which of the following is not a recognized theory of copyright infringement? group of answer choices equivalence vicarious infringement direct infringement indirect infringement

Answers

Answer 1

Equivalence is not a recognized theory of copyright infringement.

What is copyright infringement?In general, copyright infringement happens when a work protected by a copyright is reproduced, distributed, performed, publicly exhibited, or transformed into a derivative work without the owner's consent.Copyright protection must meet three fundamental criteria: it must be an original work of authorship, fixed in a physical medium of expression, and be a work of authorship.The two most prevalent forms of copyright infringement plagiarism are image and text. No matter if they are used in academic papers, song lyrics, or stock pictures, utilising them without the owner's consent typically constitutes copyright infringement.Unauthorized downloading or uploading of a work protected by copyright is illegal. Criminal sanctions for willful copyright infringement include up to a five-year jail sentence and fines of up to $250,000. Civil judgements may also be obtained for violations of copyright.

Learn more about copyright infringement refer to :

https://brainly.com/question/14855154

#SPJ1


Related Questions

Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income

Answers

Answer:

distance

capacity

smoothness

thickness

capacity, smoothness, thickness, distance, income

Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a VendingMachine object that performs the following operations:

Purchases input number of drinks Restocks input number of bottles.
Reports inventory Review the definition of "VendingMachine.cpp" by clicking on the orange arrow.
A VendingMachine's initial inventory is 20 drinks.

Ex: If the input is: 5 2
the output is: Inventory: 17 bottles

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

class VendingMachine {

 public:

   int initial = 20;};

int main() {

 VendingMachine myMachine;

   int purchase, restock;

   cout<<"Purchase: ";  cin>>purchase;

   cout<<"Restock: ";  cin>>restock;

   myMachine.initial-=(purchase-restock);

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

Explanation:

This question is incomplete, as the original source file is not given; so, I write another from scratch.

This creates the VendingMachine class

class VendingMachine {

This represents the access specifier

 public:

This initializes the inventory to 20

   int initial = 20;};

The main begins here

int main() {

This creates the object of the VendingMachine class

 VendingMachine myMachine;

This declares the purchase and the restock

   int purchase, restock;

This gets input for purchase

   cout<<"Purchase: ";  cin>>purchase;

This gets input for restock

   cout<<"Restock: ";  cin>>restock;

This calculates the new inventory

   myMachine.initial-=(purchase-restock);

This prints the new inventory

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

Why is it useful to teach Karl new commands

Why is it useful to teach Karl new commands

Answers

Answer:

It's important to teach karl more commands so karl can do more tasks and create more complex algorithms

Explanation:

it’s useful because they would know what to do when you say something . example of you say turn left they would not know what to do because they have not been taught . that’s why you should teach them new commands .

Which devices are separate pieces that when combined together make a desktop computer? Choose five answers. 0000 Scanner Monitor Keyboard Stylus External speakers Mouse Tower​

Answers

There are five devices that, when combined together, make a desktop computer. These devices include a tower, monitor, keyboard, mouse, and external speakers.

The tower, also known as the computer case or CPU, is the main component that houses the motherboard, power supply, and other important hardware components. It is responsible for processing and storing data.

The monitor is the visual display unit that allows users to see and interact with their computer. It can come in various sizes and resolutions, depending on the user's needs.

The keyboard and mouse are input devices that allow users to input data and interact with their computer. The keyboard is used to type text and commands, while the mouse is used to navigate and select items on the screen.

Lastly, external speakers can be added to a desktop computer to enhance the audio experience. They allow users to hear music, sound effects, and other audio elements more clearly.

Overall, these five devices work together to create a fully functional desktop computer. While there are other optional components that can be added, such as a scanner or stylus, these five devices are essential for any desktop setup.

For more such questions on desktop, click on:

https://brainly.com/question/29921100

#SPJ11

Which of the following describes the phishing
of it up information security crime

Answers

Pretending to be someone else when asking for information

What is phishing?

A method wherein the criminal poses as a reliable person or respectable company in order to solicit sensitive information, such as bank account details, through email or website fraud.

Attackers create phony emails that contain harmful links. Once the victim clicks the link and enters their credentials, the attacker can use those credentials to gain illegal access. Consequently, the victim is phished.

Phishing is a dishonest method of obtaining sensitive information by posing as a reliable organization. Similar to any other form of fraud, the offender can do a great deal of harm, especially if the threat continues for a long time.

To learn more about phishing refer to:

https://brainly.com/question/23021587

#SPJ9

A developer wants to take existing code written by another person and add some features specific to their needs. Which of the following software licensing models allows them to make changes and publish their own version?


Open-source


Proprietary


Subscription


Software-as-a-Service (SaaS)

Answers

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

There are different types of loops in C#. Some are "Entry Controlled Loops", meaning that the evaluation of the expression that determines if the body of the loop should execute, happens at the beginning before execution of the body. Which types of loops are "Entry Controlled Loops"?

Answer Choices Below

While loops are the only example of entry controlled loops.


While and For loops are the two examples of entry controlled loops.


Do/While loops are the only entry controlled loops because they enter the body first which controls the loop.


For loops are the only example of entry controlled loops.

Answers

Answer:

While and for loops are the two examples of entry controlled loops.

Explanation:

Entry controlled loop is the check in which it tests condition at the time of entry and expressions become true. The loop control is from entry to loop so it is called entry controlled loops. Visual basic has three types of loops, next loop, do loop and while loop. Entry control loop controls entry into the loops. If the expression becomes true then the controlled loops transfer into the body of the loop.

What is a complier in computers

Answers

Answer:

Explanation:

A compiler is a computer program that translates source code into object code.

You are given an initially empty queue and perform the following operations on it: enqueue (B), enqueue (A), enqueue(T), enqueue(), dequeue(), dequeue(), enqueue (Z), enqueue(A), dequeue(), enqueue(1), enqueue(N), enqueue(L), dequeue(), enqueue(G), enqueue(A), enqueue(R) enqueue(F), dequeue), dequeue(). Show the contents of the queue after all operations have been performed and indicate where the front and end of the queue are. Describe in pseudo-code a linear-time algorithm for reversing a queue Q. To access the queue, you are only allowed to use the methods of a queue ADT. Hint: Consider using an auxiliary data structure.

Answers

Reversing a queue Q in linear time: ReverseQueue(Q): stack = []; while Q: stack.append(Q.pop(0)); while stack: Q.append(stack.pop()).

After performing the given operations on the initially empty queue, the contents of the queue and the positions of the front and end of the queue are as follows:

Contents of queue: T Z 1 A G A R F

Front of queue: points to the element 'T'

End of queue: points to the element 'F'

To reverse a queue Q in linear time, we can use a stack as an auxiliary data structure. The algorithm will work as follows:

Create an empty stack S.Dequeue each element from the queue Q and push it onto the stack S.Once all elements have been pushed onto the stack S, pop each element from the stack S and enqueue it back onto the queue Q.The elements of the queue Q are now in reversed order.

Pseudo-code for the algorithm is as follows:

reverseQueue(Q):

   create a stack S

   while Q is not empty:

       x = dequeue(Q)

       push(S, x)

   while S is not empty:

       x = pop(S)

       enqueue(Q, x)

This algorithm reverses the order of the elements in the queue in linear time O(n), where n is the number of elements in the queue.

Learn  more about algorithm here:

https://brainly.com/question/17780739

#SPJ4

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

Media plays an important role in shaping the socio-economic mind set of the society. Discuss the adverse impact of the today's media technologies when compared to the traditional methods.

Answers

While today's media technologies offer unprecedented access to information, they also come with adverse effects. The proliferation of misinformation, the culture of information overload, and the reinforcement of echo chambers all contribute to a negative impact on the socio-economic mindset of society when compared to traditional media methods.

Today's media technologies have undoubtedly revolutionized the way information is disseminated and consumed, but they also bring adverse impacts when compared to traditional methods.

One significant drawback is the rise of misinformation and fake news. With the advent of social media and online platforms, anyone can become a content creator, leading to a flood of unverified and inaccurate information.

This has eroded trust in media sources and has the potential to misinform the public, shaping their socio-economic mindset based on falsehoods.

Additionally, the 24/7 news cycle and constant access to information through smartphones and other devices have created a culture of information overload and short attention spans.

Traditional media, such as newspapers and magazines, allowed for more in-depth analysis and critical thinking. Today, the brevity of news headlines and the focus on sensationalism prioritize clickbait and catchy content over substantive reporting.

This can lead to a shallow understanding of complex socio-economic issues and a lack of nuanced perspectives.

Furthermore, the dominance of social media algorithms and personalized news feeds create echo chambers, reinforcing existing beliefs and biases.

This hampers the exposure to diverse viewpoints and reduces the potential for open dialogue and understanding among individuals with different socio-economic backgrounds.

For more such questions on proliferation,click on

https://brainly.com/question/29676063

#SPJ8

Please could you help me
Task 4
Decode this:
010010010110011000100000011110010
110111101 10101001000000110001101
1000010110111000100000011110011​

Answers

Answer:

is this a among us reference oooorr...... im confused. are u being frfr ...?

Explanation:

Answer:

hmmmm its decode

Explanation:

decode

Data for each typeface style is stored in a separate file.
a. True
b. False

Answers

Data for each typeface style is stored in a separate: a. True.

What is a typeface?

In Computer technology, a typeface can be defined as a design of lettering or alphabets that typically include variations in the following elements:

SizeSlope (e.g. italic)Weight (e.g. bold)Width

Generally speaking, there are five (5) main classifications of typeface and these include the following:

SerifSans serifScriptMonospacedDisplay

As a general rule, each classifications of typeface has its data stored in a separate for easy access and retrieval.

Read more on typeface here: https://brainly.com/question/11216613

#SPJ1

It is important to know who your audience is and what they know so that you can tailor the information to the audience’s needs. True or false PLEASE HURRY!!!!

Answers

this is a true statement
True feedback is very important so you know what to give the audience

Using WEKA software, answer the following questions based on the Phishing dataset provided.
a) Draw a simple confusion matrix (general one, not from WEKA) of the possible data scenarios for this
Phishing dataset. (0.5 Mark)
b) Draw a table that will outline the Accuracy, Precision, Recall, F-Measure, ROC Area of the following
Rules based algorithms; RIPPER (JRip), PART, and Decision Table (2 Marks)
c) Use Decision Trees algorithms (Random Forest, Random Tree) and Artificial Neural Network
(Multilayer Perceptrol) to compare with the results in part b) above. Do you have better prediction
accuracy with these in this dataset? (2 Marks)
d) What is your conclusion in these experiments pertaining to ML algorithms used? (0.5 Mark)

Answers

Answer:

This isn’t a difficult question, its a task

Explanation:

Using WEKA software, answer the following questions based on the Phishing dataset provided.a) Draw a

Can someone please help me with this?

Answers

Answer:

no

Explanation:

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

FILL IN THE BLANK. a __ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.

Answers

A personal area network (PAN) is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.

A personal area network (PAN) is a type of wireless network that provides connectivity between devices in close proximity to each other, typically within a range of 10-meters. PANs are typically used for personal, non-commercial purposes and connect devices such as cell phones, headsets, personal digital assistants (PDAs), game controllers, and other small, portable devices.

PANs typically use low-power, short-range technologies such as Bluetooth, Infrared Data Association (IrDA), or Zigbee to establish connectivity. These technologies allow devices to communicate with each other wirelessly, eliminating the need for cords and cables and making it easier to connect and use the devices.

One of the main benefits of PANs is their simplicity and convenience. They allow you to quickly and easily connect devices in close proximity, eliminating the need for manual configuration or setup. Additionally, they use very low power, making them ideal for use with battery-powered devices.

Overall, PAN are a useful technology for individuals and small groups who need to connect their devices in close proximity for personal, non-commercial purposes.

Learn more about personal area network (PAN) here:

https://brainly.com/question/14704303

#SPJ4

FILL IN THE BLANK. ___ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

Answers

Prototyping

Design teams experiment by turning creative ideas into physical prototypes, which might span from paper to digital. Again for purpose of capturing design concepts and user testing, work together to develop prototypes with varied levels of realism.

What is Prototyping?

Prototyping is the process of creating a scaled-down or preliminary version of a product. This can be done by making a working model or a simulation of the product’s features and functions. Prototyping allows companies to test the viability of a product before investing the resources necessary to develop the full version. This process can help identify design flaws, user interface issues, or usability problems that may not have been obvious in the early design stages. By creating a prototype, companies can make sure their final product meets customer expectations. Additionally, it can provide valuable user feedback and improve the overall quality of the product.

To know more about Prototyping

brainly.com/question/7509258

#SPJ4

Which of these statements are true about managing through Active Directory? Check all that apply.

Answers

Answer:

ADAC uses powershell

Domain Local, Global, and Universal are examples of group scenes

Explanation:

Active directory software is suitable for directory which is installed exclusively on Windows network. These directories have data which is shared volumes, servers, and computer accounts. The main function of active directory is that it centralizes the management of users.

It should be noted thst statements are true about managing through Active Directory are;

ADAC uses powershellDomain Local, Global, and Universal are examples of group scenes.

Active Directory can be regarded as directory service that is been put in place by  Microsoft and it serves a crucial purpose for Windows domain networks.

It should be noted that in managing through Active, ADAC uses powershell.

Therefore, in active directory Domain Local, Global, and Universal are examples of group scenes .

Learn more about Active Directory  at:

https://brainly.com/question/14364696

Which of the following IPv4 addresses is a public IP address?

Answers

An example of Pv4 addresses that is a public IP address is

An example of a public IPv4 address is "8.8.8.8". This is a public IP address that is assigned to one of Go ogle's DNS servers. Any device connected to the Internet can use this IP address to resolve domain names and access websites.

What is the IP address about?

A public IP address is a globally unique IP address that is assigned to a device or computer that is connected to the Internet. Public IP addresses are used to identify devices on the Internet and are reachable from any device connected to the Internet.

On the other hand, private IP addresses are used within a local area network (LAN) or within a private network, and are not reachable from the Internet.

They are used to identify devices within a local network, such as a home or office network. Private IP addresses are not unique and can be used by multiple devices within a LAN.

Learn more about IP addresses from

https://brainly.com/question/30018838

#SPJ1

how much time does a computer take to big calculations ?​

Answers

Answer:

There are many different calculations that a computer can do, and it really depends on which type of computer you are using and how big the digits are, Eg. it takes 21 for an average computer at home to calculate a square root of a number with a million digits or so.

Hope My Answer Helps :)

What is system analysis and design?

Answers

Answer:

According to the Merriam-Webster dictionary, studying an activity (such as a procedure, a business, or a physiological function) typically by mathematical means in order to define its goals or purposes and to discover operations and procedures for accomplishing them most efficiently"

According to the freedictonary, "the preparation of an assembly of methods, procedures, or techniques united by regulated interaction to form an organized whole".

what do you type in the terminal then? for c++ 4-4 on cengage

Answers

In this exercise we have to use the knowledge of computational language in C++ to write a code that  write my own console terminal in C++, which must work .

Writting the code:

int main(void) {

   string x;

   while (true) {

       getline(cin, x);

       detect_command(x);

   }

   return 0;

}

void my_plus(int a, int b) {

   cout << a + b;

}

void my_minus(int a, int b) {

   cout << a - b;

}

void my_combine(string a, string b) {

   ?????????????;

}

void my_run(?????????) {

   ???????????;

}

void detect_command(string a) {

   const int arr_length = 10;

   string commands[arr_length] = { "plus", "minus", "help", "exit" };

   for (int i = 0; i < arr_length; i++) {

       if (a.compare(0, commands[i].length(), commands[i]) == 0) {

           ?????????????????????;

       }

   }

}

See more about C++ at brainly.com/question/19705654

#SPJ1

what do you type in the terminal then? for c++ 4-4 on cengage

The Internet emerged as a new medium for visualization and brought all the following EXCEPT Group of answer choices new forms of computation of business logic. worldwide digital distribution of visualization. new graphics displays through PC displays. immersive environments for consuming data.

Answers

The Internet emerged as a new medium for visualization and brought all the following EXCEPT : Computation of business logic.

What is business logic?

Business Logic refers to a series of algorithms that are the basis of different business software. The aim of business logic is the implementation of higher-level algorithms to process data hence generate precise output.

The Internet did not bring business logic to the surface but the implementation of Information Technology (IT) to business.

Hence, the Internet emerged as a new medium for visualization and brought all the following except computation of business logic.

Learn more internet here : https://brainly.com/question/97026

what is the keyboard shortcut to display formulas on the worksheet

Answers

the keyboard shortcut is c=8

Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.

Answers

To revise the banking program so that it runs continuously for any number of accounts, we need to modify the existing code to incorporate a looping mechanism. The loop should execute continuously while the balance entered is not negative, and it should perform the calculation of the fee and prompt the user for the balance for the next account.

One approach could be to use a while loop that continues to iterate as long as the balance entered is greater than or equal to 0. Within the while loop, we can perform the calculation of the fee and prompt the user for the balance for the next account. After the calculation of the fee and prompt for the next balance, the program should retrieve the new balance entered by the user and update the loop condition accordingly.

To ensure the program runs continuously for any number of accounts, we need to make sure that the loop continues to execute until a balance less than 0 is entered by the user. This can be achieved by using a conditional statement within the while loop that checks if the balance entered is less than 0. If the balance is less than 0, the program can break out of the while loop and proceed to the end-of-job module.

In the end-of-job module, the program can perform any necessary cleanup tasks, such as printing the final results or saving the data to a file. Once the end-of-job module has executed, the program can end.

In conclusion, by modifying the existing code to incorporate a looping mechanism and performing the necessary calculations and prompts within the loop, we can revise the banking program so that it runs continuously for any number of accounts. The end-of-job module can then execute after a balance less than 0 is entered, bringing the program to a clean end.

Here is an example of what the revised banking program could look like in Python:

balance = float(input("Enter the balance for the first account: "))

while balance >= 0:

   fee = 0.0

   if balance < 1000:

       fee = 10.0

   else:

       fee = 5.0

   

   balance -= fee

   print("The balance after fee: ", balance)

   balance = float(input("Enter the balance for the next account: "))

print("End of Job")

In this example, the first balance is retrieved from the user, and the while loop is executed as long as the balance entered is greater than or equal to 0. Within the while loop, the fee calculation is performed, the balance is updated after the fee is deducted, and the user is prompted for the balance for the next account. The program continues to execute the while loop until a balance less than 0 is entered by the user, at which point the program breaks out of the loop and executes the end-of-job module.

Here is an example of what the revised banking program could look like in Java:

import java.util.Scanner;

public class BankProgram {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       double balance = 0.0;

       System.out.print("Enter the balance for the first account: ");

       balance = sc.nextDouble();

       

       while (balance >= 0) {

           double fee = 0.0;

           if (balance < 1000) {

               fee = 10.0;

           } else {

               fee = 5.0;

           }

           balance -= fee;

           System.out.println("The balance after fee: " + balance);

           System.out.print("Enter the balance for the next account: ");

           balance = sc.nextDouble();

       }

       System.out.println("End of Job");

   }

}

In this example, the first balance is retrieved from the user using a Scanner object, and the while loop is executed as long as the balance entered is greater than or equal to 0. Within the while loop, the fee calculation is performed, the balance is updated after the fee is deducted, and the user is prompted for the balance for the next account. The program continues to execute the while loop until a balance less than 0 is entered by the user, at which point the program breaks out of the loop and executes the end-of-job module.

In this assignment, you will need to design a complete Black-Box testing plan for the following program. A computer science student has to travel from home to ODU every day for class. After showing up to class late too many times due to traffic, the student made a program to tell him when he should leave the house. The time given depends on the class time and the day of the week.

He came up with a few rules to make sure he gets to class on time.
The normal drive time for this student is 30 minutes without traffic. He then gives himself 5 minutes to walk across campus to class from the parking lot.
However, if he leaves home during the worst morning rush hour, from 6 AM - 7 AM on a weekday, he needs to add 20 minutes to his commute to account for traffic. If he leaves home during the regular morning rush hour, from 7 AM - 8 AM on a weekday, he needs to add 10 minutes to his commute to account for traffic.
Mondays have the worst morning traffic, and he should instead add 30 minutes for 6 AM-7AM and 20 minutes for 7 AM – 8 AM.
On Saturdays and Sundays the student needs to take a different route due to road construction. This adds 6 minutes of travel time.
If he leaves during the afternoon rush hour on a weekday, traffic from 4-6PM should add 15 minutes of travel time. Traffic in the afternoon is worst on Thursdays, and should instead add 20 minutes of travel time.
If the class is between 9:30 AM and 11 AM he needs to arrive 10 minutes earlier for walking time because the closest parking lots are all full.
The program will read data from the screen in the following format:

Day_of_the_week hours:minutes AM/PM
e.g.
Tuesday 12:45 AM
Sunday 01:52 PM
If the input is not in the correct format the program will prompt the user again for the input. The program is not case sensitive. The hours and minutes can be a single digit or two digits, but the minutes must be 2 digits.

Answers

Answer: sorry i need points to ask a question hope u understand...

Explanation:

Which goal of design theory can be described as the proper distribution

Answers

The answer is balance

The transmit power of a TV satellite is 40 W and the diameter of the parabolic antenna at the transmit antenna is 80 cm. The diameter of the parabolic antenna at the receiver is 120 cm. Distance from the satellite to the earth is 40 000 km, frequency is 11.5 GHz. Given that both antenna efficiencies are equal to nt = nr = 0.7, how many dBm is the signal received by the receive antenna? (Hint the antenna aperture of a parabolic antenna with diameter D is given by
(pi × D^2 )/4​

Answers

Answer:

Explanation:

.

I don’t know the answer I’m sorry maybe nextime
Other Questions
Are historical documents as Importanttoday as they were when they werewritten?A) Yes. Documents like the Constitutionprovide guidance and a vision for us tostrive toward.B) Maybe. There might be some benefitsfrom referencing historical documents,but we need to create new visions for thefuture.C) No. Historical documents have becomeirrelevant today because the people whowrote them could not predict howtechnology and society would change. Here are two similar rectangles.4 cm4.8 cm7 cmWork out the area of the larger rectangle. how much work must you do to push a 10.0 kg block of steel across a steel table ( k = 0.60) at a steady speed of 1.10 m/s for 7.10 s ? This type of bike tire is thinner, lighter, more expensive, and punctures easily.A. ClinchesB. Tubular15 POINTS! I will give Brainliest. b. (10% points) Select ONLY the necessary requirements (or assumptions) met in this analysis to confirm that our results from the one-sample t procedures are valid. There is a random sample of data. There is NO random sample of data. The sample is large enough. It is given that the population has a Normal distribution. The histogram and boxplot shows it is safe to assume sample is selected from a population with a Normal distribution. The boxplot shows the sample has no outliers. None of these. c. (5% points) Do your conclusions based on confidence interval and p-value indicate the same thing? Yes, because we use matching confidence level and significance level. O No, they don't have to be same. Allowing the virginia plan as well as the new jersey plan to determine the structure of congress resulted in a . 3. Sam's farm has cows and chickens. If he was a total of 35 cows and chickens and a total of 104 legs.How many cows and chickens are on his farm?a. Write the system of equations. Be sure to define your variables.b. Solve. What form of bullying uses the Internet, cell phones, or social media to humiliate someone?techno-bullyingcyberbullyingbot-bullyingcompubullying Clarisa is reading an article about a middle school boy who is raising money for his schools sports department. She remembers hearing an interview about a middle school student in a different country who is raising money to fix his schools roof. How does she establish a text-to-world connection? A trip to St. Louis from Atlanta will take 7 hours. Assuming you're two-thirds of the way there, how much longer, in hours, will the trip take? A city has 18 radio stations, including 9 oldies stations.What is the probability that a randomly chosen radio station in this city is an oldies station?Write your answer as a fraction or whole number. A 0.05 kg ball moving at 25 m/s In response to calls from the radio and advertising industries for Arbitron to provide more detailed measures of radio audiences, Arbitron introduced the ________. This wearable, page-size device electronically tracks what consumers listen to on the radio by detecting inaudible identification codes that are embedded in the programming:a. AQH RTGb. RADARc. Cumed. PPMe. AQH SHR The cultural mandate is very similar to . What was the Roman empire's views on Christianity at various points in its history? What caused them to change over time? PLS HELP. (19 POINTS IF DO!!!!) EXPLAIN. Which of the following best describes the Supreme Court ruling in the case of Worcester v. Georgia?A. The Cherokee are not a sovereign nation and must abide by the laws of the state of Georgia and the United States Government. B. The Cherokee are a sovereign nation and as such are not bound by the laws of the state of Georgia or the United States Government. C. The Cherokee are a nuisance and must be relocated to Indian Territory.D. The Cherokee are not citizens of the United States and have no right to sue the state of Georgia. A paint mixer wants to mix paint that is 15% gloss with paint that is 30% gloss to make 5 gallons of paint that is 20% gloss. How many gallons of each paint should paint mixer mix together? The paint mixer should use 2 gallons of 15% gloss paint and 3 gallons of 30% gloss paint. The paint mixer should use 3 gallons of 15% gloss paint and 2 gallons of 30% gloss paint. ____________ artists used characteristic methods of a discipline to criticize the discipline itself, not to subvert it but to entrench it more firmly in its area of competence.A. PostcolonialB. IndustrialC. ModernistD. Psychoanalytic how did the murder of Caesar affected cleopatra Graph the hyperbola Y^2/16 - x^2/ 9= 1 What type of transverse axis does it have?