.h>

int main() {

 char str[101];

 scanf("%s", str); // input the string

 int len = strlen(str);

 for (int i = len - 1; i >= 0; i--) {

   printf("%c,", str[i]); // print the character followed by a comma

 }

 return 0;

}

Explanation:

   First, we declare a character array str of size 101 to store the input string.

   We use the scanf() function to input the string from the terminal.

   We use the strlen() function to get the length of the string.

   We loop through the string in reverse order, starting from the last character and going backwards.

   Inside the loop, we use the printf() function to print each character followed by a comma.

   Finally, we return 0 to indicate successful execution of the program.

Note: This program assumes that the input string does not have any spaces. If the input string has spaces, you can use fgets() function to input the string instead of scanf().

The loop in the C program is used to traverse the input string in reverse order and print each character along with a comma.

What is the purpose of the loop in the C program?

The task at hand is to write a C program that prints the individual characters of a string in reverse order, separated by commas.

The first step is to declare a character array to store the input string, which can be done using the syntax char string[100]; for a string with a maximum size of 100 characters.

Next, the input string needs to be read from the terminal. This can be accomplished using the scanf function with the format specifier %s, which reads a string of characters from the standard input stream. The input string will be stored in the string array.

Once the input string is stored in the array, we need to traverse it in reverse order and print each character along with a comma.

This can be done using a loop that starts at the end of the array and iterates until the beginning of the array is reached. Within the loop, each character is printed using the printf function with the format specifier %c, followed by a comma.

The final step is to add a newline character to the end of the output to make it more readable. This can be done using the printf function with the format specifier "\n".

Overall, the C program to print the individual characters of a string in reverse order, separated by commas, can be written as follows:

c

Copy code

#include <stdio.h>

int main() {

 char string[100];

 scanf("%s", string);

 int length = strlen(string);

 for (int i = length - 1; i >= 0; i--) {

   printf("%c,", string[i]);

 }

 printf("\n");

 return 0;

}

This program reads the input string from the terminal using scanf, then iterates through the array in reverse order using a loop and prints each character along with a comma using printf.

Finally, it adds a newline character to the end of the output using another printf statement.                                            

Learn more about C program

brainly.com/question/30905580

#SPJ11

I hey could use the Internet access documents on the company network, and communicate with customers, managers and fellow employees using email, telephone and virtual access to reach out to their clients, conduct meetings as well as face to face . YOUR TASK FOR THE ASSIGNMENT - Write a MEMO to Heather Miller, your company president, discussing the pros and cons of the proposal plan. - Recommend whether or not she should adopt the plan. - Provide her with relevant information as to why it should be considered for the employees to work from home. - When providing your information consider the security measures of using your home equipment, how secure are they? - How reliable are they? - Also try to show the amount of time employees have to commute each day - Try to make your response in favor of the request of the employees KEY FACTORS TO LOOK AT IN THE CASE - Address the main subject of the Memo - Organize the most important points from the case before you begin writing - Address the main subject of the Memo (in the subject line as well as the opening sentence) - The use of the 5W

s - Remember to provide a Memo format for the assignment as shown in your online textbook.

Answers

It reduces commuting time, increases job satisfaction, and allows for a better work-life balance. However, it is crucial to address the security and reliability concerns associated with using home equipment.

I am writing to discuss the proposal for implementing remote work arrangements within our company. After careful consideration, I recommend adopting this plan due to the numerous benefits it offers. Remote work enables employees to access company documents, communicate with clients, managers, and colleagues through various means, and conduct meetings effectively.

I highly recommend adopting the proposed remote work plan for our employees. By allowing them to work from home, we can harness the power of the internet to provide them with access to necessary company documents and facilitate communication with clients, managers, and fellow employees. This will enhance productivity and efficiency, as employees can seamlessly collaborate and stay connected through email, telephone, and virtual meetings.

One of the significant advantages of remote work is the reduction in commuting time. Employees no longer have to endure long and stressful daily commutes, which can have a negative impact on their well-being and productivity. By eliminating this commute, they gain valuable time that can be devoted to work or personal activities, leading to increased job satisfaction and a better work-life balance.

However, it is important to address the security and reliability concerns associated with using home equipment. Adequate security measures, such as VPNs and encryption protocols, must be implemented to ensure the protection of company data. Additionally, employees should receive training on best practices for maintaining a secure work environment at home. Regular IT support and maintenance should also be provided to ensure the reliability of home equipment, minimizing any potential disruptions to work.

In conclusion, adopting the proposal for remote work arrangements offers numerous benefits for our employees and the company as a whole. It promotes efficient communication, reduces commuting time, increases job satisfaction, and provides a better work-life balance. While security and reliability concerns must be addressed, these can be mitigated through the implementation of appropriate measures. Therefore, I recommend moving forward with the plan and embracing the advantages that remote work can bring.

Sincerely,

[Your Name]

[Your Position/Department]

Learn more about commuting time here:
https://brainly.com/question/12951274

#SPJ11

one security component that doubles as a network component

Answers

Answer:

is the sentence above the question?

Answer:

It is to enter the site and then it will protect you in terms of form and appearance, and so on as required

Read two doubles as the voltage and the current of a wire object. declare and assign pointer mywire with a new wire object using the voltage and the current as arguments in that order. then call mywire's increasevoltageandcurrent() member function. ex: if the input is 1.5 4.0, then the output is:

Answers

Answer:

Find solutions for your homework

Find solutions for your homework

engineeringcomputer sciencecomputer science questions and answerstwo doubles are read as the voltage and the current of a wire object. declare and assign pointer mywire with a new wire object using the voltage and the current as arguments in that order. ex: if the input is 4.5 1.0, then the output is: wire's voltage: 4.5 wire's current: 1.0 #include &lt;iostream&gt; #include &lt;iomanip&gt; using namespace std; class wire

This problem has been solved!

You'll get a detailed solution from a subject matter expert that helps you learn core concepts.

See Answer

Question: Two Doubles Are Read As The Voltage And The Current Of A Wire Object. Declare And Assign Pointer MyWire With A New Wire Object Using The Voltage And The Current As Arguments In That Order. Ex: If The Input Is 4.5 1.0, Then The Output Is: Wire's Voltage: 4.5 Wire's Current: 1.0 #Include &Lt;Iostream&Gt; #Include &Lt;Iomanip&Gt; Using Namespace Std; Class Wire

Two doubles are read as the voltage and the current of a Wire object. Declare and assign pointer myWire with a new Wire object using the voltage and the current as arguments in that order.

Ex: If the input is 4.5 1.0, then the output is:

Wire's voltage: 4.5 Wire's current: 1.0

#include <iostream>

#include <iomanip>

using namespace std;

class Wire {

public:

Wire(double voltageValue, double currentValue);

void Print();

private:

double voltage;

double current;

};

Wire::Wire(double voltageValue, double currentValue) {

voltage = voltageValue;

current = currentValue;

}

void Wire::Print() {

cout << "Wire's voltage: " << fixed << setprecision(1) << voltage << endl;

cout << "Wire's current: " << fixed << setprecision(1) << current << endl;

}

int main() {

Wire* myWire = nullptr;

double voltageValue;

double currentValue;

cin >> voltageValue;

cin >> currentValue;

/* Your code goes here */

myWire->Print();

return 0;

How do I assign a message center reader role?

Answers

Active Users is a tile in the Office 365 Admin Center that allows current global admins to give users the Message Center Reader role.

Which identities are eligible to receive the reports reader role?

Which identities are eligible for the Reports reader role  rates every educator as a subject-matter authority. only RG1 and User1: In the Microsoft 365 admin center, users with this role have access to utilization reporting data.

How can I give Exchange a position as an administrator?

The second step is to access the Exchange admin center by clicking Admin on the left pane. Step 3: Choose "Roles" > "Admin roles." Step 4: Click the admin role group that needs to be assigned to a user from the list.

To know more about Message Center Reader role visit :-

https://brainly.com/question/30172963

#SPJ4

let g = ( v , e ) be an undirected graph where v = { a , b , c , d , e , f , g , h }

Answers

g = ( v , e ), where v = { a , b , c , d , e , f , g , h } is an undirected graph. Here are the definitions of undirected graph, vertices, and edges:

An undirected graph is a graph in which all edges are bidirectional, or in other words, there is no direction for an edge.Edges:An edge is a line between two vertices that represents a connection between two vertices.

Vertices:Vertices are a set of points in which each point represents an object, person, or node. They are also known as nodes. An undirected graph is graph, i.e., a set of objects (called vertices or nodes) that are connected together, where all the edges are bidirectional. An undirected graph is sometimes called an undirected network. In contrast, a graph where the edges point in a direction is called a directed graph.

Let's add some edges to our graph (g).Below is the graph, g with all the edges connected:We now have a fully connected graph with 8 vertices.

Learn more about undirected graph at

brainly.com/question/13198984

#SPJ11

Helllppppppp plzzzzzzzz

Helllppppppp plzzzzzzzz

Answers

Answer:

i help you

ife ifrt ksd

its a study meeting of girls i am also girl here we only study boy were not allowed because he disturb here we only study its safe meeting of girl

Question 7 (1 mark) In a computer information system control procedures that provide reasonable assurance that the recording, processing and reporting of data are properly performed for specific appli

Answers

Control procedures in a computer information system ensure proper recording, processing, and reporting of data for specific applications.

In a computer information system, control procedures play a vital role in maintaining the integrity, accuracy, and reliability of data. These procedures are designed to provide reasonable assurance that the recording, processing, and reporting of data are performed correctly and in accordance with predefined standards and objectives.

Control procedures encompass a range of measures implemented to minimize the risks associated with data manipulation and ensure the system operates effectively. They can include both preventive and detective controls. Preventive controls aim to prevent errors or irregularities from occurring in the first place, while detective controls focus on identifying and correcting errors or discrepancies that may have occurred.

Examples of control procedures include access controls, segregation of duties, data validation and verification, data backup and recovery mechanisms, error handling procedures, and audit trails. These procedures are typically documented and enforced through policies, protocols, and system configurations.

By implementing control procedures, organizations can reduce the risk of data inaccuracies, unauthorized access, and fraudulent activities. They provide a level of assurance that data is processed in a controlled and secure manner, ensuring the reliability of the information produced by the computer information system.

Learn more about control procedures

brainly.com/question/30623695

#SPJ11

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

Fill in the Blank

Complete the sentence.

______allows a data type to be changed to one that is specified by the user.

Answers

Answer:

a0 - Typecasting

Explanation:

Backspace that is the answer for ur question

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

What are antivirus software's with examples

Answers

Answer: An antivirus is a software that helps keep a computer system healthy and free of viruses and other types of malware. Some famous examples of antivirus software are McAfee, Kapersky, Norton and more.

Answer: Antivirus software's are software's that help protect your shared networks against malicious attacks like Trojan Horses and ransomware. Antivirus tools can help you speed up the performance of your computer as they can declutter cached threats. Antivirus apps can help you keep your data secure and protected so you won't lose them.

I have a aline gaming laptop and it has ransome ware on it that wants 2000$ can i get it back????

Answers

Answer:

Umm

Explain

yea i think you can  

Answer:

take out the Hard Drive or SSD and take it to a data recovery place. It should be much cheaper there. Maybe $100 or so.

Explanation:

Which is a computing device that connects network s and exchange data between them

Answers

A computing device that connects networks and exchanges data between them is called a router. A router is a network device that is responsible for directing traffic between different networks. It is used to interconnect networks that have different architectures or different protocols.


A router examines the destination address of the data packets that are received, and it then forwards the data packets to the correct destination network. A router determines the most efficient path for the data to travel, which helps to ensure that data packets are delivered quickly and reliably. Routers operate at the network layer (Layer 3) of the OSI model, and they use routing protocols to exchange information with other routers.

Routing protocols enable routers to learn about the topology of the network, which helps them to determine the best path for data packets to travel. In summary, a router is a computing device that connects networks and exchanges data between them. It is used to direct traffic between different networks, and it enables different networks to communicate with each other. A router operates at the network layer of the OSI model, and it uses routing protocols to exchange information with other routers.

To know more about router visit:

https://brainly.com/question/32128459

#SPJ11

Why are electric cars better than gas cars. If you have the time I prefer at least a paragraph. Thank you!

Answers

Electric cars are better then gas cars, as they don’t use gasoline as gasoline is highly toxic and flammable! But also when gasoline evaporates it pollutes the air. While electric cars, use electricity it’s a plus as it’s cheaper then cars that run on gas. Also as more people use electric cars the oil company shall shrink which is pro for the world, including climate change and more!

Research has shown that electric cars are better for the environment. They emit less greenhouse gases and air pollutants over their life than a petrol or diesel car. This is even after the production of the vehicle and the generation of the electricity required to fuel them is considered.

assume that you are given a polynomial time algorithm that given a 3- sat instance decides in polynomial time if it has a satisfying assignment. describe a polynomial time algorithm that finds a satisfying assignment (if it exists) to a given 3-sat instance.

Answers

Given a 3-SAT instance, use the algorithm that decides if it has a satisfying assignment. If it has one, output it. Otherwise, there is no satisfying assignment, and the algorithm can return a failure.

How to determine a polynomial time algorithm that finds a satisfying assignment (if it exists) to a given 3-SAT instance?

Assuming we have a polynomial time algorithm that can decide whether a 3-SAT instance has a satisfying assignment or not, we can use that algorithm to find a satisfying assignment in polynomial time.

The algorithm can first run the decision algorithm to check whether the 3-SAT instance has a satisfying assignment. If it has one, we can simply output the assignment and the algorithm terminates. If not, we proceed with the following steps.

The algorithm can then generate all possible assignments for the given 3-SAT instance and check each one in turn using the decision algorithm. If a satisfying assignment is found, it can be outputted and the algorithm terminates. If no satisfying assignment is found among all possible assignments, the algorithm returns a failure.

Since the decision algorithm itself runs in polynomial time, and the number of possible assignments for a 3-SAT instance is also polynomial, this algorithm will also run in polynomial time.

Learn more about 3-SAT

brainly.com/question/15088390

#SPJ11

in a communication process, the ________ initiates a message by encoding a thought.

Answers

In a communication process, the sender initiates a message by encoding a thought.

What happens during communication?

The communication process, a dynamic framework, describes the transmission of a message between a sender and receiver across various communication channels. Its goal is to ensure that the message is effectively deciphered and that the recipient may give feedback fast and easily.

What is meaning of encoding in communication?

The process of converting thoughts into communication is called encoding. The encoder uses a phone conversation, email, text message, in-person meeting, or another form of communication as the "medium"  phone conversation, email, text message, in-person meeting, or another form of communication is used as the "medium" the encoder to transmit the message. The message encoding may involve varying degrees of conscious thought.

To know more about communication process click:

https://brainly.com/question/26152499

#SPJ1

Although not all programming environments support documentation in the form of comments, when programmers use one that does support it, they should be adding comments throughout the programming process. Although the comments are ignored by the compiler when executing, they are still useful. Which of the following are true about documentation / comments?
a. It helps in developing and maintaining correct programs when working in an individual or collaborative setting.
b. It provides a way to acknowledge any code segments that were developed collaboratively or by another source (generally this acknowledgement is in the form of the author’s name and the origin of the code).
c. It is used to describe the function of a code segment, procedure or program and how it was developed.
d. All of the above

Answers

The following are true about documentation/comments:

It helps in developing and maintaining correct programs when working in an individual or collaborative setting.It provides a way to acknowledge any code segments that were developed collaboratively or by another source (generally this acknowledgement is in the form of the author’s name and the origin of the code).It is used to describe the function of a code segment, procedure or program and how it was developed.

What is a Comment?

A comment is referred to a programmer-readable explanation

or annotation in the source code of a computer program.

Comments are used to perform the functions mentioned above

which is why the option D is the most appropriate choice.

Read more about Documentation/Comments here https://brainly.com/question/1504175

starting at vertex f, use prim's algorithm to find the minimum spanning tree. what are the 4 nodes added to the tree after node f?

Answers

16 spanning trees can be created from a complete network with 4 vertices using prim's approach to determine the smallest spanning tree.

How many spanning trees can there be in a graph?

When a network has n vertices and is considered complete, the total number of spanning trees is equal to n(n-2) where n is the total number of nodes in the graph.

How many different graphs are possible with four nodes?

There are only two realizations that are isomorphic, hence the solution is straightforward. They have a size of two automorphism groups (they are symmetric to reflection, see also IGBlissAutomorphismCount ). Accordingly, only 4! / 2 = 12 of the 4! = 24 permutations of vertices result in distinctive labelled graphs.

To know more about spanning trees visit :-

https://brainly.com/question/13148966

#SPJ4

Can you guys please help?!

Can you guys please help?!

Answers

Answer:

The parameter is "an". Parameters are located in the method header between the parenthesis.

Question 7 of 10
Charts are most useful for which task?
A. Removing data that is not useful from a spreadsheet
B. Organizing data into a new spreadsheet
C. Creating more columns in a spreadsheet
D. Creating visual displays of data for presentations

Answers

In order to make it simpler to understand enormous amounts of data as well as the relationships between various series of data, series of numeric data are displayed in charts in a graphical manner.

What is Charts?A chart, also known as a graph, is a graphic representation for visualizing data in which "the data is represented by symbols, such as bars in a bar chart, lines in a line chart, or slices in a pie chart." A chart can show functions, some types of quality structures, or tabular numerical data and can convey a variety of information.As a graphic way to convey data, the word "chart" can mean several different things:An example of a diagram or graph that organizes and depicts a collection of quantitative or qualitative data is a data chart.Charts, such as a nautical chart or an aeronautical chart, are oftentimes referred to as maps that are embellished with additional information (map surround) for a particular purpose and are typically distributed across multiple map sheets.A record chart for album popularity or a chord chart in music notation are examples of other domain-specific constructions that are commonly referred to as charts.

To Learn more About charts refer To:

https://brainly.com/question/25032284

#SPJ1

does anyone have a pdf of the greatest by eddie van der meer????

Answers

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

how can the constructor be identified in a class file? the name of the constructor is the same as the name of the class. the name of the constructor is the same as the name of the file. the constructor is like a method, but it has no return type.

Answers

A constructor can be identified by its name because it has the same name as that of the class name at which it is defined. So option A: "the name of the constructor is the same as the name of the class" is correct.

In object-oriented programming, a constructor is a special kind of method of a class or structure that initializes a newly created object of that kind. The constructor is called automatically, whenever an object is created. The constructor has a special feature that it has the same name as its class name. And in cases there is more than one constructor, then the arguments for each constructor must differ in type or in number from the others. Also, a constructor cannot have a return value so it is not permissible to specify a return value for it.

You can learn more about constructor at

https://brainly.com/question/13267121

#SPJ4

Other Questions
the food and agricultural organization has estimated that livestock in the united states account for of the nation's soil erosion, Use point slope form to write the equation of a line that passes through the point (14,1) with slope 2/3 match each level of protein structure with the covalent/non-covalent interaction or entropic driving force that is featured in its construction. Read the excerpt from Raymond's Run.I was once a strawberry in a Hansel and Gretel pageant when I was in nursery school and didnt have no better sense than to dance on tiptoe with my arms in a circle over my head doing umbrella steps and being a perfect fool just so my mother and father could come dressed up and clap. Youd think theyd know better than to encourage that kind of nonsense. I am not a strawberry.What does the narrative voice in this excerpt tell readers about Squeakys character?She wishes she could be more like other girls in school.She worries that her parents are disappointed with her.She knows who she is and is comfortable with herself.She thinks that she is good at and succeeds in everything. when two waves with equal and opposite amplitude interfere what will the resulting amplitude measure Directions: Match the letter with the statement for 15-17 describe the difference between the economy of Athens and sparta When Juan started his company he had 47 employees. The next year (1) he had 54employees. What would the point-slope equation be, showing y as the number ofemployees he had the next year? 16. The elevation of City of Santa Clara is approximately 75 ft. What is the elevation in centimeters? (1ft = 12in; 1in = 2.54cm) I NEED HELP PLEASE MATHMATH MATH Use a protractor to measure all four angles inside quadrilateral abcd. write the measure of each angle to the nearest whole degree. Which set of elements are ordered from small atomic radius to largest atomic radius? a.Fluorine, Chlorine, Bromine, lodine b.Bromine, lodine, Chlorine, Fluorine c.Chlorine, Fluorine, Bromine, lodine d.lodine, Bromine, Chlorine, Fluorine What is the difference between external and internal in history? angles between parallel lines find angles a, b, c, d Based on the text of president carter's speech and the summary of his human rights record, describe his approach to foreign policy based on human rights. why did president carter think the united states had a special responsibility to uphold human rights around the world? State two (2) examples of osmosis occurring in everyday life The hoplites werea.nobles who ruled early city-states.c.slaves.b.wealthy merchants.d.non-noble soldiers.I need help with this question put the fraction in least to greatest 1/5, 5/5 ,4/5 How do I solve this problem 34=p+19 what is the quotient of 5/4?(I'll give brainliest if you answer, thanks!