When coding a hyperlink to a webpage that is external to your website, an accepted behavior is to a. open the page in the same browser tab b. open the page in a new browser tab c. use a relative webpage reference d. display a warning that you are visiting a webpage outside of your website

Answers

Answer 1

When coding a hyperlink to a webpage that is external to your website, an accepted behavior is to open the page in a new browser tab.

In some circumstances, opening a new window or tab is better from the standpoint of accessibility. Here are two such situations:

A multi-step workflow, such as filling out and submitting a form, will be considerably disrupted if a page providing context-sensitive information, such as help instructions, or an alternative method of completing a form, such as a calendar-based date picker, is opened in the same window or tab.

When a user follows a link to a page outside of a secured part of a website, their logon is terminated because they are currently logged into a secured area of the website. The user can access these references in this situation by accessing external links in a separate window while maintaining their login open in the original one.

It is advised that there be a notification when links open in a new window.

To learn more about hyperlink click here:

brainly.com/question/12499252

#SPJ4


Related Questions

Computer knowledge is relevant in almost every are of life today. With a
view point of a learning institute, justify these statement.

Answers

Answer:

mainly helps to get educate in computer knoeledge

Explanation:

The effective use of digital learning tools in classrooms can increase student engagement, help teachers improve their lesson plans, and facilitate personalized learning. It also helps students build essential 21st-century skills.

all of the following are mechanisms that are used to collect digital evidence under the u.s. electronic communications privacy act (ecpa), except: court orders
search warrants
subpoenas without prior notice to the subscriber or customer
subpoenas

Answers

Digital evidence is not subject to subpoenas without prior notice to the subscriber or customer under the US Electronic Communications Privacy Act.

What are three possible locations a digital forensics expert could check for evidence?

Information about the date a file was produced on a hard drive, the person who probably created it, or the fact that the file was created on another computer. Networks in general, wireless telecommunication systems, the Internet, and conventional telephone systems can all serve as sources of proof.

What are the three categories of cloud services that NIST has defined?

The three different types of cloud computing are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Without having to physically manage them on-premises, IaaS enables companies to manage their own computing, networking, and storage components.

To know more about Communications visit:-

https://brainly.com/question/22558440

#SPJ1

Consider that we want to write a function compare to compare a Cat from question B1 and a Dragon from question B2. If we want this to be a friend function, what do we do and why? Assume that a particular Cat is considered better than a particular Dragon if the product of the tail length and number of teeth is greater than the age of the dragon. Write the implementation of such a function.​

Answers

It’s c because I did it to

Ranboo back story? (not homework i just wanna find some ppl who are interested in the same things) ft. the reddie meme

Ranboo back story? (not homework i just wanna find some ppl who are interested in the same things) ft.

Answers

Answer:

i like meme very much

Explanation:

mark as brainliest please

Answer:

ranboo backstory poggg

Explanation:

idrk his back story im pretty sure he forgot most of it anyways

You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.

Answers

Following are the steps of the polynomial-time algorithm:

Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from\(\bold{ low \ to\ mid+1}\) using only these roads.There is a solution if every shop can be reached by road only up to \(\bold{mid+1}\), but not up to mid.You can \(\bold{set \ low = mid+1}\) if all businesses aren't accessible using both \(\bold{mid\ and\ mid+1}\) roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because \(\bold{ low > high}\)You can do this by \(\bold{set\ mid = \frac{(low + high)}{2}}\)The new low, mid, and high numbers are used in step (a).

In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.

Learn more:

polynomial-time algorithm: brainly.com/question/20261998

Complete the sentence.
____ use only apps acquired from app stores.

O tablets
O laptops
O servers
O desktops

Answers

The answer is Tablets

Answer:

Tablets

Explanation:

I say so

1. Which one of the following is an HTML5-based interface that allows you to log directly in to the ESXi host? a) vSphere client b) ESXCLI c) VMware Host Client d) DCUI

Answers

The HTML5-based interface that allows you to log directly into the ESXi host is **c) VMware Host Client**.

The VMware Host Client provides a web-based management interface that allows users to log in directly to the ESXi host. It is built using HTML5 technology, making it accessible from web browsers without the need for any additional client applications or plugins. The VMware Host Client allows administrators to perform various management tasks, such as configuring network settings, monitoring system resources, managing virtual machines, and accessing logs and performance data.

The VMware Host Client offers a user-friendly and intuitive interface for managing ESXi hosts, providing convenient remote access to the host's configuration and management capabilities. It simplifies the administration process by eliminating the need for separate client software installations and provides a streamlined experience for managing ESXi hosts in HTML5-compatible web browsers.

For more such answers on HTML5

https://brainly.com/question/28994257

#SPJ8

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

In this lab, you use what you have learned about parallel arrays to complete a partially completed C++ program. The program should:

Either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop
Or it should print the message Sorry, we do not carry that.
Read the problem description carefully before you begin. The file provided for this lab includes the necessary variable declarations and input statements. You need to write the part of the program that searches for the name of the coffee add-in(s) and either prints the name and price of the add-in or prints the error message if the add-in is not found. Comments in the code tell you where to write your statements.

Instructions
Study the prewritten code to make sure you understand it.
Write the code that searches the array for the name of the add-in ordered by the customer.
Write the code that prints the name and price of the add-in or the error message, and then write the code that prints the cost of the total order.
Execute the program by clicking the Run button at the bottom of the screen. Use the following data:

Cream

Caramel

Whiskey

chocolate

Chocolate

Cinnamon

Vanilla

In this lab, you use what you have learned about parallel arrays to complete a partially completed C++

Answers

A general outline of how you can approach solving this problem in C++.

Define an array of coffee add-ins with their corresponding prices. For example:

c++

const int NUM_ADD_INS = 7; // number of coffee add-ins

string addIns[NUM_ADD_INS] = {"Cream", "Caramel", "Whiskey", "chocolate", "Chocolate", "Cinnamon", "Vanilla"};

double prices[NUM_ADD_INS] = {1.50, 2.00, 2.50, 1.00, 1.00, 1.25, 1.00}

What is the program about?

Read input from the user for the name of the coffee add-in ordered by the customer.

c++

string customerAddIn;

cout << "Enter the name of the coffee add-in: ";

cin >> customerAddIn;

Search for the customerAddIn in the addIns array using a loop. If found, print the name and price of the add-in. If not found, print the error message.

c++

bool found = false;

for (int i = 0; i < NUM_ADD_INS; i++) {

   if (customerAddIn == addIns[i]) {

       cout << "Name: " << addIns[i] << endl;

       cout << "Price: $" << prices[i] << endl;

       found = true;

       break;

   }

}

if (!found) {

   cout << "Sorry, we do not carry that." << endl;

}

Calculate and print the total cost of the order by summing up the prices of all the add-ins ordered by the customer.

c++

double totalCost = 0.0;

for (int i = 0; i < NUM_ADD_INS; i++) {

   if (customerAddIn == addIns[i]) {

       totalCost += prices[i];

   }

}

cout << "Total cost: $" << totalCost << endl;

Read more about program here:

https://brainly.com/question/26134656

#SPJ1

How many combinations of 1s and Os can we make with 6 place values?

Answers

Explanation:

which question is this

Who was making the high-pitched growling noise that Francisco hears?

Answers

The high-pitched growling noise that Francisco hears is due to mating call of male midshipman fish or 5G.

What is the  hum about?

The Hum is known to be a kind of unexplained happenings that has brought a lot of irritations to people. It is known to be a high-pitched noise that brought a lot of scientific theories.

Studies has shown that the high-pitched growling noise that Francisco hears is as a result of  mating call of male midshipman fish or 5G.

Learn more about noise from

https://brainly.com/question/2278957

How can you ensure that the website you are using is secured?
A.
website begins with http://
B.
website begins with https:// and has a green padlock
C.
website doesn’t have any padlock icon
D.
website has a red padlock icon

Answers

The answer is B: website begins with https:// and has a green padlock

algorithm that has been coded into something that can be run by a machine.

1. algorithm
2. event
2. program

Answers

the answer is program

Brainly account. How to open?

Answers

You would have to take a picture of TOR work your working on or you can type it in here and myself and other will be Able to help you:)

Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the customer's loan balance each month until the loan is paid off. b. Modify the Bob's E-Z Loans application so that after the payment is made each month, a finance charge of 1 percent is added to the balance.

Answers

Answer:

part (a).

The program in cpp is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   std::cout << "Loan balance: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>0)

   {

       if(balance<payment)    

         { payment = balance;}

       else

       {  

           std::cout << balance <<"\t\t\t"<< payment << std::endl;

           balance = balance - payment;

       }

   }

   return 0;

}

part (b).

The modified program from part (a), is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   double charge=0.01;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   balance = balance +( balance*charge );

   std::cout << "Loan balance with 1% finance charge: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>payment)

   {

           std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

           balance = balance +( balance*charge );

           balance = balance - payment;

       }

   if(balance<payment)    

         { payment = balance;}          

   std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

   return 0;

}

Explanation:

1. The variables to hold the loan balance and the monthly payment are declared as double.

2. The program asks the user to enter the loan balance and monthly payment respectively which are stored in the declared variables.  

3. Inside a while loop, the loan balance and monthly payment for each month is computed with and without finance charges in part (a) and part (b) respectively.

4. The computed values are displayed for each month till the loan balance becomes zero.

5. The output for both part (a) and part (b) are attached as images.

Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly
Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly

what is the advantages of your solutions ​

Answers

Answer:

One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.

Explanation:

Which goal of design theory can be described as the proper distribution

Answers

The answer is balance

Write a 250-word essay on the benefits and dangers of collecting and storing personal data on online databases. Things to consider:

Does the user know their data is being collected?
Is there encryption built into the system?
Is that encryption sufficient to protect the data involved?
Does collecting the data benefit the end user? Or just the site doing the collecting?

Answers

Answer:

The collection and storage of personal data on online databases has both benefits and dangers. On the one hand, collecting and storing data can be incredibly useful for a variety of purposes, such as personalized recommendations, targeted advertising, and improved user experiences. However, it's important to consider the risks and potential consequences of this practice, particularly in regards to privacy and security.

One concern is whether or not users are aware that their data is being collected. In some cases, this information may be clearly disclosed in a site's terms of service or privacy policy, but in other cases it may not be as transparent. It's important for users to be aware of what data is being collected and how it is being used, so that they can make informed decisions about whether or not to share this information.

Another important factor is the level of encryption built into the system. Encryption is a way of encoding data so that it can only be accessed by authorized parties. If a system has strong encryption, it can help to protect the data involved from being accessed by unauthorized users. However, if the encryption is weak or flawed, it may not be sufficient to protect the data. It's important to carefully consider the strength and reliability of any encryption used on a system that stores personal data.

Ultimately, the benefits and dangers of collecting and storing personal data on online databases will depend on the specific context and how the data is being used. It's important to weigh the potential benefits and risks, and to carefully consider whether the collection and storage of this data is truly in the best interests of the end user, or if it is primarily benefiting the site doing the collecting.

Explanation:

Should one own a smart home device

What are some security issues that one can find bothersome with these types of devices?

Answers

Yes, one can have or should one own a smart home device

Some security issues that one can find bothersome with these types of devices are:

Privacy concernsVulnerabilities to hackingLack of updatesWhat are the  security issues?

Smart home tools offer usefulness and can help create growth easier, but they further create freedom risks that should be deliberate.

Some freedom issues so that find bothersome accompanying smart home tools contain:

Lastly, in terms of Privacy concerns: Smart home ploys may accumulate individual dossier, such as custom patterns and choices, that could be joint accompanying after second-party parties for point or direct at a goal buildup or added purposes.

Learn more about  security issues  from

https://brainly.com/question/29477357

#SPJ1

If the maximum range of projectile is x. show that the maximum height reached by the same projectile is x/4.

Answers

Explanation:

Given that,

The maximum range of a projectile is x.

Maximum range occurs when the angle of projection is 45°. Using formula for maximum range.

\(R=\dfrac{v^2}{g}\)

According to the question,

\(x=\dfrac{v^2}{g}\) ...(1)

Maximum height,

\(h=\dfrac{v^2}{2g}\)

From equation (1).

\(h=\dfrac{x}{2}\)

Hence, this is the required solution.

Create a program that displays a menu to select addition, subtraction, or multiplication. Using random numbers between 0 and 12 (including 0 and 12), present a math problem of the type selected to the user. Display a "correct" or "incorrect" message after the user enters their answer. In C++

Answers

Answer:

This question is answered using C++

#include<iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int ope, yourresult;

   cout<<"Select Operator: \n"<<"1 for addition\n"<<"2 for subtraction\n"<<"3 for multiplication\n";

   cout<<"Operator: ";

   cin>>ope;

   srand((unsigned) time(0));

   int num1 = rand() % 12;

   int num2 = rand() % 12;

   int result = 1;

   if(ope == 1){

       cout<<num1<<" + "<<num2<<" = ";

       result = num1 + num2;

   }

   else if(ope == 2){

       cout<<num1<<" - "<<num2<<" = ";

       result = num1 - num2;

   }

   else if(ope == 3){

       cout<<num1<<" * "<<num2<<" = ";

       result = num1 * num2;

   }

   else{

       cout<<"Invalid Operator";

   }

   cin>>yourresult;

   if(yourresult == result){

       cout<<"Correct!";

   }

   else{

       cout<<"Incorrect!";

   }

   return 0;

}

Explanation:

This line declares operator (ope) and user result (yourresult) as integer

   int ope, yourresult;

This prints the menu

   cout<<"Select Operator: \n"<<"1 for addition\n"<<"2 for subtraction\n"<<"3 for multiplication\n";

This prompts the user for operator

   cout<<"Operator: ";

This gets user input for operator

   cin>>ope;

This lets the program generates different random numbers

   srand((unsigned) time(0));

This generates the first random number

   int num1 = rand() % 12;

This generates the second random number

   int num2 = rand() % 12;

This initializes result to 1

   int result = 1;

If the operator selected is 1 (i.e. addition), this prints an addition operation and calculates the actual result

   if(ope == 1){

       cout<<num1<<" + "<<num2<<" = ";

       result = num1 + num2;

   }

If the operator selected is 2 (i.e. subtraction), this prints an subtracttion operation and calculates the actual result

   else if(ope == 2){

       cout<<num1<<" - "<<num2<<" = ";

       result = num1 - num2;

   }

If the operator selected is 3 (i.e. multiplication), this prints an multiplication operation and calculates the actual result

   else if(ope == 3){

       cout<<num1<<" * "<<num2<<" = ";

       result = num1 * num2;

   }

If selected operator is not 1, 2 or 3, the program prints an invalid operator selector

   else{

       cout<<"Invalid Operator";

   }

This gets user input

   cin>>yourresult;

This checks if user result is correct and prints "Correct!"

   if(yourresult == result){

       cout<<"Correct!";

   }

If otherwise, the program prints "Incorrect!"

   else{

       cout<<"Incorrect!";

   }

   return 0;

Hundreds of endpoints were not updated with the latest OS and patches. Identify an administrative control to remediate outdated operating systems and patches.

Answers

Implementing a regular patch management policy, with a schedule for updating all endpoints and enforcing compliance through configuration management or other tools.

What is patch management policy?

Patch management rules are a set of standards that guarantee patching is managed, efficient, and secure. These instructions outline the actions and procedures to be followed when fixing bugs and vulnerabilities. There are several sorts of patches, such as security patches, hotfixes, and service packs.

Patch management is the process of updating software, drivers, and firmware to prevent vulnerabilities. Effective patch management also ensures that systems run at peak performance, increasing productivity.

Learn more about Path Management:
https://brainly.com/question/29744046
#SPJ1

Product reviews are written by:
OA. people with specialized knowledge.
B. clever advertising copywriters.
C. consumers who may use the product.
OD. people on social networking sites.

Answers

Product reviews can be written by all of the above. People with specialized knowledge, clever advertising copywriters, consumers who may use the product and people on social networking sites can all write product reviews.

Question 18 of 20:
Select the best answer for the question.
18. Illegally downloading media such as music or movies is called
O A. plagiarism.
OB. harassment.
OC. bullying.
D. piracy.

Answers

Answer:

A is the answer

Explanation:

we don't have to bully some one if they are not nice or their skin colour

Give one example program for Head element.

Give one example for Body element in html

Answers

Answer:

1 one is Metadata and the 2 one is body

Is the ASSIGN statement a data entry statement, true or false?

Answers

I need the imagine to see so I will tell you the answer

Name:

Sup-R Game Desktop – Model EEXL
Inteel® Core i7
6GB Tri-Channel DDR3
500GB SATA-II (7200 rpm)
16x CD/DVD burner
21.5” HD widescreen monitor
NVIDIA® GeForce
Creative Sound Blaster® X-Fi Titanium
Altec Lansing speakers
Gigabit Ethernet port
3 – year limited warranty
Windows 10


1. Suppose you are reading a computer magazine and you come across the ad pictured above. By looking at the specs, you can see that: (2 Points)

The amount of RAM is ___________.

The microprocessor manufacturer is __________.

The amount of disk storage is _______________.

The amount of Solid State Drive storage is ______________

2. In the table below, list the hardware/peripheral components in the ad and check which function the component performs. (Add additional rows to the table if needed). (5 Points)

Component
Processor
Memory
Storage
Input
Output
Other












































3. In the table below, list 5 functions/features you would look for in purchasing a computer and explain why each is important to you. (3 Points)

Function/Feature
Explanation as to why and size, capacity, etc. you need this feature/function












5. List and describe the factors that affect the performance of a microprocessor. Name two manufacturers of central processing units (CPUs) and some for the different models of processors that they manufacture. (5 points)









6. At the beginning of an update for your smart phone, you notice a warning that says “Make sure your device is connected to a wall outlet and do not turn the device off until the update is complete.” You suspect that the update is going to _______________ the ROM boot loader to fix a security vulnerability. (2 Points)

7. You are working on a group project and you suggest to your team that they use a ______________ storage service where members can access a shared folder. (2 Points)

8. One of the ports on your laptop is rectangular and the inside of it is blue. It is a(n) _________ port. (2 Points)

9. You need an external keyboard for your Android device, and thankfully you can add a wireless one because it has ________________ capability. (2 Points)

10. You volunteer to produce a large quantity of black-and-white leaflets for a charity organization. It is fortunate that you have access to a(n) _____________________ printer with a high duty cycle and low operating costs.

Answers

1 6gb of ram
inteel
500gb
500gb

Select the correct answer.
Who takes care of the final layout of the product that meets the standards set by UX designers?
O A web developer
ОВ.
design director
OC. UX designer
OD. UI designer
Reset
Next
Hi

Select the correct answer.Who takes care of the final layout of the product that meets the standards

Answers

Answer:

UI designer

Explanation:

You want to use an algorithm to indicate that something should happen in
response to an action by the user. What type of function should be used?
O A. If-then statement
O B. Set to function
O C. Repeat function
O D. If-else statement

Answers

Answer:

If-then statement

Explanation:

If-then statement is the type of function that should be used if you want to use an algorithm to indicate that something should happen in response to an action by the user. The correct option is A.

What is if-then statement?

A programming conditional statement that executes one set of code if a specified condition is true and another set of code if the condition is false is known as a "if-then" statement.

This enables the algorithm to make a decision based on the user's action and take the necessary action.

The set-to and repeat functions have nothing to do with responding to user actions. The set-to function is typically used to set the value of a variable, whereas the repeat function is used to repeatedly execute a set of instructions.

Another type of conditional statement is the if-else statement, which can be used to execute code based on whether a condition is true or false, but it is not required for indicating a response to a user action.

Thus, the correct option is A.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ7

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

Other Questions
CHE19TXIQuestion 14 PointsIn chapter two, we are introduced to a legendary advertiser whose work with Pepsodenttoothpaste helped establish him as a leading figure in the industry and whose rules aboutcreating habits influences many industries today. What is that man's name?(A) Charles DuhiggB) Wolfram SchultzC) Drake Stimson(D) Claude C. Hopkins A firm uses the order-up-to model to manage its inventory. It wants to increase its in-stock probability while decreasing its holding costs (i.e., reduce its average inventory). Which of the following will help to achieve this goal?A.) increase the warehouse sizeB.) increase the base stock levelC.) Switch from pooled inventory to non-pooled inventory system.D.) Decrease the lead timeE.) Increase the average quantity on-orderF.) Increase the standard deviation of demand. hi everybody can you help me i really thank you each qusesion is 10 pioints Which angle is congruent to 2? Which of the following is not a possible consequence of inadequate access to health care?A. Greater opportunities to catch identifiable diseases in time for effective treatmentB. Increased risk of undiagnosed heart disease, cancer, and other diseasesC. Missing annual wellness visits and follow-up appointments with doctors D. Slightly higher chance of developing cavities, tooth decay, and bone loss Examples of someone being remarkable Multiply. State the product in simplest form..p-4p-1218p6p+12 p-9p+18, p - 2,3,6 Geology has the greatest effect on soil building?Question options: True False CAN SOMEONE HELP ME UNDERSTAND THIS PLEASE Please help solve due soon!! A school wants to buy a chalkboard that measures 4 feet by 6 feet. The chalkboard costs $10.00 per square foot. How much will the chalkboard cost? -9 ( x + 6)= -9x + 108 Which event ended Germanys hopes of winning World War II?the Battle of Berlinthe D-Day invasionthe Battle of the Bulgethe Battle of Stalingrad Can you PLEASE help with this as SOON as you can. I will give BRAINLIEST!!! You are going to make a password that starts with two letters from the alphabet, followed by three digits (for example, AB-123). Digits may be numbers 0through 9If you are allowed to repeat letters or numbers, you can makepasswords. If you don't repeat any letters or numbers, you can makepasswords The Model of Aggregate Demand and Aggregate Supply Most economists use the Model of Aggregate Demand and Aggregate Supply to explain + fluctuations in economic activity around its trend. The A Which function is equivalent toy=\left(x+6\right)^2-4y=(x+6) 2 4 why is population called dynamic thing What are the 3 types of compound words? Question 9 of 25A lower credit score indicates that a person is:A. carrying a low debt-to-credit ratio.B. less likely to pay back a debt.C. unlikely to default on a debt.D. more likely to pay back a debt.