Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD).
After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up.
Which of the following is the BEST place to begin repairing Wendy's computer?
Boot the computer from the Windows installation disc and run Startup Repair.
Although BSOD can be caused by many things, given the circumstances and your suspicion that malware may be the cause, you should first isolate Wendy's computer and then try to make her computer bootable by running Startup Repair. Startup Repair attempts to fix problems that keep Windows from loading. If this process fixes her computer, you would then take the proper steps to find and remove the malicious software that caused the issue in the first place.
If the computer does not boot after completing the above, you can try to run a System Restore. This would recover your computer to a previous point, but all of the changes made after the restore point was created would be lost.
If the restore process fails, you could then try to Reset the PC. Keep in mind that this step may get the computer running again, but it will remove all of the applications and settings. If this step does work, you must still check for malicious software that may be disguised as a personal file.
If all else fails, a clean installation of Windows can be performed. And if a backup of Wendy's files are available, they can be restored.

Answers

Answer 1

For Wendy to repair the computer, she should continuously hold down the shift key for the Advanced Recovery Options menu to appear. For troubleshooting, she will then click reset the PC. Then select if she can perform a clean install and remove all things or keep the files. Therefore, the correct option is "Boot the computer from the Windows installation disc and run Startup."

Windows Installation and the Run Startup

Select Settings>Update and Security>Recovery from the PC's menu. The page title will be "Reset this PC." Next, click the Get Started option and select keeping files or removing everything.

When using Windows 10, the setting window will be launched by clicking the Start menu, then selecting a gear icon in the low left corner. The other choice from the apps list is the Settings app. Then later, click Update and Security> Recovery in Settings, and decide to Get started under rebooting the PC.

Therefore, booting the computer from the installation disc of the window and running the option of resetting the PC is the best answer.

To learn more about windows installation, follow the link below: brainly.com/question/24282472

#SPJ4


Related Questions

The ‘rect()'block has two inputs that
control where it's drawn - the x and y position. If
you wanted these commands to draw different
sizes of rectangles, what additional inputs would
you need to give the blocks?

Answers

Answer is yes beacause

The w and h, which are the width and height respectively, are additional inputs that should be given to the block to draw rectangles of different sizes.

In the Drawing drawer of the Game Lab toolbox, the rect() command is used for drawing a rectangle. It takes in four inputs as arguments. These arguments are;

i. x - the x-coordinate of the point relative to the top-left corner of the display area where the shape will begin from. This is the first argument.

ii. y - the y-coordinate of the point relative to the top-left corner of the display area where the shape will begin from. This is the second argument.

iii. w - the width of the rectangle to be drawn. This is the third argument. It is measured in pixels.

iv. h - the height of the rectangle to be drawn. This is the fourth argument. It is measured in pixels.

For example, to draw a rectangle with a height of 50px, width of 60px and starting at point (x, y) = (40, 40), the command rect() will be called as follows;

rect(40, 40, 60, 50)

Take a look at another example: To draw a rectangle with a width of 120px, height of 60px and starting at point (x, y) = (30, 50), the command rect() will be called as follows;

rect(30, 50, 120, 60)

Therefore, the width and height inputs should be specified in order to draw different sizes of rectangles.

The internet was originally intended to be a U.S department of defense communication network that could withstand a nuclear war true or false

Answers

True. The internet was originally intended to be a U.S department of defense communication network that could withstand a nuclear war .

The internet was originally developed as a U.S. Department of Defense communication network called ARPANET (Advanced Research Projects Agency Network). The project was initiated in the late 1960s by the U.S. Department of Defense's Defense Advanced Research Projects Agency (DARPA). Its purpose was to create a robust and decentralized network that could withstand disruptions, including the potential destruction of communication infrastructure during a nuclear war.The design of ARPANET aimed to create a network that could survive damage to its nodes, reroute information through alternative pathways, and maintain connectivity even if certain parts of the network were destroyed. This decentralized structure, with multiple interconnected nodes, allowed for the sharing of information and resources in a resilient manner.While the original motivation for the development of ARPANET was defense-related, its subsequent evolution and widespread adoption transformed it into the global network we know today as the internet. The internet now serves a variety of purposes beyond military communication, connecting people and facilitating information exchange on a global scale.

The statement is true.

For more such questions on Internet

https://brainly.com/question/21527655

#SPJ8

For my c++ class I need to complete this assignment. I've been stuck on it for a few hours now and was wondering if anyone could help me out by giving me some hints or whatever.

You work for an exchange bank. At the end of the day a teller needs to be able to add up the value of all of the foreign currency they have. A typical interaction with the computer program should look like this:

How many Euros do you have?
245.59

How many Mexican Pesos do you have?
4678

How many Chinese Yen do you have?
5432

The total value in US dollars is: $1378.73

Think about how to break this problem into simple steps. You need to ask how much the teller has of each currency, then make the conversion to US dollars and finally add the dollar amounts into a total.
Here is a sketch of the solution.

double currencyAmount;
double total;

// get the amount for the first currency
total += currencyAmount;

// get the amount for the second currency
total += currencyAmount;

// get the amount for the third currency
total += currencyAmount;

// output the total
Notice the use of the += operator, this is a shortcut that means the same thing as total = total + currencyAmount. It is usful for accumulating a total like we are doing here.
Submit only the .cpp file containing the code. Don't forget the code requirements for this class:
Good style: Use good naming conventions, for example use lower camel case variable names.
Usability: Always prompt the user for input so they know what to do and provide meaningful output messages.
Documentation: Add a comments that document what each part of your code does.
Testing: Don't submit your solution until you have tested it. The code must compile, execute and produce the correct output for any input.

Answers

Answer:

246,45 Euro

Explanation:

A simple algorithm that would help you convert the individual currencies is given below:

Step 1: Find the exchange rate for Euros, Mexican Pesos, and Chinese Yen to the United States Dollar

Step 2: Convert the values of each currency to the United States Dollar

Step 3: Add the values of all

Step 4: Express your answer in United States Dollars

Step 5: End process.

What is an Algorithm?

This refers to the process or set of rules to be followed in calculations or other problem-solving operations, to find a value.

Read more about algorithm here:

https://brainly.com/question/24953880

#SPJ1

4. The part of the computer that processes all the inputs and outputs is the:
CPU
Mouse
Tower
Monitor

Answers

Answer: CPU

because the mouse gives input, monitor outputs, and tower inputs and outputs, but none process

The part of the computer that processes all the inputs and outputs is the CPU. The correct option is A.

What is a CPU?

Central Processing Unit (CPU). The CPU is a computer's brain, including all of the circuitry required to process input, store data, and output results. The CPU is continually obeying computer program instructions that tell it which data to process and how to process it.

As previously stated, the processor is also known as the central processing unit (CPU). The central processor unit is made up of electronic circuits that understand and execute program instructions while also communicating with input, output, and storage devices.

Processing devices are the components of a computer system that are in charge of information processing. This comprises components like the CPU, memory, and motherboard.

Therefore, the correct option is A, CPU.

To learn more about CPU, refer to the link:

https://brainly.com/question/16254036

#SPJ2

narrative report in computer system servicing

Answers

Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.

what are the functions of the windows button, Task View and Search Box? give me short answer

Answers

Answer:

Windows button = You can see a Start Menu

Task view = You can view your Tasks

Search Box = You can search any app you want in an instance

which are the focus area of computer science and engineering essay. According to your own interest.

Answers

Answer:

Explanation:

While sharing much history and many areas of interest with computer science, computer engineering concentrates its effort on the ways in which computing ideas are mapped into working physical systems.Emerging equally from the disciplines of computer science and electrical engineering, computer engineering rests on the intellectual foundations of these disciplines, the basic physical sciences and mathematics

Mission statement base on shoes company ? Help me

Answers

Here are 2 examples:

- Bringing comfortable walking, running, biking, and adventuring to the world.

- Transforming the way you live your life, two soles at a time.

A mission statement should be focused on what a company is about at its core roots. What's the driver for why the company does what it does? Often it is related to why a company is relevant in its industry.

Our mission statement is to offer our customers with an athletic footwear product that has desirable performance attributes such as impeccable quality, enhanced features, comfort and its diverse assortment of vibrant colors, trending styles, and exclusive designs.

Consider any tasks performed in real life, for example, driving a taxi. The task you pick involves many functions. Driving a taxi involves picking up customers, and quickly and safely transporting them to their destination. Go through the components of the AI cycle to automate the problem you choose. List the useful precepts available. Describe how you will represent your knowledge. Based on that, describe how you will use reasoning to make and execute a plan expected to achieve a goal or obtain maximum utility. (this is for artificial intelligence, but they did not have that option)​

Answers

The taxi came at night so you go

Of the following hard drives, which one is fastest?
a. SATA 6 Gb/s SSD
b. SATA 6 Gb/s 10,000-RPM drive
c. M.2 SSD using a SATA3 interface
d. PCIe NVMe SSD card

Answers

Answer:

D. PCIe NVMe SSD card

Explanation:

PCIe NVMe SSD cards are ludicrously fast even compared to some modern SSD drives today. Some can even average up to 8 GB/s while moving/copying files, though, the price tag is pretty high compared to some other SSD / HDD drives.

If you want Nud3s add me on sc Kermit4lyfe1

Answers

Answer:

que pinga this is a hw website not snap

Explanation:

bro are you okay umm

PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.

The instructions that make up a computer program are sometimes referred to as __________.
a. statements
b. function
c. control
d. encapsulation

Answers

Answer:

a. statements

Explanation:

GIVE ME BRAINLEST

If you were to sort the Title field in tblBooks in a Descending order, in ms access which author would be at the top of the list? A. Linda Rode B. Robert Howard C.Isaac Asimov D. Roger D. Abrahams​

Answers

If the Title field in the tblBooks table is sorted in descending order in MS Access, the author at the top of the list would be Linda Rode. So, the correct option is A.

Sorting the Title field in descending order means arranging the titles in reverse alphabetical order.

Out of the given authors, Linda Rode would be at the top of the list because her last name, "Rode," comes first alphabetically when compared to the other authors' last names. The other authors' last names are Howard, Asimov, and Abrahams.When sorting in descending order, the records are listed from Z to A or highest to lowest, depending on the sorting field. In this case, since we are sorting the Title field, which is a text field, the sorting would be in reverse alphabetical order.

Therefore, Linda Rode, with her last name starting with "R," would appear at the top of the list. So, the correct choice is option A.

For more questions on author

https://brainly.com/question/32116759

#SPJ8

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

Answers

In credentialed scanning, policy compliance plugins give you an advantage  known as option C: Customized auditing.

What does auditing serve to accomplish?

The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?

Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.

Learn more about Customized auditing from

https://brainly.com/question/7890421
#SPJ1

See full question below

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

More accurate results

Safer scanning

Customized auditing

Active scanning

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

John tells you that a certain algorithm runs in time (3 + 200), and Bill tells you that the same algorithm runs in time Ω(3). Can both John and Bill be correct? Why?

Answers

According to the question, the statements made by both John and Bill are correct. This is because both express the value of algorithms with respect to their requirement and identification.

What is an Algorithm?

An algorithm may be characterized as a type of procedure that is widely used for solving a problem or performing a computation. They act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

As per John, the worst-case run time requires the setting of the algorithm to (3+200), but on contrary, as per Bill, the running time of the same algorithm requires Ω(3). The concept of both people is correct but they are understanding the algorithm with respect to their facts and requirements.

Therefore, the statements made by both John and Bill are correct. This is because both express the value of algorithms with respect to their requirement and identification.

To learn more about Algorithm, refer to the link:

https://brainly.com/question/24953880

#SPJ9

Characteristics of VR headsets​

Answers

Answer Believable Virtual Word. The believable virtual world is a key characteristic of Virtual Reality. ...
Immersive. ...
Feedback. ...
Interactive. ...
Virtual Reality Headset. ...
Computing Device (Commuter / Smart Phone) ...
Virtual Reality Input and Output Devices. ...
Fully Immersive Virtual Reality.

A nutritionist who works for a fitness club helps members by evaluating their diets. As part of her evaluation, she asks members for the number of fat grams and carbohydrate grams that they consumed in a day. Then, she calculates the number of calories that result from the fat, using the following formula: calories from fat = fat grams X 9 Next, she calculates the number of calories that result from the carbohydrates, using the following formula: calories from carbs = carb grams X 4 The nutritionist asks you to write a program that will make these calculations.

Answers

In python:

fat = int(input("Enter the # of fat grams: "))

carbs = int(input("Enter the # of carbohydrate grams: "))

print("The calories from fat are {} and the calories from carbs is {}".format(fat * 9, carbs * 4))

Reusing PCBs of destroyed processes instead of freeing up the data structures eliminates the overhead of dynamic memory management but is likely to use more memory. Assume the following: • . The number of processes to be created and destroyed over a period of time is 10,000. The average number of processes coexisting at any given time is 100. The maximum number of processes coexisting at any given time is 600. Allocating and freeing a PCB take the same amount of time.
Question 1: How many memory operations (allocate or free) will be performed without PCB reuse?
Question 2: How many PCBs will coexist in memory, on average, during the entire run without PCB reuse?

Answers

Answer:

Question 1.  A maximum of 600 PCBs will be needed, all of which will be freed at the end of the run. The total is 2*600 = 1,200 memory operations.

Explanation:

Since 100 processes will coexist at any given time, 100 PCBs will reside in memory on average.

The ethical and appropriate use of a computer includes_____. Select 4 options.

Answers

The ethical and appropriate use of a computer encompasses several key principles that promote responsible and respectful behavior in the digital realm.

Four important options include:

1. Always ensuring that the information you use is correct: It is essential to verify the accuracy and reliability of the information we use and share to avoid spreading false or misleading content.

Critical evaluation of sources and fact-checking are vital in maintaining integrity.

2. Never interfering with other people's devices: Respecting the privacy and property rights of others is crucial. Unauthorized access, hacking, or tampering with someone else's computer or devices without their consent is unethical and a violation of their privacy.

3. Always ensuring that the programs you write are ethical: When developing software or coding, it is important to consider the potential impact of your creations.

Ethical programming involves avoiding harmful or malicious intent, ensuring user safety, respecting user privacy, and adhering to legal and ethical standards.

4. Never interfering with other people's work: It is essential to respect the intellectual property and work of others. Plagiarism, unauthorized use, or copying of someone else's work without proper attribution or permission is unethical and undermines the original creator's rights and efforts.

In summary, the ethical and appropriate use of a computer involves verifying information accuracy, respecting privacy and property rights, developing ethical programs, and avoiding interference with other people's work.

These principles promote a responsible and respectful digital environment that benefits all users.

For more such questions on ethical,click on

https://brainly.com/question/30018288

#SPJ8

The probable question may be:
The ethical and appropriate use of a computer includes_____.

Select 4 options.

-always ensuring that the information you use is correct

-never interfering with other people's devices

-always ensuring that the programs you write are ethical

-never interfering with other people's work


Write the Flowchart to find Even number between 1 to 50

Answers

Answer:

See attachment for flowchart

Explanation:

Required

Flowchart to fine even from 1 to 50

The flowchart has been attached.

The rough algorithm (explanation) of the flowchart is as follows.

1. Start

2. Initialize num to 1

3. Check if num is less than or equal to 50

  3.1 If yes

      3.1.1 Check if num is even

      3.1.1.1 If yes

         3.1.1.2 Print num

  3.1.3 Increase num by 1

 3.2 If num is greater than 50

    3.2.1 Stop

4. Goto 3

Write the Flowchart to find Even number between 1 to 50

Help me with this digital Circuit please

Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please

Answers

A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.

This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.

On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.

Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Learn more about Digital circuit, refer to the link:

https://brainly.com/question/24628790

#SPJ1

How would a malfunction in each component affect the system as a whole ?

Answers

Answer:

The whole system becomes unavaliable

Explanation:

1. State three types of web protocols​

Answers

Answer:

Types of Protocols

Transmission Control Protocol (TCP)

Internet Protocol (IP)

User Datagram Protocol (UDP)

Post office Protocol (POP)

Simple mail transport Protocol (SMTP)

File Transfer Protocol (FTP)

Hyper Text Transfer Protocol (HTTP)

Hyper Text Transfer Protocol Secure (HTTPS)

Describe three things (risks) that can cause damage to computer hardware​

Answers

Phishing,computer viruses,malware/ransomeware,rogue security software,denial of service attacks etc

Explain information systems and its components and provide examples of how each
component is applied

Answers

An information system (IS) refers to a set of interconnected components that collect, process, store, and disseminate data and information to support decision-making, coordination, and control in an organization.

How to explain the system

The key components of an information system are:

Hardware: The physical components of the computer system that enable the processing, storage, and communication of data. Examples of hardware components include the computer itself, storage devices such as hard drives and flash drives, input devices such as keyboards and scanners, and output devices such as monitors and printers.

Example: A Point of Sale (POS) system used by retailers uses hardware components like cash registers, barcode scanners, and card readers to capture data and process transactions.

Software: The programs and applications that run on the computer hardware and enable users to perform various tasks. Examples of software include operating systems, word processors, spreadsheets, and database management systems.

Example: Customer Relationship Management (CRM) software used by businesses to track customer interactions and manage customer data.

Data: The raw facts and figures that are processed by the information system. Data can be in various forms, such as text, images, audio, and video.

Example: A spreadsheet used to track sales data by a sales manager.

Learn more about information on;

https://brainly.com/question/4231278

#SPJ1

Which arithmetic operation is used by a signed binary comparator to determine if two operands are equal

Answers

Answer:

Equality Operators

Explanation:

The equality operators, which are often written as "equal (==), and not-equal (!=)" are technically used by a signed binary comparator to determine if two operands are equal or not equal. They produce 1 in a situation where both operands have equal value, and 0 if they do not have equal value.

Hence, in this case, the correct answer is Equality Operators.

The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion.

Question 6 options:

True


False

Answers

The statement "The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion" is true.

What are the game mechanics?

The guidelines that control a video game's gameplay are known as play mechanics. The game's artificial intelligence (AI) and the activities that users can take within the game's environment are both controlled by the game's play mechanics.

Being able to move a variable amount of space based on a probability distribution produced by a pair of dice is an illustration of a mechanic frequently employed in board games.

Therefore, the statement is true.

To learn more about game mechanics, refer to the link:

https://brainly.com/question/29739190

#SPJ1

What type of result does the MATCH function, when used on its own, return?

Answers

Answer:

It returns the lookup value located in a specific location.

Explanation:

Other Questions
TRUE / FALSE. phagocytic cell that accounts for two-thirds of white blood cells True or false:Writing is the best mode for conversations to resolve conflict. Summarize What obstacles faced women and African Americans who wanted an education? 2. Explain how melting of permafrost in Alaska contributes to the carbon cycle. Which of the following best defines megaliths?A. a temple made of woodB. large mammals that live in the Asian TundraC. huge stones used as monumentsD. type of bone What geographical feature is on Chinas north eastern border? A. Korean Peninsula B. Sea of Japan C. Yellow River D. Himalayan Mountains Find the slope of the line that passes through (8,2) and (5,6) A student had an assignment to describe the cell theory to the class. The student made a poster about the cell theory as it relates to all organisms. However, on the way to school, the poster snagged on a rough surface and ripped. The remaining piece of the poster is shown here. Which statement could best fit in the missing part of the poster? A)all cells have cell walls. B)all living things are multicellular C)all living things are made up of cellsD)all cells have the same size and shape is x^3 an exponential function Bobby bought 3 T-shirts at the malland a pair of pants for $16 at theclothing store. All together he spent $28for the clothes. How much was eachshirt? Somebody please help its due in 10 minutes I will give brainliestWhat country imperialized this Third World Country? Two students make a model of a tree house they want to build. The scale is 1:42.In the scale model, the tree house door is 3 cm tall.How tall should the real tree house door be?39 cm45 cm126 cm14 cm Why are zebra mussels able to spread so quickly in the United States? a. They are weaker competitors than the local mussels. b. They grow logistically. C. They are more zebra mussels than there are resources. d. There are no natural predators of the zebra mussel in the U.S. bacteria are organisms that reproduce asexualy how is this better for them than reproducing sexually? How can we solve social discrimination?. In his arguments in Brown v. Board of Education, the lawyer for Oliver and Linda Brown claimed that separate but equalpublic schools were define about the different types of silk found around the world Rectangle ABCD has points at A (4, 2), B(4, 4), C(8, 4), and D(8, 2). After undergoing a transformation, its new points are A'(2, 1), B'(2, 2), C'(4, 2), and D (4, 1). Is the new figure congruent to the old figure? Why or why not? Under the bilateral netting, if a US subsidiary owes a French subsidiary $8 million and the French subsidiary simultaneously owes the US subsidiary $6 million, a bilateral settlement will be made with a single payment of ________ from the French subsidiary to the US subsidiary. deedra refuses to leave the house because they are fearful of being exposed to germs. because this behavior interferes with everyday life it is considered to be: strange. unusual. maladaptive. odd.