What is responsible for sending instructions to the hardware to complete tasks such as opening graphics on the Internet, making words appear in your word processor, and running the various software programs that keep your computer operating?
Internet
operating system
hard drive
USB

Answers

Answer 1
The answer is B: Operating System

Related Questions

ball.setSize(25, 75);
What does 25 represent in the example above?
1. The SPEED of the ball
2. The WIDTH of the ball
3. The HEIGHT of the ball
4. The 'X' coordinate of the ball

Answers

Answer:

2

Explanation:

This is a python program my teacher assigned:
Create a list of days of the week. (yes, this uses strings)
A) Print each day using a for loop.
B) for non-school days, print “freedom” next to the day of the week.

How would I execute this?

Answers

Answer:

#Create an array for week

week = ["Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday","Sunday"]

#Create a varable index and use index to loop through week(array)

for index in week:

 #if the index is on Saturady or Sunday then, print freedom

 if index == "Saturday" or index == "Sunday":

   print(index + " Freedom")

#else just pint out the other days

 else:

   print(index)

the volume of two similar solids are 1080cm and 1715cm .if the curved surface area of the smaller cone is 840cm .fond the curved surface area of the larger cone​

Answers

Answer:

\(A_{big} = 1143.33cm^2\)

Explanation:

The given parameters are:

\(V_{small} = 1080\)

\(V_{big} = 1715\)

\(C_{small} = 840\)

Required

Determine the curved surface area of the big cone

The volume of a cone is:

\(V = \frac{1}{3}\pi r^2h\)

For the big cone:

\(V_{big} = \frac{1}{3}\pi R^2H\)

Where

R = radius of the big cone and H = height of the big cone

For the small cone:

\(V_{small} = \frac{1}{3}\pi r^2h\)

Where

r = radius of the small cone and H = height of the small cone

Because both cones are similar, then:

\(\frac{H}{h} = \frac{R}{r}\)

and

\(\frac{V_{big}}{V_{small}} = \frac{\frac{1}{3}\pi R^2H}{\frac{1}{3}\pi r^2h}\)

\(\frac{V_{big}}{V_{small}} = \frac{R^2H}{r^2h}\)

Substitute values for Vbig and  Vsmall

\(\frac{1715}{1080} = \frac{R^2H}{r^2h}\)

Recall that:\(\frac{H}{h} = \frac{R}{r}\)

So, we have:

\(\frac{1715}{1080} = \frac{R^2*R}{r^2*r}\)

\(\frac{1715}{1080} = \frac{R^3}{r^3}\)

Take cube roots of both sides

\(\sqrt[3]{\frac{1715}{1080}} = \frac{R}{r}\)

Factorize

\(\sqrt[3]{\frac{343*5}{216*5}} = \frac{R}{r}\)

\(\sqrt[3]{\frac{343}{216}} = \frac{R}{r}\)

\(\frac{7}{6} = \frac{R}{r}\)

The curved surface area is calculated as:

\(Area = \pi rl\)

Where

\(l = slant\ height\)

For the big cone:

\(A_{big} = \pi RL\)

For the small cone

\(A_{small} = \pi rl\)

Because both cones are similar, then:

\(\frac{L}{l} = \frac{R}{r}\)

and

\(\frac{A_{big}}{A_{small}} = \frac{\pi RL}{\pi rl}\)

\(\frac{A_{big}}{A_{small}} = \frac{RL}{rl}\)

This gives:

\(\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{L}{l}\)

Recall that:

\(\frac{L}{l} = \frac{R}{r}\)

So, we have:

\(\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{R}{r}\)

\(\frac{A_{big}}{A_{small}} = (\frac{R}{r})^2\)

Make \(A_{big}\) the subject

\(A_{big} = (\frac{R}{r})^2 * A_{small}\)

Substitute values for \(\frac{R}{r}\) and \(A_{small}\)

\(A_{big} = (\frac{7}{6})^2 * 840\)

\(A_{big} = \frac{49}{36} * 840\)

\(A_{big} = \frac{49* 840}{36}\)

\(A_{big} = 1143.33cm^2\)

Hence, the curved surface area of the big cone is 1143.33cm^2

My computer likes to disconnect every 3 or 5 minutes a lot when I turn it on, Is there any solution for this?

Answers

Answer:

RESTART IT!!! also check if its charged and look up problems with that model

Explanation:

Restart the computer and make sure there’s nothing lose on the system and also if there’s stable connection.

When an operator's operands are of different data types, such as int and double, c automatically converts one of them so that they are the same data type.

a. true

b. false

Answers

The statement "When an operator's operands are of different data types, such as int and double, C automatically converts one of them so that they are the same data type" is true.

Different data types are used in programming, and it is not uncommon to encounter scenarios where the data types of two operands used with an operator are not the same. To enable the operator to function, C automatically converts one of the operands to the same data type as the other operand. This process is called type conversion or type casting.There are two types of type conversion: implicit and explicit. In implicit type conversion, C automatically converts one of the operands to the same data type as the other operand. This happens when the operands are of different types, but the operator can still perform the operation with the operands in different types.For instance, if we have an integer variable called "x" and a double variable called "y," we can add them together by using the "+" operator. In this case, C will change x to a double so that both operands are doubles, and the addition can be performed. This is known as implicit type conversion or promotion.Explicit type conversion is the second type of type conversion, where a programmer manually converts one data type to another. In this case, the programmer specifies the type to which they want to convert the data. This is known as type casting. In summary, type conversion is a crucial aspect of C programming, and it ensures that operators can function correctly with operands of different data types.

The statement "When an operator's operands are of different data types, such as int and double, C automatically converts one of them so that they are the same data type" is true. This process is called type conversion, and it enables the operator to perform its operation with operands in different types. Type conversion in C can be either implicit or explicit, depending on the scenario. Implicit type conversion happens when C automatically converts an operand to the same data type as the other operand. Explicit type conversion happens when a programmer manually converts a data type to another.

Learn more about type conversion visit:

brainly.com/question/30399355

#SPJ11

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with a total of 8 words of data:
C1 has 1-word blocks,
C2 has 2-word blocks, and
C3 has 4-word blocks.
In terms of miss rate, which cache design is the best?
Assume
the miss stall time is 25 cycles, and
C1 has an access time of 2 cycles,
C2 takes 3 cycles, and
C3 takes 5 cycles,
which is the best cache design?
Cache 1 (1W) Cache 2 (26) Cache 3 (46) Word Address Binary Address Tag index | hit/miss index | hit/miss index |hit/miss 0000 0011 1 MOM 180 10110100 | 22 4 43 0010 1011 5 3 2 0000 0010 0 2 191 10111111 237 88 01011000 10111110 110 23 6. M 1 M O MOM | H 1 H m 1 1 190 14 0000 1110 181 10110101 44 0010110054 M1 M 186 1011 1010 23 2 M1 M0M 253 11111101 315 2 M 1 Cache 1: miss rate = %(an integer between 0 and 100), total cycles = Cache 2: miss rate = %sip (an integer between 0 and 100), total cycles = Cache 3: miss rate = %(an integer between 0 and 100), total cycles = Cache provides the best performance. (Fill in numbers 1,2 or 3)

Answers

In general, to determine which cache design is the best, both miss rate and total cycles (access time + miss stall time * miss rate) need to be calculated for each cache configuration.

How to perform this calculation

To calculate the miss rate, you'd analyze each reference for each cache and mark whether it's a hit or miss. The miss rate is the number of misses divided by the total number of references.

To calculate total cycles, you multiply the miss stall time by the miss rate, and add the access time.

The best cache design is the one with the lowest total cycles, since it would provide the fastest memory access time.

Read more about caches here:

https://brainly.com/question/2331501

#SPJ4

From our IT​ News, data brokers collect and sell​ _______________ information. A. anonymously filtered B. aggregate C. individually identifiable

Answers

From our IT News, data brokers collect and sell individually identifiable information.

This includes personal details such as name, address, date of birth, social security number, and other sensitive information. This type of information is highly valuable to advertisers and marketers who use it to target specific audiences with personalized advertising. However, the collection and sale of this data raises privacy concerns and has led to calls for stricter regulations on data brokers. Consumers should be aware of how their personal information is being collected and used, and take steps to protect their privacy online.

learn more about data brokers here:

https://brainly.com/question/12448881

#SPJ11

you have recently installed windows server 2016 desktop experience on a server. your manager informs you that he needs to extensively use the command line and powershell. he also does not want the graphical interface. what should you do to meet his requirements? [choose two that apply]

Answers

To meet your manager's requirements, you can take the following steps:

   Uninstall the desktop experience feature: The desktop experience feature provides a graphical user interface (GUI) on Windows Server, which your manager doesn't want. You can uninstall this feature by running the following PowerShell command as an administrator:

   Uninstall-WindowsFeature Server-Gui-Shell -Restart

   This will remove the desktop experience feature and reboot the server.

   Install the Windows Server Core mode: The Windows Server Core installation provides a command-line interface with no GUI, which is suitable for your manager's needs. You can install this mode by running the following PowerShell command as an administrator:

   Install-WindowsFeature ServerCore

   This will install the Windows Server Core mode, which only includes the command-line interface and essential system components.

Note: Before making any changes to a production system, it is recommended to test the changes in a non-production environment. Also, make sure to communicate with your manager and obtain approval before making any changes to the server.

For more such question on interface

https://brainly.com/question/30390717

#SPJ11

It is not necessary for the game mechanics that you choose to fit into the genre of your game.

TRUE
FALSE

Answers

Answer:

false

Explanation:

cause it is necessary for the game mechanics to fire into the genre of the game

how did the code red worm spread

Answers

The Code Red worm spread through a buffer overflow vulnerability in the Microsoft Internet Information Services (IIS) web server.

The Code Red worm, discovered in 2001, was designed to exploit a specific security flaw in the Microsoft IIS web server. This flaw, a buffer overflow vulnerability, allowed the worm to execute its malicious code on the targeted server. The worm would then scan the internet for other vulnerable servers, replicate itself, and infect those systems as well. The worm also had a secondary function, which was to launch a denial-of-service (DoS) attack on specific targets.

The rapid spread of the Code Red worm was due to its exploitation of a buffer overflow vulnerability in Microsoft IIS web servers, allowing it to infect numerous systems and carry out its intended functions, including replication and DoS attacks.

To know more about denial-of-service visit:

https://brainly.com/question/30656531

#SPJ11

nix operating system associates a protection domain with the . a. task b. tread c. process d. user

Answers

The nix operating system links the application to a protection domain.

What does Java mean by a protective domain?

The Protection Domain class incorporates the properties of a domain that contains a number of classrooms whose instances, when run on behalf of a specified group of Doctrines, are assigned a particular set of rights.

What about domain protection?

The purchase of trademark information privacy for your small or medium-sized professional or commercial webpage can provide you a feeling of protection, but due to recent modifications to international rules aimed at preserving online privacy, you don't have to.

To know more about Protection domain visit:

https://brainly.com/question/28563270

#SPJ4

Create a class called Date that includes three pieces of information as data members -- a month (type int), a day (type int) and a year (type int). Your class should have a constructor with three parameters that uses the parameters to initialize the three data members. For the purpose of this exercise, assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1-12; if it isn't, set the month to 1. Provide a set and a get function for each data member. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/).

Answers

Answer:

please mark me brainlist

Explanation:

Create a class called Date that includes three pieces of information as data members -- a month (type

Why would a user want to resend a message? Check all that apply.
O to include new recipients
D to include a forgotten attachment
D to force recipients to read the message immediately
D to respond to a request from a recipient who accidentally deleted it
O to include missing information
O to require recipients to respond to a read receipt

Answers

Answer:

A

B

D

E

Explanation:

O to include new recipients

D to include a forgotten attachment

D to respond to a request from a recipient who accidentally deleted it

O to include missing information

Answer:

He's right its A, B, D and E

Explanation:

What's the Deal with Those Last 4 Digits on ZIP Codes?

Answers

After a hyphen, the additional four numbers are added to complete the ZIP+4. Specific delivery routes within delivery areas are represented by these final four digits. This additional information results in an even more exact matching at a finer level.

What is ZIP Code?An American Postal Service postal code is called a ZIP Code. Five digits made up the fundamental format, which was unveiled on July 1st, 1963. During the introduction of the extended ZIP+4 code in 1983, a four-digit location-specific designation was added after the five-digit ZIP Code, followed by a hyphen. A 5-digit code known as a ZIP Code identifies a specific post office or geographic area for mail delivery. Letters' ultimate sorting and delivery locations are identified by their ZIP Codes. Each ZIP Code identifies a set of mail carriers' routes for delivering mail and USPS service areas. A postal code used by the United States Postal Service is called a ZIP code.

To learn more about ZIP Code, refer to:

https://brainly.com/question/30363772

#SPJ4

quick sort is being used with data[0] as the split value. what is the state of the array when the first recursive call is made?

Answers

An array is a group of related data elements kept in close proximity to one another in memory.

What is array?

In most programming situations, a significant volume of data of a similar type must be stored.

To store this much data, we must define a lot of variables.

It would be very difficult to remember every variable name while coding the scripts. It is preferable to define an array and keep all the elements inside of it.

In a two-dimensional array, we can access the individual cells by utilizing their indices, much like in a one-dimensional array where data can be retrieved using simply an index.

A single cell has two indices: one is the row number and the other is the column number.

Hence, An array is a group of related data elements kept in close proximity to one another in memory.

learn more about arrays click here:

https://brainly.com/question/28061186

#SPJ4


Where might you find recommendation engines at work?
Suggesting a new song you might
enjoy on a streaming music site.
Providing new movies you might
enjoy based on titles you liked.
An online advertisement for a video
game you recently read about in a
blog post.
All of the above

Where might you find recommendation engines at work?Suggesting a new song you mightenjoy on a streaming

Answers

Answer:

All of the above.

Explanation:

All scenarios show signs of a recommendation engine at work since they are providing recommendations and suggestions of things that you would potentially like based on the analysis of data from your search history or likes from songs, movies, etc.

Hope this helps :)

how do I open this thing? it is stuck​

how do I open this thing? it is stuck

Answers

Answer:

the little button

Explanation:

Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart

Answers

Complete Question:

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)

Group of answer choices.

a. Try an external device before replacing the motherboard.

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Answer:

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Explanation:

In this scenario, Sherri is considering replacing a processor on her laptop because the laptop is running slower than she would like.

Hence, Sherri should consider the following informations prior to taking the laptop apart;

I. Make sure you have the correct processor for the motherboard. She can get the specifications of the motherboard and processor on the manufacturer's website.

II. Verify that the laptop is not under warranty because if it still under warranty, taking the laptop apart would void the warranty granted by the original manufacturer.

III. Determine whether a teardown procedure is available. She should ensure there is a guide available for dismantling and re-coupling of the laptop.

what are three activities involved in deploying an application to cloud foundry?

Answers

Three activities involved in deploying an application to cloud foundry are Preparing the application, Pushing the application, Managing and scaling the application.

The three activities involved in deploying an application to Cloud Foundry are:

1. Preparing the application: Before deploying your application, ensure that it is compatible with Cloud Foundry and that all necessary dependencies are included. You might need to modify the application's configuration files or include specific buildpacks to support the required runtime environment.

2. Pushing the application: The next step is to push your application to Cloud Foundry using the Cloud Foundry Command Line Interface (CLI). Use the 'cf push' command along with the application's name, buildpack (if needed), and other required parameters. This step will upload your application's source code, create a new application container, and start the application on Cloud Foundry.

3. Managing and scaling the application: Once your application is deployed, you can manage it using the Cloud Foundry CLI or the web-based Cloud Foundry Management Console. You can scale the application by increasing or decreasing the number of instances, allocate more memory or disk space, and monitor the application's performance.

In summary, the three activities involved in deploying an application to Cloud Foundry are preparing the application, pushing the application using the CLI, and managing and scaling the deployed application.

To learn more about Cloud Foundry

https://brainly.com/question/32142682

#SPJ11

Complete the statement below using the correct term.


__________is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate security into their applications.

answer quickly pls

Answers

Answer:

bugs?

Explanation:

..........................

.....

..

Suppose that an algorithm performs f(n) steps, and each step takes g(n) time. How long does the algorithm take? f(n)g(n) f(n) + g(n) O f(n^2) O g(n^2)

Answers

The algorithm performs f(n) steps, and each step takes g(n) time. To find the total time it takes for the algorithm to complete, you can multiply the number of steps by the time per step.

However, we can give some possible answers based on the commonly used asymptotic notation.
If f(n) and g(n) are both constants (i.e., they don't depend on n), then the algorithm will take f(n) x g(n) time, or a constant amount of time. So the answer is f(n)g(n).
If f(n) is much smaller than g(n) (i.e., f(n) = O(g(n))), then the dominant term in the total time will be g(n). So the answer is O(g(n)).
If g(n) is much smaller than f(n) (i.e., g(n) = O(f(n))), then the dominant term in the total time will be f(n). So the answer is O(f(n)).
If f(n) and g(n) are both roughly the same size, then we need to consider their product, which is f(n) x g(n). This means that the total time will be on the order of f(n) x g(n), so the answer is O(f(n) x g(n)) or O(n^2) if f(n) = g(n) = n.
In summary, the answer is either f(n)g(n), O(f(n)), O(g(n)), or O(f(n) x g(n)), depending on the relationship between f(n) and g(n).

To know more about algorithm visit :-

https://brainly.com/question/31936515

#SPJ11

What is the purpose of the green flag in the Scratch interface?
A. It opens the sprite menu.
B. It saves and shares the game.
C. It begins the program.
D. It opens the costumes palette.

What is the purpose of the green flag in the Scratch interface?A. It opens the sprite menu.B. It saves

Answers

Answer:

C. It begins the program.

Explanation:

Which of the following is not a valid way to write a string?

Using single quotation marks around the characters
Using double quotation marks around the characters
Using triple single quotation marks around the characters
Using parenthesis around the characters

Answers

The statement which is not a valid way to write a string is: C. Using triple single quotation marks around the characters.

What is a string?

In Computer technology, a string can be defined as a data type which is commonly used for data values that typically contains ordered sequences of characters.

This ultimately implies that, a string can either contain a single character or be entirely empty. Additionally, "Hello world" is a typical example of a string in computer programming.

In Computer programming, some of the valid way to write a string include the following:

Using single quotation marks around the characters.Using double quotation marks around the characters.Using parenthesis around the characters.

Read more on a string here: brainly.com/question/25619349

#SPJ1

system _____ refers to the arrangement of software, machinery, and tasks in an information system needed to achieve a specific functionality.

Answers

System configuration refers to the arrangement of software, machinery, and tasks in an information system needed to achieve a specific functionality.

System configuration involves the organization and setup of various components within an information system to fulfill a particular purpose or functionality. It encompasses the arrangement of software applications, hardware devices, and the allocation of tasks and responsibilities. The goal is to ensure that all the necessary elements are properly integrated and coordinated to achieve the desired outcome.

System configuration includes decisions related to software installation, hardware connectivity, network settings, and task allocation among different components. By configuring the system appropriately, it becomes optimized to perform specific functions efficiently and effectively.

You can learn more about information system  at

https://brainly.com/question/14688347

#SPJ11

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

When you instruct a computer or mobile device to run an application, the computer or mobile device answer its software, which means the application is copied from storage to memory?

Answers

I believe loads

not for sure what the question is

(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Ion Column B a. An atom or molecule that has a positive or negative charge b. A value from 0 to 14 that is used to specify how acidic or basic a compound is when it is dissolved in water c. A compound that increases hydrogen ions (H+) when it is dissolved in a solution d. A compound that increases the hydroxide ions (OH-) when it is dissolved in a solution

Answers

Answer:

Follows are the matching to this question:

Explanation:

Column  A            Column B

     1                           c

     2                          d

     3                          b

     4                          a

Description of the matching:

In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution.  In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+.  In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.

Answer:

Acid-A compound that increases hydrogen ions (H+) when it is

Base-A compound that increases the hydroxide ions (OH−) when it is  dissolved in a solution

Ions- An atom or molecule that has a positive or negative charge

pH-A value from 0 to 14 that is used to specify how acidic or basic a  compound is when it is dissolved in water

Explanation:

plz give brainly

Five uses of the start button

Answers

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance

Answers

Answer:

I. ===> B

II. ===> D.

III ===> A

IV ===>  C

V ===> E.

Explanation:

PAN is the smallest network. Then comes then HAN then LAN.

MAN covers a city and WAN covers the greatest distance.

Other Questions
Question 7 The greatest demand for electricity would occur in homes in Georgia at night during a cold winter Saturday. O at about noon during a cold winter Wednesday. O at about noon during a hot summer Wednesday. O at night during a hot summer Saturday. What is the solution set for the open sentence with the given replacement set?13 x 7, {4, 5, 6, 7}1.42.53.64.7 1 PointsMULTIPLE CHOICEQuestion 7What were weather conditions like during the Cherokees 1,000 mile journey on the Trail ofTears?PIt was a harsh winter.BIt was a hot summer.CIt was a windy fall.DIt was a rainy spring a metal-cutting operation has a target value of 20 and consistently averages 19.8 with a standard deviation of 0.5. the design engineers have established an upper specification limit of 22 and a lower specification limit of 18. which statement concerning this process is true? A neutralization reaction between HCl and NaOH has taken place in the lab, below is the data. Please determine the concentration of the unknown HCl solution. Please make sure all final answers are written using the correct number of significant figures and using scientific notation. 1 HCl + 1 NaOH 1 H2O + 1 NaClMolarity of NaOH = 1.00 MWhat is the change in volume of NaOH? Select the best sentence that reflects the central idea of Franklin d. Roosevelts speech? Phase voltage and current of a star-connected inductive load is 150 V and 25 A. Power factor of load is 0.707 lagging. Assuming that the system is a 3-phase three wire and power is measured using two watt meters, find the reading of watt meters. (14) & ZX V X V 30 710 describe(s) interactions and patterns that operate in a family over time and that are linked to expectations. ________________is the accounting system linked to family loyalty and indebtedness. Why do process drawings use common sets of lines and symbols to represent components? the presence of any of the following factors would suggest a switch to abc except whenselect answer from the options belowproduction managers are ignoring data provided by the existing system.the manufacturing process has changed significantly.overhead costs constitute a minor portion of total costs.product lines differ greatly in volume. Black Americans found ways to survive and thrive despite racist policies. Please describe three situations that highlight the resilience of Black Americans under Jim Crow. Find the area of the shape.Either enter an exact answer in terms of (pi) or use 3.14, for (pi) and enter your answer as a decimal. There are many cones with a height of 12 inches. Let r represent the radius and v represent the volume of these cones Estimate the perimeter and the area of the shaded figure. How do you find the area of this shaded shape? Thank you! Can someone help me please Effective leadership is based on the traits of leaders."" Critically discuss this statement with reference to relevant theories. During one part of the water cycle, heat from the Sun causes liquid water to change into water vapor, which rises into the atmosphere.Which statement best describes the reverse of this process?As liquid water falls from the atmosphere to land, it turns into a gasAs the Sun's rays warm solid ico, it begins to melt into liquid water.As liquid water from streams and groundwater drains into large bodies of liquid water, it turns to gas.As water vapor meets cooler air, it changes into droplets of liquid water that return to Earth's surface, Read the excerpt from amy tans essay mother tongue. i know this for a fact, because when i was growing up, my mothers limited english limited my perception of her. i was ashamed of her english. i believed that her english reflected the quality of what she had to say. that is, because she expressed them imperfectly her thoughts were imperfect. which phrase from this excerpt best indicates to the reader that the purpose of this essay is to inform? a. i know this for a fact b. my mothers limited english c. the quality of what she had to say d. her thoughts were imperfect a) An adult who visited a therapist during the past year is randomly selected. What is the probability this adult used non-prescription antidepressants? Round your answer to decimal places.(b) What is the probability that an adult visited a therapist during the past year, given that he or she used non-prescription antidepressants? Round your answer to decimal places.