What is the second step of the A+ troubleshooting methodology?A. Identify the problemB. Establish a probable causeC. Test the theoryD. Document

Answers

Answer 1

The second step of the A+ troubleshooting methodology is Establish a probable cause.

So, the correct answer is B.

Understanding the step of Establish a probable cause

This step involves narrowing down the possible issues based on the information gathered during the first step, which is Identify the problem.

The second step of the A+ troubleshooting methodology is to establish a probable cause. Once the problem has been identified, the technician must then determine what is causing the problem.

This involves examining the symptoms and gathering information to determine the most likely cause. The technician may use various tools and techniques to help with this process, such as diagnostic software, hardware tests, or examining system logs.

Once a probable cause has been established, the technician can then move on to the next step of testing the theory by implementing a solution and observing the results.

It is important to document the entire troubleshooting process, including the steps taken, the results observed, and any solutions implemented. This documentation can be used for future reference and can help other technicians who may encounter similar problems. Hence, the answer of this question is B. Establish a probable cause.

Learn more about troubleshooting at

https://brainly.com/question/29736842

#SPJ11


Related Questions

por que se dice que las TIC´S son las integracion de las TI y las TC?

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

I need help with this question. asap please

I need help with this question. asap please

Answers

Answer:

what are you talking about

Explanation:

can you help me with my question

I need help with this question. asap please

What are like arms surrounding all the other code blocks?
A. chevrons
B. curly braces
C. square braces
D. parentheses

Answers

Answer:

Parenthesis

Explanation:

I code

Answer:

Its curly braces.

Your welcome!

What creative commons license allow for the work to be copied, distributed, displayed, or performed but modifications may not be made without the owner's consent

Answers

Answer:

No derivative works.

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. For example, the copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).

A creative commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.

Generally, there are four (4) main types of creative commons and these includes;

I. Attribution.

II. Share alike.

III. Non-Commercial.

IV. No Derivative Works.

No Derivative Works is a creative commons license which allow for a body of work (material) to be copied, distributed, displayed, or performed by another person but modifications may not be made without the owner's consent.

PLS HELP) Early word processors ran on devices that looked like digital _______?

Answers

i looked it up it just says true

Answer: Typewriter

Explanation:

Electronic typewriters enhanced with embedded software became known as word processors. The Brother-EP20, an early word processor. One example of those machines is the Brother EP-20, which was introduced in 1983. This electronic typewriter featured a small dot matrix display on which typed text appeared.

Which of the following is the correct binary representation of the IP address 192.168.0.2?
a. 11110000.10111000.00000000.00000010
b. 10100000.10010000.00000000.00000010
c. 11100000.10110000.00000000.00000010
d. 11000000.10100000.00000000.00000010

Answers

The correct binary representation of the IP address 192.168.0.2 is option B, that is 10100000.10000000.00000000.00000010.So, the correct answer is B.

An Internet Protocol (IP) address is a numerical label allocated to each device linked to a computer network. The IP address is a unique identifier that allows computers to interact with one another on the internet.

The IP address is a 32-bit numeric address composed of four fields separated by periods. Each of the four fields contains a value between 0 and 255 in decimal form, hence they are referred to as octets.

Therefore, the IP address of 192.168.0.2 can be expressed in binary form as shown below:192 168 0 2C1 10 00 00.10101000.00000000.00000010

Therefore, 10100000.10000000.00000000.00000010 is the correct binary representation of the IP address 192.168.0.2.

Hence, the answer is B

Learn more about IP address at:

https://brainly.com/question/14219853

#SPJ11

The binary representation of the IP address 192.168.0.2 is given by option
b) 10100000.10010000.00000000.00000010.

he given IP address is 192.168.0.2The given options are as follows:
a. 11110000.10111000.00000000.00000010
b. 10100000.10010000.00000000.00000010
c. 11100000.10110000.00000000.00000010
d. 11000000.10100000.00000000.00000010

The binary representation of the given IP address is obtained as follows:
192 is represented in binary as 11000000.168 is represented in binary as 10101000.0 is represented in binary as 00000000.2 is represented in binary as 00000010.
The complete binary representation of the given IP address is given as follows:11000000.10101000.00000000.00000010. Thus, the correct binary representation of the IP address 192.168.0.2 is given by option b) 10100000.10010000.00000000.00000010.

Binary representation of IP address is a series of numbers in which the given IP address is converted into its binary format. The given IP address is 192.168.0.2. To find the correct binary representation of this IP address, each digit of the IP address is converted to its binary format.192 is represented in binary as 11000000.168 is represented in binary as 10101000.0 is represented in binary as 00000000.2 is represented in binary as 00000010.The complete binary representation of the given IP address is 11000000.10101000.00000000.00000010. The correct option is b) 10100000.10010000.00000000.00000010

Thus, the correct binary representation of the IP address 192.168.0.2 is given by option b) 10100000.10010000.00000000.00000010.

To know more about IP address visit:
https://brainly.com/question/31026862
#SPJ11

Which of these is considered a visual sign of potential chemical hazards?

Answers

The liquid is considered a visual sign of a potential chemical hazard.

Explanation:

A chemical hazard is defined as non-biological material which can cause harm to life or health.

Exposure to these substances can lead to adverse health effects.

These substances can come into contact via inhalation, skin absorptions, ingestion, etc.

The liquid substance which is of corrosive nature has a sign with 2 horizontal test tubes and one hand.

So, from this, we can say that liquid is considered a visual sign of a potential chemical hazard.

Always check with the product's manufacturer if you are unsure. Hazardous chemical labels often include the words “danger” or “warning,” as well as pertinent pictograms and information on dangers.

What visual sign of potential chemical hazards?

The term “chemical hazard” refers to a non-biological substance that poses a risk to human life or health.

These compounds can have detrimental impacts on health when exposed to them.

Through consumption, skin absorption, inhalation, etc., these substances may come into contact with the body.

Two horizontal test tubes and one hand are displayed on a sign next to a liquid material that is corrosive in nature.

As a result, we can conclude that liquid is regarded as a visible indicator of a potential chemical hazard.

Therefore, The liquid is regarded as a physical indicator of a possible chemical hazard.

Learn more about chemical hazards here:

https://brainly.com/question/13349458

#SPJ6

software-based virtual private networks (vpns) are typically more scalable than hardware vpns.T or F

Answers

True.

Software-based virtual private networks (VPNs) are typically more scalable than hardware VPNs. This is because software VPNs can be easily installed and configured on a larger number of devices, and can be easily scaled up or down as needed. Additionally, software VPNs can be used on a wider range of operating systems and devices, making them more versatile and flexible than hardware VPNs.

Software VPNs are simple to set up and install on a variety of devices: Software VPNs can be set up on any device that can run the required software, as opposed to hardware VPNs, which need to be installed on physical devices.

As a result, software VPNs are more scalable because they can be set up on more devices.

Software VPNs provide for simple scaling up and down based on demand: Software VPNs may be readily scaled up or down to meet demand as the number of devices requesting VPN connection rises or falls.

A wider variety of devices and operating systems support software VPNs: Because they may be used with a larger variety of operating systems and devices, software VPNs are often more adaptable and flexible than hardware VPNs.

Hardware VPNs may need more substantial configuration adjustments or extra actual hardware to handle rising demand: Scaling up a hardware VPN might be more expensive and time-consuming than scaling up a software VPN since it may be necessary to add more physical devices or make more significant configuration adjustments to handle rising demand.

Learn more about virtual private networks (VPNs) :

https://brainly.com/question/29671312

#SPJ11

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Your company offers continuous online training. If each online lesson is 20 minutes long, and there are 90 lessons, how many hours will each employee complete to finish all the lessons?.

Answers

The number of hours it would take each employee complete to finish all the lessons is: c) 30.

What is a proportion?

In Mathematics, a proportion can be defined as an equation which is typically used to represent (indicate) the equality of two (2) ratios. This ultimately implies that, proportions can be used to establish that two (2) ratios are equivalent and solve for all unknown quantities.

By applying direct proportion to the given information, we have the following:

1 lesson = 20 minutes.

90 lessons = X minutes.

Cross-multiplying, we have:

X = 20 minutes × 90 lessons

X = 1800 minutes.

Note: 60 minutes is equal to one (1) hour.

Therefore, the time in hours is given by:

Time = 1800/60

Time = 30 hours.

Read more on direct proportion here: brainly.com/question/1266676

#SPJ1

Complete Question:

Your company offers continuous online training. If each online lesson is 20 minutes long, and there are 90 lessons, how many hours will each employee complete to finish all the lessons?

a) 33

b) 1.5

c) 30

d) 90

Write a statement that defines a Product structure variable named chips.

Answers

The statement that declares the variable using the  Product structure is: Product chips;

How to define the structure variable?

The product structure definition is given as:

Product {

.........

};

To declare a variable named chips, we use the following syntax:

Structure-name Variable-name;

The structure name is Product and the variable name is chips

Hence, the statement that declares the variable is: Product chips;

Read more about variables at:

https://brainly.com/question/15683939

when copper cabling is used to carry t-1 traffic, what kind of connector is used?

Answers

When copper cabling is used to carry T-1 traffic, the most commonly used connector is the RJ-45 (Registered Jack-45).

The RJ-45 connector is widely used for Ethernet connections and is compatible with twisted-pair copper cabling. T-1, which is a digital transmission technology, uses two pairs of wires within the copper cable.

The RJ-45 connector provides the necessary pin configuration and physical interface to connect the T-1 equipment, such as routers, switches, or T-1 multiplexers, to the copper cabling.

The T-1 signals are transmitted over the copper wires within the cable, and the RJ-45 connector ensures a reliable and standardized connection for T-1 communication.

To learn more about copper: https://brainly.com/question/21406849

#SPJ11

Which of the following gives the manufacturer
of a device with MAC address
6A:BB:17:5D:33:8F?

BB:17:5D

5D:33:8F

17:5D:33

6A:BB:17

Which of the following gives the manufacturerof a device with MAC address6A:BB:17:5D:33:8F?BB:17:5D5D:33:8F17:5D:336A:BB:17

Answers

When looking for MAC address prefixes, MACLookup makes the process simple by matching them to the company that made the chipset. The IEEE database is utilized.

What area of a MAC address represents the manufacturer?

The 12 hexadecimal digits that make up a MAC address are typically organized into six pairs and separated by hyphens. The range of MAC addresses is 00-00-00-00-00-00 to FF-FF-FF-FF-FF. The number's first digit is often used as a manufacturer ID, and its second digit serves as a device identifier.

How can I locate manufacturer information?

If you're using professional directories, it may be possible for manufacturers and suppliers to list their items according to the NAICS code, which will make it simpler for you to locate the companies that make and supply your products. You can access the NAICS directory online or in your local library.

to know more about MAC address here:

brainly.com/question/27960072

#SPJ1

explain the connection between the statement ""an object at rest tends to stay at rest"" and how a simple seismometer works. (12 pts)

Answers

The statement "an object at rest tends to stay at rest" is a part of Newton's first law of motion, also known as the law of inertia. This law explains that an object will remain at rest or continue to move in a straight line at a constant speed unless acted upon by an external force.

A simple seismometer works based on this principle of inertia. It consists of a heavy weight suspended from a frame by a spring or wire. When the ground shakes during an earthquake, the frame of the seismometer moves with it, but the heavy weight tends to stay at rest due to its inertia. This causes the spring or wire to stretch, and the amount of stretching is recorded by the seismometer to measure the magnitude of the earthquake.

Therefore, the connection between the statement "an object at rest tends to stay at rest" and how a simple seismometer works is that the seismometer uses the principle of inertia to measure the movement of the ground during an earthquake.

Learn more about operation of a simple seismometer:

https://brainly.com/question/29638834

#SPJ4

The connection between the statement "an object at rest tends to stay at rest" and how a simple seismometer works is that the seismometer uses the principle of inertia to measure the movement of the ground during an earthquake.

The statement "an object at rest tends to stay at rest" is a part of Newton's first law of motion, also known as the law of inertia. This law explains that an object will remain at rest or continue to move in a straight line at a constant speed unless acted upon by an external force.

A simple seismometer works based on this principle of inertia. It consists of a heavy weight suspended from a frame by a spring or wire. When the ground shakes during an earthquake, the frame of the seismometer moves with it, but the heavy weight tends to stay at rest due to its inertia. This causes the spring or wire to stretch, and the amount of stretching is recorded by the seismometer to measure the magnitude of the earthquake.

Therefore, the connection between the statement "an object at rest tends to stay at rest" and how a simple seismometer works is that the seismometer uses the principle of inertia to measure the movement of the ground during an earthquake.

Learn more about operation of a simple seismometer:

brainly.com/question/29638834

#SPJ11

Lorann sends messages to Aiden that always go into Aiden’s Junk E-mail folder. Which process would best correct this problem so that Lorann’s messages no longer go into Aiden’s Junk E-mail folder?
A. adding Aiden to the Safe Senders list
B. adding Aiden to the Safe Recipients list
C. adding Lorann to the Safe Senders list
D. adding Lorann to the Safe Recipients list

Answers

C doing this for points

Answer:

b

Explanation:

What is this asking me? When I look at my code, what should I be looking for?

What is this asking me? When I look at my code, what should I be looking for?

Answers

When your call condition you're asking your computer to test something I.e, if/ else

if ( i ==5)

{

}

else

{

}

this is what we call a condition. when it calls a function you're asking your computer to determine if it's true or false, yes or no, if it's equal to this if the condition is met (true) do something. They're asking you to detail what conditions (What is your computer testing to determine true or false)

In the example i gave, the condtion would be " If I = 5 do something. If it doesnt do something else. Each time it runs it will test if thie condition is true or false and execute the result.

PYTHON
How can I make a algorithm in python that finds how many numbers are in a row in a list?

For example:

Input:
List = [0,1,1,1,0]
num = 1

Output:
3

Answers

Answer:

This is one of the efficient ways to find the number of occurrences of a given number in a list:

def find_num(arr,n):    return len([count for count in arr if count == n])print(find_num([0,1,1,1,0],1))

If you want a simpler version, you can try this:

def find_num(arr,n):    count = 0    for i in range(len(arr)):        if arr[i]==n:            count += 1    return countprint(find_num([0,1,1,1,0],1))

This is the simplest method:

arr = [0,1,1,1,0]print(arr.count(1))

I think I gave you enough examples. This should get you started off easily.

If you need an explanation, I am happy to help you. BTW I started python 6 months back so even I am pretty new to this.

if you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, you should a. not catch the exception in the function b. throw an integer exception c. never throw an exception in this function d. none of the above

Answers

If you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, you should a. not catch the exception in the function. The correct choice is option A.

When writing code, it is important to consider how to handle exceptions. In some cases, a function may throw an exception and different programs may want to handle it differently. If this is the case, it is recommended that you do not catch the exception in the function itself. This is because it can limit the flexibility of the program and make it harder to modify in the future. Instead, it is better to let the calling program handle the exception and decide how to handle it based on its specific needs. Throwing an integer exception is not recommended as it can be difficult to distinguish between different types of exceptions. Never throwing an exception in this function is also not the best solution as it may lead to unexpected behavior and errors. In summary, if you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, it is best to not catch the exception in the function and let the calling program handle it based on its specific needs.

To learn more about exception, visit:

https://brainly.com/question/29781445

#SPJ11

In operant conditioning, the reduced frequency of behavior when it is no longer reinforced is known as:_______

Answers

In operant conditioning, the reduced frequency of a person's behavior when it's no longer reinforced is referred to as extinction.

The types of reinforcement.

In operant conditioning, there are four (4) main types of reinforcement and these include the following:

PunishmentNegative reinforcementPositive reinforcementExtinction

In operant conditioning, extinction refers to the reduced frequency of a person's behavior when it's no longer reinforced.

Read more on reinforcement here: https://brainly.com/question/10579224

#SPJ1

what are the relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease? a. there is no pattern b. they are about the same c. they are lower d. they are higher

Answers

The relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease is that option they are lower.

What is drug susceptible of a disease?

Drug susceptible form of any disease is known to be one is the opposite the other.

Note that If a person is infected with the disease that are fully susceptible, it means that all of the drugs will be effective so long as they are taken  well but that is not the case with  resistant strain.

Therefore, The relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease is that option they are lower.

Learn more about resistant strain from

https://brainly.com/question/27333304

#SPJ1

PLEASE HELPPP!!! QBASIC WORK!



Write a program that asks a user to input length and breadth of a room in feet. This program displays message ‘Big room’ if the area of the room is more than or equal to 250 sq. ft otherwise it displays ‘Small room’.

Answers

Answer:

INPUT "Input Length: ";LENGTH

INPUT "Input Width: ";WIDTH

AREA = WIDTH*LENGTH

IF AREA >= 250 THEN PRINT "Big room"

IF AREA < 250 THEN PRINT "Small room"

Explanation:

What is a graphics card?

Answers

Answer:

a printed circuit board that controls the output to a display screen.

makes ya games or other things look pog

Explanation:

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called

Answers

Analysis tools such as query-by-example and a specialised programming language called SQL facilitate examining all or selected data, querying the database, and generating reports.

Data collection and analysis technologies are used to collect, evaluate, and present data for a range of applications and industries. They take unprocessed data and turn it into meaningful knowledge that businesses can use to make better choices. A data analyst may operate in a range of sectors, including operations, marketing, and finance. For instance, their findings might result in lower shipping costs. different viewpoints on consumer behaviour. Among the numerous types of data analysis tools, three categories stand out as particularly essential: Applications for Excel, R, Python, and business intelligence (BI).

Learn more about Analysis tools from

brainly.com/question/13994256

#SPJ4

what did the person using the windows command prompt do during round 1

Answers

The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.

As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:

List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files,  etc

Please note that your question is incomplete, so I gave a general overview which should help you get the right answer.

Read more here:

https://brainly.com/question/12787942

5 preguntas abiertas sobre video juegos por favor!

5 open questions about video games is for my speech class for tomorrow! ‍♀️

Answers

1 How do these ideas for character development come about? —-2 How are the songs placed? —-3 How to know if the song really fits the video game?——-4 Do the colors influence wanting to play them (that is, as persuasion)? Does the game go fast, does it become addictive?


I hope it helps you

Which statement is true regarding the Quick Access toolbar?
O It can be located at the top left-hand corner of the screen or below the ribbon.
O. It can contain functions that are also in the ribbon
O It can be modified to contain any function that you use frequently.
O All the above statements are true.​

Answers

Answer: All the above statements are true

Answer:

D) All of the above

Explanation:

The development of computer languages is classified into two categories .

true or false​

Answers

Answer:

False

Explanation:

Mark me as a brainliest

what gonna happened if you put rice water in your hair

Answers

Answer:

That does something?

Explanation:

(•_•)

<) )╯all the single ladies

/ \

(•_•)

\( (> all the single ladies

/ \

(•_•)

<) )╯oh oh oh

/ \

You're visiting a Computer Science building at a college, and they've decided it'd be fun to display all the room numbers in binary. You're going to room 13.What binary number should you look for on the door?

Answers

Answer:

1101 its the 4 bit binary number...

Off distance grid cut off is characterized by which of the following.?
A. The top of the image is underexposed
B. Both sides of the image are underexposed
C. One side of the image is underexposed
D. The bottom of the image is underexposed

Answers

Off distance grid cut off is characterized by one side of the image being underexposed. Therefore, the correct answer is option C.The term "cut off" refers to a situation where the film, plate, or sensor area has failed to receive the entire image projection; the light from one or both edges of the camera lens does not reach it.

There is a partial loss of the visual data on one side of the resulting image. This issue is primarily seen in the case of aerial photographs that have been taken from a plane or other remote location where the camera is mounted and triggered automatically.In summary, the off distance grid cut off is a type of photographic error that is caused by one side of the image being underexposed.

To know more about characterized visit:

https://brainly.com/question/30241716

#SPJ11

Other Questions
codman's exercises are performed with active movement of the shoulder muscles to increase shoulder motion. question 3 options: true false What is the duration of a two-year bond that pays an annual coupon of 12 percent and whose current yield to maturity is 13 percent? Use $1,000 as the face value. Ava is making Vampire punch for the Halloween party. The recipe makes 12 servings and calls for 3/5 cups of cranberry juice. how much cranberry juice will she need for 15 servings PLS HELPPPPwill mark brainliest:)) Pls help Ill brainlest for the right answer Read paragraph 16 Identify the function shown in this graph.54321-54-3 -2 -11234 52-3-5A. y = -2x + 1B. y = kx + 1O c. y = 2x - 1O D. y = -2x - 1SUBMIT The category that is generally considered to be the best measure of a company's ability to continue as a going concern is A. cash flows from financing activities. B. cash flows from investing activities. C. usually different from year to year. D. cash flows from operating activities. Can someone help with my physics homework? pleaseA go cart engine applies a force of 888N and moves the cart forward 22m.a) How much work is done?b) What is doing the work?c) If the driver wants to go further will the amount of work increase or decrease? Do you need a bigger engine to gofurther?d) We put on a bigger engine (1111N) but the cart still moves forward 22m. How much work is done now?e) Why would you put on a bigger engine if you are still moving 22m?f) Work requires a change in energy, which engine uses more gas to go 22m?g) Even an empty semi truck uses much more gas than a car. Why?Find the soultions Sandra is writing a technical paper on Graphics Design. She needs to illustrate this paper with a few images to depict certain concepts. She browses the web and comes across images she can use. However, the images she finds are copyrighted. How should she use these images? A. She can use the image as it is B. She can modify the image and use it C. She needs permission from the owner D. She will not add the image at all Hi, I have three Geometry questions on my quiz that I want to be absolutely certain they are done correctly, can someone help me with them please? Type your one-page report here. Be sure to answer all of the following questions:Name of the mental disorder and medication available and commonly used to treat it.What effects does the medication have on correcting the disorder?How does it help a person function normally?What are the benefits of taking this medication?How does the medication change behavior?What are the disadvantages of taking this medication? Are there any side effects?Why do you personally think people resist taking mental disorder medication? I have to find the surface area 9) What must employers do to create safe workplace conditions?A) Handle complaints about safety issues promptly, particularly in industries like mining or aviation.B) Provide employees with pay that meets the national or state minimum pay rates.C) Allow employees to take a leave of absence for situations like child birth, adoption, or medical emergencies.D) Refrain from showing a bias against workers based on factors like race, color, religion, age, or national origin. which of the following is an example of meristic variation? a frog that lays 100 eggs in each clutch compared to a frog that lays 20 eggs in each clutch. a goose species with 24 cervical vertebrae compared to a duck species with 16 cervical vertebrae. a fruit fly egg that takes 1 day to develop compared to a dragonfly egg that takes 1 week to develop. a genus of beetles with 3,000 described species compared to a genus of birds with 15 described species. the nurse is caring for a 4-year-old with a suspected urinary tract infection. what would be most appropriate when obtaining a urine specimen from the child? using the Disney characters Tom and jerry make 8 sentences of Spanish dialogue between them using these notes. Jenny needs to decide which nail polish and shoes to wear out to dinner. She lays out 5 bottles of nail polish of different colors: 2 shades of red and 3 shades of pink. She also lays out 4 pairs of different shoes: 3 are flats and 1 are high heels. If she chooses a nail polish and a pair of shoes at random, find the probability she chooses a pink nail polish and a pair of high heels. ............help plsss T.T If the reaction is begun with an initial PH_3 concentration of 0.95 M, what will be the concentration of PH_3 after 26.00 s? The rate of decomposition of PH3 was studied at 901.00 C. The rate constant was found to be 0.0375 s-1. 4PH; - P_4+6H_2 pls help on these and thku