What does the following code result in
bold


A.bold
B.bold
C.Bold ( in bold )
D. BOLD

Answers

Answer 1

Answer:

c

Explanation:


Related Questions

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Which statement is true?
An employee list can give the departments and job titles of employees.
A product list can include names and addresses of buyers of the product.
A medical record can include consumer buying behaviors of prescriptions.
A market research report can give names of employees of a company.

Answers

Answer:

An employee list can give the departments and job titles of employees.

Explanation:

Well you have to your employees age birth certificate  and stuff like that on file and there department and title would bee in that file.

Answer:

A

Explanation:

Makes the most sense

Gottfried semper said that a people, their technology, and their aesthetics were all connected. according to him, the four basic kinds of technology available are: (select all that apply)

Answers

They reflected the values, traditions, and craftsmanship of a particular civilization.

What are the four basic kinds of technology according to Gottfried Semper?

Gottfried Semper believed that the four basic kinds of technology available are:

Tectonic: Refers to the construction and assembly of buildings and structures using materials like wood, stone, and metal. It involves the principles of structural engineering and architectural design.

Ceramic: Involves the use of fired clay or pottery for various purposes such as pottery vessels, bricks, tiles, and decorative objects. It includes techniques like pottery wheel throwing, molding, and glazing.

Textile: Relates to the production of fabrics and textiles using techniques like weaving, knitting, and embroidery. It encompasses the creation of clothing, tapestries, carpets, and other textile-based products.

Composite: Involves the combination of different materials to create new materials with enhanced properties. It includes practices such as laminating, layering, and bonding materials together.

Semper believed that these four types of technology were interconnected and influenced by a people's culture, aesthetics, and society.

Learn more about craftsmanship

brainly.com/question/30107694

#SPJ11

which tab and group on the ribbon holds the command to change the font of the text of the cells of a worksheet?

Answers

In Microsoft Excel, the "Home" tab of the ribbon is normally where you can find the "Font" command, which enables you to alter the font of the text in the worksheet's cells.

A typeface is a collection of graphic characters that have a similar design and appearance and are used in computing. In digital documents and user interfaces, fonts are used to style and format text, and they have a significant impact on the content's readability and attractiveness. Serif, sans-serif, script, and ornamental font types are only a few of the many variations that are available. To accommodate various uses and design requirements, they can be modified in terms of size, weight, and colour. Font options are available through the ribbon interface in software programmes like Microsoft Excel, enabling users to quickly and simply change the appearance of the content of their spreadsheets.

Learn more about "Font" here:

https://brainly.com/question/29662656

#SPJ4

6) -------- is not used in evaluating the size of the software?

Answers

The correct answer is The size of a module is not taken into account when calculating the software's size.

The dimension of a vector space, which determines its size, is generalised to include the length of a module in abstract algebra. Particularly, only modules that were formed at a certain point in time may be of a limited length. The length of the longest chain of submodules is how it is defined. It must be succinct and direct; if it is lengthier, gamification or significant interaction are required. Usually between 2 and 5 minutes, but if it's interesting, it could go on longer. A separate group of parts that may be easily added, deleted, or replaced in a larger system is called a module. A module typically cannot work by itself. A module in computer hardware is a part that is intended to be changed out quickly.

To learn more about size of a module click the link below:

brainly.com/question/28524802

#SPJ4

WILL GIVE BRAINLIEST!!!!!!!
In a series circuit, electricity flows along more than one path.


True

False

Answers

The answer is True !!!!!!!!!!!!!!!

A group of developers for a startup company store their source code and binary files on a shared open-source repository platform which is publicly accessible over the internet. They have embarked on a new project in which their client requires high confidentiality and security on all development assets. What AWS service can the developers use to meet the requirement

Answers

Answer: AWS CodeCommit

Explanation:

The AWS service that the developers can use to meet the requirements that are illustrated in the question is the AWS CodeCommit.

The AWS CodeCommit is refered to as a fully-managed source control service which can be used in the hosting of Git-based repositories which are secure.

AWS CodeCommit makes it easy for the collaboration on code for teams in a secure ecosystem. CodeCommit can securely store binaries, source code etc.

The service AWS CodeCommit could be used to meet the requirements by the development companies, and the further discussion can be defined as follows:

It is a safe, highly scaleable, controlled source that hosts private Git repositories that enables you to increase your developmental cycle speed and frequency.It is being used to eliminate this need you to handle or to magnitude one's source control system, instead of the entire application, this could transfer incremental changes.The CodeCommit can be used for any storage from code to binaries and maintains its repositories near your AWS cloud building, stage, and production environments.

Therefore, the final answer is "AWS CodeCommit".

Learn more:

brainly.com/question/17718130

A group of developers for a startup company store their source code and binary files on a shared open-source

A loop must return to the ____ question at some later point in a structure.
A) master loop
B) loop-controlling
C) start loop
D) continue loop

Answers

A loop must come back to the loop-controlling issue at some point in the structure.

A loop is a set of instructions that are repeatedly carried out until a particular condition is met in computer programming. Typically, a certain action is taken, such as receiving and modifying a piece of data, and then a condition is checked, such as whether a counter has reached a specific value. The next instruction in the series is a directive to go back to the first instruction in the sequence and repeat it if it hasn't. The following instruction "falls through" to the following sequential instruction or branches outside of the loop if the condition has been met. A loop is a fundamental concept in programming that is frequently utilized while creating programs. A loop that never ends is said to be infinite.

Learn more about loop here:

https://brainly.com/question/13090212

#SPJ4

There are two main types of hard drive available to a computer. State what they are and describe their use.
(best answer gets to be the brainliest!)​

Answers

Answer:

Hard disk drives (HDD), which use one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical parts, but use flash memory like the kind found in USB flash drives.

Explanation:

After saving the changes she made, Sally notices that she used the word "home” too many times in her paragraph. She decides to make her paragraph more interesting by replacing "home” with "shelter” in a few places in the paragraph. How should Sally accomplish this task?

Answers

Answer:

c or a there both correct

Explanation:

7.2.7: Part 1, Replace a Letter

"Write a function named replace_at_index that takes a string and an integer. The function should return a new string that is the same as the old string, EXCEPT with a dash in place of whatever character was at the index indicated by the integer.

Call your function on the word eggplant and the index 3, like this:

s = replace_at_index("eggplant", 3)
You should then print the value of s, which should display:

egg-lant"

Answers

Answer:

def replace_at_index(string, index):

   return string[0:index]+"-"+string[index+1:]

   

replaced_word = replace_at_index("house", 0)

print(replaced_word)

Explanation:

simpler version

The Function that is used to name replace_at_index that takes a string and an integer is as follows:

def replace_at_index(string, index):

            return string[0:index]+"-"+string[index+1:]

       replaced_word = replace_at_index("house", 0)

           print(replaced_word).

What is the significance of the programming function?

The significance of the programming function is determined by the fact that it sanctions programmers in order to breach or disintegrate a problem into smaller chunks. Each of these smaller chunks usually performs a particular task.

Functions are specifically utilized by the user in order to execute certain actions, and they are important for reusing code. They usually define the code once and use it multiple times with the same efficacy and accuracy.  These collections of codes develop a function.

Therefore, the function that is used to name replace_at_index that takes a string and an integer is well described above.

To learn more about Computer's functions, refer to the link:

https://brainly.com/question/179886

#SPJ3

Adnan is creating a presentation about engineers using geometric shapes in bridge construction. He wants to insert
an illustration of a bridge saved in a folder on his computer.
How can he access the folder using the images command group?
After choosing the illustration he wants to add, which button should he click?
Add
Insert
OK
Done
Intro

Answers

Answer:Click Pictures, Insert

Explanation:

Got it right

Answer:

A. A

B. B

Explanation:

If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for their work.

caption
citation
macro
merge

Answers

Answer:

citation

Explanation

you are supposed to cite the author, so it would be citation

It would be a Citation

How do u set up a Wi-Fi network on Android ​

Answers

Answer:

These are some way I know

How do u set up a Wi-Fi network on Android

Scenario You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality. The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day: Produce a list of all items purchased in a given day along with the number of times each item was purchased. Produce a number representing how many times a specific item was purchased in a given day. Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality. Directions One of Python's strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program. Grocery Tracking Program Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work. As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.
Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.

Answers

One approach is to use the Python/C API to write a C++ function that passes user input to Python, which then uses a dictionary to count the frequency of each word in the text file and returns the frequency of the specific word.

How can you use C++ and Python together to determine the frequency of a specific item in a text file?

To address the second requirement from the scenario and create code to determine the frequency of a specific item, you can follow these steps:

Use C++ to validate user input for option 2 in the menu. Prompt the user to input the item or word they wish to look for. This can be done using standard input/output functions in C++.
Write a C++ function that takes the user's input and passes it to Python. This can be done using the Python/C API, which allows C++ to interact with Python code. You can use the PyRun_SimpleString function to execute Python code from C++. For example, you can pass the user's input as a string to a Python function that searches for the frequency of the word in the input file.
Write Python code to return the frequency of a specific word. You can use the logic you wrote to address the first requirement and modify it to return just one value. One way to do this is to use a dictionary to store the frequency of each word and then return the frequency of the specific word. For example, you can define a Python function that takes the input file and the specific word as arguments and returns the frequency of the word as an integer.
Modify the C++ function to receive the value returned from Python and display it on the screen in C++. You can use the PyRun_SimpleString function again to execute Python code that returns a value, and then use the PyLong_AsLong function to convert the returned value to a C++ integer. Finally, you can use standard output functions in C++ to display the frequency of the word on the screen.

Overall, this approach allows you to use the strengths of both programming languages to create a program that analyzes text records and processes large amounts of data. By using C++ for user input and output and Python for text processing, you can create a program that is both efficient and user-friendly.

Learn more about Python

brainly.com/question/30427047

#SPJ11

Which concept, when applied in an algorithm, allows the computer to make
decisions?
A. Sequencing
B. Storage
C. Selection
D. Iteration

Answers

The data and statistical analyses used by algorithmic or automated decision systems are classified as individuals to estimate their entitlement to benefit or penalty.

They are used also in the public sector, such as the delivery, sentence, and parole judgments in criminal justice.It is the limited series of well-defined instructions for computers implementation, generally for solving a class or completing a calculation of specific issues. Algorithms are always unambiguous and are used as computations, processing data, automated simplification as well as other duties.A sequencing notion allows a computer to pass judgment if implemented in an algorithm.

Therefore, the final answer is "Option A".

Learn more:

brainly.com/question/19565052

Answer:

C. Selection

Explanation:

had to learn the hard way

Write a pseudocode algorithm that uses the For Each loop to display all of the
values in the following array:
Constant Integer SIZE = 10
Declare Integer values[SIZE] = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

Answers

so i’m not sure it’s making me answer a question

Here is a pseudocode algorithm that uses the For Each loop to display all of the values in the given array:

```

declare a constant integer named SIZE and set its value to 10

declare an integer array named values with SIZE elements and initialize it with the values 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10

for each integer value in values do

display the value

end for

```

This algorithm first declares a constant integer `SIZE` and an integer array `values` with `SIZE` elements, initialized with the given values. It then uses a For Each loop to iterate through each value in the `values` array and display it. The loop will execute 10 times, once for each element in the `values` array.

learning components of radiography program? radr 1303

Answers

The radiography program is the use of technology is crucial to the practice of radiology. As a result, radiologists and technologists must comprehend the science behind the equipment as well as the physical laws that govern its benefits, drawbacks, and dangers.

Basic X-ray beam production equipment can be found in the typical radiography room, including the collimator, generator, beam filtration system, tube, and tube housing. A radiography degree will instruct you in the science, philosophy, and practice of medical imaging as well as radiographic research techniques and statistics. It will also educate you on subject-specific skills in anatomy, physiology, and pathology. The X-ray beam originates from the X-ray tube. The cathode, anode, rotor, envelope, tube port, cable sockets, and tube housing are the basic parts of the X-ray tube.

Learn more about radiography here:-

https://brainly.com/question/17943258

#SPJ4

1. Readability, navigation, consistency, layout and typography are all factors which
influence the usability of web pages. Briefly describe each of these factors.

Answers

Answer:

1) Readability is the ease with which a reader can understand a written text. Readability is more than simply legibility—which is a measure of how easily a reader can distinguish individual letters or characters from each other.

2) Navigation is a field of study that focuses on the process of monitoring and controlling the movement of a craft or vehicle from one place to another. The field of navigation includes four general categories: land navigation, marine navigation, aeronautic navigation, and space navigation. It is also the term of art used for the specialized knowledge used by navigators to perform navigation tasks.

3) In classical deductive logic, a consistent theory is one that does not entail a contradiction. The lack of contradiction can be defined in either semantic or syntactic terms. The semantic definition states that a theory is consistent if it has a model, i.e., there exists an interpretation under which all formulas in the theory are true. This is the sense used in traditional Aristotelian logic, although in contemporary mathematical logic the term satisfiable is used instead.

4) The way in which the parts of something are arranged or laid out.

5) Typography is the art and technique of arranging type to make written language legible, readable and appealing when displayed. The arrangement of type involves selecting typefaces, point sizes, line lengths, line-spacing (leading), and letter-spacing (tracking), and adjusting the space between pairs of letters (kerning ).

Explanation:

Hope it helps :)

Choose the best answer in each of the drop-down menus.

Choose the best answer in each of the drop-down menus.

Answers

Answer:

whata r in the windows pls list them

Explanation:

If you were in charge of search engine optimization for a client who was a personal trainer, what would you recommend that they do?

Answers

The practice of using optimizations to raise your website's position in search results is known as SEO.

Why is SEO so important?Search engine optimization (SEO) will help you reach more customers and assist them in becoming healthier. The practice of using optimizations to raise your website's position in search results is known as SEO. It makes your website more visible to those looking for a personal trainer.Good SEO techniques also enhance a website's usability and user experience, thus SEO is not just about search engines. Users trust search engines, therefore having a website appear in the top results for the user's search terms builds user trust.The most crucial elements of SEO are content and user experience because they make up your website.

To learn more about SEO refer,

https://brainly.com/question/14097391

#SPJ1

If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, or View

Answers

Answer:

You would first click view.

Explanation:

hope this helps

Answer:

editing (b)

Explanation:

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

A short-range wireless network is called:
cable modem
cell site
wi fi
personal digital assistant

Answers

Answer:

WiFi

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. The standard range or distance covered by WiFi is about 50 meters (160 feet).

Hence, a short-range wireless network is called WiFi.

In a university database that contains data on students,
professors, and courses: What views would be useful for a
professor? For a student? For an academic counselor?

Answers

In university database the views that would be useful for a professor is Course Roster View, Gradebook View, Course Schedule View. For student it would be Course Catalog View, Class Schedule View, Grades View. For academic counselor it would be Student Profile View, Degree Audit View, Academic Advising Notes View.

For a professor:

Course Roster View: A view that displays the list of students enrolled in the professor's courses. This view can provide essential information about the enrolled students, such as their names, contact details, and academic performance.Gradebook View: A view that allows the professor to access and update the grades of their students. This view can provide a convenient way for professors to track and manage student performance throughout the semester.Course Schedule View: A view that shows the professor's teaching schedule, including the dates, times, and locations of their classes. This view helps professors stay organized and plan their daily activities accordingly.

For a student:

Course Catalog View: A view that provides information about available courses, including their titles, descriptions, prerequisites, and instructors. This view helps students explore and select courses for registration.Class Schedule View: A view that displays the student's schedule for the current semester, showing the dates, times, and locations of their enrolled classes. This view allows students to keep track of their class timetable and avoid scheduling conflicts.Grades View: A view that shows the student's grades and academic performance in each course they have taken. This view helps students monitor their progress, identify areas of improvement, and calculate their GPA.

For an academic counselor:

Student Profile View: A view that presents comprehensive information about a specific student, including their personal details, academic history, enrolled courses, and any relevant notes or comments. Degree Audit View: A view that displays the student's progress towards completing their degree requirements. This view shows the courses the student has completed, the ones in progress, and the ones remaining. Academic Advising Notes View: A view that allows counselors to add and access notes or comments regarding their interactions and discussions with students. This view helps counselors maintain a record of important conversations and track the progress of their advising sessions.

To learn more about database: https://brainly.com/question/518894

#SPJ11

What refers to the way players get personally involved in a game, with the ability to influence the outcome?
ludonarrative
interactive fiction
participant observation
player agency

Answers

Answer:

player agency

Explanation:

Answer:

I think it's player agency

Explanation:

Player Agency: The player's ability to impact the story through the game design or gameplay

For what type of image is a megapixel a unit of measurement?
film
cligital
print

Answers

Answer:

answer number 1

Explanation:

tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. she copies the files she has been working on (which contain phi) to a flash drive and drops the flash drive in her purse for later use. when tamara gets home, the flash drive is missing. is this a security breach?

Answers

On the way home from work, Tamara who works as an analyst decides she needs to do some advanced work at home tonight. The files that he had copied and worked on at the office were stored on the flash drive, but when he got home the flash drive was gone. The incident that Tamara experienced was not a security breach.

What is security breach?

A security breach is any incident or occurrence that results in unauthorized access to data on a computer, on an application, on a network, or on a device. This will result in information being accessed without involving authorization. This leads to unauthorized access to information.

Learn more about serious security breach occurred in your organization here https://brainly.com/question/23077661

#SPJ4

What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *

Answers

FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.

What tradeoff must the Administrator consider when using FTP?

Although the FTP is insecure, it is a very fast way of transferring files.

When the connection is lost during file transfer, it is possible to resume such a transfer.

It also allows for queuing, scheduling, uploading, and downloading of files.

The full meaning of SMTP is Simple Email Transfer Protocol.

Learn more about FTP and SMTP at:

https://brainly.com/question/17506968

https://brainly.com/question/14396938

listen to exam instructions you just deployed a new cisco router that connects several network segments in your organization. the router is physically located in a server room that requires an id card for access. you backed up the router configuration to a remote location with an encrypted file. you access the router configuration interface from your notebook computer using a telnet client with the username admin and the password admin. you used the md5 hashing algorithm to protect the password. what else should you do to increase the security of this device? (select two.)

Answers

While working with a router, that connects various network segments in your organization, there are two measures you can take to enhance its security:

Changing the password frequently;Setting up a user account for a telnet session, other than the one currently in use.

About the measurement to enhance the security

The following are two measures you can take to enhance the security of this device:

Changing the password frequently

It is always a good idea to modify your password frequently.

When passwords aren't changed often enough, they can become vulnerable to malicious hacking activities, and your router may be exposed to unauthorized access. You can even put a reminder to yourself to modify the password every few months, in addition to making it more complicated.

Setting up a user account for a telnet session, other than the one currently in use.

The method you're using to connect to the router now is through the admin account. Admin accounts are intended for special system duties and not for regular use.

As a result, it's not a good idea to connect to the router using the admin account. You should create a separate user account with limited permissions, which should be used only for accessing the router. This practice will help you to keep your router and network infrastructure safe from unauthorized access.

Learn more about router at

https://brainly.com/question/29869351

#SPJ11

Other Questions
24 year old g2p1 woman who underwent an elective termination two days ago presents to the emrgency room with abdominal and pelvic pain complete the table by writing the equation in point - slope form each point and slope given why did some cherokee already move west of the mississippi while others did not? Help Geometry Math I don't know pls help Which word means most nearly the same as advance?01. motion2. action3. program4. gain How can an understanding of digital marketing and social media strategies helped companies gain a competitive Advantage and choose a right decision it comes to customer relationships management? When a portion of a chromosome breaks off and attaches to a different chromosome this is called a:_______ Two wires are tied to the 1.5 kg sphere shown in the figure. (Figure 1) The sphere revolves in a horizontal circle at constant speed. For what speed is the tension the same in both wires? Express your answer to two significant figures and include the appropriate units. What is the tension? Express your answer to two significant figures and include the appropriate units. Complete each sentence with the correct confirmation question as in the example find the volume of the solid generated by revolving the regionabout the y-axis #2929. the region in the first quadrant bounded above by the parabola y = x2, below by the x-axis, and on the right by the line x = 2 1r and below by please help i will vote brainlyest Desert plants receive much less water than plants in a tropical rain forest. Which adaptation would give desert plants the best chance of survival? A.Decrease the size of the cell B.Increase the size of the cell C.Increase the number of mitochondria D.Increase the size of the vacuoles.if you know more plz let me know i could use alot of help and i pay cash app vemmo or paypal A rectangular garden is 10 by 15. A uniform walkway is being added around the edge and this will increase the area by 50%. What is the width of the walkway. In five years the sum of Don's and Dan'sages will be 34. Don's age now is 8 yearsless than three times Dan's age. How oldis Don? Compute the increase in length of 1,897 m of copper wire when its temperature changes from 6.7 to 40.3 C. To control an infection, a doctor recommends that a patient who weighs 92 pounds be given 320 milligrams of antibiotic. If the antibiotic is given proportionally according to the patient's weight, how much antibiotic should be given to a patient who weighs 138 pounds? A 400 milligramsB 480 milligramsC 550 milligrams D 600 milligrams You perform a rapid assessment and determine that your patient is experiencing cardiac arrest. On the basis of your assessment findings, you begin cpr to improve the patients chances of survival. Which term refers to clearly and rationally identifying the connection between information and actions?. Adam used a discount coupon for 25% off at his favorite clothing store. He bought 2 pairs of sunglasses for xx dollars each and 6 jackets for yy dollars each. Which expression represents the total amount Adam paid after the coupon was applied? help me fast i will give brainlist Which of the following is not included in an expository essay?conclusionopinionsintroductionbody paragraphs PLS HELP ME GIVING BRAINLIEST TO -FIRST- COEECT ANSWER!! find the value of x.