Which of the following is not a question that should be asked when planning a Windows Server 2019 installation?

a. What are the storage needs of the server?
b. Who will be supporting the server?
c. How many users are expected to connect to the server?
d. What services will the server run?

Answers

Answer 1

The question that should not be asked when planning a Windows Server 2019 installation is "Who will be supporting the server?" Thus, Option B is correct.

The question of who will be supporting the server is not relevant to the planning of a Windows Server 2019 installation. The focus should be on technical requirements such as storage needs, expected number of users, and services that the server will run. This information will inform decisions about hardware requirements, network configuration, and security considerations.

While it is important to consider the support structure for the server after it is installed, this is not a question that should be asked during the planning phase. Therefore, Option B holds true.

Learn more about Windows Server 2019 https://brainly.com/question/31173410

#SPJ11


Related Questions

HELP HELP HELP HELP
I spilled acetone nail polish remover on my Chromebook and it left white stains and I tried to scrap most of it off but it won't go away and I REALLY need to fix or cover this up :( Please help me!!!

Answers

use sharpie or nail polish that is the same color as the chromebook then buff it out with sandpaper

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Hardware- The ______________ equipment that makes up the computer.

Answers

Answer:

It's like the stuff you can touch, the software is the stuff that runs in your computer

Explanation:

Hardware has those usb ports or whatever too (i think lol) good luck

30 points and brainiest Which certifications are offered in Family Consumer Science? (Select 2) Select 2 correct answer(s)
Question 2 options:

Community Health Worker

Early Childhood Education

Food Handler's

Counseling

Answers

The certifications are offered in Family Consumer Science are option B and C:

Early Childhood EducationFood Handler's

What is the certifications  about?

Family Consumer Science is a field that focuses on the study of how families interact with the broader community and economy. Some of the certifications offered in Family Consumer Science include:

Early Childhood Education: This certification is designed for individuals who wish to work with young children, typically from birth to age 8, in settings such as preschools, daycare centers, and primary schools. It covers topics such as child development, teaching methods, and classroom management.

Therefore, in Food Service Management: this certification is designed for individuals who wish to work in the food service industry, such as managing and supervising food service operations in schools, hospitals, restaurants and other food service facilities.

Learn more about certifications   from

https://brainly.com/question/26004231
#SPJ1

For this assignment, you will select a digital media career that you would be interested in pursuing. You will need to do some research to identify the right career for you. Next, you will research and discover what kind of training you will need to land your dream job. Finally, you will find available jobs in your career and select a job that you would want. After doing some research and some thinking, you will:

Select a career that is right for you. Write at least 150 words describing the career and why you believe it would be a good fit for you. Keep in mind your interests and talents.
Research and learn about what training the career requires. After you research, write at least 150 words describing the training. You can include what types of course you would take. How long the training program is, and how much it might cost you.
Finally, you will find a job! Research available jobs in your career and select a job you would want. Provide a copy of the job posting. You can snapshot this, copy and paste it, or copy it word for word. Make sure you include where you found the job posted. You will include at least 75 words on why you selected this particular position. Some helpful sites for job hunting are Indeed, Dice, Career Builder, and Monster.

Answers

A digital media career involves using technology to create and distribute various forms of digital content, such as video, audio, graphics, and multimedia. This can include roles such as graphic designers, web developers, social media specialists, digital marketers, and video producers.

How long the training program is, and how much it might cost you.

To land a career in digital media, you will typically need a combination of technical skills and creativity, as well as a strong understanding of digital media platforms and technologies. Depending on the specific career path you choose, you may need to have skills in areas such as graphic design, web development, video editing, or social media management.

Training for a digital media career can vary depending on the specific path you choose, but often involves completing a degree or certificate program in a related field such as digital media, graphic design, or marketing. These programs can range in length from a few months to several years, and can cost anywhere from a few thousand dollars to tens of thousands of dollars.

Job opportunities in digital media can be found on job search sites such as Indeed, Dice, Career Builder, and Monster. One example of a job posting for a digital media position is:

Position: Social Media Specialist

Company: XYZ Digital Agency

Location: New York, NY

Job Type: Full-time

Responsibilities:

Develop and execute social media strategies for client accounts

Create engaging social media content, including graphics and video

Monitor social media channels for trends and insights

Analyze social media metrics and adjust strategies as needed

Why I selected this particular position:

I am interested in pursuing a career in social media management, and this position seems like a good fit for my skills and interests. I am drawn to the opportunity to create engaging content and develop strategies to help clients achieve their social media goals. Additionally, the location and job type align with my preferences.

Read more on digital media career here https://brainly.com/question/29363025

#SPJ1

Which of the following statements is valid?SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal = MAX(InvoiceTotal)SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal = (SELECT MAX(InvoiceTotal))SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)All of the above

Answers

Correct Answer:

c.

SELECT InvoiceNumber, VendorName

FROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorID

WHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)

Explanation:

All options only differ on the WHERE clause:

a: WHERE InvoiceTotal = MAX(InvoiceTotal)

Fails because aggregate functions (like MAX, COUNT, etc) have to be used on the SELECT clause.

b: WHERE InvoiceTotal = (SELECT MAX(InvoiceTotal))

Fails because the SELECT clause is incomplete.

c: WHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)

This one is correct, and returns the InvoiceNumber and VendorName register with the largest value on the InvoiceTotal field.

how do you use the internet? researching? studying? comparative shopping? how could you more effectively use the internet? explain and provide very specific examples.

Answers

The internet can be used in a variety of ways, including for researching, studying, and comparative shopping.

What is the Internet?

The Internet is an extensive network that connects computers all over the world. Through the internet, information can be shared and communication is possible from anywhere.

To effectively use the internet, it is important to be organized, focused, and to have a plan. For example, when researching a topic, it is helpful to have a list of keywords and specific questions to help guide your search.

When studying, it is important to set goals and stick to a schedule to stay on track. When using the internet for comparative shopping, it is important to be thorough and to compare prices, reviews, and other factors before making a purchase.

Additionally, using tools such as bookmarking and taking notes can help to make your internet use more efficient and effective.

Learn more about the Internet https://brainly.com/question/16721461

#SPJ11

Why authentication processes and features important

Answers

Answer:

Authentication processes are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. Authentication processes can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

write a program in c language to generate following series :

1) 999 , 728, 511,.......upto 10th term

thank you​

Answers

Answer:

that is above the attachment

:)))

write a program in c language to generate following series :1) 999 , 728, 511,.......upto 10th term thank

In this exercise we have to have knowledge in computational language in C to write the requested code.

The code is found in the attached image.

We can write the code in a simpler way like:

#include<stdio.h>

#include<conio.h>

int main()

{

   int N, i;

   printf("Enter the value of N (limit): ");

   scanf("%d", &N);

   printf("\n");

   for(i=1; i<=N; i++)

   {

       if(i==N)

           printf("%d", i);

       else

           printf("%d,", i);

   }

   getch();

   return 0;

}

See more about C language at brainly.com/question/19705654

write a program in c language to generate following series :1) 999 , 728, 511,.......upto 10th term thank

to see how some of the hosts on your network react, winston sends out syn packets to an ip range. a number of ips respond with a syn/ack response. before the connection is established he sends rst packets to those hosts to stop the session. winston has done this to see how his intrusion detection system will log the traffic. what type of scan is winston attempting here?

Answers

Winston is attempting a SYN scan, which is a type of network reconnaissance technique used to identify open ports on a target network.

What type of scan is Winston attempting by sending syn?

Winston is attempting a SYN scan, which is a type of network reconnaissance technique used to identify open ports on a target network.

In a SYN scan, the attacker sends SYN packets to a range of IP addresses and waits for SYN/ACK responses from hosts that have open ports.

Once a response is received, the attacker sends a RST packet to close the session before the connection is established.

This technique allows the attacker to determine which ports are open without completing the three-way handshake required to establish a connection, which makes it difficult to detect.

Winston is using this technique to test his intrusion detection system's ability to log such traffic.

Learn more about scan

brainly.com/question/28799317

#SPJ11

What is the function of input device?​

Answers

Answer:

The function of an input device is to communicate information to a computer or other sort of information processing equipment. Input devices are types of peripheral devices that communicate with processing units.

Which of the following is NOT a career in the Information Support and Services pathway?

a
Website engineers
b
Technical writers and editors
c
Database administrators
d
Software developers

Answers

Answer:

here yuuuurrrrr Vote for me nah jk

Which of the following is NOT a career in the Information Support and Services pathway? aWebsite engineers

what does the first number in a zip code represent?

Answers

The first digit in a ZIP code represents a defined group of U.S. states. The second and third digits represent a region in that group, such as a large city. To send mail, only the first five digits of the ZIP code are required.

so.. the answer is “ The first digit in a ZIP code represents a defined group of U.S. states. “

hope this helps!!

many populations throughout central eurasia share high frequencies of the b allele. what does this pattern suggest about the evolutionary history of these populations? describe the evolutionary force that probably caused this trait distribution. view keyboard shortcuts edit view insert format tools table 12pt paragraph

Answers

Many populations in central Eurasia have high B allele frequencies; this pattern suggests or supports evidence of local adaptation in Eurasian human populations.

What is the evolutionary force?Alleles are gene variants that code for different traits in an organism. Mutations or evolutionary adaptations could be to blame. The presence of the O allele is common in Americans.

The American evolutionary patterns suggest that:

A, B, and O alleles code for human blood type. The individual inherits two alleles from his or her father and mother.The frequency of the O allele in the allele in Americans is higher, reaching 100% in some cases.The evolutionary pattern suggests that these populations are descended from the O-blood type population. The phenomenon is frequently explained as a result of the founder effect, which causes the loss of genetic variation.

To learn more about evolutionary force refer to :

https://brainly.com/question/14256554

#SPJ4

Use what you know about the properties of metal to explain why you think it is incredibly dangerous and potentially deadly to stick something metal in an electrical outlet.

Answers

It is incredibly dangerous and potentially deadly to stick something metal in an electrical outlet because metals are conductors of electricity.

Metals are known to be the best conductors of electricity. An electrical outlet will have electrons in abundance present.

When a metal is stuck to an electrical outlet, it will begin to conduct electricity. As metals are good conductors, the flow of electrons for electrical conduction would be heavy.

A person who touches the metal will experience an electrical shock that would be life-threatening and dangerous. Hence, due to the high conductivity of metals, when they are stuck to an electrical outlet, they can be potentially deadly.

To learn more about metal, click here:

https://brainly.com/question/4701542

#SPJ4

As a Manager, you will find it difficult to operate on daily basis without a computer in your office and even at home. Evalauate this statement

Answers

As a manager, operating on a daily basis without a computer in both the office and at home would indeed pose significant challenges. Computers have become an essential tool in modern management practices, enabling efficient communication, data analysis, decision-making, and productivity enhancement.

In the office, a computer allows managers to access critical information, collaborate with team members, and utilize various software applications for tasks such as project management, financial analysis, and report generation. It provides a centralized platform for managing emails, scheduling meetings, and accessing company systems and databases.

Outside the office, a computer at home provides flexibility and convenience for remote work and staying connected. It enables managers to respond to urgent emails, review documents, and engage in virtual meetings. It also allows them to stay informed about industry trends, access online resources for professional development, and maintain a work-life balance through effective time management.

Without a computer, managers would face limitations in accessing and analyzing data, communicating efficiently, coordinating tasks, and making informed decisions. Their productivity and effectiveness may be compromised, and they may struggle to keep up with the demands of a fast-paced, technology-driven business environment.

In conclusion, a computer is an indispensable tool for managers, facilitating their daily operations, communication, and decision-making. Its absence would significantly impede their ability to perform their responsibilities effectively both in the office and at home.

To learn more about Computers, visit:

https://brainly.com/question/32329557

#SPJ11

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?
a. focus
b. cost leadership
c. high standards
d. differentiation

Answers

The business strategy does this represent is high standards. Thus, option C is correct.

What is upper level?

An upper level is manager proposes that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when their purchase will ship and when it will arrive.

Company value allocation rules that do not offer incentives to commercial enterprise capabilities to lessen the value of industrial software organization program.

Therefore,  The business strategy does this represent is high standards. Thus, option C is correct.

Learn more about business strategy on:

https://brainly.com/question/28561700

#SPJ1

why is it important to use safe hand tool?​

Answers

Safe tool use contributes to a safer, more efficient work environment.
Using one is safer, hence the name, and can prevent serious injuries you could get without using it

i) What are Chronic Micro Traumas, and other physical injuries that gamers have faced?
ii) What are the mental/cognitive/emotional challenges that are mentioned in the article?
iii) Imagine a close friend of yours shares with you that they are facing the physical/cognitive/emotional challenges related to gaming/over usage of technology, what would you recommend for them to improve all forms of their health?

Answers

Some common physical injuries that gamers may face include:

Carpal Tunnel SyndromeEye StrainBack and Neck PainRepetitive Strain Injuries (RSIs)

ii) The mental/cognitive/emotional challenges are:

Addiction:Social IsolationPoor Sleep PatternsAttention and Concentration Issues

What are the mental/cognitive/emotional challenges

Chronic micro traumas are caused by excessive gaming/tech use, leading to repetitive stress injuries. Gamers may face physical injuries like Carpal Tunnel Syndrome, which causes pain, numbness, and tingling in the hand and arm due to repetitive wrist.

Common challenges related to gaming or excessive technology use include addiction, which interferes with daily life. Excessive screen time may cause social isolation. Late-night gaming or excessive screen time before bed can disrupt sleep, causing insomnia or poor sleep quality.

Learn more about   emotional challenges from

https://brainly.com/question/26162044

#SPJ1

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called.

Answers

Python first compiles your source code (. py file) into a format known as byte code . Compilation is simply a translation step and byte code is a lower level and platform-independent representation of your source code

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

The line of code returns the ASCII code.

ASCII, has the full form American Standard Code for Information Interchange. It consists of a 7-bit code in which every single bit represents a unique alphabet.

Python is a high-level computer programming language. It is dynamically used.

First, it does a compilation for a file with the extension `.pyc`

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

Learn more about Python code here:

https://brainly.com/question/34746850.

#SPJ3

Which of the following will NOT correctly increment the value by one of a previously initialized integer variable named counter?


counter + 1;

counter++;

counter = counter + 1;

counter += 1;

All of the above will correctly increment the value by one.

Answers

counter + 1; will raise the value by one but it will not set the value of counter to itself + 1, therefore,

counter + 1; is the correct answer

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

What process should be followed while giving a reference?
sam

Answers

Keep the information factual. Avoid opinions about issues such as personal conflicts
Qualify what you say. For example, “It was our experience or “In this situation
Make your praise specific. ...
Refer to specific tasks or projects
Avoid examples that highlight a candidate's weaknesses.

How would you test a computer program?

releasing the program and waiting for user input
running the program with test data to see if outcomes are as expected
seeing how fast the program runs

rethinking the logic of the program code

Answers

To test a computer program, you would run the program with test data to see if the outcomes are as expected. Option B is answer.

Testing a computer program is an essential step in software development to ensure its functionality and identify any issues or bugs. One way to conduct testing is by running the program with predefined test data and comparing the actual outcomes with the expected outcomes. This helps verify if the program behaves correctly and produces the desired results.

By designing comprehensive test cases that cover various scenarios and input values, developers can systematically evaluate different aspects of the program's functionality, including input validation, calculations, and output generation.

Option B is answer.

You can learn more about Testing at

https://brainly.com/question/29511803

#SPJ11

what is a wired network adapter with a port that resembles a telephone jack?

Answers

A wired network adapter with a port that resembles a telephone jack is called an RJ45 Ethernet adapter.

What is the name of the network adapter with a port that looks like a phone jack?

An RJ45 Ethernet adapter is a type of network adapter that is commonly used to connect devices to a wired network. This type of adapter has a port that resembles a telephone jack, but it is slightly wider and has more pins.

RJ45 Ethernet adapters are typically used to connect computers, routers, and other devices to a local area network (LAN), but they can also be used to connect to the internet through a modem or other network device.

Learn more about RJ45 Ethernet adapter

brainly.com/question/29716163

#SPJ11

Why are tables a good way for displaying data

Answers

Answer:

Tables are used to organize data that is too detailed or complicated to be described adequately in the text, allowing the reader to quickly see the results.

Explanation:

please make my answer as brainelist

if you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you viewing?

Answers

If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, you are most likely viewing a **dynamic webpage**.

Dynamic webpages are generated on the server-side in response to user requests or specific conditions. These pages are not pre-built and stored as static files but are generated dynamically based on various factors such as user preferences, database information, or real-time data. Dynamic webpages can incorporate interactive elements, personalized content, and data that is constantly updated or customized based on user interactions or changing information.

In the case of a webpage displaying updated stock quotes, the content is dynamically generated and refreshed to provide real-time or near-real-time information. This allows users to view the most recent stock prices without manually refreshing the page.

Learn more about Dynamic webpages here:

https://brainly.com/question/14181873

#SPJ11

you are following the life cycle of an application in intune. you want to implement conditional access policies to limit unauthorized exposure to email and company resources. which phase are you implementing?

Answers

You are following the life cycle of an application in intune. By protecting phase you can implement conditional access policies to limit unauthorized exposure to email and company resources.
As technology advances, the world of work also changes.  One of them is the increasing popularity of the term modern workplace.  Modern workplace itself is a term used to define companies that use digital collaboration by using technology in their work processes.
To support this modern workplace , you need lots of components.  One way is to choose the right collaboration application.  Microsoft Intune is one of the best options available today.
How Microsoft Intune Can Help You Create a More Dynamic Workspace
Microsoft Intune is a cloud-based service that focuses on Mobile Device Management and Mobile Application Management (MAM).  Intune is included in the Microsoft Enterprise Mobility + Security (EMS) package which allows users to remain productive while protecting all data to keep it safe.
Learn more about intune at https://brainly.com/question/14799487.
#SPJ4

Sql is usually used as a procedural language: group of answer choices true false

Answers

The given statement exists false. Users specify what they want done in SQL, which is a non-procedural language, and the SQL language compiler automatically creates a procedure to access the database and carry out the requested action.

What is meant by SQL?

SQL is a domain-specific language that programmers use to manage data in relational databases and for stream processing in relational data stream management systems.

Practically any organization that wishes to store relational data can use SQL because it is the most popular database language. SQL queries can be used to get data from the database, albeit the efficacy of the queries vary.

One of the easiest languages to learn, SQL has ideas, syntax, queries, and data formats that are easy to remember. It also has name-dependent functions. In other words, you wouldn't be confused by any table or function concepts, and knowing the several important RDBMS tools makes it much more exciting.

Users specify what they want done in SQL, which is a non-procedural language, and the SQL language compiler automatically creates a procedure to access the database and carry out the requested action.

To learn more about procedural language refer to:

https://brainly.com/question/14784018

#SPJ4

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

Other Questions
What tool is used to determine the probabilities of different genetic outcomes from various crosses? PLEASE HELP ASAP WILL MARK BRAINLIEST Lakeview Company completed the following two transactions. The annual accounting period ends December 31 a. On December 31, calculated the payroll, which indicates gross earnings for wages ($80,000), payroll deductions for income tax ($8,000), payroll deductions for FICA ($6,000), payroll deductions for American Cancer Society ($3,000), employer contributions for FICA (matching), and state and federal unemployment taxes ($600). Employees were paid in cash, but payments for the corresponding payroll deductions have not yet been made and employer taxes have not yet been recorded b. Collected rent revenue of $6,000 on December 10 for office space that Lakeview rented to another business. The rent collected was for 30 days from December 11 to January 10 and was credited in full to Unearned Rent Revenue Required 1. & 2. Complete the required journal entries for the above transactions as shown below () Prepare the entries required on December 31 to record payroll. (i) Prepare the journal entry for the collection of rent on December 10 (iii) Prepare the adjusting journal entry on December 31 (Do not round intermediate calculations. If no entry is required for a transaction/event, select "No Journal Entry Required" in the first account field.) View transaction list Journal entry worksheet 2 4 Record the wages expense, including payroll deductions Note: Enter debits before credits. Date General Journal Debit Credit December 31 What percent ionization would be expected for a 0.400 M HN3(aq) solution at 25 C? Ka= 1.9x10-5 14. A diprotic acid, H2A, has values of Kai = 1.0x10-5 and Kaz = 1.0*10-10 at 25 C. In a 0.10 M aqueous solution of HA, what is the concentration of the anion A2-? A battery of survey questions asked of a representative sample of individuals, is a? Aniline is to be cooled from 200 to 150F in a double-pipe heat exchanger. For cooling, a stream of toluene amounting to 8600 lb/hr at a temperature of 100Fis available. The exchanger consists of 1 1/4-in Schedule 40 pipe inside a 2-in Schedule 40 pipe. The aniline flow rate is 10,000 lb/hr. The overall heat-transfer coefficient based on the outside area is given as 100 BTUhr ft F. (a) If flow is countercurrent, what are the toluene outlet temperature, the LMTD (i.e. ATLM), and the heat transfer area needed to do this job? (b) What are they if flow is parallel? You need to look up any physical properties that are required. Given the function what are the following values? Square A is a dilation of Square B. What is the scale factor? which consumes the least amount of energy per day? what is the molarity of a hcl solution prepared by dissolving 0.165 moles of hcl in sufficient water to producea 200. ml solution? learning curve chapter 20 which group experienced the biggest loss in the presidential election of 1896? A small unit of heredity that stores a single trait is a chromosome. T or F Does any know how to do paragraph proofs? what is the difference between weight and mass? A. weight depends on gravity and mass is constant B. Mass depends on gravity in Weight is constant C. weight depends on density and mass depends on gravity or D. Weight depends on gravity and mass depends on volume Calcium hydride reacts with water to form calcium hydroxide(aqueous) and hydrogen gas.How many grams of calcium hydride are needed to form 4.850 gg ofhydrogen gas?Express your answer using four si This mortuary temple was built by Hatshepsut, the first recorded female ruler in history. It is distinctive for its alignment along a central axis, and its use of two impressive __________ in the front. Find the average of the numbers 9 5/9 , 7 2/9 , 2 7/36 4 3/4. use the drop-down menu to complete the statement. the government of the was made up of independent city-states. Can hard water damage glass? How was america transformed from a peacetime to a wartime economy.