When computers are recycled in the United States in ways that limit environmental pollution, they are ____.

Answers

Answer 1

When computers are recycled in the United States in ways that limit environmental pollution, they are broken down into its component pieces and recycled in different ways.

Does pollution come from electronics?

One of the largest environmental effects of e-waste is the release of harmful compounds into the atmosphere when it is subjected to heat. Following that, such hazardous substances may leak into the groundwater, endangering both land and marine life. Air pollution may also be a result of electronic trash.

Why is electrical trash produced?

There is a huge oversupply of unwanted electronic devices, or "e-waste," because of the rapid growth of technology, which causes many electronic products to become outdated in a relatively short amount of time. The health of people and the environment might be seriously endangered by the landfill disposal of e-waste.

To know more about Electronic waste visit

brainly.com/question/26807121

#SPJ4


Related Questions

D
Question 11
A binary search tree (BST) is a linked-node based binary tree which stores key-value
pairs (or just keys) in each node.
Find/Search/Get in a binary search tree with n nodes has an expected runtime
of O(log n) for balanced trees.
O True
1 pts
False

Answers

Answer:

True

Explanation:

Bias in the development of computational artifacts often arises from _____. Select 2 options.

testing software


conscious bias


including outliers


unconscious stereotyping


accurate data

Answers

Answer:

concious bias

unconciscous sterotyping

Explanation:

The bias in computational artifacts results in conscious bias and unconscious stereotyping. Thus, options A and C are correct.

What is a bias in technology?

A bias in technology is given as the developed system of the systematic and repeatable errors that makes the formation of the unfair outcomes. The development of the working outcomes formed is responsible for the development of the inappropriate function of linked processes.

The development of the bias in the computational artifacts is found to be the result of conscious bias and unconscious stereotyping. Thus, options A and C are correct.

Learn more about bias, here:

https://brainly.com/question/13044778

#SPJ2

data is information, information is Data, comparison of both​

Answers

Answer:

"Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random and useless until it is organized. When data is processed, organized, structured or presented in a given context so as to make it useful, it is called information. Each student's test score is one piece of data. "

Data is defined as facts or figures, or information that's stored in or used by a computer. An example of data is information collected for a research paper. An example of data is an email.

Hope this Helps

Mark Brainiest

Write a program that defines the following two lists:
names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack',
'Kelly', 'Larry']
ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]
These lists match up, so Alice’s age is 20, Bob’s age is 21, and so on. Write a program
that asks the user to input the number of the person to retrieve the corresponding
data from the lists. For example, if the user inputs 1, this means the first person
whose data is stored in index 0 of these lists. Then, your program should combine
the chosen person’s data from these two lists into a dictionary. Then, print the
created dictionary.
Hint: Recall that the function input can retrieve a keyboard input from a user. The
signature of this function is as follows:
userInputValue = input("Your message to the user")
N.B.: userInputValue is of type String

Answers

Answer: I used colab, or use your favorite ide

def names_ages_dict():

 names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack', 'Kelly', 'Larry']

 ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]

 # merging both lists

 names_ages = [list(x) for x in zip(names, ages)]

 index = []

 # creating index

 i = 0

 while i < len(names):

     index.append(i)

     i += 1

 # print("Resultant index is : " ,index)

 my_dict = dict(zip(index, names_ages))

 print('Input the index value:' )

 userInputValue  = int(input())

 print(f'data at index {userInputValue} is, '+ 'Name: ' + str(my_dict[input1][0] + '  Age: ' + str(my_dict[input1][1])))

 keys = []

 values = []

 keys.append(my_dict[input1][0])

 values.append(my_dict[input1][1])

 created_dict = dict(zip(keys, values))

 print('The created dictionary is ' + str(created_dict))

names_ages_dict()

Explanation: create the function and call the function later

Write a program that defines the following two lists:names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary',

Given integer variables seedVal and highest, generate three random numbers that are less than highest and greater than or equal to 0. Each number generated is output. Lastly, the average of the three numbers is output.

Answers

Answer:

Here's a Python code snippet to generate three random numbers between 0 and highest (exclusive), and then calculate the average of these numbers:

import random 

seedVal = int(input("Enter seed value: "))

highest = int(input("Enter highest value: ")) 

random.seed(seedVal)

num1 = random.randint(0, highest)

num2 = random.randint(0, highest)

num3 = random.randint(0, highest) 

print("First number:", num1)

print("Second number:", num2) 

print("Third number:", num3)

average = (num1 + num2 + num3) / 3 

print("Average:", average)

Write a program HousingCost.java to calculate the amount of money a person would pay in renting an apartment over a period of time. Assume the current rent cost is $2,000 a month, it would increase 4% per year. There is also utility fee between $600 and $1500 per year. For the purpose of the calculation, the utility will be a random number between $600 and $1500.
1. Print out projected the yearly cost for the next 5 years and the grand total cost over the 5 years.
2. Determine the number of years in the future where the total cost per year is over $40,000 (Use the appropriate loop structure to solve this. Do not use break.)

Answers

Answer:

import java.util.Random;

public class HousingCost {

public static void main(String[] args) {

int currentRent = 2000;

double rentIncreaseRate = 1.04;

int utilityFeeLowerBound = 600;

int utilityFeeUpperBound = 1500;

int years = 5;

int totalCost = 0;

System.out.println("Year\tRent\tUtility\tTotal");

for (int year = 1; year <= years; year++) {

int utilityFee = getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

int rent = (int) (currentRent * Math.pow(rentIncreaseRate, year - 1));

int yearlyCost = rent * 12 + utilityFee;

totalCost += yearlyCost;

System.out.println(year + "\t$" + rent + "\t$" + utilityFee + "\t$" + yearlyCost);

}

System.out.println("\nTotal cost over " + years + " years: $" + totalCost);

int futureYears = 0;

int totalCostPerYear;

do {

futureYears++;

totalCostPerYear = (int) (currentRent * 12 * Math.pow(rentIncreaseRate, futureYears - 1)) + getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

} while (totalCostPerYear <= 40000);

System.out.println("Number of years in the future where the total cost per year is over $40,000: " + futureYears);

}

private static int getRandomUtilityFee(int lowerBound, int upperBound) {

Random random = new Random();

return random.nextInt(upperBound - lowerBound + 1) + lowerBound;

}

}

An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average

Answers

python

Answer:

# put the numbers array here

average=sum(numbers)/35 # find average

count=0 #declare count

for i in numbers: #loop through list for each value

if i > average: #if the list number is greater than average

count+=1 #increment the count

print(count) #print count

Which of the following are most likely to be members of the technical crew for a production?
A)producers
B)bookkeepers
C)camera operators
D)actors

Answers

C) Camera operators

Answer:

C: camera operators

Explanation:

edg2021

Producers and actors are the only other two in the film industry, and they are separate from the technical crew

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

As a network administrator u where ask to create ten usable host with a subnet mask of 225.225.225.0 , to be assign to ten PC's on a network. (Use snipping tools to capture the environment.)​

Answers

You will receive six usable IP addresses from this, one of which will connect to the broadcast address and the other to the network address. Five IP addresses are available for use as hosts if one of them is a router.

What exactly is a valid host address?

It is not possible to assign broadcast and network addresses to network hosts. Therefore, the total number of addresses less two is the number of addresses you can assign to hosts.

Expecting that the veil is for every individual subnet and that you have no less than 160 continuous addresses accessible to you, the principal entryway address will be 201.255.0.1 and there will be passages at 201.255.0.9, 201.255.0.17, etc.

201.255.0.153 will be the final gateway of the twenty, leaving you with 96 addresses in a /24 block. The most effective allocation for the remainder would be a /27 at 201.255.0.161 with the nm 255.255.255.240 and a /26 at 201.255.0.193 with the nm 255.255.255.192. This will give you 6 IP addresses .

To learn more about IP visit :

https://brainly.com/question/26230428

#SPJ1

Write a program in JavaScript to display all the Odd number from 1 to 1.​

Answers

Answer:

for (let i = 1; i <= 10; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

Explanation:

This program uses a for loop to iterate over the numbers from 1 to 10. The if statement checks if the current number is odd by using the modulo operator % to check if the remainder of dividing by 2 is not equal to 0. If the number is odd, it is printed to the console using the console.log function.

You can adjust the program to display odd numbers up to a different limit by changing the upper limit of the for loop. For example, to display odd numbers up to 20, you could change the loop to:

for (let i = 1; i <= 20; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

What is the purpose of a computer network needs assessment? to evaluate how to move from the current status to the desired goal to determine what steps employees can take to increase company revenue to analyze which workers need more training to improve their performance to compare worker productivity

Answers

Answer:

to evaluate how to move from the current status to the desired goal

Description:
Read integer inCount from input as the number of integers to be read next. Use a loop to read the remaining integers from input. Output all integers on the same line, and surround each integer with curly braces. Lastly, end with a newline.

Ex: If the input is:

2
55 75
then the output is:

{55}{75}

Code:
#include
using namespace std;

int main() {
int inCount;

return 0;
}

Description:Read integer inCount from input as the number of integers to be read next. Use a loop to

Answers

Here's the modified code that includes the requested functionality:

#include <iostream>

using namespace std;

int main() {

   int inCount;

   cin >> inCount;

   for (int i = 0; i < inCount; i++) {

       int num;

       cin >> num;

       cout << "{" << num << "}"; }

  cout << "\n";

   return 0;}

In this code, we first read the integer inCount from the input, which represents the number of integers to be read next. Then, using a loop, we read each of the remaining integers from the input and output them surrounded by curly braces {}. Finally, we print a newline character to end the line of output.

Learn more about integer loop, here:

https://brainly.com/question/31493384

#SPJ1

What the central difference between negative and positive politeness?

Answers

Answer:

      Politeness is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.

    Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.

What are positive face needs?

  One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.

Negative politeness :

  Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.

What is politeness in discourse analysis?

    In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.

Hope u got it

If you have any question just ask me

Starting a corporation is ________.
DIFFICULT
FAIRLY SIMPLE
ALWAYS NON-PROFIT

Answers

Starting a corporation is FAIRLY SIMPLE. (Option B). This is because there is such a vast amount of information and paid guidance that is available to those who want to start a corporation.

What is a corporation?

A corporation is an organization—usually a collection of individuals or a business—that has been permitted by the state to function as a single entity and is legally recognized as such for certain purposes.

Charters were used to form early incorporated companies. The majority of governments currently permit the formation of new companies through registration.

It should be emphasized that examples of well-known corporations include Apple Inc., Walmart Inc., and Microsoft Corporation.

Learn more about Corporation:
https://brainly.com/question/13551671
#SPJ1

A five-year prospective cohort study has just been completed. the study was designed to assess the association between supplemental vitamin a exposure and mortality and morbidity for measles. the rr for incidence of measles was 0.75 and the rr for measles mortality was 0.5. Assume these RR are significant. Regarding the RR reported above, which statement is correct?

a. Exposure to vitamin A appears to protect against morbidity and mortality for measles.
b. Exposure to vitamin A appears to be a risk factor for morbidity and mortality for measles.
c. Exposure to vitamin A is not associated with morbidity and mortality for measles.
d. Exposure to vitamin A is a risk factor for morbidity and a protective factor for mortality for measles.

Answers

Answer:

Exposure to vitamin A appears to be a risk factor for morbidity and mortality for measles.

Explanation:

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

what are the characteristics of a computer system


Answers

Answer:

A computer system consists of various components and functions that work together to perform tasks and process information. The main characteristics of a computer system are as follows:

1) Hardware: The physical components of a computer system, such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripherals.

2) Software: The programs and instructions that run on a computer system. This includes the operating system, application software, and system utilities that enable users to interact with the hardware and perform specific tasks.

3) Data: Information or raw facts that are processed and stored by a computer system. Data can be in various forms, such as text, numbers, images, audio, and video.

4) Processing: The manipulation and transformation of data through computational operations performed by the CPU. This includes arithmetic and logical operations, data calculations, data transformations, and decision-making processes.

5) Storage: The ability to store and retain data for future use. This is achieved through various storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), and optical media (CDs, DVDs).

6) Input: The means by which data and instructions are entered into a computer system. This includes input devices like keyboards, mice, scanners, and microphones.

7) Output: The presentation or display of processed data or results to the user. This includes output devices like monitors, printers, speakers, and projectors.

8) Connectivity: The ability of a computer system to connect to networks and other devices to exchange data and communicate. This includes wired and wireless connections, such as Ethernet, Wi-Fi, Bluetooth, and USB.

9) User Interface: The interaction between the user and the computer system. This can be through a graphical user interface (GUI), command-line interface (CLI), or other forms of interaction that allow users to communicate with and control the computer system.

10) Reliability and Fault Tolerance: The ability of a computer system to perform consistently and reliably without failures or errors. Fault-tolerant systems incorporate measures to prevent or recover from failures and ensure system availability.

11) Scalability: The ability of a computer system to handle increasing workloads, accommodate growth, and adapt to changing requirements. This includes expanding hardware resources, optimizing software performance, and maintaining system efficiency as demands increase.

These characteristics collectively define a computer system and its capabilities, allowing it to process, store, and manipulate data to perform a wide range of tasks and functions.

Hope this helps!

How does SAFe provide a second operating system that enables Business Agility?

Answers

SAFe provides a means for businesses to concentrate on consumers, products, innovation, and growth by structuring the second operating system around value streams rather than departments.

What is business agility?

Using seven essential competencies—team and technical agility, agile product delivery, enterprise solution delivery, Lean portfolio management, Lean-agile leadership, organizational agility, and continuous learning culture—the SAFe Business Agility Assessment assess an organization's overall agility.

By structuring a second OS, it enables one to focus on consumers' products and innovation.

Learn more about SAFe :

https://brainly.com/question/10851873

#SPJ1

A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence

Answers

Answer:

D

Explanation:

because it is a sequence it does more than one thing

Answer:

B

Explanation:

I took the test

Which kind of file would be hurt most by lossy compression algorithm

Answers

Answer:

Answer is a text document

Explanation:

"Text document" is the file that would be hurt most by the lossy compression algorithm.

Audio, as well as picture data (text document), are compressed with crushing defeat to start taking benefit of the unique vision as well as listening or auditory shortcomings.More such documents including software should have been stored without any information leakage as well as corruption.

Thus the above answer is appropriate.

Learn more about the text document here:

https://brainly.com/question/18806025

Which kind of file would be hurt most by lossy compression algorithm

create a program that calculates the areas of a circle, square, and triangle using user-defined functions in c language.​

Answers

A program is a set of instructions for a computer to follow. It can be written in a variety of languages, such as Java, Python, or C++. Programs are used to create software applications, websites, games, and more.

#include<stdio.h>

#include<math.h>

main(){

 int choice;

 printf("Enter

1 to find area of Triangle

2 for finding area of Square

3 for finding area of Circle

4 for finding area of Rectangle

 scanf("%d",&choice);

 switch(choice) {

    case 1: {

       int a,b,c;

       float s,area;

       printf("Enter sides of triangle

");

       scanf("%d%d %d",&a,&b,&c);

       s=(float)(a+b+c)/2;

       area=(float)(sqrt(s*(s-a)*(s-b)*(s-c)));

       printf("Area of Triangle is %f

",area);

       break;

     case 2: {

       float side,area;

       printf("Enter Sides of Square

       scanf("%f",&side);

       area=(float)side*side;

       printf("Area of Square is %f

",area);

       break;

   

 case 3: {

       float radius,area;

       printf("Enter Radius of Circle

");

       scanf("%f",&radius);

       area=(float)3.14159*radius*radius;

       printf("Area of Circle %f

",area);

       break;

    }

    case 4: {

       float len,breadth,area;

       printf("Enter Length and Breadth of Rectangle

");

       scanf("%f %f",&len,&breadth);

area=(float)len*breadth;

       printf("Area of Rectangle is %f

",area);

       break;

    }

    case 5: {

       float base,height,area;

       printf("Enter base and height of Parallelogram

");

       scanf("%f %f",&base,&height);

       area=(float)base*height;

       printf("Enter area of Parallelogram is %f

",area);

       break;

    }

    default: {

       printf("Invalid Choice

");

       break;

    }

 }

}

What do you mean by programming ?

The application of logic to enable certain computing activities and capabilities is known as programming. It can be found in one or more languages, each of which has a different programming paradigm, application, and domain. Applications are built using the syntax and semantics of programming languages. Programming thus involves familiarity with programming languages, application domains, and algorithms. Computers are operated by software and computer programs. Modern computers are little more than complex heat-generating devices without software. Your computer's operating system, browser, email, games, media player, and pretty much everything else are all powered by software.

To know more about ,programming visit

brainly.com/question/16936315

#SPJ1  

When writing an algorithm, plans are reviewed before they are carried out.

True or False?

Answers

Answer: True

Explanation:

thats the main step of algortithm lol

I need help please and thanks

I need help please and thanks

Answers

Answer:

ok thx for points

Explanation:

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.
What is the probability that a

Answers

The probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

What is the probability about?

Probability is  known to be the way or the measurement of the likelihood that a given event  will take place.

Note that in the case above, the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

See full question below

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.

What is the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to complete the race?

Learn more about race from

https://brainly.com/question/28062418

#SPJ1

Differentiate between Host based IDS and Network based IDS?

Answers

The main difference between Host-based Intrusion Detection System (IDS) and Network-based Intrusion Detection System (IDS) lies in their scope and location.

Host-based IDS (HIDS):

Host-based IDS is a security mechanism that operates on individual hosts or endpoints within a network.

It focuses on monitoring and analyzing the activities occurring on the host itself.

HIDS agents are installed on individual systems, and they monitor system logs, file integrity, user activity, and other host-specific information.

HIDS can detect attacks that originate both externally and internally, as it has visibility into the activities happening within the host.

It provides granular and detailed information about the system, including the processes, file modifications, and user behavior, allowing for precise detection and response.

Network-based IDS (NIDS):

Network-based IDS, on the other hand, is designed to monitor network traffic and detect suspicious patterns or anomalies within the network.

NIDS devices are strategically placed at key points in the network infrastructure, such as routers or switches, to capture and analyze network packets.

It examines network headers, payload content, and protocols to identify potential threats.

NIDS focuses on the network layer and can detect attacks targeting multiple hosts or specific vulnerabilities in network protocols.

It provides a global view of network activities and can identify threats before they reach individual hosts.

For more questions on Network-based Intrusion Detection System (IDS)

https://brainly.com/question/20556615

#SPJ8

Which statement is written correctly?

Which statement is written correctly?

Answers

Answer:

B.

Explanation:

In Javascript, the if should have a condition attached to it with parenthesis and curly braces.

Write a program to test the class LinkedBag. For example create a bag by asking the user for few names then 1.Put those names in the bag. 2. ask the user for a name and delete it from the bag. 3. ask for a name and check whether it is in the bag or not 4. print all names in the bag.

Answers

Answer:  lolllllllllllllllllllllllllllllllllllllllllllllllllllllllll

In the no trade example, total world production of computers is _______, of which _______ are produced in the United States.
13; 0
13; 12
12; all 12
14; 12

Answers

In the no trade example, total world production of computers is 12, of which 0 are produced in the United States. Correct answer: letter A.

Choice A is the best answer because it correctly explains the opportunity cost of producing the eleventh unit of consumer goods in North Cantina.

In the example given, the production alternative B shows that the production of 1 unit of consumer goods requires the sacrifice of 1 unit of capital goods. Therefore, the opportunity cost of the eleventh unit of consumer goods is 11 units of capital goods.

Learn more about production of computers

https://brainly.com/question/17347684

#SPJ4

Which sensitivity level is not a default available in Outlook 2016?


Normal

Personal

Confidential

Company Only

Answers

Answer:

Company only

Explanation: The sensitivity levels available for Outlook 2016 are Normal, personal,private and confidential, this sensitivity levels helps users to the intentions of the user of the product and it will help to give their plan on what and how to utilize the product. It is very important to make use of the sensitivity levels in your Outlook for better usage of the Microsoft Outlook.

Answer:

company only

Explanation:

because i took the test edge2020

Other Questions
Gregory Mendel work was different from that of other researchers working in inheritances in his day because he alone which of the following is true of the heartwood of a tree? question 9 options: heartwood is the phloem tissue that has been compressed to the center of the stem. heartwood is the active layer of vascular tissue. heartwood is located between the secondary xylem and phloem. heartwood is the old xylem tissue. What are two other ways to describe the range? which of the following is a method of closed treatment of fractures What is one function of political parties in the u.s political system? WILL GIVE BRAINLIST IF YOU AWNSER NOW Too many sentence fragments in your writing might:1make readers wonder what's happening2make your readers think that you can't write well3confuse your reader with too many incomplete thoughts4any of the above The force of attraction between any two particles in the universe is directly proportional to. Why is my iphone not notifying me when i receive a text from one person. What is the length of fence that will be installed to the nearest tenth of a foot ? during the most recent year, finn company produced 13,700 chairs and 9,700 desks. it incurred $501,700 of indirect material costs during the period and spent 101,700 hours on the total manufacturing project. using number of units, how much of the indirect material costs should be allocated to the chairs? What is the nth term rule of the quadratic sequence below?5,4,1,4,11,20,31 acillllllllllllllllllllll PART A: How did Malcolm's views on civil rights change throughout his life? An entrepreneur who is green focuses on a. helping others who are in need. b. conserving resources. c. operating with integrity. d. finding societal needs that are not being met by the government. Which of the following passages best supports the answer to the previous question? HELP ASAP DUE IN A HOURAnswer choices for the above questionA. Romantic writers and artists turned away from the emphasis on reason explored in the Enlightenment era.B. They believed that people had tremendous knowledge within them that they could better access by spending time alone and in reflection.C. Essays were a popular form in the period, particularly for the Transcendentalists. Essays allowed writers in the Romantic period to explore a particular idea or argue a point.D. In the Romantic period, poets broke rules associated with the formal poetry of the Enlightenment. They experimented with form and style in free verse poetry. Please help me on this I need u to write it if u can I will give brainlies and if your answer is not about this then I will report. The winds that blow from the subtropical high of West Africa to the equatorial low in the Gulf of Mexico are called the Can yall help me plz Convert 5.6 cm to meters. (please show the steps to how you did the problem.) Do you know the Intellect, Technology and Economy of Tang, Song, Mongols or Ming