What happens when you drag a new transition from the Effects panel on top of an existing transition?

Answers

Answer 1

When you drag a new transition from the Effects panel on top of an existing transition, the new transition will replace the existing one.

The new transition will use the same duration as the old transition and will affect the same frames. If you want to add a new transition without replacing the existing one, you can hold down the Ctrl key (Windows) or Command key (macOS) while dragging the new transition onto the clip. This will add the new transition to the end of the existing transition, effectively creating a double transition. You can adjust the timing of the new transition by dragging its edges in the timeline.

You can learn more about transition at

https://brainly.com/question/14985581

#SPJ11


Related Questions

Predict the output a b= 12 13 print(print(a+b)) ​

Answers

Answer:

Invalid Syntax

We if correct the syntax then output is 25

Explanation:

In the given question a=12 ,b=13 if we used print(print(a+b)) ​ this syntax then invalid syntax will occur if we correct the syntax then correct syntax program is given below

a =12

b=13

print(a+b)

it gives 25 as output because we used "+" operator between a and b variable this operator provide addition between the two variable .

write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz​

Answers

Answer:

The program is as follows:

5 INPUT A,B

6 PROD = A * B

7 PRINT PROD

8 TOTAL = A + B

9 PRINT TOTAL

10 DIFF = A - B

11 PRINT DIFF

12 END

Explanation:

This gets input for the two numbers

5 INPUT A,B

This calculates the product

6 PROD = A * B

This prints the calculated product

7 PRINT PROD

This calculates the sum

8 TOTAL = A + B

This prints the calculated sum

9 PRINT TOTAL

This calculates the difference

10 DIFF = A - B

This prints the calculated difference

11 PRINT DIFF

This ends the program

12 END

In a swap you need a _____________ variable so that one of the values is not lost.

Answers

Answer:

temp

Explanation:

:D

There are different type of variable in computer, In a swap you need a temporary variable so that one of the values is not lost.

What is a temporary variable?

A temporary variable is a variable that has a short lifetime,it is use to hold a data that will soon be discarded, or data that will soon be moved to a more permanent memory location.

Therefore, In a swap you need a temporary variable so that one of the values is not lost.

Learn more on temporary variable here,

https://brainly.com/question/13420617

Which textual evidence best supports the conclusion that the knights are intimidated by the visitor?.

Answers

There are ways to know text that support a conclusion. The textual evidence best supports the conclusion is that "So that many of the noble knights were afraid to answer, And all were struck by his voice and stayed stone still".

How do one support a conclusion?

One can support a conclusion using;

Topic sentence. Here, one can rephrase the thesis statement.Supporting sentences. Here, one can make a summary or conclude the key  points in the body of the passage and also explain how the ideas did fit.Closing sentence. Here, one can use the final words. One can connects them back to the introduction.

Learn more about this passage from

https://brainly.com/question/24813043

With an upgraded network, Arroyo senior management wants IT to begin incorporating automation and
monitoring tools to help them manage the network more efficiently. Management also wants to improve network security for both the wired and wireless infrastructures,
ensuring that personnel, payroll, and customer information is protected from unauthorized viewing or use.
As part of this phase, you will need to identify potential sources of attacks and related security controls,
Tasks
For this part of the project, create a network planning document that includes:
1. A high-level plan for overall network management 2. A high-level plan for network monitoring that includes a procedure for how to measure
performance baselines
3. A high-level plan for network security based on defense in depth
. This part of the plan should describe the potential threats against the Arroyo network and
how the controls minimize those threats

Answers

The potential sources of attacks include phishing attacks, malware, social engineering, and brute-force attacks.

As part of the project, a network planning document is required to be created. The network planning document should include the following:

1. High-level plan for overall network management: The high-level plan for network management should focus on optimizing the network for maximum uptime, performance, and security. This can be achieved by implementing automated tools and ensuring that all critical systems are constantly monitored to avoid downtime.

2. High-level plan for network monitoring: The high-level plan for network monitoring should include a procedure for measuring the performance baselines. The procedure should be designed to detect any performance issues and take corrective actions in a timely manner. This can be achieved by using network monitoring tools and leveraging analytics to identify performance bottlenecks.

3. High-level plan for network security: The high-level plan for network security should be based on defense in depth. This can be achieved by implementing multiple layers of security controls to mitigate the risks associated with potential threats. The potential threats against the Arroyo network should be identified and the controls should be designed to minimize those threats.

Some of the potential sources of attacks include phishing attacks, malware, social engineering, and brute-force attacks. The controls should include measures such as firewalls, intrusion detection systems, antivirus software, and data encryption to protect against these threats.

Learn more about encryption:https://brainly.com/question/9979590

#SPJ11

what are the specific advantages of a pert network chart? more than one answer may be correct.

Answers

The PERT (Program Evaluation and Review Technique) network chart offers several advantages in project management. Some of the specific advantages include:

Visual Representation: PERT charts provide a visual representation of the project tasks and their dependencies, allowing stakeholders to easily understand the project flow and timeline. Task Sequencing: PERT charts highlight the sequential relationships between tasks, helping project managers determine the most efficient order of execution and identify any potential bottlenecks or dependencies.

Learn more about network here;

https://brainly.com/question/29350844

#SPJ11

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

what are the first two steps for creating a powerful multimedia presentation? create graphics first, and then add special effects. write the text first, and then select backgrounds and fonts. choose images that help communicate your message, and move your presentation to the internet.

Answers

The first two steps for creating a powerful multimedia presentation is option B: Write the text first, and then select backgrounds and fonts.

What is a Multimedia presentation?

A multimedia presentation is a standalone presentation that has data given with the help of slides, videos, or digital representations. It also includes sound, which could be in the form of narration, music, or sound effects.

The following are the 7 steps to making a multimedia presentation:

Draw up a plan.Make a software selection.Create the slides.Prepare the necessary media.Write.Include media components.Finalize your work.

Note that  writing the text first, you can be able to make any kind of adjustment to your presentation.

Learn more about multimedia presentation from

https://brainly.com/question/27800459
#SPJ1

Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet.​a) TCPb) UDPc) FTPd) PAN

Answers

The type of protocol that provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet is FTP, which stands for File Transfer Protocol. FTP is a standard protocol that is widely used for transferring files between servers and clients on a network.

FTP allows users to upload and download files to and from a remote server, as well as to manage files on the remote server, such as creating, deleting, and renaming files and directories. FTP operates on top of the TCP/IP protocol, and it uses two channels for communication: a control channel for sending commands and receiving responses, and a data channel for transferring files.

FTP is widely supported on a variety of operating systems and can be accessed using a range of FTP client software, such as FileZilla, Cyberduck, and WinSCP. It's worth noting that while FTP is a reliable and widely used protocol, it is not secure by default, and data transferred over FTP is not encrypted. For this reason, it's recommended to use secure alternatives such as SFTP (Secure File Transfer Protocol) or FTPS (FTP over SSL/TLS) when transferring sensitive data over a network.

#done with school already

Answers

Answer: omg yes same hate it

Explanation:school is boring and we have to do work.

which of these statements about the binary search algorithm are true? multiple select question. the number of comparisons performed by the algorithm when given a search term that is in the sequence depends on the search term. for every integer, there is some finite sequence such that the binary search algorithm does not end when searching the sequence. given a sequence, each integer from 1 to the size of the sequence can be the output of the binary search algorithm for some search term. the number of comparisons performed by the algorithm when given a search term that is in the sequence is independent of the search term. for all search terms and all sequences, the binary search algorithm continues splitting the sequence until it only contains one term.

Answers

The following statements about the binary search algorithm are true: The number of comparisons performed by the algorithm when given a search term that is in the sequence is independent of the search term. and For all search terms and all sequences, the binary search algorithm continues splitting the sequence until it only contains one term.

The statement "given a sequence, each integer from 1 to the size of the sequence can be the output of the binary search algorithm for some search term" is not necessarily true. It depends on whether the sequence contains duplicate elements or not.

The statement "the number of comparisons performed by the algorithm when given a search term that is in the sequence depends on the search term" is not true for the binary search algorithm, as it always takes a logarithmic time with respect to the size of the input sequence.

The statement "for every integer, there is some finite sequence such that the binary search algorithm does not end when searching the sequence" is also not true. The binary search algorithm will always terminate, even if the search term is not in the sequence.

Learn more about the binary search algorithm:https://brainly.com/question/15190740

#SPJ11

Which MySQL function can perform one-way password encryption in a database?
a. password()
b. encrypt()
c. asymmetric()
d. flush()

Answers

The MySQL function that can perform one-way password encryption in a database is password().

So, the correct answer is A.

This function is specifically designed for securing passwords in MySQL databases by applying a hash function. The one-way nature of the hash ensures that it is very difficult to reverse-engineer the original password from the encrypted output.

Keep in mind, it's recommended to use more advanced encryption methods like bcrypt, scrypt, or Argon2 for improved security in real-world applications. Functions b. encrypt(), c. asymmetric(), and d. flush() do not serve the same purpose as password() in terms of encrypting passwords in a MySQL database.

Hence ,the answer of the question is A.

Learn more about database at

https://brainly.com/question/32067346

#SPJ11

A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph also includes multiple pieces of metadata including:
Date: The date the photograph was taken
Time: The time the photograph was taken
Location: The location where the photograph was taken
Device: Which camera the photo was taken with
Which of the following could the photographer NOT do based on this metadata?
A. Filter photos to those taken in the last week
B. Filter photos to those taken in a particular country
C. Filter photos to those taken of buildings
D. Filter photos to those taken with her favorite camera

Answers

Answer: Filter photos to those taken of buildings

Explanation:

Based on the metadata, the option that the photographer cannot do is to filter the photos to those taken of buildings.

• Option A -Filter photos to those taken in the last week

Date: The date the photograph was taken -

Option B - B. Filter photos to those taken in a particular country.

Location: The location where the photograph was taken

Option D - Filter photos to those taken with her favorite camera

Device: Which camera the photo was taken with

Therefore, the correct option is C.

Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time

Answers

Answer:

See answer below

Explanation:

He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.

In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.

The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.

Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
to-speech tool best help her?
It can improve her comprehension.
o It can help her with vocabulary words.
It can increase the pace of her reading
It can provide her with a summary

Answers

Answer:

It can improve her comprehension.

It can help her with vocabulary words.

It can increase the pace of her reading.

It can provide her with a summary.

Explanation:

edge 2020

Answer: C it can increase the pace of her reading

Use the following data set about coffee to create an Infographic-type visualization.
First think about the reader and what questions the data set might be able to answer.
Perform any statistical processes necessary to tell a compelling story that answers those questions.
Run descriptive statistics on the data set. Then decide which assumptions you can make for the data set.
Apply the concepts from Unit 7 such as: bringing in outside data to provide context for the reader, using Gestalt principles to emphasize important information, etc.
Include a minimum of five facts and five graphics to tell the story.
Create an Infographic.
Be sure to look at the examples of infographics so you get a clear idea of what to create. Your infographic should tell a story based on the graphics you create, the graphics should be thematic, and there should be a minimum of text.
coffee data set Download coffee data set
Possible outside data for context (remember that the above data set is your primary focus)

Answers

The coffee data set provided requires statistical processes to be used to tell a compelling story that can answer readers' questions. To accomplish this, descriptive statistics should be conducted on the data set.

Once the descriptive statistics are completed, it's vital to make assumptions about the data set. This enables one to create an Infographic type visualization that will help the readers to better understand the coffee data set.It is important to remember to bring in outside data to provide context for the reader and use Gestalt principles to emphasize important information. Some possible outside data that could provide context are coffee consumption trends over time or the production of coffee worldwide over time.

In conclusion, an Infographic has five facts and five graphics that tell a story based on the graphics you create, and the graphics should be thematic, and there should be a minimum of text. So the statistics and the context should be displayed through the use of graphics.The infographic should tell a story about the coffee data set. For example, it should highlight the top coffee-consuming countries, the average amount of coffee consumed per person, the most common coffee brewing methods, and the most popular coffee brands. These facts can be presented through different graphics such as a world map showing the top coffee-consuming countries, a bar graph showing the average amount of coffee consumed per person in each country, a pie chart showing the most common coffee brewing methods, and a bubble chart showing the most popular coffee brands. The graphics should be well-designed and follow Gestalt principles to emphasize important information.

To know more about Infographic visit:

brainly.com/question/33014968

#SPJ11

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

Please help! It’s about coding and I’m not doing well on this topic. So i need a little help

Joe now wants to show his new personal assistant, Kelly, what he has learned about HTML, DHTML, and XML coding. Fill in the blank parts of the table below with Joe's newfound information. Then, perform each action using your simple web page from Question 2.

Please help! Its about coding and Im not doing well on this topic. So i need a little help Joe now wants

Answers

Answer : Actionscript is for animation

JavaScript is for adding functionality to a webpage

DHTML is incorporating other languages into HTML

XML is used to store data

HTML is used to create a web page

Explanation:

relevez le rôle principal de la peau dans l,organime humain. je suis bloquée aidez moi metci​

Answers

Answer:

language?

Explanation:

A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next

Answers

Answer:

Establish a plan of action to find the DHCP server.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.

Which of the following is not one of the challenges posed by international networks, including the Internet? A. Quality of service B. Costs and tariffs C. Security D. Network management E. Differences in Internet protocols

Answers

Correct option is A. Quality of service,it is not one of the challenges posed by international networks, including the Internet.

How do international networks not pose a challenge in terms of quality of service?

Quality of service (QoS) is not one of the challenges posed by international networks, including the Internet. QoS refers to the ability of a network to deliver reliable and predictable performance, such as low latency, high bandwidth, and minimal packet loss.

While QoS is important in many network environments, it is not typically considered a significant challenge in international networks.

On the other hand, challenges such as costs and tariffs, security, network management, and differences in Internet protocols are commonly encountered in international networks.

International networks often involve complex billing structures, regulatory frameworks, and varying pricing models, which can pose challenges in terms of cost management and tariff negotiations.

Security is a critical concern in international networks due to the diverse range of cyber threats and the need to protect sensitive data during transmission.

Network management becomes challenging due to the physical distance, diverse infrastructure, and varying technical standards across different countries.

Finally, differences in Internet protocols can hinder interoperability and require careful consideration when establishing connections between networks with varying protocols.

Learn more about Quality of service

brainly.com/question/15295852

#SPJ11

What is one similarity between compiled and interpreted programming languages? (5 points)

Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.

Both compiled and interpreted languages can be shared with others while keeping the source code private.

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

There are no similarities between compiled and interpreted programming languages.

Answers

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.

There are various risks from attacks on wi-fi networks. These include all of the following except _____.

Answers

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

What is malware?

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

you can't cite Wikipedia, what are three ways that you can use it for your research?

Answers

Answer:

Scan over the article for references/resources, find general information about your topic, find keywords and terms you can use for further searching.

Explanation:

True/False: the original development goals for unix were twofold: to develop an operating system that would support software development, and to keep its algorithms as simple as possible.

Answers

False. The original development goals for Unix were not twofold but rather threefold:

To provide a convenient and efficient operating system for software development.To allow easy portability of the operating system across different hardware platforms.To keep the design and implementation of the system as simple and elegant as possible.The simplicity and elegance of Unix's design were seen as important goals by its creators, Ken Thompson and Dennis Ritchie. They aimed to create a modular and flexible operating system that could be easily understood, extended, and maintained. This emphasis on simplicity contributed to Unix's success and its influence on subsequent operating systems.



learn more about development  here :


nly.com/question/28011228



#SPJ11

anyone have good websites to cure boredom

Answers

Answer:

cool math if its not blocked

Explanation:

How do you resolve you have uncommitted work pending Please commit or rollback before calling out?

Answers

In order to resolve this issue, you need to either commit or rollback the pending work. Committing the pending work will save the changes to the database.

What is database ?

A database is a collection of data that is organized in a structured format and stored in a computer system. It is typically used to store, retrieve and manipulate data. Databases are used for a variety of purposes, including recording customer information, storing financial records, and tracking inventory. A typical database contains tables, fields, records, and indexes, which are used to store and organize the data. Database management systems (DBMS) are responsible for managing the data and providing access to users. These systems provide various tools, such as query languages, forms, and reports, to assist in manipulating and retrieving the data.

To learn more about  database

https://brainly.com/question/28033296

#SPJ4

Question 3 of 10
2 Points
What is the term for classifying and grouping organisms?
O A. Outgrouping
B. Taxonomy
O O
O C. Linnaeus
O D. Ancestor​

Answers

Answer:

B. Taxonomy

Explanation:

Taxonomy is a term used in biological sciences. It is defined as the grouping together or classification of living organisms such as Plants, Animals and Microorganisms in specific categories or groups based on similarities in certain characteristics or morphology which they share.

Carl Linnaeus a scientist (botanist) from Sweden has been described or named as the Father of Taxonomy. This is because created what is known as the Linnaean Taxonomy system in which organisms are classified and named.

Living Organisms are classified into ranks or hierarchy listed below:

a) Domain

b) Kingdom

c) Phylum(for Animals) or Division (for Plants)

d) Class

e) Order

f) Family

g) Genus

h) Species.

what does the word collaborative mean?

Answers

Answer:

Collaborative is an adjective that describes an effort in which people work together (that is, one in which they collaborate). Collaborative is often used in a positive context to refer to two or more parties successfully working together on a goal or shared project.

Explanation:

Hope this helps you! Feel free to leave feedback :)

Other Questions
Two plants cross-fertilize. One plant has round yellow seeds with the genotype RRYY; the other parent plant has green and wrinkled seeds rryy. What gametes can each parent plant produce It is inconsistent to believe that the long-run aggregate supply curve is vertical and the long-run Phillips curve is downward sloping because O A. in order for the long-run Phillips curve to be downward sloping, changes in the interest rate would have to affect the unemployment rate in the long run, which does not happen with a vertical long-run aggregate supply curve. OB. in order for the long-run Phillips curve to be downward sloping, changes in the price level (inflation) would have to affect the unemployment rate in the long run, which does not happen with a vertical long-run aggregate supply curve. O C. in order for the long-run aggregate supply curve to be vertical, changes in the price level (inflation) would have to affect the unemployment rate in the long run, which does not happen with a downward-sloping long-run Phillips curve. OD. None of the above-believing that the long-run aggregate supply curve is vertical and the long-run Phillips curve is downward sloping is not inconsistent. Think Critically 5-1 Creating Flexible Storage. It's been 6 months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to get low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes. He wants a flexible solution in which drives and volumes aren't restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a storage enclosure system that can contain up to 10 HDDs. Which Windows feature can accommodate these needs, and how does it work? Salt water gargle can temporarily relieve a sore throat. One recipe calls for 3/4 teaspoon of salt in 1 cup of water. A second recipe calls for 1 teaspoon of salt in 2 cups of water. Which recipe will taste saltier? Find a recurrence relation for Cn , the number of ways to parenthesize the product of n+1 numbers, x0 x1 x2 ... xn, to specify the order of multiplication. For example, C3: = 5 because there are five ways to parentheize x0 x1 x2 ..... xn to determine the order of multiplication: ((x0.x1).x2) X3 , (x0. (x1 x2)). x3, (x0 x1) . (x2 x3), x0. ((x1. x2). x3), x0 (x1 x2 x3)) You worked this past summer at a furniture manufacturing plant. Among the products used in making chairs and couches are glues, paint thinners, varnishes, and stains. Residuals of these products were discharged by the company through a pipe into a nearby pond. The pond is a tributary of a lake popular with boaters and people who like to fish. Now that you are back at school, you read in the paper that the company has pled guilty to the crime of knowingly discharging industrial pollutants into the waters of the United States, a violation of the Clean Water Act. You wonder what consequences will result.What are the various penalties that can be imposed by the judge on the furniture company for its violation of the Clean Water Act? Include all that apply.A maximum fine of $500,000.A fine of up to $2,500 for each day the Act was violated up to $1 million, an injunction mandating the company stop polluting, and a requirement that the company clean up the pollution it caused or pay for the cost of doing so.A fine of up to $2,500 for each day the Act was violated up to $1 million, plus an injunction.A fine of $2,500 for each day the Act was violated up to a maximum of $1 million. Please help!! Choosing brainliest!! problem 1A train starts at rest, accelerates with constant acceleration a for 5minutes,then travels at constant speed for another 5minutes,and the decelerates with a.suppose it travels a distance of 10km in all find aproblem 2A ball is dropped from a height of 10m.At the same time, another ball is thrown vertically upwards at an initial speed of 10m/sec.How high above the ground will the two balls collide problem 3 find the resultant of the two velocity vectors and also, find the angle that the resultant makes with the vector What types of medium(s) can sound travel through?gasesAll of them!solidsliquids Which part(s) of the molecule can form a hydrophobic interaction with a suitable partner? Check all that appluy: An interest group isA. A person voters choose to speak and act for their fellow citizens in government.B. The various means of mass communication as a whole group, such as television.C. The course of action accepted or used by government to respond to a problem.D. A group of people with common goals who work together to promote their cause. Explain one reason Southeast Asia has many religions and one reason it has many languages. although they both provide tensile strength and resistance to compression, the extracellular matrix of animals and cell walls of plants differ because the cell walls of plants: The United States decided to enter World War II after Japan, an ally of Nazi Germany, attacked Pearl Harbor. Before the attack onPearl Harbor, the United States was already unhappy with Japan because of Japanese aggression in which of the followingcountries?OA. RussiaOB. IndiaOC. PolandOD. China PLEASE HELP!!! i will give you brainly! Which of the following business events or transactions is most likely a red flag of a money laundering operation? Stealing passwords Kiting checks Smoothing net income on the financial statements 0 Prepayments on a credit card If anybody can answer it would be greatly appreciated! (Question is worth 20 points) Write an integer to represent the following situations1. An increase of 3 points 2. Earning $25 3. Spending 10$4. A loss of 5 yards The question in the imagePlease help me A Women making $29 an hour gets a 15% raise. How much money will she make after 4 hours of working with the increased hourly pay?