The operating system task of scheduling central processing unit (CPU) time to programs is the function of *


(A) file management

(B) process management

(C) memory management

(D) peripheral management​

Answers

Answer 1

Answer:

It would be B; process management??

Explanation:

U can correct me if I'm wrong

Answer 2

The operating system task of scheduling central processing unit (CPU) time to programs is the function of; B: Process Management.

Components of operating systems includes;

File ManagementProcess ManagementI/O Device ManagementNetwork ManagementMain Memory managementSecondary-Storage ManagementSecurity Management

Now, from the options, the only one that is not among the components is peripheral management.

However, by definition the only option that among the other 3 that represents the operating system task of scheduling central processing unit (CPU) time to programs is the function of process management.

Read more about process management at; https://brainly.com/question/25646504


Related Questions

You are researching the Holocaust for a school paper and have located several Web sites for information.In three to five sentences, describe the method you would use to determine whether each Web site is a suitable source of information for your paper.

Answers

I suggest the following methods to determine whether a website is a suitable source of information for a school paper on the Holocaust:

The Method

Check the credibility of the website by examining the author's qualifications, credentials, and institutional affiliation.

Evaluate the accuracy of the information by comparing it with other reliable sources on the same topic.

Check the currency of the information by looking at the date of publication or last update. Avoid using outdated information.

Analyze the objectivity of the website by checking for any bias or slant towards a particular perspective or ideology.

Lastly, check the website's domain name and extension to verify its origin, as some domains may have questionable reputations.

Read more about sources here:

https://brainly.com/question/25578076
#SPJ1

Computer 1 on network a, with the ip address of 10.1.1.8, wants to send a package to computer 2, with the ip address of 10.1.1.10. on which network is computer 2?

Answers

=65

SOLUTION:- According to the problem we have:-

Definition to approach the problem:- As To do these practical following steps should be done: 1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are any, just whack the whole end off, Thus by using above definition we have the value of the TTL once it reaches its destination will be

62+3

=62+3=(65)

Thus option B should be right there.

Explanation:Please refer to solution in this step.

Answer:

Thus option B should be right there.

=62+3=65

you can learn more through link below:

https://brainly.com/question/14291365#SPJ4

a(n) ________ enables a program to read data from the user.

Answers

An Input/output interface enables a program to read data from the user.

The I/O interface typically consists of various inputs, such as a keyboard, mouse, or touchscreen, and outputs like a monitor, speaker, or printer.There are two types of I/O operations: synchronous and asynchronous. The synchronic operations wait for the input to arrive and block the CPU until it is delivered. In comparison, asynchronous operations do not stop the CPU, and they do not necessitate that input be delivered at any time. This makes asynchronous I/O more scalable than synchronous I/O, and it is preferable for concurrent and parallel processing.

Input/output operations can be handled in a number of ways in computer systems, including memory-mapped I/O, port-mapped I/O, and direct memory access (DMA). Memory-mapped I/O operations treat the I/O device as if it were a portion of the computer's primary memory. When reading or writing from a memory-mapped device, the system sends a memory request to the device, which is then handled by the device driver.

Learn more about Input/output interface: https://brainly.com/question/30158105

#SPJ11

An input statement enables a program to read data from the user. An input statement is used to read the data provided by the user into the program. These statements enable a program to receive data from the user in a well-defined format.

Input statements are used when we need to get input from a user for any calculations or operations. To read data from the user, input statements can be used in many programming languages such as Python, Java, C++, etc. Here is an example of the input statement used in Python language:

age = input("Enter your age: ")

The above code will prompt the user to enter their age and store the entered age value in the variable "age". The entered age value can then be used for calculations or operations. Therefore, we can conclude that an input statement enables a program to read data from the user. It is one of the most fundamental statements in programming languages and is used extensively while creating user-based programs.

To learn more about input statement, visit:

https://brainly.com/question/31838309

#SPJ11

write a scheme program that prompts a user for year n, and then checks if year n is a leap year. test your program

Answers

Scheme program that prompts the user for a year and checks if it is a leap year:

(define (is-leap-year? year)

 (cond ((= (mod year 4) 0)

        (if (= (mod year 100) 0)

            (= (mod year 400) 0)

            #t))

       (else #f)))

(display "Enter a year: ")

(define year (read))

(if (is-leap-year? year)

   (display year)

   (display "is a leap year.")

   (newline)

   (display year)

   (display "is not a leap year.")

   (newline))

To test the program, you can run it in a Scheme interpreter or compiler, and it will prompt you to enter a year. After entering a year, it will display whether the entered year is a leap year or not.

For example, if you enter the year 2024, the program will output:

2024 is a leap year.

And if you enter the year 2023, the program will output:

2023 is not a leap year.

You can try running the program with different years to test its functionality.

Learn more about Scheme interpreter here:

https://brainly.com/question/31107007

#SPJ11

Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?

Answers

Answer: 0

Explanation: 1/2

Answer:

a

Explanation:

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

30 points for this.
Any the most secret proxy server sites like “math.renaissance-go . Tk”?

Answers

No, there are no most secret proxy server sites like “math.renaissance-go . Tk”

What is proxy server sites

A proxy server functions as a mediator, linking a client device (such as a computer or smartphone) to the internet.  Sites operating as proxy servers, otherwise referred to as proxy websites or services, allow users to gain access to the internet using a proxy server.

By utilizing a proxy server site, your online activities are directed through the intermediary server before ultimately reaching your intended destination on the web.

Learn more about   proxy server sites from

https://brainly.com/question/30785039

#SPJ1

presenting results to the user is called

Answers

Answer:

You're answer is,

Output devices

Explanation:

An output device is any piece of computer hardware equipment which converts information into a human-perceptible form or, historically, into a physical machine-readable form for use with other non-computerized equipment. It can be text, graphics, tactile, audio, or video. Examples include monitors, printers, speakers, headphones, projectors, GPS devices, optical mark readers, and braille readers.

Hope this helps

`

`

`

Tori

assslainsdffddsvvdesdssbhasasco5m

Answers

Hahahahaha I wanna was the day I wanna was the last time I got to
Uh okay?- Ksnsjsbwns del

Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest). Ex: If the input is: 10 -7 4 39 -6 12 2 the output is: 2 4 10 12 39

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

   int a[]={10,-7,4,39,-6,12,2};//defining single deminition array and assign value

   int i,x,j,t; //defining integer variable

   cout<<"Before sorting value: ";  

   for(i=0;i<7;i++) //using loop to print value

   {

       cout<<a[i]<<" ";//print value

   }

   cout<<endl <<"After sorting value: ";

   for(i=0;i<7;i++)//defining loop to sort value

{  

 for(j=i+1;j<7;j++)//count array value

 {

  if(a[i]>a[j]) //defining condition to inter change value

  {

      //performing swapping

   t=a[i];  //integer variable t assign array value

   a[i]=a[j];//swapp value

   a[j]=t;//assign value in array

  }

 }

}

for(i=0;i<7;i++) //defining loop to print value

   {

       if(a[i]>=0) //defining condition to check positive value  

       {

       cout<<a[i]<<" ";//print value

       }

   }

   return 0;

}

Output:

Before sorting value: 10 -7 4 39 -6 12 2  

After sorting value: 2 4 10 12 39  

Explanation:

Following are the description to the above code:

In the above program code, Inside the main method, an array a[] is declared that assign some value, and another integer variable "i, j, x, and t" is declared, in which variable "i and j" are used in the loop, and "x, t" is used to sort value.In the next step, three main for loop is declared, in which the first loop is used to print array value.In the second loop, inside another loop is used that sorts array values.In the last loop, a condition is defined, that check the positive value in the array and print its values.

Answer:

integers=[]

while True:

      number=int(input())

      if number<0:

       break

      integers.append(number)  

print("",min(integers))

print("",max(integers))

Explanation:

What is/are the correct increasing order of downlink of satellite bands? Select one or more: □ a. L < Ku ​

What is/are the correct increasing order of downlink of satellite bands? Select one or more: a. L &lt;

Answers

The correct increasing order of downlink satellite bands is -  L < S < C < Ku < Ka (Option B).

How is this so?

It is to be noted that the   order of downlink satellite bands is based on their frequencies,with lower frequencies being assigned to longer wavelengths.

In this case,   L-band has lower frequency thanS -band, C-band has lower frequency than both L-band and S-band, and so on, resulting in the order L < S < C < Ku < Ka.

The   downlink satellite bands,in increasing order of frequency are:

L-bandS-bandC-bandKu-band and Ka-band.

Learn more about Satellite bands:
https://brainly.com/question/31384183
#SPJ1

The __________ stage of the Data Science process helps in converting raw data to a machine-readable format. Data Cleaning Exploratory Data Analysis Data Description Data Gathering

Answers

The Data Cleaning stage of the Data Science process helps in converting raw data to a machine-readable format.

It is an important stage of the data science process that helps in refining and improving data quality before it is analyzed for further insights. Data Cleaning is the process of cleaning and pre-processing raw data to convert it into a format that can be easily analyzed. Data Cleaning helps in refining and improving data quality before it is analyzed for further insights.

The main aim of Data Cleaning is to ensure that the data is accurate, complete, and consistent. Data Cleaning is a critical process in Data Science as it helps in converting raw data into a machine-readable format that can be used for analysis.

To know more about  Data Cleaning visit:-

https://brainly.com/question/30448561

#SPJ11

The search engine optimization is

Question 3 options:

the process of using a rational, systematic series of steps based on sound mathematical procedures and given statements to arrive at a conclusion


the use of a variety of artistic or communicative media


the process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine


communicating with people for the purpose of finding career opportunities

Answers

The search engine optimization is: C. the process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.

What is Search engine optimization (SEO)?

Search engine optimization (SEO) can be defined as a strategic process which is typically used to improve and maximize the quantity and quality of the number of visitors (website traffics) that visits a particular website, by making it appear topmost among the list of results displayed by a search engine.

This ultimately implies that, search engine optimization (SEO) helps individuals and business firms to maximize the amount of traffic that is generated by their website, through the strategic placement of their website at the top of the results returned by a search engine.

In conclusion, we can infer and logically deduce that search engine optimization (SEO) can be used to improve the ranking in user searches by increasing the probability (chances) of a specific website emerging at the top of a web search.

Read more on search engine here: https://brainly.com/question/13709771

#SPJ1

Answer: The answer is C. The process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

Congratulationsill You have just been hired on as a Network Specialist by MW5G Network Consulting. The police have asked for the wireless support staff for Melille's Coffee Cale to meet with them; you are sent on behalf of MWSG as their representative. Apparently three customers of Melville's coffee Gafe have had their identity stolen and it seems they were all at the colfee shop during the first week of November of this year, and they were all using their laptops. The police suspect someone at the cafe was somehow snooping on the customer's computers. They hwe a suspect from the video survellance camera, but they want to know how the bad gay did it. 1. You take a look at the router at Metvite's Coffee Cafe: it's using Channel 1, has an SS1D of MELVILIFSCAFE, and the WEP security key is 17 characters long ["AhoyYetandlubbers") Do you Mee any issues here? does x −1 have ony gseriol charotius. [wrak passue 2. What do you think the method of attack was? - mion in the ridelle. 3. Explain how the bad guy did it. - Attaetur just bijak the wite. 4. The police are confused - why wouldn't the custemers have been aware of the attack? - Pecause we disn't trel mon in the middle a thaw no delay. 5. What steps will you take to try to ensure the problem stops?

Answers

From the information provided, it appears that there are several issues with the router at Melville's Coffee Cafe. Firstly, it is using channel 1 which is a common channel and can cause interference with other devices in the area.

Additionally, the SSID (MELVILIFSCAFE) is easily guessable and the WEP security key is only 17 characters long which is not considered secure. This makes it relatively easy for an attacker to gain access to the network.

What is Network Specialist?

Based on the information provided, it is likely that the method of attack was a "man-in-the-middle" attack. This type of attack involves intercepting and manipulating communication between two parties without either party being aware of the attack.

The bad guy likely used tools such as a wireless sniffer to gain access to the network and intercept the communication between the customers' laptops and the router. They may have also used techniques such as ARP spoofing to redirect the traffic to a device under their control, allowing them to intercept and read the data.

The customers may not have been aware of the attack because the man-in-the-middle attack likely did not cause any noticeable changes to their experience, such as delays or connectivity issues. Additionally, the attacker may have been able to hide their actions by encrypting the intercepted data.

To try to ensure that the problem stops, I would take several steps:

Change the SSID and WEP key to something more secureConfigure the router to use a different channel to avoid interferenceImplement a more secure encryption method such as WPA2Monitor the network for suspicious activity and take appropriate action

Learn more about Network Specialist from

https://brainly.com/question/29352369

#SPJ1

Exam Instructions
Question 6 of 20:
Select the best answer for the question.
6. Which of the following would most likely indicate the sequence in which milk
travels through a production plant to each stage of a cheese manufacturing
process?
OA. A single-line diagram
OB. A piping schedule
OC. Manufacturer's drawings
OD. A process schedule
Mark for review (Will be highlighted on the review pago)

Answers

A diagram which indicates the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process is: D. A process schedule

What is a process schedule?

A process schedule can be defined as a type of diagram (schematic) which is designed and developed to illustrate the various processes and stages (steps) that are associated with manufacturing of a particular product.

In this context, a process schedule is a diagram which would most likely indicate the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process.

Read more on cheese manufacturing here: https://brainly.com/question/21148228

#SPJ1

suppose you want to transmit a data frame with a total length of 1 mb, and where all bits are set to 1s using a 1000 ghz clock. if the manchester coding method discussed in class is used, how many seconds will it take to transmit the data frame?

Answers

it would take 8 microseconds to transmit the data frame using Manchester encoding with a clock frequency of 1000 GHz.

Manchester encoding is a line code that encodes binary data as transitions between high and low levels. It uses a clock signal that is twice the frequency of the data signal, which means that for each bit of data, two symbols are transmitted.

For a data frame with a total length of 1 MB (or 8 million bits) where all bits are set to 1s, the number of symbols that need to be transmitted would be 2 times that, or 16 million symbols.

Since the clock frequency is 1000 GHz, or 1 trillion cycles per second, the time it takes to transmit one symbol would be:

1 / (2 * 1000 GHz) = 0.5 picoseconds

Therefore, the time it takes to transmit all 16 million symbols would be:

16 million symbols * 0.5 picoseconds/symbol = 8 microseconds

So utilising Manchester encoding and a clock frequency of 1000 GHz, the transmission of the data frame would take 8 microseconds.

You can learn more about manchester coding at

https://brainly.com/question/14987522

#SPJ11

How could the information you share with others be used against you later?

Answers

The way that information you share with others be used against you later is through blackmail such as when you are running for a political office. It will be used to extort money from you or make you to do illegal things.

Why shouldn't you divulge your information?

People who have acquired your personal information may be able to obtain your login credentials for multiple websites or engage in online crimes like tax fraud while posing as you. Identity theft is the kind of crime that can have long-lasting effects on both your online reputation and your privacy in the digital world.

Therefore, Blackmail has changed over time from the act of requesting that someone pay money or do anything in order to prevent having negative information about them exposed.

Learn more about blackmail from

https://brainly.com/question/14466247
#SPJ1

What is one way interpreted programming languages differ from compiled programming languages? (3 points)


Interpreted languages produce translated machine code that can be saved and run later, while compiled languages cannot be saved.

Interpreted languages translate all lines of code together and execute them all at once, while compiled languages translate one line of code at a time and then execute that line before moving on.

Programs written with interpreted languages are ready to be run, but programs written with compiled languages require interpreter software to be run.

Programs written with interpreted languages require the original source code, but programs written with compiled languages can be shared with others while keeping the source code private

Answers

Interpreted programming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously.

Why is this so ?

Interpreted progra ming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously while the program runs.

Whereas compiled languages transform code into machine code that computers can execute directly.

In contrast to compiled languages, interpreted languages lack a distinct executable file and interpret the language itself during runtime. Interpreted programming offers increased flexibility and reduced debugging complexity, while compiled programs create more efficient code with improved speed.

Learn more about compiled programming languages at:

https://brainly.com/question/30498060

#SPJ1

in makecode arcade, which part of the interface can be used to answer questions about how a block functions?

Answers

in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

What is the function about?

In Blocks, Functions is known to be the element that one can find under the Advanced section.

Note that in finding functions in block, student can be be introduced to Simple functions.

Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

Learn more about block functions from

https://brainly.com/question/17043948

#SPJ1

Answer:

The right side panel

Explanation:

On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save

Answers

Answer:

Your answer is D.click the File tab, click Save As, type in the title, click Save

Explanation:

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."Which steps

Answer:

C

Explanation:

took the quiz

Which of the following is not a common type of electrical circuit? a. parallel circuit b. series circuit c. frame-ground circuit d. series-ground circuit

Answers

Answer:

a series - ground circuit is not common .

Series circuit is not a common type of electrical circuit.

What is Electrical circuit?

An electrical circuit connects various electrical parts. Batteries, resistors, inductors, capacitors, switches, or transistors make up an electrical circuit.

A closed loop is the foundation of an electrical network. A closed path where electrons move through a wire is called a circuit. The electrons in the copper wire never leave the copper as long as it is allowed to exist on its own.

But, free electrons will be sent toward the positive terminal of the battery if we attach this copper wire to one. Electromotive force is the term for this pushing force (E.M.F).

Therefore, Series circuit is not a common type of electrical circuit.

To learn more about Electrical circuit, refer to the link:

https://brainly.com/question/29761561

#SPJ3

Which type of system is used to analyze, evaluate, and integrate the output of other systems?
Office automation system
Knowledge based systems
Management information systems
Decision support systems

Answers

Answer:

The management information system.

Explanation:

Had to do some research to help you out on this lol. have a good day.

hii can u pls answer this?

hii can u pls answer this?

Answers

Answer:

Applying fertilizers in the proper amount, at the right time of year, and with the right method can significantly reduce how much fertilizer reaches water bodies. Keeping animals and their waste out of streams keeps nitrogen and phosphorus out of the water and protects stream banks.

hopes this helps even tho its kinda late.

Define the term editing​

Answers

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

define computer software

Answers

Answer:

It is any program on a computer that you cannot touch or clean by yourself. EX: Windows.

Have A Nice Day!

Checking account a charges a mouthly service fee $23 and wire transfer fee of $7.50 while checking account b charges a monthly service fee of $14 and wire transfer fee of $9.50 which checking account is the better deal if four wire transfers are made per month

Answers

Answer:

Checking account b is the better deal, because the total monthly fees amount to $52, while those for checking account a amount to $53.

Explanation:

Given:

monthly service fee of checking account a = $23

wire transfer fee of a = $7.50

monthly service fee of checking account b = $14

wire transfer fee of b = $9.50

To find:

which checking account is the better deal if four wire transfers are made per month?

Solution:

If four wire transfers are made per month then total monthly fees of both accounts is computed as follows:

Account a:

service fee of a + four wire transfers fee of a

23 + 4(7.50) = 23 + 30 = $ 53

Account b:

service fee of b + four wire transfers fee of b

14 + 4 (9.50) = 14 + 38 = $ 52

From the above results checking account b is the better deal because the total monthly fees amount to $52 while total monthly fees for checking account a amount to $53.

this absolute subtraction circuit has been implemented as a fully customized solution to the problem. is this design easily extendable to 32-bit inputs?

Answers

The 32-bit ALU 130 can perform any standard one- or two-operand operation, including pass, complement, twos complement, add, subtract, AND, NAND, OR, NOR, EXCLUSIVE-OR, and EXCLUSIVE-NOR.

How can I upgrade Windows from the 32-bit to the 64-bit edition?

You must perform a hard disk reformat, install Windows 64-bit, and then reinstall all of the other software you previously had on your computer in order to upgrade from Windows 32-bit to Windows 64-bit.

What functions do the control unit (CU) and arithmetic logic unit (ALU) perform in a computer?

Arithmetic and logical units, often known as ALUs, carry out operations like addition, subtraction, division, etc. CU stands for control unit, which is responsible for controlling computer functions.

To know more about 32-bit visit:-

https://brainly.com/question/30584706

#SPJ4

Keisha wants to change the default printer before printing an e-mail. Which steps will accomplish this task?
on the Home tab, clicking Print and choosing the desired printer from the Printer drop-down list
O on the File tab, clicking Print and choosing the desired printer from the Printer drop-down list
O on the Home tab, clicking Open and choosing the desired printer from the Printer drop-down list
O on the File tab, clicking Open and choosing the desired printer from the Printer drop-down list
lol

Answers

Answer:

The steps that will accomplish the task are;

On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list

Explanation:

In steps required to change the default printer on Microsoft Outlook before printing as e-mail are as follows;

1) Select the File tab on the Menu bar

2) Click on the Print option on the File's Menu

3) From the Print window displayed under the File Menu in Microsoft Outlook select the desired printer from the Printer options drop-down list

The steps that will accomplish the task are On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list.

what is profession explain with example​

Answers

Answer:   a profession is a job, or what you do for a living

example : a teacher is an example of proffesion

Answer:

the activities which are done for earning and to live life is called profession . eg: doctor ,engineer,

Other Questions
Given the following balanced chemical equation:N2(g) + 3H2(g) + 2NH3(8)What is the maximum amount of NH3(g) that can be produced from 2.0 mol H2(g)? Assume that N2(g) is the excess reactant. The process of retrieving information (summarizing) data is called O predictive statistics O statistical inference O descriptive statistics O information gathering howard cho has been hired by greenwood enterprises to work on an assembly line in its small engine division. he understands that he will be on probation for 30 days and then must join the union. cho enterprise has a(n what is the best course of action if a gravity filtration setup seems unsteady? Question 5If the yield curve has the shape of an inverted U curve what does it mean?Select one:a. short-term interest rates are expected to remain unchanged in the near-term and fall later on.b. short-term interest rates are expected to fall sharply in the near-term and rise later on.c. short-term interest rates are expected to rise moderately in the near-term and fall later on.d. short-term interest rates are expected to fall in the near-term and remain stable later on. Yellowstone National Park has an average of about 4500 bison living in it. The park covers 3472 square miles. What is the population density of bison living in Yellowstone? a. 1.3 bison/mi b. 16 bison/mi c. 77 bison/mi d. 0.77 bison/mi PLEASE HELP!!!!!!!!!!!Molar mass is the molecular (formula) mass of any substance expressed in which unit?kilogramslitersmolesgrams drugs abuse and it effect on the hfhkdkjdhhnbgsjsusldjghhvd In the Time of Butterflies, which character can be described as concerned about money?a) Mara Teresab) Patriac) Minervad) DedIt's not A took test.. A student who shares a dorm suite and bathroom with seven other students has contracted a skin infection caused by MRSA. Based on what you know about MRSA and about the student, where would you look first for the source of the bacteria Which sentence has correct punctuation and accent marks?A. Como estas?B. Cmo te llamas?C. Hola!D. Cmo te llamas? The contribution margin ratio of Kuck Corporation's only product is 75%. The company's monthly fixed expense is $456,000 and the company's monthly target profit is $42,000. Determine the dollar sales to attain the company's target profit. someone please help,,,, government may choose to combine spending decreases and tax increases in order to Span of control is a key element of an organization's structure. Which of the following key questions is addressed by this element. 14. In the second through fifth paragraphs (lines 8-54), it is evident that the speaker believes O(A) violence is often the only option O (B) adults usually know better than youth (C) starting the day very early is wise and respectable O (D) society has many overrated standards (E) conforming to social norms is a citizen's duty advice to youth by mark twian which diagnostic testing results should be monitored for ongoing assessment of mrs watson's infection and response to treatment What is the most common settlement pattern in West Africa?feudal manorsOscattered villageswalled fortressessprawling metropolises A gasoline engine in a large truck takes in 10,000 Joules of heat and delivers 200 Joules of mechanical work per cycle. The heat is obtained by burning gasoline with the heat of combustion HV = 5 x 104 J/KG. What is the thermal eff of this engine?a. 0.20b. 0.30c. 0.40d. 0.50 Austin walks 1/3 of the way to school and stopped to rest. Devyn walks 2/6 of the way to the school and stops to rest who traveled further