What makes a reliable source reliable?

Answers

Answer 1

A trustworthy source will offer a "thorough, well-reasoned hypothesis, argument, etc. based on substantial evidence," says UGA Libraries.

Which sources are deemed trustworthy?A source is trustworthy if it was written by a subject matter expert, is error-free, and is objective. In this manual, the distinction between reliable, scholarly, and peer-reviewed sources is explained.Unbiased and supported by facts, a reputable source is reliable. A reliable author or organization penned it. There are many sources available, and it can be challenging to distinguish between those that are reliable and those that are not at first glance. An essential information literacy skill is assessing source credibility.A trustworthy source will offer a "thorough, well-reasoned hypothesis, argument, etc. based on substantial evidence," says UGA Libraries. Peer-reviewed academic books and articles are examples of sources that are widely regarded as reliable, articles for trade or industry.      

To learn more about Trustworthy source refer to:

https://brainly.com/question/28970369

#SPJ4


Related Questions

The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.

Answers

Answer:

allocates

Explanation:

Select the education and qualifications that are most helpful for Insurance Services careers. Check all that apply.
leadership skills
critical thinking skills
knowledge of credit systems
research skills
O certification and licensure
bachelor's and master's degrees

Answers

Answer:

critical thinking skills

research skills

certification and licensure

bachelor's and master's degree

Explanation: edge 2020

The education and qualifications that are most helpful for Insurance Services careers are as follows;

Critical thinking skills.Research skills.Certification and license.Bachelor's and master's degrees.

Thus, the correct options for this question are B, D, E, and F.

What is the significance of Insurance Services careers?

The significance of Insurance Services careers is understood by the fact that it is one of the most lucrative sectors in the entire world. The demand for this sector is rapidly growing. It provides various opportunities in specific countries along with global levels like World Monetary funds, world banks, etc.

It is required for all sectors to have particular criteria and eligibility. So, if you are interested to make your career in Insurance Services you definitely have bachelor's and master's degrees along with certain certifications and licensure.

Therefore, the correct options for this question are B, D, E, and F.

To learn more about Insurance services, refer to the link:

https://brainly.com/question/25855858

#SPJ5

Which type of word processing programs enables users to include illustrations within the program?

Answers

Answer:

 full featured

Explanation:

Answer:

Full Featured

Explanation:

How do you create a variable with the numeric value 5?

Answers

Answer:

They are declared simply by writing a whole number. For example, the statement x = 5 will store the integer number 5 in the variable x.

malware disguised as real software

Answers

Malware disguised as real software refers to a type of malicious software that masquerades as legitimate software to trick users into downloading and installing it on their devices.

What is a malware that is disguised as a software?

This can be achieved through various methods, such as creating fake download pages that look like official ones, it can be by using phishing emails or messages to lure users into downloading the malware, or by bundling the malware with legitimate software downloads.

Read more on malware here:https://brainly.com/question/399317

#SPJ1

question

What is Malware disguised as real software

List and describe the three types of reports.

Answers

Answer:

Basic Reports. Basic reports are divided into detail reports, grouped reports, crosstab reports, and other basic table samples. ...

Query Reports. ...

Data Entry Reports.

Explanation:

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

what is true of the wallbox pulsar plus level 2 charger?

Answers

With its intelligent features and compact design, the Wallbox Pulsar Plus Level 2 Charger provides a fast and convenient charging solution for electric vehicles.

It is compatible with most EV models and can deliver up to 40 amps of power, which can fully charge a vehicle in just a few hours. The Pulsar Plus also features advanced connectivity options, including WiFi, Bluetooth, and cellular connectivity, which allows you to monitor and control your charging sessions from your smartphone or other devices. Additionally, the charger is UL certified, which ensures its safety and reliability.

To know more about cellular connectivity visit:

brainly.com/question/3454559

#SPJ11

Please Help! (Language=Java) This is due really soon and is from a beginner's computer science class!
Assignment details:
CHALLENGES
Prior to completing a challenge, insert a COMMENT with the appropriate number.

1) Get an integer from the keyboard, and print all the factors of that number. Example, using the number 24:

Factors of 24 >>> 1 2 3 4 6 8 12 24
2) A "cool number" is a number that has a remainder of 1 when divided by 3, 4, 5, and 6. Get an integer n from the keyboard and write the code to determine how many cool numbers exist from 1 to n. Use concatenation when printing the answer (shown for n of 5000).

There are 84 cool numbers up to 5000
3) Copy your code from the challenge above, then modify it to use a while loop instead of a for loop.

5) A "perfect number" is a number that equals the sum of its divisors (not including the number itself). For example, 6 is a perfect number (its divisors are 1, 2, and 3 >>> 1 + 2 + 3 == 6). Get an integer from the keyboard and write the code to determine if it is a perfect number.

6) Copy your code from the challenge above, then modify it to use a do-while loop instead of a for loop.

Answers

Answer:

For challenge 1:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Print all the factors of the integer

       System.out.print("Factors of " + num + " >>> ");

       for (int i = 1; i <= num; i++) {

           if (num % i == 0) {

               System.out.print(i + " ");

           }

       }

   }

}

For challenge 2:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n

       int coolCount = 0;

       for (int i = 1; i <= n; i++) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 3:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n using a while loop

       int coolCount = 0;

       int i = 1;

       while (i <= n) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

           i++;

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 5:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number

       int sum = 0;

       for (int i = 1; i < num; i++) {

           if (num % i == 0) {

               sum += i;

           }

       }

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

For challenge 6:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number using a do-while loop

       int sum = 0;

       int i = 1;

       do {

           if (num % i == 0) {

               sum += i;

           }

           i++;

       } while (i < num);

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

\(1 giga\ bytes = 1 \times 10 ^ {9} bytes\)

So for 35 gigabytes it would be

\(= 35 \times 10 ^ {9} bytes\)

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for \(35 \times 10 ^ {9} bytes\) it would be x

Now we solve the x which is equal to

\(= \frac {35 \times 10 ^ {9} bytes}{2,000}\)

= 17,500,000 pages

b. Now for 500 pages, it would be

\(= \frac{17,500,000}{500}\)

= 35,000

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

What helps you evaluate websites for reliable information?

Answers

the url....typically government (.gov) websites are the most factual sites as well as non profit sites..

Answer:

A and C

Explanation:

right on edge and someone in the comments was right

what is a proxy? a. a standard that specifies the format of data as well as the rules to be followed during transmission b. a simple network protocol that allows the transfer of files between two computers on the internet c. a standard internet protocol that provides the technical foundation for the public internet as well as for large numbers of private networks d. software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons

Answers

An intermediary proxy server serves as your connection to the internet. End consumers are separated from the websites they visit by an intermediary server.

What is the purpose of a proxy?

Proxies are frequently used for system optimization, such as load balancing and caching comparable requests for faster response times, as well as information security against threats. They can handle authentication requests and act as a firewall.

What kind of proxy would that be?

Some proxy servers consist of a collection of programs or servers that obstruct popular internet services. An SMTP proxy, for instance, intercepts email, whereas an HTTP proxy intercepts online access. An organization's single IP address is shown to the internet through a proxy server using a network addressing system.

To know more about proxy here:

brainly.com/question/14403686

#SPJ4

Write a program that converts a string into 'Pig Latin". To convert a word to pig latin, you remove the first letter of that word then append it to the end of the word. Then you add 'ay' to it. An example is down below:
English: I SLEPT MOST OF THE NIGHT
Pig Latin: IAY LEPTSAY OSTMAY FOAY HETAY IGHTNAY

Answers

Answer:

def pig_latin(text):

words = text.split()

pig_latin_words = []

for word in words:

first_letter = word[0]

rest_of_word = word[1:]

pig_latin_word = rest_of_word + first_letter + 'ay'

pig_latin_words.append(pig_latin_word)

return ' '.join(pig_latin_words)

pig_latin('I SLEPT MOST OF THE NIGHT') # 'Iay Leptsay Ostmay ofay hetay ightnay'

having the latest version of software products can make your system more reliable, you can clean out unnecessary programs from your startup folder and when you defrag your hard drive, it works more efficiently are all related to assuring what?

Answers

Defrag. Your HDD will grow increasingly fragmented over time as you store and remove files from it (defragging a SSD is not necessary). Your HDD will have to work harder because of the fragmentation, which could slow down your computer.

Which technique is employed by memory to enhance disk performance?Items in the memory are reorganized via defragmentation, which joins processes and empty spaces to create contiguous spaces.Six crucial elements that affect the performance of hard drivesTrue Capacity Given that hard drives are frequently used for data storage, one of their most important characteristics is capacity. ...Rate of Transfer. A hard drive's read/write data speed is referred to as its transfer rate. Rotational Speed, Cache, Average, and Access Period, Interface Type, etc.

To learn more about Defrag refer to:

https://brainly.com/question/14254444

#SPJ4

To print preview a document, navigate to the _____ tab and select the Print option. File Page Design View Insert

Answers

Answer:

Option A

Explanation:

The process of viewing the print preview option in MS word is as follows -

a) First of all click on the File tab

b) After clicking on file tab, click on the print button at the left hand side

c) In the new tab that open up after clicking on the print button will provide an option of print preview.

Hence, option A is correct

Answer:

b. page layout

Explanation:

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

News sources occasionally have to issue retractions, which are statements saying that they have made an error in their reporting. Does this eliminate
then as reliable news sources?
A. Yes, reliable sources always get it right the first time.
B. No, by correcting mistakes they are striving for accuracy.
C. Yes, it is better to hope that no one notices your mistakes.
D. No, making mistakes is a standard part of reporting the news.

Answers

The response to if this eliminate then as reliable news sources is option B: B. No, by correcting mistakes they are striving for accuracy.

What characteristics make a news source dependable?

Transparency: Reputable news sources explicitly label opinion pieces as such, identify conflicts of interest, state where and how information was gathered for stories, and include links to relevant sources.

Therefore, one need to publishes factually correct content, verifies information, and fixes any inaccuracies. Employs trustworthy sources (people, evidence) and validates those sources and Present headlines that accurately summarize the content of the article; headlines should not exploit readers' emotions.

Learn more about reliable news sources from

https://brainly.com/question/24308310
#SPJ1

Jeff is at his workplace and needs a file from his computer at home. Which protocol can Jeff use to access this file from a remote location? A HTTP B. POP3 C. LDAP D. Telnet ​

Answers

The answer is Telnet.


Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines. It follows a user command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol for creating remote sessions.

state two reasons why you would upload and download information​

Answers

Answer:

get a better understanding of the problem

Explanation:

to be able to understand what it means and to be able to remember it in the future

Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1

Help now please

Answers

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

suppose host a and host b both send udp datagrams to the same port number on host c. will the datagrams be delivered to the same socket? why?

Answers

Yes, the datagrams sent by host a and host b will be delivered to the same socket on host c.

What is UDP?

UDP is a connectionless protocol, implying that it does not establish a dedicated end-to-end connection between the two devices and that datagrams are sent independently of one another without being tied together. This makes it easier to transmit datagrams from several hosts to a single socket on the same host. Because of the lack of a dedicated connection, each datagram that is sent contains all of the addressing information required for it to be delivered to the appropriate destination.

Each datagram has a source IP address, a source port number, a destination IP address, and a destination port number in the addressing fields. The destination IP address and port number fields are used by the recipient to identify the appropriate socket to which the datagram should be delivered.

Learn more about datagram here:

https://brainly.com/question/31117690

#SPJ11

Every javafx main class __________. group of answer choices implements javafx.application.applicatio extends javafx.application.application overrides start(scene s) method overrides start() method

Answers

Two concepts central to JavaFX are a stage and a scene.

Legacy systems can be described as all of the following except? Usually found on a mainframe. Old systems that often require hard-to-use command languages. Systems that most often have detailed information that can be accessed by a system at a higher tier. A system that often holds the middle tier of a multiple-tier system. A system that is already in place, from the past.

Answers

A legacy system refers to outdated infrastructure, applications, and processes, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

What is a legacy system?

It describes software or IT systems that have been around for a long time and that, from a technological point of view, should be replaced by a more modern version.

A legacy system has often been used for a long time and is no longer technologically up to date, however these old applications are still used for various reasons, for example because they form the basis of newer software.

Therefore, we can conclude that legacy systems are those computer systems that have become outdated but are still used by companies, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

Learn more about legacy systems here: https://brainly.com/question/7494597

A ____________ is a solid line of defense against malware and other security threats
A. firewall
B. virus
C . shield
D. worm

Answers

The answer is firewall because firewall is composed of several blocks (such as Secu- rity Builder and Firewall Interface) connected to each others

3. Given a square n by n matrix A, a column vector v of n entries, and a vector c with k entries C1,C2,C3,...,Cx, compute the column vector w = (CI+ C2A + C3A2 + ... + C Ak-1)v in the following three ways, and use tic toc to compare how long they take. The first method uses matrix-matrix multiplication; the others use only matrix-vector multiplication. Discuss the results of your experiments and the conclusions you draw based on A being a 1000 by 1000 matrix ( try A = round(10*rand(1000)-5) and c = 1 : k for k = 2,4,6,8). (i) First compute B = ciI+C2A + C3A2 + ... + CkAk-1 by successively computing the matrix powers as A2 = A(A), A3 = A(A2), A4 = A(A?),... (that is multiply the previous matrix by A at every step) and adding the successive terms together; then compute w = Bv. (ii) Observe that distributing the vector v gives w = C1V + C2Av + C3A²v + ... + CkAk-ly. Evaluate this from left to right by computing successively Av = A(v), A?v = A(Av), A’y = A(A²v),... (that is, multiply the previous vector by A at every step) and adding terms as you go along. There must be absolutely no matrix-matrix multiplication ! (iii) A version of Horner's method (nested multiplication): rewrite the expression in (ii) as w = C1V + A(C2V + A(C3V + ... + ACC#-1V + A(Cxv)...)) to be evaluated from right to left, corresponding to the successive pairs of parentheses, by repeating the specific pattern: first multiply the previous term by A, then add civ.

Answers

Given a square n by n matrix A, a column vector v of n entries, and a vector c with k entries C1,C2,C3,...,Cx, computing the column vector w = (CI+ C2A + C3A2 + ... + C Ak-1)v in the following three ways:

Method 1: Computing B = ciI+C2A + C3A2 + ... + CkAk-1, successively computing the matrix powers as A2 = A(A), A3 = A(A2), A4 = A(A?),... (that is multiply the previous matrix by A at every step) and adding the successive terms together; then compute w = Bv.Method 2: Distributing the vector v gives w = C1V + C2Av + C3A²v + ... + CkAk-ly. Evaluate this from left to right by computing successively Av = A(v), A?v = A(Av), A’y = A(A²v),... (that is, multiply the previous vector by A at every step) and adding terms as you go along. There must be absolutely no matrix-matrix multiplication!Method 3: A version of Horner's method (nested multiplication): rewrite the expression in (ii) as w = C1V + A(C2V + A(C3V + ... + ACC#-1V + A(Cxv)...)) to be evaluated from right to left, corresponding to the successive pairs of parentheses, by repeating the specific pattern: first multiply the previous term by A, then add civ.

A being a 1000 by 1000 matrix ( try A = round(10*rand(1000)-5) and c = 1 : k for k = 2,4,6,8), we can use tic toc to compare how long they take. Here's the time taken for each method: Method 1 took 1.567432 seconds to compute. Method 2 took 0.465260 seconds to compute. Method 3 took 0.310456 seconds to compute.Therefore, from the experiments conducted, it can be observed that method 3 takes the least amount of time to compute, followed by method 2 and method 1. Thus, the conclusion that can be drawn is that method 3 is the most efficient way to compute the column vector w for the given problem.

To know more about vector visit:

https://brainly.com/question/30958460

#SPJ11

what text will be output by the program var age=15

Answers

Int type
Or integer will be the output if you mean the type of characters

Output D text will be output by the program var age=15.

What is program?

Program is defined as a collection of guidelines that a computer follows to carry out a certain task. A programme is like the recipe for a computer, to use an analogy. The size of a computer programme affects the likelihood that an error may occur. Programs are organized, clear, and written in a language that computers can understand.

By storing just one thing—a value on a sticky note put inside a designated baggy—the baggy serves as a representation of a variable. The variable is changed when the event occurs. The variable's current value is altered by a predetermined amount. The variable is updated with the new value.

Thus, output D text will be output by the program var age=15.

To learn more about program, refer to the link below:

https://brainly.com/question/3224396

#SPJ5

Which computer is the fastest to process complex data?

Answers

Answer:

Supercomputers for sure.

Which of the following is NOT a career in the Information Support and Services pathway?

a
Website engineers
b
Technical writers and editors
c
Database administrators
d
Software developers

Answers

Answer:

here yuuuurrrrr Vote for me nah jk

Which of the following is NOT a career in the Information Support and Services pathway? aWebsite engineers

5 What is the effect of the author proposing athought experiment at the beginning of the text? ​

Answers

Answer:

i dont know correct or not . then also i will.. sorry if the answer is wrong

Explanation:

text "Disease Central" in When Birds Get Flu by John DiConsiglio. In 1958, scientists at the CDC made their first trip overseas. A team went to Southeast Asia to respond to an epidemic of smallpox and cholera. The author uses this passage to help the reader focus on

The aim of A thought experiment is to promote speculative thinking, logical reasoning, and paradigm shifts, it address problems, forces out of our comfort zone, mainly highlight the gaps.

What is the meaning of thought experiments?

Thought experiments is nothing but an imaginative methods which involve in examining the nature of things, employed in various  purposes in different disciplines, including physics, economics, history, mathematics, and philosophy.

It is a test of thoughts that can be done in minds only, it involve imagination of a specific scenario like repercussions, which can lead to broad conclusion.

Hence, a thought experiment  mainly produce speculative thinking, logical reasoning, and paradigm shifts, address problems out of our comfort zone.

Learn more about experiments on:

brainly.com/question/17274244

#SPJ2

Other Questions
ASAP I need help on this 20 points As explained in the Help section for the Workforce Compensation, Training, and Product Assembly decision screen, if (1) a company pays a drone PAT member an annual base wage of $24,000, an $800 year-end bonus for perfect attendance, and provides a company-paid annual fringe benefits package worth $3,200 and (2) a PAT is paid a $4 assembly quality incentive per UAV drone assembled that is equally divided among 4 PAT members, then if a drone PAT's productivity is 1500 drones per year then what would be the annual total compensation cost of a fully-staffed PAT and the total compensation cost per drone assembled?*Please provide me with a step by step process how to solve the problem. Thanks The following transactions apply to Ozark Sales for Year 1: 1. The business was started when the company received $49,000 from the issue of common stock. 2. Purchased equipment inventory of $174,000 on account. 3. Sold equipment for $194,500 cash (not including sales tax). Sales tax of 7 percent is collected when the merchandise is sold. The merchandise had a cost of $119,500. 4. Provided a six-month warranty on the equipment sold. Based on industry estimates, the warranty claims would amount to 4 percent of sales. 5. Paid the sales tax to the state agency on $144,500 of the sales. 6. On September 1, Year 1, borrowed $20,500 from the local bank. The note had a 7 percent interest rate and matured on March 1, Year 2. 7. Paid $5,900 for warranty repairs during the year. 8. Paid operating expenses of $53,000 for the year. 9. Paid $125,400 of accounts payable. 10. Recorded accrued interest on the note issued in transaction no. 6. b-1. Prepare the income statement for Year 1. (Round your answers to the nearest dollar amount.) b-2. Prepare the balance sheet for Year 1. (Round your answers to the nearest dollar amount.) b-3. Prepare the statement of cash flows for Year 1. (Enter amounts to be deducted and cash outflows with a minus sign. Round your answers to the nearest whole dollar.) The best definition of Attack surfaces would be:- Applications- Any location in which a vulnerability could allow access- All programs within a server or web application - Network interface cards- Servers A store pays $245 for radio. The store marks the radio up 65%. What is the selling price for the radio? Pls explain answer X = 3A = 6Y = 4Z = 33x - 6a 5z + 3y Which code will allow Jean to print I like to code! on the screen? Print ("I like to code!") Print (I like to code!) Print ("I like to code!) Print = I like to code! George Washington died of_____.O scarlet feverO a throat infectionO a horseback riding accidentO the fluO war injuries write a three paragraph essay about whatstrategies were used by the civil rightsmovement in the 1950's and 1960's and howmuch success did they have Howmanymolecules are in 8.55x10-15 moles of a substance Which graph shows the image of A following a reflection in the x-axis?IS IT A B OR C PICK ONE OF THE PINK ANGLES THE BLUE IS THE ANGLE U NEED TO SLOVE I THINK You are witness to a road accident in which a motorcyclist, a car and an animal are involved. Write a concise report, giving the location, the time, your involvement and the facts as you saw them. Avoid an expression of opinion. please help me pleaseeee! Consider the following scenario: two firms 1 and 2 are considering to participate in a cartel. In the first stage of the game, the firms simultaneously decide whether to participate in the cartel (In) or not (Out). The participation decision incurs the cost of -1 irrespective of the other firm's choice while non- participation does not incur any cost (and thus the firm's payoff would be zero). If at least one of the firms choose not to participate, the game ends. If both of the firms choose to participate, the game proceeds to the second stage: the firms form a cartel and simultaneously decide whether to conform to the cartel agree- ment. The payoffs from conformation (C) or violation (V) is summarized by the following payoff matrix: C V C 2,2 0,3 V 3,0 1,1 The game ends after the second stage ends. The payoffs are given by the sum of payoffs in the first- and second stages of the game. (a) (10 points) Draw the game tree for the game. (b) (10 points) List all the strategies for firm 1. Consider a ring, sphere and solid cyclinder all with the same mass. They are all held at the top of an inclined plane which is at 20 to the horizontal. The top of the inclined plane is 1 m high. The shapes are released simultaneously and allowed to roll down the inclined plane. Assume the objects roll without slipping and that they are all made from the same material. Assume the coefficient of static friction between the objects and plane to be 0.3.a) workout what orderthey would get to the bottom of the Slope.b) How long will it take each shape to reach the bottom of the Slope ?c) which shapes have the greater moment of inertia ?d) determine the linear acceleration(a) e) calculate the tangential (linear) Velocity of each shapes- What is the choroids function? Find the solution of each inequality in the interval (0, 2). (Enter your answers using interval notation.) (a) sin (x) 0.5 (b) cos (x) -0.5 (c) 5 tan (x) < 5 sin (x)(d) 4 cos (x) 4 sin (x) A direct current is applied to an aqueous nickel (II) bromide solution. a. Write the balanced equation for the half reaction that takes place at the b. Write the balanced equation for the half reaction that takes place at the c. Write the balanced equation for the overall reaction that takes place in the d. Do the electrons flow from the anode to the cathode or from the cathode to anode. cathode. cell. the anode? borrowers in wealthy countries that have few domestic investment opportunities would gain if capital flows between nations are prohibited Why are 4 of 1K plants not working for all Americans