this is pixlr


You have an image of a building, but people are standing on the far left side. You will like to remove those people. Which tool do you need?

Cropping
Clipping
Snipping
Cutting

You want to transform an image with artistic effects. Which menu would you look under?

Filter
Edit
View
File

Sharing an image online generally, requires which of the following?

Low resolution
High resolution
Blurring
Kaleidoscope


You have been asked to design a logo for community organizations. What kind of image would you create?

Raster
Vector
Transparent
Opaque

Answers

Answer 1
1 - Cropping
2 - Filter
3 - High Resolution
4 - Opaque
Thank you!

Related Questions

The internet of things is made up of a growing number of devices that collect and transfer data over the internet without human involvement. True or false?.

Answers

In the use of the Internet of Things, is a device whose job is to collect and transfer data over the internet without the involvement of humans. The statement is True.

What is Internet of Things?

Internet of Things (IoT) is a system of interconnected computing devices, mechanical and digital machines, objects, animals, or people, each equipped with a unique identifier (UID) and capable of transmitting data. We need people-to-people connections, interpersonal, or between humans and computers.

Internet of Things has humans with implanted heart monitors, farm animals with biochip transponders, cars with built-in sensors that alert drivers when tire pressure is low, or whatever, natural or man-made. An object that can be assigned an Internet Protocol (IP) address and that can send data over a network.

Learn more about What is the Internet of Things all about here https://brainly.ph/question/1145028

#SPJ4

What is the name of tool

What is the name of tool

Answers

Answer:

bro the pic is hazy

Explanation:

but it is looking like octagon

hope it helps you

please mark me as brainlist

Which protocol is responsible for transporting files between a client and a server?

HTTP
FTP
LLP
TCP

Answers

Answer:

FTP

Explanation:

FTP stands for File Transfer Protocol.

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

Can I use multiple else if in C++?

Answers

You may use more than one else if necessary, but each one needs to have open and close curly braces.

If not, what else?

The conditional expression else if, also known as elsif, comes after such an if statement and executes a function if it is true. The if, elsif, and others conditionals in Perl are demonstrated in the example below.

What are else if statements used for?

Conditional branching is controlled by an if-else expression. If-branch statements are only carried out when the set personal to a non-zero result (or true ). The next line is executed and the optional else clause is skipped if the value of the condition is nonzero.

To know more about else if visit:

https://brainly.com/question/21937163

#SPJ4

nesecito las respuestas

nesecito las respuestas

Answers

f is your answer to this
“F” es la respuesta

A mobile phone can be ordered in 2 different sizes (large and small) and 3 different colors (gold, silver and black). Construct a tree diagram to show all possible combinations of mobile phones that can be ordered.

Answers

The tree diagram below illustrates all the possible combinations of mobile phones that can be ordered based on two sizes (large and small) and three colors (gold, silver, and black):

             Mobile Phone

                         |

           -------------------------

          |                         |

      Large                  Small

         |                         |

   ---------------        ---------------

  |       |       |      |       |       |

Gold Silver Black   Gold Silver Black

In the diagram, the first level represents the choice of size, with "Large" and "Small" as the options. The second level represents the choice of color, with "Gold," "Silver," and "Black" as the options for each size.

This tree diagram provides a clear visualization of all the possible combinations of sizes and colors for the mobile phones. It helps in understanding the total number of options available and can be used as a reference when making decisions or analyzing different scenarios.

Learn more about probability analysis here:

https://brainly.com/question/32996461

#SPJ11

use net use to map the p: drive to the projects folder on corpfiles.

Answers

Net use is a command-line utility provided by Windows that allows the user to connect to network resources.

The net use command is used to map a network drive or printer to a shared resource, allowing the user to access that resource as if it were a local drive or printer. In this particular case, we will be using the net use command to map the p: drive to the projects folder on corpfiles.
To map the p: drive to the projects folder on corpfiles, follow these steps:
1. Open a Command Prompt window by clicking Start, typing "cmd" in the search box, and then pressing Enter.
2. In the Command Prompt window, type the following command: net use p: \\corpfiles\projects /persistent:yes
3. Press Enter. The net use command will map the p: drive to the projects folder on corpfiles.
4. To verify that the p: drive is mapped correctly, type the following command: net use
5. Press Enter. The net use command will display a list of all currently mapped network drives and printers. Look for the p: drive in the list to verify that it has been successfully mapped.
The "/persistent:yes" option in the net use command makes the mapping permanent, so the p: drive will remain mapped to the projects folder on corpfiles even after you log off and log back on again. If you want to remove the mapping, you can use the net use command with the /delete option: net use p: /delete.

Learn more about network :

https://brainly.com/question/31228211

#SPJ11

Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you with 15 hugs!
This year, she, unfortunately, cannot see you on your birthday, so instead, she wants to send you virtual hugs!
Create a program that prompts the user for how old they are turning and then using a loop, output a virtual hug for every year old they are.
The following prints a single "virtual hug."
print("**HUG**")

Answers

Answer:

Written in Python

age = int(input("How old are you? "))

for i in range(1,age+1):

     print("**HUG**")

Explanation:

The first line prompts the user for age

age = int(input("How old are you? "))

The next line is an iteration that starts from 1 till the user input

for i in range(1,age+1):

The last line prints "**HUG**" while the iteration is true

     print("**HUG**")

The required program written in python 3 which prints virtual hugs based on the value of age inputted by the user is as follows :

age=int(input('Happy birthday, How old are you: '))

#prompts the user to enter an an integer value for their age

for hug in range(1, age+1):

#for loop loops through the supplied age value

print("**HUG**")

#for each year in the age supplied, **HUG** is displayed.

In other to achieve the required number of virtual hugs to be displayed, 1 is added to the age value supplied as the last value in the second range parameter is not inclusive.

Therefore, the output of the working program is attached.

Learn more on python programs:https://brainly.com/question/18732854

Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned

hijacking differs from spoofing in that the takeover occurs during an authenticated session.a. trueb. false

Answers

True.

Hijacking and spoofing are both techniques used in cybersecurity attacks, but they differ in terms of when the takeover occurs. Hijacking refers to the unauthorized takeover of an active and authenticated session or connection. In other words, the attacker gains control over an already established and legitimate session between two parties.

On the other hand, spoofing involves the creation of a false or fake identity to deceive the target system or user. It typically occurs at the beginning of a session or connection, where the attacker impersonates someone else or masquerades as a trusted entity.

Therefore, the statement is true. Hijacking occurs during an authenticated session, meaning that the attacker takes over an already established and authorized connection, while spoofing happens at the initiation of a session where the attacker pretends to be someone or something they are not.

Please mark this as the answer, Thank You!

large and powerful computer capable of processing and storing large amounts of business data

Answers

Answer:

True

Explanation:

but no need to be large physically ;)

the important point is the computer must have a proper specification to process a large amount of data

ashrae standard 15-2013 requires the use of room sensors and alarms to detect

Answers

ASHRAE Standard 15-2013 is a safety standard that focuses on refrigeration system design, construction, testing, and operation. It requires the use of room sensors and alarms to detect refrigerant leaks, ensuring safety in occupied spaces.

Room sensors are devices that constantly monitor the refrigerant concentration levels in a given space. If the sensors detect a leak, they trigger alarms to alert building occupants and management of potential hazards.

These alarms help initiate appropriate response measures, such as evacuation or repair, to mitigate the risks associated with refrigerant leaks.

In summary, ASHRAE Standard 15-2013 mandates the use of room sensors and alarms to enhance the safety of individuals in areas with refrigeration systems. 

Learn more about Ashrae standard at

https://brainly.com/question/28235626

#SPJ11

A____is the smallest unit of measurement used to describe computer processing and storage. Enter the answer in the box

Answers

Answer:

the smallest unit of measurement used for measuring data is a bit

A bit




Ckfhdhxtb tu j tu hg DF Uc

Why might we use abbreviations when sending messages?What are the advantages

Answers

Answer:

Abbreviations help you write faster when you're in a hurry and save time. They also help you when you take notes in class.

Explanation:

Hope It Helps

Sorry If I'm Wrong

Para que se utilizan las siguientes plataformas: Matlab, Labview, VisualBasic, Mplab, Micropic, PicCompiller

Answers

Answer:

MATLAB (abreviatura de MATrix LABoratory, «laboratorio de matrices») es un sistema de cómputo numérico que ofrece un entorno de desarrollo integrado (IDE) con un lenguaje de programación propio (lenguaje M). Está disponible para las plataformas Unix, Windows, macOS y GNU/Linux.

Entre sus prestaciones básicas se hallan la manipulación de matrices, la representación de datos y funciones, la implementación de algoritmos, la creación de interfaces de usuario (GUI) y la comunicación con programas en otros lenguajes y con otros dispositivos hardware.

LABVIEW (acrónimo de Laboratory Virtual Instrument Engineering Workbench) es una plataforma y entorno de desarrollo para diseñar sistemas, con un lenguaje de programación visual gráfico pensado para sistemas hardware y software de pruebas, control y diseño, simulado o real y embebido.

Visual Basic (VB) es un lenguaje de programación dirigido por eventos, desarrollado por Alan Cooper para Microsoft. Este lenguaje de programación es un dialecto de BASIC, con importantes agregados. Su primera versión fue presentada en 1991, con la intención de simplificar la programación utilizando un ambiente de desarrollo.

MPLAB es un editor IDE gratuito, destinado a productos de la marca Microchip. Este editor es modular, permite seleccionar los distintos microcontroladores soportados, además de permitir la grabación de estos circuitos integrados directamente al programador.

MICROPICUn PIC es un circuito integrado programable (Programmable Integrated Circuited), el cual contiene todos los componentes para poder realizar y controlar una tarea, por lo que se denomina como un microcontrolador. Los PIC son una familia de microcontroladores tipo RISC fabricados por Microchip Technology Inc. y derivados del PIC1650, originalmente desarrollado por la división de microelectrónica de General Instrument.

PICCOMPILER

El Portable C Compiler o Compilador de C Portable (también conocido como pcc o, algunas veces, como pccm - máquina de compilador de C portable) fue uno de los primeros compiladores para el lenguaje de programación C escrito por Stephen C. Johnson de los Laboratorios Bell a mediados de los 70, basado, en parte, en las ideas de un trabajo previo de Alan Snyder en 1973.

Explanation:

MATLAB (abreviatura de MATrix LABoratory, «laboratorio de matrices») es un sistema de cómputo numérico que ofrece un entorno de desarrollo integrado (IDE) con un lenguaje de programación propio (lenguaje M). Está disponible para las plataformas Unix, Windows, macOS y GNU/Linux.

Entre sus prestaciones básicas se hallan la manipulación de matrices, la representación de datos y funciones, la implementación de algoritmos, la creación de interfaces de usuario (GUI) y la comunicación con programas en otros lenguajes y con otros dispositivos hardware.

LABVIEW (acrónimo de Laboratory Virtual Instrument Engineering Workbench) es una plataforma y entorno de desarrollo para diseñar sistemas, con un lenguaje de programación visual gráfico pensado para sistemas hardware y software de pruebas, control y diseño, simulado o real y embebido.

Visual Basic (VB) es un lenguaje de programación dirigido por eventos, desarrollado por Alan Cooper para Microsoft. Este lenguaje de programación es un dialecto de BASIC, con importantes agregados. Su primera versión fue presentada en 1991, con la intención de simplificar la programación utilizando un ambiente de desarrollo.

MPLAB es un editor IDE gratuito, destinado a productos de la marca Microchip. Este editor es modular, permite seleccionar los distintos microcontroladores soportados, además de permitir la grabación de estos circuitos integrados directamente al programador.

MICROPICUn PIC es un circuito integrado programable (Programmable Integrated Circuited), el cual contiene todos los componentes para poder realizar y controlar una tarea, por lo que se denomina como un microcontrolador. Los PIC son una familia de microcontroladores tipo RISC fabricados por Microchip Technology Inc. y derivados del PIC1650, originalmente desarrollado por la división de microelectrónica de General Instrument.

PICCOMPILER

El Portable C Compiler o Compilador de C Portable (también conocido como pcc o, algunas veces, como pccm - máquina de compilador de C portable) fue uno de los primeros compiladores para el lenguaje de programación C escrito por Stephen C. Johnson de los Laboratorios Bell a mediados de los 70, basado, en parte, en las ideas de un trabajo previo de Alan Snyder en 1973.

A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques

Answers

A regional bank implemented an automated solution to streamline its operations for receiving and processing checks/cheques. They would like to further enhance the solution to recognize signs of potential check fraud and alert their security teams accordingly.

Which technology could be combined with the current solution to do this?​

Answer:

Machine learning

Explanation:

The technology that could be used in combining with the current solution to do this is known as MACHINE LEARNING

Given that Machine Learning is a form of Artificial Intelligence, which is designed to possess the ability to act or mimic human beings and their functional characteristics to solve human problems.

Hence, because the regional bank prefers to streamline their processes of receiving and carrying out checks/cheques while also enhancing the solution to recognize signs of potential check fraud, then the technology they could use is called MACHINE LEARNING.

This is because Machine Learning will operate like humans to solve human problems efficiently.

I Have a Kodak pixpro camera and I put my memory card in (sandisk) but it keeps on saying "card is not formatted" then it gives me the option of "format" "doing so will clear all data" "yes or no" but i barely bought the memory card and the camera , so What do i do ? I never used the camera or the memory card . (PLEASE HELP )

Answers

If you've never used the camera, and you're fairly certain there aren't any pictures on the memory device, then it's safe to format the disk so that you set up the table of contents properly. That way the computer can read the data in the right sectors and so on. I would choose the option "yes" and follow the instructions on the screen. It should lead you to a blank disk so you can then fill it up with future pictures down the road.

If you think there are pictures on the card and you want to retrieve them, then try putting the card into a different memory reader and see if the same message pops up. Chances are there are slightly different formats that aren't being compatible in some way if this is the case.

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

do you feel me?
take a look inside my brain
the people always different but it always feels the same
thats the real me
pop the champagne
the haters wanna hurt me and im laughin at the pain

Answers

stayin still eyes close let the wound just pass me by, pain pills nice clothes if i fall i think i'll fly touch me midas, make me part of your design. None to guide us I feel fear for the very last time

calculate the cpi if the perfect-cache cpi is 0.5 and 25% of all instructions are memory references (load/store)? g

Answers

Since we don't have the exact value of Memory_cpi, we cannot calculate the precise CPI without this information. The CPI would depend on the specific characteristics of the memory subsystem and its impact on the overall performance of the system.

To calculate the CPI (Cycle Per Instruction) when 25% of all instructions are memory references (load/store) and the perfect-cache CPI is 0.5, you can use the following formula:

CPI = CPI_base + (Instruction_fraction * Memory_cpi)

Given:

Perfect-cache CPI (CPI_base) = 0.5Instruction fraction (Fraction of memory references) = 25% = 0.25Assuming Memory_cpi represents the CPI contribution of memory references, we need to determine its value.

CPI = 0.5 + (0.25 * Memory_cpi)
Since we do not have the value of Memory_cpi, CPI cannot be calculated.

Learn more about CPI: https://brainly.com/question/14569222

#SPJ11

Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT

Answers

Answer:

A language that instructs a computer how to carry out functions

Explanation:

The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.

This is a longer answer to the question just without "language" in it.

Answer:

B. A language that instructs a computer how to carry out functions

Explanation:

A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.

Which action is a result of human error?
OA data deletion
OB. unstructured data
OC. archiving data
OD. outsourcing data

Answers

The answer is Outsourcing data hope this help if yes leave a thanks

You have recently joined in an academic programme to learn more about

programming. You have learnt a few programmes. Your teacher has now given you a

number of tasks to complete.


a) Explain the concept of an algorithm and describe common algorithmic

techniques and solutions.

b)Create a flowchart from the following algorithm.

Step 1: Input VALUE1, VALUE2

Step 2: if (VALUE1 > VALUE2) then

MAX VALUE1

else

MAX VALUE2

endif

Step 3: Print “The largest value is”, MAX

Answers

The concept of an algorithm simply refers to the procedure that is used in problem-solving.

The description of the common algorithmic techniques and solutions are:

Brute-force or exhaustive search.Divide and Conquer.Greedy Algorithms.Dynamic Programming.Branch and Bound Algorithm.Randomized Algorithm.Backtracking.

The sample flowchart:

START

Input

VALUE1,VALUE2

is

VALUE1>VALUE2

If yes

MAX  VALUE1

If no

MAX  VALUE2

Print

“The largest value is”, MAX

STOP

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

What do I do if my mom isn't answering her phone? I need her to answer and she isn’t halp me I will give brainliest to whoever answers best

Answers

Is anyone that u know with ur mom?
Then go look for her :/
Maybe she is busy. If its not too important then just try to call later. If its an emergency call other relatives to try to reach her

explain plat data model​

Answers

Data models are a set of guidelines and/or constructs that are employed in computers to define and represent elements of the real world. There are two main data models.

Describe data models using an example.

There are two distinct but related notions that might be referred to as data models. It can also refer to an abstract formalization of the entities and connections present in a certain application domain, such as the clients, goods, and orders in a manufacturing company.

By data model, what do you mean?

Data models for an organization visually represent data elements and their interactions. Models help define and structure data within the context of relevant business activities, which aids in the development of effective information systems.

To know more about data model​ visit:-

https://brainly.com/question/29651109

#SPJ1

When covered in a training session, features of hardware or software that are unusual, rarely used features are sometimes called ____.

Answers

The features of hardware or software that are unusual or rarely used are sometimes referred to as "Easter eggs." Easter eggs can include hidden functions, messages, or even games that are not typically advertised or documented by the manufacturer.

They are often included as a way for developers to add a bit of fun or creativity to their products, or as a way to reward users who take the time to explore and discover all the hidden elements within the software or hardware. Easter eggs can be found in a wide range of products, from video games and software applications to hardware devices like smartphones and tablets. While they are not essential to the operation of the product, they can add a bit of excitement and surprise for users who are willing to look for them.

Learn more about software here:

https://brainly.com/question/985406

#SPJ11

Why won't this program work? I have no solution for this.

LANGUAGE: Python, CodeHS; 4.11.4: Snake Eyes

Why won't this program work? I have no solution for this.LANGUAGE: Python, CodeHS; 4.11.4: Snake Eyes

Answers

Explanation:

hope it helps,Godbless

Why won't this program work? I have no solution for this.LANGUAGE: Python, CodeHS; 4.11.4: Snake Eyes

John wants to know the amount of ram memory installed on his computer. in which category of the windows 7 control panel can this information be found?

Answers

John can find the amount of Random Access Memory (RAM) memory installed on his computer with the Windows 7 under the category “System and Security” in the Control Panel.

To know the total amount of installed RAM through Control Panel in the computer with Windows 7, John should follow the steps as:

Click the Windows key Type Control Panel Click the category named “System and Security” Now under “System”, click “View amount of RAM and processor speed” “Device Specifications” section displays the amount of installed RAM in John’s computer

Thus, above are the steps by which John’s can find the amount of installed RAM in his Windows 7 computer’s Control Panel.

What is Random Access Memory (RAM)?

RAM is the temporary memory in computers that stores the data currently being used by the processor.

You can learn more about Control Panel at

https://brainly.com/question/1445737

#SPJ4

d. 2A116 into binary​

Answers

2A116₍₁₆₎ = ?₍₂₎

2₍₁₀₎ = 0010₍₂₎

A₍₁₀₎ = 1010₍₂₎

1₍₁₀₎ = 0001₍₂₎

1₍₁₀₎ = 0001₍₂₎

6₍₁₀₎ = (0110)₍₂₎

⇒ 2A116₍₁₆₎ = (0010)(1010)(0001)(0001)(0110)₍₂₎ = 101010000100010110₍₂₎

Other Questions
HELP ME PLEASEEEEEE come up with 5 questions you have about interracial relationships from the Jim Crow laws and answer those questions with at least 3 sentences each. Please help, thank you Calculate the percent dissociation for a 0.22 M solution of chlorous acid (HClO2,Ka=1.2102). tell me 21 musical instruments An infinite number of ratios are equivalent to 3:8. Howcan that be possible, when the multiplication table onlygoes to 9? a drug like nicotine that produces a biological response in the brain is called a(n) . Which of these was NOT an important principle of mercantilism as practiced in Early Modern times?A) Gold and silver should flow to the mother country of each empire.B) Nations should export more than they import to have a positive balance of trade.C) Governments should regulate companies as little as possible.D) Colonies could supply valuable raw materials and markets to their mother countries. Select the structure that correspondsto the following name:diphenyl etherA.B.C. both What are the soldiers in Act I of Hamlet Are Looking for? Having a world connected via the Internet has some massive implications true or false PLZ HELP! NO FAKE ANSWER PLEASE!!!!!! PLEASE AND THANK YOU MARRY CHRISTMAS! Given:9a - 3b + c = -15a-b+c= -34a + 2b + c = 5Which of the following are points on the graph of the quadratic function (choose all correct answers)(-1, -3)(-3,-15) (9-3)(2,5) Seala el nmero de versos, el nmero de estrofas y el nmero de versos en cada estrofa. Llora en silencio mi alma solitaria, excepto cuando est mi corazn unido al tuyo en celestial alianza de mutuo suspirar y mutuo amor. Es la llama de mi alma cual aurora, brillando en el recinto sepulcral: casi extinta, invisible, pero eterna ni la muerte la puede mancillar. Acurdate de m! Cerca de mi tumba no pases, no, sin regalarme tu plegaria; para mi alma no habr mayor tortura que el saber que has olvidado mi dolor. Oye mi ltima voz. No es un delito rogar por los que fueron. Yo jams te ped nada: al expirar te exijo que sobre mi tumba derrames tus lgrimas. I dont get it please can I have help :) The weight, in pounds, of a newborn baby t months after birth can be modeled by the equation W=1.75t+6. What is the slope of the equation and what is its interpretation in the context of the problem? Each X shows the location of an archer's arrow on a bull's-eye target. The archer was aiming for the center circle. x x x X X X Which words best describe the archers results? A. High riin, low accuracy B. Low precisione non accuracy C. Low precision, low accuracy D. Hgh precision high accuracy The three 230 g masses in (Figure 1) are connected by massless, rigid rods. Part A Figure What is the triangle's moment of inertia about the axis through the center? Part B 60 60% 40 cm What is the triangle's kinetic energy if it rotates about the axis at 4.6 rev/s ? Which sentence incorrectly uses a colon?1. The menu for tonight's dinner is as follows: roast beef, mashed potatoes, and green beans.2. My favorite book of all time: is Charlotte's Web.3. There was only one thing on her mind: getting her work done before the deadline.4. She was proud of her accomplishments: graduating with honors, landing a job, and renting an apartment. What is the name given to the specialized cell type that helps to form the supporting framework required for B-cell development?a. Secondary Lymphoid cellb. Hematopoietic cellc. Stromal cell ken wants to watch a new movie that's still in theaters but does not want to buy a ticket to go see it. he knows that he can find it online and download it for free, but he also knows that doing so is illegal. ken wants to illegally watch the movie but knows it is wrong. according to psychodynamic theory, ken has a conflict between his and . group of answer choices superego; ego id; ego subego; superego id; superego when you're using a quote in an essay, how do you 'cite' it?