The peripheral vision or fringe vision is up to one hundred and eighty degrees to the left or right. -True -False

Answers

Answer 1

Answer:

false

Explanation:

Answer 2
The monocular visual field consists of central vision, which includes the inner 30 degrees of vision and central fixation, and the peripheral visual field, which extends 100 degrees laterally, 60 degrees medially, 60 degrees upward, and 75 degrees downward

Related Questions

Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?

A.
Creative Commons

B.
word processing program

C.
Weebly

D.
web-based publishing software

Answers

The BEST type of program for Anthony to use to create the items he needs for his business are  word processing program.

What is the word processing program?

Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.

To learn more about  word processing program.

https://brainly.com/question/14718387

#SPJ1

Software program to creat edit and other things of that matter

3 different ways that ultrasonic sensors can be used in everyday life.

Answers

Answer:

Ultrasonic Sensors Uses:

Anti-Collision DetectionPeople DetectionContouring or ProfilingPresence DetectionBox Sorting using a Multi-Transducer SystemEasy Control of Trash Collection VehiclesPallet Detection with ForkliftsBottle Counting on Drink Filling Machines

Learn more about Ultrasonic Sensors here

Visit —

https://brainly.in/question/19907919

https://brainly.ph/question/13809853

Hope my answer helps you ✌️

Mark BRAINLIEST

Ultrasonic diffuse proximity sensors.
Ultrasonic retro-reflective sensors.
Ultrasonic through-beam sensors.

What is output?
Print (12 % 5)

Answer
0
5
2
1

Answers

It’s 5. Hope it helpsss
5 because most outputs are usually smaller then the input so that makes 5 the output

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

Riley receives an email containing several grammatical errors with a link to sign a petition. Which of the following strategies should he use to make sure the email is trustworthy? (5 points) Evaluate source credibility. Fact check. Listen to his gut. Look for authenticity.

Answers

The Answer:

Explanation:

He should evaluate the source credibility.

Lyla is using a computer repair simulator. This program can help her
A: determine the best brand of computer
B: find the fastest processor
C: identify the best operating system
D: learn the different types of hardware

Answers

Answer:

D. Learn the different types of hardware.

Explanation:

When Lyla is a computer repair simulator, she is learning the different types of hardware. After she has learned most of the types of hardware, she can repair her computer.

hope this helped.

Answer:
D. Learn the different types of hardware.
Explanation:
When Lyla is a computer repair simulator, she
is learning the different types of hardware.
After she has learned most of the types of
hardware, she can repair her computer.

HOW DO I DRAW A HOUSE ON GOOGLE DRAWINGS!!!!!

Answers

Triangle, Square under it, 2 tiny squares with pluses in the middle and a rectangle inside
True but use a picture and copy it

What was true of Northern cities?
O A. Governments ensured that all areas of city had equal public
services
B. Segregation was limited to the workplace.
O C. The rights of wealthy citizens were protected regardless of their
race.
D. Segregation was practiced even where it was not the law.​

Answers

Answer:

D. Segregation was practiced even where it was not the law.

windows 93 it is a website THE QUESTION IS WHAT IS THE FIRST THING THAT POPS UP WHEN YOU OPEN THE WEBSITE?

Answers

Answer:

A black screen with green text in the top left corner

Explanation:

A black screen with the green text in the top left corner.

For each of the following discussion questions, write a response in complete sentences. Your response should be at least one paragraph (5 to 7 sentences). Each discussion response is worth a total of 5 points.

How can the knowledge and skills that you develop as a photographer help you solve problems in other areas, such as your personal life, school work, and so on?

Answers

Photography has given common people the ability to be remembered. Photography democratized making images. Making and distributing images became easier, faster, and less expensive. The details were introduced to the world in 1839, a date generally accepted as the birth year of practical photography.

hope this helps :)

Answer:

Photography has given common people the ability to be remembered. Photography democratized making images. Making and distributing images became easier, faster, and less expensive. The details were introduced to the world in 1839, a date generally accepted as the birth year of practical photography.

Explanation:

Wyatt has a database to keep track of his enormous collection of videos. How can Wyatt find the details for the game Lost on Mars?
sort the data

filter the data

edit the data

query the data

Answers

Edit data is correct

Answer: edit the data i think sorry if its wrong

Explanation:

Jason needs to add a picture of his baseball team to the team's web page. Which file format should he use?

ZIP
IMG
JPG
MPG

Answers

Answer:

JPG file(s)

Explanation:

JPG are typically used for digital images. Since he's posting this onto a website, he should use the JPG file format.

Answer: JPG would be the best!

What will be the value of number after this code is finished executing?

for i in range(100):

number = 0

A.
100

B.
0

C.
1

D.
i

Answers

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

Learn more about code on:

https://brainly.com/question/26134656

#SPJ1

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

plsss help u will get brainliest
i need a Y word to describe myself for an acrostic
HURRY PLSS

Answers

Answer:

Young-at-Heart having a youthful or fresh spirit not depended of one's age; act in a way like younger person does.

Yare lively; eager; keen; agile; dexterous; ready; prepared.

Explanation:

got those ones hope it helps

Answer:

yappy or youthful

Explanation:

youthful means  fresh; vigorous; active

yappy means talkative; loquacious

!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:

a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:

Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age

Date: [Insert Date]

Byline: [Your Name]

[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.

The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.

In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.

One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.

According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.

During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.

On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.

After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.

The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.

As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.

In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.

I hope this helps. Cheers! ^^

Which device would help someone train for a marathon?

Drone
Navigation system
Smart watch
VR headset

Answers

i think a smart watch because it can help track you steps and it can tell you how many calories and fat you burn.
i hope this is correct and i hope it helps

I think Smart watches will be good as it will track your breathing, heartbeat, and steps. VR head set will not make you go so far, drones can look at the track you are running but it is not helping you run, and i don’t know about navigation systems.

so if i were to make a user fill in a story with HTML coding prompts (i need at least 4) can someone show me what i need to do i dont get it

Answers

Use: <input type="text">

<!DOCTYPE html>

<html lang="en" xmlns="http://www.w3.org/1999/xhtml">

<body>

<h2><strong>Build Your Own Adventure</strong></h2>

<p>Once upon a time a <input type="text" class="check003" id="input001" size="15" /><text class="button002" id="check001"></text> named <input id="input002" size="15" /><text class="button002" id="check002"></text>made a wish for <input id="input003" size="15" /> <text class="button002" id="check003"></text>. When they woke up the next day they found <input id="input004" size="15" /><text class="button002" id="check004"></text> and three small<input id="input005" size="15" /><text class="button002" id="check005"></text> sitting out side their door.</p>

<div id="disappear001"><div id="center001"><button class="button001" onclick="submit001()">The End</button></div></div><br />

<div id="center001"><p id="message001"></p><p id="reload001"></p></div>

<br />

</body>

</html>

Build input html r”

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Quick, answer this please! What happens if you answer bot questions with low points? Like they say they would give you 10+ points but they only have 5 points? I am afraid I might get h a c k e d

Answers

Answer:

Hello! I haven't been h a c k e d yet so I'm pretty sure its safe.

Explanation:

Okay okay I just got the phone call from you

Which car in nfs heat, looks more monstrous?

Answers

Answer:

BlackPanthaa

Explanation:

Probably all of them and also the square root of pineapple bruh

Provide step-by-step instructions for David, the boy in the orange on the left side of the second row, to retrieve the globe from the teacher’s desk. Assume he is a robot that will only do exactly what you tell him using commands like “step” or “turn left.” We will share one or more classroom responses.

Answers

Answers

1. Get up from your chair

2. Go to your teachers desk

3. Grab a pencil

4. Sit down and work

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

what is a logic circuit?

Answers

Answer:

A logic circuit is an electronic circuit that performs a specific logical operation on one or more binary inputs to produce a binary output. Logic circuits are made up of electronic components, such as transistors, diodes, and resistors, which are arranged in a specific way to implement a particular logical function, such as AND, OR, NOT, and XOR.

Logic circuits are used in many digital electronics applications, such as computers, calculators, and electronic control systems. They are designed to process digital signals, which consist of binary data represented by voltage levels or current flow. By manipulating these signals with logical operations, logic circuits can perform arithmetic, comparison, and decision-making functions, among others.

There are many different types of logic circuits, ranging from simple gates that perform basic logical functions, to more complex circuits that implement more advanced functions, such as flip-flops and registers that can store and manipulate data. The design and analysis of logic circuits is an important area of study in electrical engineering and computer science.

Explanation:

Answer: a circuit for performing logical operations on input signals.

Explanation: Pleas give brainliest

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

3 different ways color sensors are used in everyday life.

Answers

Answer: The most famous way is to grade colored products, but it's also useful for; Distinguishing coded markings and to detect data codes on a package.

This is the complex version:

Color sensors are widely used in various applications to detect and analyze colors. Here are three different ways color sensors are used in everyday life:

Color Sorting in Manufacturing: Color sensors play a crucial role in industrial manufacturing processes, particularly in product sorting and quality control. For example, in the food industry, color sensors are used to sort fruits, vegetables, candies, or other items based on their color and appearance. By accurately detecting and categorizing different colors, the sensors ensure that only products meeting specific color criteria are selected, improving efficiency and maintaining product consistency.Color Calibration in Displays: Color sensors are employed in devices with displays, such as smartphones, monitors, and televisions, to ensure accurate color reproduction. These sensors measure the ambient light and adjust the display's color settings accordingly. By analyzing the surrounding light conditions, color sensors help optimize the color temperature, brightness, and contrast of the display to provide a visually pleasing and consistent viewing experience.Color Recognition in Home Automation: Color sensors are utilized in smart home automation systems to detect and recognize specific colors. For instance, in lighting automation, color sensors can identify the color of objects or surfaces in a room and adjust the lighting accordingly. This enables dynamic lighting scenes where the color and intensity of the lights can change based on the detected colors, creating an immersive and personalized environment.

Additionally, color sensors are used in various applications such as printing, textile manufacturing, medical diagnostics, and color analysis in scientific research. They provide precise and reliable measurements of color information, allowing for enhanced accuracy, efficiency, and improved user experiences in many everyday scenarios.

• Use variable to create the number 0 at location 0, 400.
• Use the counter pattern to increase the size of the number by 1 continuously after the run button is clicked.

(javascript btw)

Answers

Answer: i thinks its

Explanation:

$('button')

 .html('Click me') // Try edit it...

 .on('click', () => console.log(''))

.on('click', () => console.log(''))

.on('click', () => console.log(''))

console.log('App started')

The answer above is correct I checked, hope this helps :

Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of
energy.

(I know what a survey means but how do u make questions to represent ways of conservation of energy? [I also know how to use the resources in the app]
Somebody please give me some ideas it will help me)

Answers

40 is the right answer
The correct answer is 40
Other Questions
tori inc. has some material that originally cost $68,400 (sunk cost). the material has a scrap value of $30,100 'as is', but if reworked at a cost of $1,400, it could be sold for $30,800. what would be the incremental effect on the company's overall profit of reworking and selling the material rather than selling it 'as is' as scrap? (cma adapted) 18.5 miles per second (30 km/sec). Choose the Earth movement that best relates to this description.Earth rotates once every 24 hoursEarth orbits, with solar system, in the Milky Way GalaxyEarth orbits the SunEarth moves with the Milky Way Galaxy through galactic space To set the time period in a story in ASL, use details like_______ to give the audience a sense of time. a particular accent a type of transportation a specific city name an angry demeanor How do I write 5,248,663,711 in expanded form This man, Mansa Musa, flooded Cairo with his generosity. He left no court emir nor holder of a royal office without the gift of a load of gold. The people of Cairo made incalculable profits out of him and his travelling party in buying and selling and giving and taking. They exchanged gold until they depressed its value in Egypt and caused its price to fall.According to this account, what was the effect of Musas visit to Cairo? About how high was the nation's unemployment rate in April 2020, as a result of the COVID-19 pandemic? Choose the best answer. a. 3.5%b. 6.3%c. 2.5% d. 14.8% in a window display at a flower shop, there are 3 spots for 1 plant each. to fill these 3 spots, adam has 7 plants to select from, each of a different type. Selecting from the 7 plants, adam can make how many display arrangements with 1 plant in each spot? (Note: the positions of the unselected plants do not matter.) Imagine a fold has been eroded to a flat surface. in general, how would you know whether this fold is plunging? Name the natural resources that helped factories for the following areas: Pennsylvania, New England, Lynn, Massachusetts. please help! i dont knnow what to do Angle M' is the result of its pre-image, angle sliding horizontally in a direction and vertically in a direction. Jane just finished a CET. Her max HR was 160 b/min (nosigns or symptoms) and her resting HR was 80 b/min. What is herexercise training HR at 80% of her heart rate reserve.a. 80 b/minb. 120 b/minc A jar of olives had a circumference of 11. 99 cm. What was the approximate diameter of the jar? Why does the demand curve slope downward? the advent of containerization has group of answer choices slowed down the globalization of markets and production. made the economies of the world's nation-states less intertwined. significantly lowered the costs of shipping goods over long distances. made moving goods from one mode of transport to another extremely labor-intensive. increased costs of coordinating and controlling a global organization. The ratio of teachers to students at happy hill school is 2:29, which means that for every 2 teachers there are _ _ students. There are 7 doctors and 27 nurses at happy hill hospital. The ratio of doctors to nurses is, therefore, 7:_ _. To find the unlock code, type the numbers that the questions above, putting a space between the two answers and a space after the second. Then, type, in ratio notation (using a colon), the ratio of commas to periods in this entire prompt (the text on tope of the red lock background) required for the synthesis of nicotinamide adenine dinucleotide. group of answer choices riboflavin biotin niacin nicotine Use the Mohr's circle approach as discussed in class to determine the maximum and minimum normal stresses for the state of stress resulting from the superposition of the two states of stress shown. Enter the magnitudes of your calculated stresses in the blocks provided being sure to indicate the proper sign. Maravilla sonmbula de un ______Crecido de canciones, _____ estremecida the cost of a firms internal common equity is generally higher than the costs of a firms external common equity due to issuance costs. (True or False)