Web-based applications are application software which operate and can be accessed through.

Answers

Answer 1

Main Answer:Web-based applications are application software which operate and can be accessed through a web browser.

Sub heading:

what is web browser?

Explanation:

1.web browser  is application software for accessing the world wide web.

REFERENCE LINK:

https://brainly.com

Hashtag:

#SPJ4


Related Questions

The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen? 1 2 3

Answers

What is Python and its program?

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general-purpose language, meaning it can be used to create a variety of other programs and isn't specialized for any specific problems.

Following are the python schedule to check input number is positive or negative:

Program: def is_positive(n):#defining the method is_positive that takes one variable in parameter

if (n > 0):#defining if block that check input number is positive

return True#return boolean value that is True

else:#else block

return "None"#return string value

n=int(input("Enter number: "))#defining n variable that input a number

print(is_positive(n))#using print process that calls and prints method return value

Output:

please find the connected file.

Program Explanation:

Defining the method "is_positive" that takes one variable "n" in the parameter.

Inside the method, if conditional block is determined that checks the input number is positive, if it's true, it will return a boolean value that is "True".

Otherwise, it will go to the else block, where it will produce a string value that is "None".

Outside the way, the "n" variable is declared to be an input number.

After the input value, a print method is used that calls the "is_positive" form and prints its return value.

To learn more about  Python, refer

https://brainly.com/question/23916407

#SPJ4

The is_positive function should return True if the number received is positive, otherwise it returns

Read-only memory chips are used to
A. record high scores and later, "save slots" for longer games
B. Translate input from players into visual output
C. Store data that cannot be modified
D. Secure game code so that it can't be copied or pirated

pls help ill mark branliest!!!

Answers

Answer:

C

Explanation:

Think of memory, you can remeber things. A memory chip is meant to "remember" things!

state 5 different between mouse and keyboard​

Answers

Answer:

*here you go *

Explanation:

While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. ... While mouse is considered to be a pointing device, keyboard is the input device for a computer.

(Keyboard vs Mouse

Keyboard and mouse are integral parts of a computer system and one cannot even think of interacting with the computer or monitor with the use of these two devices. In a sense, these two devices are the user interface that allows working on a computer system, and without them it is not possible to do anything on a computer. While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. In fact, a keyboard is the only source of providing the input to the computer and it performs the functions we ask it only with the help of this device.

While mouse is considered to be a pointing device, keyboard is the input device for a computer. Despite touch screen having been developed that allows one to use virtual keyboard onscreen, physical keyboard remains first choice of most of the individuals. There are keys with symbols printed on them in a keyboard and with the lightest of touches; the numeral or alphabet gets written on the screen of the monitor using a keyboard. There are some instructions for which one has to press a key and holding it pressed, another key has to be pressed. There are many shortcuts also used with the help of a keyboard that help save time and effort. Many computer commands are the results of these shortcuts. The major function of a keyboard is when one is using a word processor or a text editor.

A mouse is a pointing device and consists of a right and left clicks with a wheel in between that allows on to scroll up and down on a web page. The major function of a mouse is to control the cursor on the monitor of the screen. Today there are wireless mouse available that work through infrared rays.)

When information from an erp or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.

Answers

When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations),

it is called interoperability. Interoperability refers to the capacity of different software systems and devices to share data and cooperate.   The term is often used in a technical systems engineering sense, or alternatively in a broad sense, taking into account social, political, and organizational factors that impact system-to-system performance.

Interoperability is the ability of software systems and devices to communicate and collaborate with one another, allowing for the integration of systems and the exchange of data between them. The ability of two or more systems or components to interact with one another in a way that achieves the desired outcome is referred to as interoperability.

To know more about  ERP visit:

https://brainly.com/question/33366161

#SPJ11

security measures are sometimes described as a combination of physical, technical, and administrative safeguards (pta). physical safeguards may include:

Answers

Physical safeguards may include anti-malware software, device data encryption, and communications encryption.

Physical safeguards are actions taken physically to guard against natural disasters, environmental dangers, unlawful entry, and other risks to a covered entity's electronic information systems, as well as the buildings and equipment they are connected to.

Workstation use, workstation security, and device and media controls are among the requirements for physical safeguards. Whether these systems are housed on the covered entity's premises or somewhere else, the Security Rule requires covered entities to implement physical safeguard criteria for them.

Although they are sometimes disregarded, physical security measures are a crucial component of PHI security for every covered institution. A covered entity's overall health data security plan might readily prioritize both technical and administrative measures. However, physical security measures are also essential and must be compatible with the other two federal regulations.

To know more about physical safeguards click here:

https://brainly.com/question/14176905

#SPJ4

find the value of the following expression. log subscript a open parentheses fraction numerator x y cubed over denominator z squared end fraction close parentheses

Answers

The value of the expression logₐ((x * y³) / z²) can be simplified using logarithmic properties to logₐ(x) + 3 * logₐ(y) - 2 * logₐ(z).

To find the value of the given expression, we can apply the logarithmic properties to simplify it. According to the logarithmic properties, the logarithm of a quotient is equal to the difference of the logarithms of the numerator and denominator. Additionally, the logarithm of a power can be expressed as the product of the logarithm and the exponent.

Therefore, we can rewrite the expression as:

logₐ((x * y³) / z²) = logₐ(x * y³) - logₐ(z²)

Using the logarithmic property for the product, we have:

logₐ(x * y³) = logₐ(x) + logₐ(y³)

And using the logarithmic property for the power, we have:

logₐ(y³) = 3 * logₐ(y)

Substituting these simplified expressions back into the original expression, we get:

logₐ((x * y³) / z²) = logₐ(x) + 3 * logₐ(y) - 2 * logₐ(z)

This is the simplified form of the given expression, where the logarithms of the individual variables x, y, and z are combined using addition and subtraction.

Learn more about logarithmic here:

https://brainly.com/question/30226560

#SPJ11

►Write
a python program that will convert Fahrenheit Temperature to Celsius and
Celsius Temperature to Fahrenheit

►Formulae
needed:


►°C
= (°F – 32) x 5/9


►°F
= (°C × 9/5) + 32

Answers

Answer:

import math

C_or_F = input("Enter C for Celcius or F for Farenheit: ")

if C_or_F == 'F':

 F = int(input("Enter degrees in Fahrenheit: "))

 Fahrenheit =(F-32)*(5/9)

 print(Fahrenheit,"°")

if C_or_F == 'C':

 C = int(input("Enter degrees in Celcius: "))

 Celcius = (C*(9/5))+32

 print (Celcius,"°")

Explanation:

The first input determines if it is Fahrenheit or Celcius. The second inputs determine how many degrees in that unit of temperature.

simplify 0.2×0.03055 to 3 decimal places​

Answers

Answer:

this 0.061 or this 0.0611

Explanation:

I think the answers is 0.061

Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False

Answers

Answer:

I may be wrong but im pretty sure its true

Explanation:

True <3


how do i find the highest daily sales quantity per customer in
June 2014, using a pivot table on excel?

Answers

Using a pivot table in Excel is an effective way to analyze and summarize data. By following the steps outlined above, you can easily find the highest daily sales quantity per customer for a specific period, such as June 2014.

To find the most elevated day to day deals amount per client in June 2014 utilizing a turn table in Succeed, you can follow these means:

Guarantee that your information is coordinated in a plain organization, with every section addressing an alternate variable, (for example, "Client," "Date," and "Deals Amount"). Ensure you have a section for the date in a reasonable date design.

Choose the entire data range, which includes the aforementioned columns. This reach ought to incorporate segment headers and every single pertinent datum.

In Excel, go to the "Insert" tab and select "PivotTable." A window with dialog will open.

Make sure that the "Select a table or range" option is selected in the dialog box and that the appropriate range is shown in the "Table/Range" field. Pick a place for your pivot table, such as a new worksheet or an existing one.

To create the pivot table, select "OK." This will either insert a pivot table at the specified location or open a new worksheet.

In the turn table field list, drag the "Client" field to the "Lines" region and the "Date" field to the "Segments" region.

Drag the "Business Amount" field to the "Values" region. It will, by default, add up all of the sales. To change this, select "Value Field Settings" by clicking the drop-down arrow next to the "Sum of Sales Quantity" field in the pivot table.

Select the "Max" function from the "Value Field Settings" dialog box and click "OK."

A pivot table displaying the highest daily sales quantity for each customer will now be available to you. Locate the sections titled "Row Labels," which ought to display the customers, and "Column Labels," which ought to display the dates. The day's highest sales quantity will be displayed at the intersection of each customer and date.

Click the drop-down arrow next to the "Column Labels" field in the pivot table, uncheck the "Select All" option, and then select "June 2014" from the list of dates to display only June 2014.

To quickly identify the customer(s) with the highest daily sales quantity in June 2014, the pivot table can be sorted by sales quantity in descending order.

To know more about Excel, visit

brainly.com/question/24749457

#SPJ11

How to fix "the number you are trying to call is not reachable"?

Answers

The number you are trying to call is not reachable" typically indicates that the phone number you are trying to call is currently unavailable or out of service. To fix this issue, you can try the following:

Check the phone number you are trying to call to make sure it is correct.Ensure that your phone is connected to a network with good signal strength.Restart your phone and try calling againTry calling the number from a different phone or from a landline to see if the issue is with your phone.If the issue persists, contact your phone service provider for further assistance.

It's also possible that the number you are trying to call has been disconnected or is no longer in service. In this case, you will not be able to reach the number. Troubleshooting is the process of identifying and resolving problems or issues with a system or device. In this case, the system or device is a phone, and the problem is that a call to a certain phone number is not going through and the message "the number you are trying to call is not reachable" is being received.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

Which of the following agile mis infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?.

Answers

Agile MIS infrastructure is based on the Agile Manifesto for software development. It emphasizes flexibility and rapid iteration. In Agile MIS infrastructure, information systems are developed and deployed using short, iterative development cycles. These cycles typically last two to four weeks, and each cycle is followed by a testing phase.

This enables the development team to quickly identify and address any issues that arise during the development process.

The characteristic that refers to the ability of an application to operate on different devices or software platforms, such as different operating systems is interoperability. Interoperability is the ability of different systems to work together, share data, and exchange information. It is an essential characteristic of modern information systems.

Interoperability is particularly important in today's world because there are many different types of devices and software platforms. For example, there are desktop computers, laptops, tablets, smartphones, and other devices, all of which run different operating systems.

To know more about infrastructure visit:

https://brainly.com/question/17737837

#SPJ11

One driving technique to increase fuel efficiency is.

Answers

Answer:

One driving technique to increase fuel efficiency is accelerating and braking gradually and gently.

"...can improve the fuel economy of your vehicle by 15%–30% at highway speeds and 10%–40% in stop-and-go traffic. Driving more sensibly is also much safer for you and others." -Alternate Fuels Data Center website

a string of characters assigned by the dba to a database that the user must enter to access the database is known as a(n) .

Answers

A string of characters assigned by the dba to a database that the user must enter to access the database is known as a password.

A password is a word, phrase, or group of characters used to distinguish between an authorized user or process and an unauthorized user (in order to grant access). To put it another way, a password is used to establish one's identity or grant access to a resource. There is a strong implication that a password is private. A username or other authentication method is typically used in conjunction with a password to ensure security. A password with a minimum of 12 characters.

Passwords should be different, complex, and illogical. They should be made up of a combination of upper- and lower-case letters, numbers, and symbols, and should not contain dictionary words from any language or be related to anything that could be guessed (employee ID, dates, etc.). They should also not be sequences from a keyboard like "qwerty" or "zxcvb."

To know more about password click here:

https://brainly.com/question/14580131

#SPJ4

Which option is an example of iteration in an algorithm?
A. Instructing the computer to use a certain amount of its memory to
save the algorithm's data
B. Including a rigid sequence of events that the computer must
perform in an exact order
OC. Instructing the computer to repeat a step over and over while a
certain condition is met
D. Including an if-then statement to account for a specific condition

Answers

An example of an iterative algorithm is the ABO allele frequency estimation method that is stated at the bottom of the preceding page because it repeatedly uses one value of (p, p, p) to obtain another value of (p, p, p). ´µ Ç ). /(2 x521) = . 688.

What does an algorithmic iteration mean?

An algorithm may need to repeat some operations until instructed to stop doing so or until a certain condition is satisfied. The repetition of stages is known as iteration. Iteration is the process of repeatedly performing the same action. Long division, the Fibonacci sequence, prime numbers, and the calculator game are a few examples. Some of these, but not all, made use of recursion. a collection of succeeding integers, or do a task a predetermined number of times. The process of doing laundry, the way we solve a long division problem, the ingredients for making a cake, and the operation of a search engine are all instances of algorithms.

To learn more about algorithm refer to

https://brainly.com/question/19021194

#SPJ1

Answer:

I believe the asnwer is C. Instructing the computer to repeat a step over and over while a certain condition is met

Explanation:

Beucase i took the cst

if its not correct please correct me

heat is released when select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a water freezes. b water evaporates. c ice melts. d all of these are correct. e none of these is correct.

Answers

When water freezes, latent energy from freezing and its equivalent are released into the environment. The release of energy is essential for the change in state to occur.

Latent heat is released into the environment when water freezes, but how?

The latent heat of freezing is the energy that is lost. The latent heat of freezing energy was released as the water froze. Indeed, heat energy was being emitted. Once the temperature reached 32 degrees Fahrenheit, this heat energy stopped the temperature from dropping any further.

What is the name for the latent heat released by water molecules?

The transformation of water vapor into a liquid is known as condensation. The 600 cal/gm of latent heat that was added during evaporation is removed from water molecules during the condensation process.

to know more about keyboard navigation here:

brainly.com/question/16860977

#SPJ1

The VLOOKUP function looks up values in a table with which feature?

column labels in the top row
column labels in the bottom row
row labels in the leftmost column
row labels in the rightmost column

Answers

The VLOOKUP function looks up values in a table with the feature that allows row labels in the leftmost column. Thus, the correct option for this question is C.

What is the VLOOKUP function?

The VLOOKUP function may be characterized as a built-in Excel function that helps you look for a specified value by searching for it vertically across the sheet. This function in Excel may sound complicated, but you will find out that it is a very easy and useful tool once you try it.

The VLOOKUP function lets you search the leftmost column for a value and return another value on the same row in a column you specify. The range of cells in which the VLOOKUP will search for the lookup_value and the return value.

Therefore, row labels in the leftmost column are the feature through which the VLOOKUP function looks up values in a table. Thus, the correct option for this question is C.

To learn more about VLOOKUP function, refer to the link:

https://brainly.com/question/29646445

#SPJ1

Answer:

A -column labels in the top row.

Explanation:

Is the correct answer.

in order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename? a. chmod 7777 filename b. chmod 777 filename c. chmod 0000 filename d. chmod 6666 filename

Answers

To set all of the special permissions on a file or directory named "filename," the correct command to use is "Option B. chmod 777 filename."

1. In the context of file permissions in Unix-like systems, the "chmod" command is used to change the permissions of a file or directory. The numerical value "777" represents the permission settings for the file.

2. Each digit in the value corresponds to a specific category: owner, group, and others. The first digit (7) sets the permissions for the owner, the second digit (7) sets the permissions for the group, and the third digit (7) sets the permissions for others.

3. In this case, "7" signifies that all permissions (read, write, and execute) are granted for the respective category. The read permission allows users to view the contents of the file, the write permission enables users to modify or delete the file, and the execute permission grants users the ability to run the file as a program or access a directory.

4. By using "chmod 777 filename," command all users, including the owner, group, and others, will have full access to the file. However, it's important to note that setting permissions to 777 may have security implications, as it grants unrestricted access to the file. It is generally recommended to use more restrictive permissions based on the specific needs and security requirements of the file or directory.

To learn more about chmod command visit :

https://brainly.com/question/31755298

#SPJ11

What is the sandbox detection method known as? select one: rule-based detection signature-based detection check sum detection heuristic detection

Answers

The sandbox detection method known as heuristic detection. By looking for suspicious aspects in the code, heuristic analysis is a technique for identifying viruses.

By comparing a program's code to the code of known virus kinds that have already been seen, examined, and stored in a database, or by using signature detection, traditional techniques of virus detection discover malware.

The introduction of new threats, which emerged around the turn of the century and are still emerging today, has made signature detection technology less effective even if it is still in use.

Learn more about heuristic detection https://brainly.com/question/14811551?

#SPJ4

What will you see on the next line? >>> int(6.5)

Answers

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

Answer:

6

Explanation:

Create a function get_longest_sublist that takes a single parameter, which is a list of lists. Complete the function such that it returns the longest sublist in lists. If the parameter is empty then simply return an empty list.

Answers

Using the knowledge in computational language in python it is possible to write the code that create a function get_longest_sublist that takes a single parameter, which is a list of lists.

Writting the code:

import ast

def get_longest_sublist(l):

   max=len(l[0])

   for i in l:

       if len(i)>max:

           max=len(i)

           p=i

   return p

str=input()

print(get_longest_sublist(ast.literal_eval(str)))

See more about python at brainly.com/question/18502436

#SPJ1

Create a function get_longest_sublist that takes a single parameter, which is a list of lists. Complete

what kind of damage is done by viruses

Answers

Answer:

well theres different kind

Explanation:

there some in your body, theres some in a computer... and other things lol

 

we cannot share software in computer network true or false​

Answers

Answer:

false

Explanation:

false but other thing is that it can be very risky increasing the chances of getting infected by a virus

What is the first thing you need to specify when you create a table in a word-processing document?
A
The colors to be applied to the columns and rows
B

The border thickness and style
C
The number of columns and rows
D
The width of each column and the height of each row

Answers

C because you need to know how many rows and columns you are going to need in that table

The first thing an end user need to specify when creating a table in a word-processing document is: C . The number of columns and rows.

A word processor refers to a software application that is typically designed for typing and formatting text-based documents. Thus, it is an application software that can be used to create a table in a word-processing or text-based document.

In Computers and Technology, some examples of a word processor are:

Microsoft WordSublime textNotepad

Furthermore, all table in a word-processing or text-based document is typically made up of columns and rows. Thus, the first thing an end user need to specify when creating a table in a word-processing document is the number of columns and rows, depending on the project at hand.

Read more on word-processing here: https://brainly.com/question/24849072

A unique file with a unique name and address that can display ancombination of text, graphics, video,
audio, or animation defines what?
A. web browser
B. web page
C. website
D. web server

Answers

Answer:

B. web page....

declare a reference variable of type file named myfile.

Answers

In order to declare a reference variable of type "file" named "myfile" in a programming language like C++, you would use the following syntax: " file& myfile;".

This statement declares a reference variable named "myfile" of type "file". The "file" type represents a file object or handle that can be used for performing file operations in the programming language.

By declaring a reference variable, you create an alias for an existing object. The reference variable "myfile" can then be used to interact with the file object it refers to, allowing you to read from or write to the file, close the file, or perform other operations as needed.

You can learn more about reference variable  at

https://brainly.com/question/31201214

#SPJ11

Write a program to simulate a Fruit Machine that displays three symbols at random from Cherry, Bell, Lemon, Orange, Star, Skull.
The player starts with £1 credit, with each go costing 20p. If the Fruit Machine “rolls” two of the same symbol, the user wins 50p. The player wins £1 for three of the same and £5 for 3 Bells. The player loses £1 if two skulls are rolled and all of his/her money if three skulls are rolled. The player can choose to quit with the winnings after each roll or keep playing until there is no money left.

1. Write pseudo or flowchart for this task ready for it to be coded in class tomorrow - 1/12/2020
2. needs - variable, iteration - while because of some condition, selection - it's all the IFs, Sequence - be careful of sequence


please this is urgent i beg u

Answers

Answer:

please read these terms and search for Google app

What is read by the system, to ensure that only authorized devices or users are allowed to access a resource on the system

Answers

The business world defines confidentiality as the characteristic of a resource that ensures access is restricted only to permitted users, applications, or computer systems.

Sunil’s basketball coach asks him to prepare a presentation for his teammates on the proper way to shoot a basketball. After researching the topic online, Sunil decides to add a visual aide to his report.

Which visual aide is the best fit for Sunil’s presentation?

a podcast describing how to shoot a basketball
a video tutorial showing how to shoot a basketball
a graph showing how many players shot a basketball
a sound bite describing a player shooting a basketball

Answers

Answer: a video tutorial showing how to shoot a basketball

Explanation:

It will show them how to shoot the basketball

Answer:

a video

Explanation:

When we read code and predict its output, it is called tracing code.

For this lesson, you will come up with your own challenging algorithm for other students to trace. It must contain at least 5 if statements and use at least one AND or OR boolean condition.

Note: Elif or else statements will not count - your statements must be if statements. Each if statement should use a unique variable name.

For this challenge, try reading 3 or 4 of your classmates' code as well. Trace their code and predict what it will output, then check the code by running it to see if you got it right, and submit your work for a grade.

Answers

Answer:

Answer:

PYTHON

a = 2

b = 0

c = 4

d = -1

e = 9

g = 77

if -1 < a < 2:

print(a % 2)

if not c and b:

print(c//a)

if 50 >= d or 2 <= d >= 8:

print(d*d)

if 0 == e and e < 100:

print(e**e)

if g and g > 77:

print(g)

The program involves tracing the possible output of the code which contains a total of 5 variables. The program is written in python 3 ;

a , b, c, d, e = (10, 5 , 6, 2, 9)

#using tuple unpacking, assigns values to the variables a, b, c, d, e

if a > b:

#first if statement, tests if variable a is greater than b

e = b + 1

#if it is. Set variable e = b + 1

if b > c :

#if the above check is false, then check if b > c

e = b * 2

#if it is, set variable e = b×2

if c > d :

#if the above is false, check if c >d

e = c /2

#if it is, set, variable e to c divided by 2 ; if not

if (d>e) or (d > c):

#if either condition is true,

e = d -2

#set e to d - 2 ; if not

if e < a :

#Check if e > a

e = e * 5

# set e to e multiplied by 5

print(e)

#display the final value of e

Learn more on python programs :https://brainly.com/question/14786286

Other Questions
HELP guys pleaseeeeeeeeee Explain how religions use works of art to encourage and spread their beliefs. What kind of spectrum (light over a range of frequencies) do active galaxies emit? Respond with at least 120 words.Find a scientific or news article that provides examples ofselective breeding and let us know why you chose it. Hello, it's asking for a code and I don't understand. Please help. The Internal Rate of Return: I considers the time value of money II does not consider the time value of money III represents the implicit rate of return that a limited partnership is expected to yield to the partners IV represents the rate at which the partnership is expected to return cash to the partners A I and III B I and IV C II and III D II and IV The value of x in the solution to the system2x - 3y = -23x 2y = 12 By using significant standardization in the use of aircrafts and by streamlining its operations, Southwest Airlines competes by offering its flights at a lower price than the competition. According to Michael Porter, the strategy that Southwest Airlines is using is Group of answer choices As we go from home operation to international operations, we can potentially receive a _______, but we can also see our ______ increase Which of the following is not one of the primary reasons that ideas can be difficult to understand:a the description relies heavily on nonexamplesb the language or concepts are difficultc the structure of process if hard to envisiond the idea is difficult to believe Balance the following chemical equation:i need F What are characteristics of a moist, unstable air mass?A.Turbulence and showery precipitation. B.Poor visibility and smooth air.C.Haze and smoke. is/are used to encourage middlemen to aggressively promote the organization s products. An acre of ground is equivalent to a square piece of land that is approximately 210 feet on each of the four equal sides. Fencing can be purchased in 50-foot rolls for $49 per roll. You are making a bid to install the fencing of a square plot of ground that is an acre at a cost of $1 per foot of fencing + the cost of materials. If the customer has bids of $1,700, $2,500, and $2,340 in addition to your bid, decide if your bid is the low bid for the job to determine if you will likely get the business. _________ provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting lan 1. Evan does some shopping at a market.(a) Evan has a bag of oranges that weighs 2.4 pounds. He has another bag of oranges that weighs 1.74 pounds. Describe how to use this model to find the total weight of the two bags of oranges. A crystal mth a simple cubic lattice and a monoatomic basis has an atomic ra- dius of 2.5 A and an atomic weight of 5.42. Calculate its density, assuming that the atoms touch each other. 12. What is the sum of the interior angles for a pentagon? (1 point)900540720108 When writer Mary Roach describes first meeting F.D.A. entomologist Dana Ludwig, she uses an idiom, a phrase that has a figurative meaning separate from the literal meaning of the words, to describe her awkward attempt at a joke. What idiom does Roach use? How does she use this idiom to transition back into the topic of the article? Janessa is playing a board game with two friends. Using a single die, one friend rolled a four, and the other friend rollea three. Janessa needs to roll a number higher than both friends in order to win the game, and she wants to calculateher probability of winning.How many desired outcomes should Janessa use in her probability calculation?A. 3B. 6C. 4D. 2