universal containers (uc) has implemented service cloud. there is a flag field on the case object that marks a case as (sensitive). uc requested that this flag can be viewed by all users who have access to the case but only be edited by the assigned case assessor. the case assessor is a lookup field on the case object. how can an architect achieve this requirement?

Answers

Answer 1

To meet the requirement of allowing all users to view the "Sensitive" flag on the Case object in Service Cloud.

To achieve the requirement, the architect can follow these steps:

   Field-Level Security: Set up field-level security on the "Sensitive" flag field. This can be done by navigating to the Object Manager in Salesforce Setup, selecting the Case object, and editing the field-level security settings. Grant Read access to all users who need to view the flags.

   Validation Rule: Create a validation rule that prevents non-assigned Case Assessors from editing the "Sensitive" flag. A validation rule ensures that data meets specific criteria before it is saved.    

This formula checks if the "Sensitive" flag field has changed, ensures it is not a new case (to allow initial assignment), and verifies that the current user is not the assigned Case Assessor. If these conditions are met, the validation rule will trigger an error message and prevent saving.

By combining field-level security and a validation rule, the architect can meet the requirements specified by Universal Containers. All users with access to the Case object will be able to view the "Sensitive" flag, while only the assigned Case Assessor will have the permission to edit it.

To learn more about cloud - brainly.com/question/30269045

#spj11


Related Questions

installation of some software package requires downloading 82 files. on the average, it takes 15 sec to download one file, with a variance of 16 sec2. what is the probability that the software is installed in less than 20 minutes?

Answers

There is a 0.1271 percent chance that the complete package will be installation in under 20 minutes.

When representing occurrences with a default behavior and accumulating potential deviations from it, a normal distribution is utilized.

The mean distribution of the time it takes to install the apps, X, shall be used (in seconds). By applying the Central Limit Theorem, we can assume that X is normal (it will be pretty close). The standard deviation for X is 15 = 3.873 since the variable has a mean of 15 and a variation of 15, respectively.

The likelihood that the full installation will take less than 12 minutes, or 720 seconds, is what we are interested in knowing. The average installation time for each software should therefore be less than 720/68 = 10.5882 seconds. We are searching for the probability that X is less than 10.5882 as a consequence.

To know more about installation click here:

https://brainly.com/question/24282472

#SPJ4

Geraldo would like to compare two areas of text, Text1 and Text2, to each other. What steps should he take?
od
select Text1, hit F1, click. "Compare to another selection," select Text2
select Text1, hold Shift+F1, click "Compare to another selection," select Text2
hold Shift+F1, select Text1, hold Shift+F1 again, select Text2
Ohit F1, select Text1, hit F1 again, select Text2

Answers

i think the second one

Dibujar un circuito con dos condensadores de 8 y 5 nf (nanofaradios),
respectivamente en paralelo, con una fuente de 20voltios, hallar la
capacitancia equivalente, con su circuito, hallar las cargas en cada uno de
los capacitores, la caída de tensión en cada capacitor (demostración).

Answers

Answer:

CT = 470nF + 1000nF = 1470nF or 1.47μF

Explanation:

When capacitors are connected together in parallel the total or equivalent capacitance, CT in the circuit is equal to the sum of all the individual capacitors added together. This is because the top plate of capacitor, C1 is connected to the top plate of C2 which is connected to the top plate of C3 and so on.  The same is also true of the capacitors bottom plates. Then it is the same as if the three sets of plates were touching each other and equal to one large single plate thereby increasing the effective plate area in m2.

Since capacitance, C is related to plate area ( C = ε(A/d) ) the capacitance value of the combination will also increase. Then the total capacitance value of the capacitors connected together in parallel is actually calculated by adding the plate area together. In other words, the total capacitance is equal to the sum of all the individual capacitance’s in parallel. You may have noticed that the total capacitance of parallel capacitors is found in the same way as the total resistance of series resistors.

The currents flowing through each capacitor and as we saw in the previous tutorial are related to the voltage.

describe the difference between rights and permissions on a windows os.

Answers

Rights and permissions are two different concepts in the Windows operating system. Rights refer to the abilities and privileges granted to a user or group, while permissions refer to the access levels granted to a specific object, such as a file or folder.

In Windows, there are several built-in rights that can be assigned to users or groups, such as the right to log on locally or the right to shut down the system. These rights are often used to control access to system resources and ensure that only authorized users have the ability to perform certain tasks.

Permissions, on the other hand, are used to control access to specific files and folders. For example, a user may have the right to read a file, but not the permission to modify or delete it. Permissions can be assigned to individual users, groups, or even the "Everyone" group, which includes all users on the system.

In summary, rights control what a user or group can do on the system, while permissions control what they can access and modify. Both are important for ensuring the security and integrity of the Windows operating system and its resources.

To know more about operating system visit :

https://brainly.com/question/6689423

#SPJ11

Suppose you are playing a different version of Rock, Paper, Scissors where the choices are rock, paper,
scissors, and gorilla. The list of options now is larger.
options = ["rock", "paper", "scissors", "gorilla"]
Complete the code for the computer to randomly choose an option.
from random import randint
compPlay options[randint(_,__)]

Answers

Answer:

rock

Explanation:

always wins

Answer: compPlay = options[randint(0,3)]

rogue wi-fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites. T/F

Answers

True, rogue Wi-Fi hotspots imitate free hotspots and capture users' information such as usernames and passwords.

Do rogue Wi-Fi hotspots imitate free hotspots and capture users' information, such as usernames and passwords? (True/False)

Rogue Wi-Fi hotspots are unauthorized or malicious Wi-Fi networks that are set up to mimic legitimate and trusted hotspots.

These rogue hotspots often have names similar to legitimate networks and may advertise themselves as free or public networks to entice users to connect.

Once connected, these rogue hotspots can capture information transmitted by users, including usernames and passwords, when users attempt to log in to legitimate websites.

By imitating free hotspots, attackers can trick unsuspecting users into connecting to their network and unknowingly disclose sensitive information.

This information can then be used for various malicious purposes, such as identity theft, unauthorized access to accounts, or financial fraud.

It is important for users to be cautious when connecting to Wi-Fi networks, especially in public places, and verify the legitimacy of the network before transmitting any sensitive information.

Learn more about rogue Wi-Fi hotspots

brainly.com/question/31457622

#SPJ11

Suppose that you set the application-level environment setting for the current workspace to store all your data in the same geodatabase. However, you want the outputs for one of the models to be stored in another geodatabase. What is the most efficient way to do it

Answers

Q:

Suppose that you set the application-level environment setting for current workspace in the geoprocessing options to store all your data in the same geodatabase, but you want the outp…

A:

Set a model-level environment setting for the workspace because it will override the application level.

Justify the use of an e-diary in the organisation of the meeting.

Answers

Answer:

It can be used to easily organize stuff

Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.

Consider the following code:
C = 100
C = C + 1
C = C + 1
print (c)
What is output?

Answers

Answer:

The output of C is 102.

100 + 1 + 1 = 102

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

What type of lines are never shown on an apa formatted table?.

Answers

In APA (American Psychological Association) formatting, there are specific guidelines for creating tables.

One important rule is that vertical lines are not used in APA-formatted tables. This means that tables in APA style do not have vertical lines separating columns of data.

The rationale behind this guideline is to maintain a clean and uncluttered appearance, making the table easier to read and interpret. APA style emphasizes simplicity and clarity in presenting information, and the absence of vertical lines helps achieve this goal.

Instead, horizontal lines are used sparingly, mainly to separate the table's title and headings from the data, as well as to indicate the end of the table.

By omitting vertical lines, APA-formatted tables promote a more organized and professional look while enhancing the focus on the data itself. Researchers and authors following APA guidelines should adhere to this rule when creating tables to ensure consistency and conformity to the APA style standards.

For more questions on APA, click on:

https://brainly.com/question/18461731

#SPJ8

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: Hacker crackdown Digital surveillance Honey pots Computer entrapment

Answers

The correct term for web sites that are designed to attract hackers for monitoring purposes is "Honey pots." Honey pots are intentionally created to appear vulnerable or attractive to hackers.

These systems or websites are closely monitored and logged to capture the activities and techniques employed by hackers. The purpose is to gather valuable information about their tactics, tools, and motivations to improve cybersecurity measures and enhance threat intelligence. Honey pots act as a decoy or trap, diverting hackers' attention away from real systems or sensitive data while allowing security professionals to analyze their actions and gather insights to strengthen defenses. It is an effective strategy to study hacker behavior, identify vulnerabilities, and enhance overall cybersecurity.

learn more about  web sites    here:

https://brainly.com/question/31804124

#SPJ11

python 3.4 code practice question 2

“Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make sure to check if the denominator is zero. If it is, print out “Error - cannot divide by zero.”

Answers

numerator = int(input("Enter a number: "))

denominator = int(input("Enter a number: "))

if denominator != 0:

   print(numerator/denominator)

else:

   print("Error - cannot divide by zero.")

The fraction can only be described as "undefined" if the denominator is ever 0.

Explain about the denominator is zero?

The mathematical error (not specified) of dividing a number by zero can be graciously overcame by using exception handling. The output of division by zero will be displayed as infinity if you write code without employing exception handling, which cannot be further processed.

A fraction cannot have zero as the denominator since zero cannot be divided by anything. The reason is that you get back 6 when you multiply the answer, 2, by the divisor, 3. Because the denominator cannot be zero, the fraction is invalid and has no value.

"Enter a number: " input = int numerator

Denominator: int ("Enter a number: "); input;

if the numerator!= 0

print(numerator/denominator)

else:

print("Error - cannot divide by zero")

("Error - cannot divide by zero.")

To learn more about denominator is zero refer to:

https://brainly.com/question/17546250

#SPJ2

full form of http.
wrong answer will be reported ​

Answers

Answer:

The full form of HTTP is Hypertext Transfer Protocol.

Explanation:

It is an application protocol.It is used for data communication.It is used for transferring hypertext documents on the World Wide Web.

Cuales son las 4 caracteristicas de desarrollo tecnologico especializacion integracion dicontinuidad cambio

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos, con el objetivo de mejorar el desarrollo de los distintos procesos productivos humanos. La palabra tecnología también se utiliza para describir los conocimientos técnicos que existen en una sociedad.

La tecnología tiene efectos importantes. Por ejemplo, está en el corazón de las economías avanzadas (incluida la economía mundial actual) y se ha convertido en un componente central de la vida cotidiana y el ocio. Las innovaciones en tecnología influyen en los valores de una sociedad y, a menudo, plantean cuestiones éticas. Por ejemplo, la aparición del concepto de eficiencia en términos de productividad humana, o nuevos desafíos dentro de la bioética.

Rita used information from a blog that someone else wrote. What should she do?

Select all answers that apply.

Rita should use the information and hope that no one recognizes where it came from.


Rita should ask the original author for approval to use the information.


Rita should ask her teacher for approval to use the information.


Rita should give the author credit for their intellectual property by citing the source.

Answers

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

Question 1 (3.33 points)
The Bureau of Labor Statistics states that the median pay for a network
administrator is
$699,670
$19,000
$69,160
$49,780

Answers

Answer: the answer is 19,00

The Bureau of Labor Statistics states that the median pay for a network administrator is $69,160

What is the meaning of Network Administrator?

Network administrators is known to be a person that is said to work by making sure the computer networks of any kind of organization are said to be secure and working properly.

Note that A network administrator is an IT professional  that is said to be very sensitive and need skills and as such, the Bureau of Labor Statistics states that the median pay for a network administrator is $69,160.

learn more about network administrator from

https://brainly.com/question/20424057
#SPJ1

Write a program that accepts three decimal numbers as input and outputs their sum.

Answers

Answer:

void sum(float a, float b, float c){

printf("%0.3f", (a + b + c));

}

Explanation:

The answer given is written in C, but the same function can be reimplemented easily in whatever language this is required in.

You have the following code:
----------------------------------------------------------------------------------------------
fruit_list = ["strawberries", "bananas", "apples", "grapes"]
total_cost = 0
for fruit in fruit_list:
if fruit in ["apples","bananas"]:
total_cost += 3
elif fruit == "cantaloupe":
total_cost += 5
elif fruit in ["raspberries","strawberries","grapes"]:
total_cost += 4
-------------------------------------------------------------------------------------------------

What will be the value of total_cost?

A.13
B.14
C.15
D.7

Answers

Answer:

7

Explanation:

We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.

define operating system?explain the types of operating system on the basis of use.​

Answers

Answer:

An operating system is a software that helps the any computers basic needs or functions.  For example, the windows on a computer is a operating system.

Explanation:

Identify the following as being an advantage or not being an advantage of rfid systems used by zara.
a. Can reduce the time needed to take store inventory b. Can help find a product a customer wants that isn't available in store
c. Can eliminate the need for PoS systems
d. Can lower advertising co

Answers

The advantages of RFID system used by Zara are that it can reduce the time needed to take store inventory, and can help find a product a customer wants that isn't available in store.

It can eliminate the need for POS systems, can lower advertising costs are NOT an advantage of RFID systems used by Zara

Radio Frequency Identification System is referred to as an RFID system. It is an "Identification system employing wireless communication" that enables data to be transferred between "Antenna (or Reader/Writers)" and "RF Tags (or Data Carriers)," which are held by people or affixed to things. A radio communication system, in a sense.

There are several uses for RFID systems including consolidated administration of things and information is possible with an RFID system.

The following applications make up the majority of the uses for RFID in a production plant.

Workplace training (destination instruction)management of history (production history, work history, inspection history, etc.)ID (identification) typically refers to the specific identification of individuals or things.RFID is used to identify objects, just like barcodes and two-dimensional codes.Fingerprints and the iris of the eye are examples of biometrics used to identify persons in a unique way.

The identification system is known as ID system. It is a method for reading and recognizing data on people and things, including AIDC (Automatic Identification & Data Capture).

AIDC uses devices that combine hardware and software to identify data acquired from media such as barcodes, 2-dimensional codes, RFID systems, iris, fingerprints, voice, etc. without the need for human participation.

To learn more about RFID system click here:

brainly.com/question/25705532

#SPJ4

Joseph Haydn's Symphony No. 101 in D Major, composed in 1794, has what nickname, after the rhythmic two-note sequence that repeats throughout the second movement?

Answers

101 has a reason for its quirky nickname…

Listen to the bassoons and the strings in the second movement of Haydn's Symphony No. 101, nicknamed 'The Clock', and you'll hear something quite striking. That incessant rhythmic pulse sounds so much like a timepiece going round and round it was given the perfect moniker.

Edhesive lesson practice 8.3, question 5

Edhesive lesson practice 8.3, question 5

Answers

Answer:

3

Explanation:

Following are the correct python code to find the length of the given parameter value.

Python code to find length:

print(len("stuff"))#printing length

Output:

please find the attached file.

Program Explanation:

In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.

Find out more about the length method here:

brainly.com/question/13527881

Edhesive lesson practice 8.3, question 5

Explain the different types of series you can create in Excel.​

WILL MARK AS BRILLIANT

Answers

Here are some of the most common types of series:

Linear SeriesGrowth SeriesDate Series

What is the Excel series?

In Excel, there are several types of series that you can create depending on your data and the format in which you want to display it.

Linear Series: A linear series is a sequence of numbers that increase or decrease by a constant value. To create a linear series, you can enter the first two values in the series and then use the fill handle to drag the selection down or across the cells to complete the series.

Growth Series: A growth series is a sequence of numbers that increase by a certain percentage with each value. To create a growth series, you can enter the first two values in the series and then use the fill handle to drag the selection down or across the cells to complete the series.

Lastly, Date Series: A date series is a sequence of dates that can be used to create a timeline or calendar. To create a date series, you can enter the first two dates in the series and then use the fill handle to drag the selection down or across the cells to complete the series.

Read more about Excel here:

https://brainly.com/question/4965119

#SPJ1

Answer:

In Microsoft Excel, you can create various types of series to populate cells with a sequence of data. These series help automate data entry and save time when working with large datasets. Here are some different types of series you can create in Excel:

1. **Numeric Series**:

  Numeric series involve a sequence of numbers that increment or decrement by a specific value. Excel provides different options for creating numeric series:

  - Linear Series: A simple sequence of numbers that can increase or decrease by a constant value.

  - Growth Series: A series that grows exponentially by multiplying the previous value by a specific factor.

  - Date Series: Excel can generate sequences of dates by day, week, month, or year, making it easy to create calendars or timelines.

2. **Text Series**:

  Text series involve a sequence of text values, which can be customized according to your needs. For example:

  - Alphabetic Series: Excel can generate sequences of letters in the alphabet, which is useful for labeling or indexing purposes.

  - Custom Text Series: You can define your own custom text sequence to populate cells with specific values.

3. **Fill Series**:

  The Fill Series feature lets you automatically populate cells with patterns such as dates, days of the week, months, etc., based on the starting value you provide. It's useful for quickly generating repetitive sequences.

4. **Custom Lists**:

  Excel allows you to create and use custom lists of values that can be used to fill cells or sort data. This is particularly useful when you have specific values that are frequently used and don't follow a simple numeric or text pattern.

5. **Flash Fill**:

  Flash Fill is a powerful feature that automatically fills cells based on a pattern it identifies in your data. For example, you can separate first and last names or format phone numbers using this feature.

6. **AutoFill Handle**:

  Excel's AutoFill handle is a small square located at the lower-right corner of a selected cell. You can click and drag this handle to fill adjacent cells with a series, whether it's numbers, dates, text, or a pattern.

7. **Geographical Series**:

  For geographic data, Excel provides options to create series of postal codes, cities, countries, and more. This is useful for mapping and data analysis.

To create a series, you typically start by entering the initial values in the selected cells and then use Excel's autofill capabilities to extend the series. You can also utilize the Fill dialog box to customize the series and fill options. The ability to create different types of series in Excel contributes to its versatility in handling various types of data and tasks.

Explanation:

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Data related to the inventories of Costco Medical Supply are presented below:
Surgical
Equipment
$274
164
26


Surgical
Supplies
$136
102
5


Rehab
Equipmen
$356
266
33


Irgical
Ipplies
$136
102
5


Rehab
Equipment
$356
266
33


Rehab
Supplies
$146
146
7

In applying the lower of cost or net realizable value rule, the inventory of surgical equipment would be valued at: Multiple Choice $139. $164. $216. $223.

Answers

In applying the lower of cost or net realizable value rule to the inventory of surgical equipment at Costco Medical Supply, the value would be $139.

The lower of cost or net realizable value rule states that inventory should be valued at the lower of its cost or its net realizable value. In this case, we need to compare the cost of the surgical equipment inventory with its net realizable value to determine the appropriate value.

Looking at the given data for surgical equipment, we have the following cost values: $274, $164, and $26. To find the net realizable value, we need additional information, such as the selling price or any relevant market value. However, the net realizable value data is not provided in the given information.

Since we don't have the necessary data to calculate the net realizable value, we can only consider the cost values. Among the given cost values, the lowest is $26. Therefore, according to the lower of cost or net realizable value rule, the inventory of surgical equipment would be valued at $26, which is the lowest cost value provided.

None of the multiple-choice options matches the lowest cost value, so it seems there may be an error or missing information in the question. However, based on the given data, the value of $26 would be the appropriate valuation according to the lower of cost or net realizable value rule.

To learn more about inventory visit:

brainly.com/question/30996763

#SPJ11

T/F:lans that run on radio frequencies use a type of wired media.

Answers

False. LANs (Local Area Networks) that operate on radio frequencies, such as wireless LANs (WLANs), do not use wired media for data transmission.

In a traditional wired LAN, data is transmitted over physical cables or wired media, such as Ethernet cables. These cables provide a direct and reliable connection between network devices, allowing for the transfer of data signals.

On the other hand, LANs that utilize radio frequencies, commonly known as wireless LANs or WLANs, employ wireless communication technology. In a WLAN, data is transmitted through the airwaves using radio frequency signals. This wireless transmission eliminates the need for physical cables and allows for greater flexibility in network connectivity.

In a WLAN, devices such as laptops, smartphones, and access points communicate with each other using wireless transceivers. These transceivers send and receive data over the air using radio waves. The data is then encoded, modulated, and transmitted between devices.

While wireless LANs do not rely on wired media for data transmission, they still require wired infrastructure for network connectivity. Access points, which serve as central points for wireless communication, are typically connected to wired network infrastructure, such as Ethernet cables, for internet access and communication with other devices on the network.

Learn more about Local Area Networks at https://brainly.com/question/8118353

#SPJ11

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

Assume that UART OutChar function is available. a. What does the following assembly program do? b. Is the result displayed properly? Why? AREA I. text|, CODE, READONLY, ALIGN=2 THUMB IMPORT UART_OutChar LDR R5, =N1 LDR R6,
=N2
LDR R7, =N3 LDR R1, [R5] LDR R2, [R6] LDR R3, [R7] ADD R4, R1, R2 ADD R4, R4, R3 MOV R1, R4 UART_OutChar N1 DCD 11 N2 DCD \#12 N3 DCD \#13 ALIGN END

Answers

a. The assembly program performs the following operations:


- It loads the values of N1, N2, and N3 into registers R5, R6, and R7 respectively.
- It then loads the values stored in the memory addresses pointed to by R5, R6, and R7 into registers R1, R2, and R3 respectively.
- It adds the values in R1 and R2 and stores the result in R4.
- It then adds the value in R3 to the value in R4 and stores the result in R4.
- Finally, it moves the value in R4 to R1 and calls the UART_OutChar function to display the result.

b. The result is not displayed properly because the UART_OutChar function expects a character as input, but the program is providing it with an integer value. The function will therefore display the ASCII character corresponding to the integer value instead of the integer value itself.

To display the result properly, the program needs to convert the integer value to a string of characters before calling the UART_OutChar function.

Learn more about assembly program:

https://brainly.com/question/13171889

#SPJ11

Other Questions
Twins generally resemble each other more than they resemble their other siblings.Which of the following best explains why this happens? Ngan created a scale drawing of mr. montenegro's classroom. in the scale drawing, the length of the classroom is 16 inches. the length of the actual classroom is 40 feet. which scale did ngan use to create the scale drawing of mr. montenegro's classroom. Simplify each sum or difference. State any restrictions on the variables.-2/x - 1 / x I will give Brainliest :) Why does the US government create regulatory agencies? Check all that apply. 1.To create fair competition between producers 2.To limit the knowledge of certain consumers 3.To allow producers to have greater freedom 4.To protect consumers' health and safety 5.To prevent the formation of monopolies Which of these is an example of the kind of claim that would go in an opinion essay?Fables are boring because its too hard to believe that animals would act like human beings.Fables were used by older cultures to teach children how to get along with other people.Fables are more fun to read than other stories because animals make interesting characters.Fables could be used in preschool to teach students how to make good choices. Convert 80.44 meters/seconds into miles/hour. Round to 1 decimal. what is the soultion to this equation? 9^x-1=2 A. -1/2 B. 1/2 C. 1 D. 2 Can somebody help me with my phycology Find the circumcenter of the triangle ABC.A(-5,3), B(5, 8), C(-5.8).The circumcenter is(Type an ordered pair.) Estimate 8% of 40 show your thinking Please help IM SO CONFUSED! 9) 8.081 ++ 0.6 = 10.20110)- 3.328 = 0.96 There are 40 students in class. 12 like pink best, 4 like yellow and the rest blue. What fraction of the class likes blue? Read the excerpt from "The Case for Shelter Animals," and observe the boldfaced evidence to support the main argument.What does that mean for the dogs and cats who are not adopted? Sadly, it means that they are at risk of being put down. So, in a very real sense, adopting a dog or a cat from a shelter is literally an act that can save that animals life. This is why adopting a shelter animal is also known as rescuing it.The main argument is that adopting a pet is what is most humane for animals.Which answer best uses the evidence to evaluate the main argument?A.The argument is effective; the evidence explains what happens to animals that are not adopted.B.The argument is effective; the evidence presents what life is like for shelter animals.C.The argument is ineffective; the evidence explains the difficulty of running a shelter.D.The argument is ineffective; the evidence does not provide valid reasoning. In a certain African country 6.00% of the newborn babies have sickle-cell anemia, which is a recessive trait. Out of a random population of 1,000 newborn babies, how many offspring would you expect are NOT carrying the allele 25 g sample of a compound that contains only C and H was burned in separately and weighed. It was found that 3.007 g of CO and 1.845 HO were formed in this reaction. What is the empirical formula of the compound? A ________ helps you to complete projects, keep within your budget, stay on schedule, and work with others. 16) Write an equation to represent three times thesum of a number and two is twelve.(Re asked) I need help Suppose a survey of 979 business owners found that more than ought . which part of the survey represents the descriptive branch of statistics? make an inference based on the results of the survey.