a homeowner arrives at home in the evening. a timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. she unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. what is an example of internet of things (iot) technology in this scenario?

Answers

Answer 1

Security is the factor Sara needs to think about when configuring her IoT lights. This scenario suggests that she most likely has obsessive-compulsive disorder.

This is known as the procedure for protecting connected networks and Internet devices from attacks and data breaches. This is frequently accomplished by shielding the gadgets from security threats. Keep in mind that security is a factor that Sara should think about when configuring her IoT lighting, and if it is secured, her mind will be at ease from any type of malware attack. Obsessive-compulsive disorder (OCD) is an anxiety condition in which a person is motivated to repeatedly do an action due to recurrent, unwelcome thoughts, ideas, or feelings (obsessions). Many people engage in repetitive habits or have focused thinking.

Learn more about IoT here:

https://brainly.com/question/27379923

#SPJ4


Related Questions

2 points
1. Which characters are normally used to represent the root of the Floppy
disk drive? *
a) C1
b) A:
c) B:
d) D:
points

Answers

Answer:

B) A:

Explanation:

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

i finished all my final exams 100 on math 100 on science and 94 on language arts.

Answers

Answer:

GOOOD JOBBB !! congrats :D

Explanation:

Answer:

hmmm

Explanation:

I think 294 cause it makes since

What are limiting factors and carrying capacity?

Answers

Hope this helps sorry if it does not
What are limiting factors and carrying capacity?

Below Are Two Series Of Data Of Yields From Two Cotton Farms That Farmer Pat Farms. You Will Use These Data In Your Analysis

Answers

To conduct the analysis, the two series of data on yields from two cotton farms operated by Farmer Pat will be utilized.

1. Data Comparison: The first step in the analysis would involve comparing the yields from the two cotton farms. This would include examining the numerical values of the yields for each farm, identifying any patterns or trends, and noting any significant differences or similarities between the two series of data.

2. Statistical Analysis: The next step would involve applying statistical techniques to the data. Descriptive statistics, such as calculating means, standard deviations, and ranges, can provide insights into the central tendency and variability of the yields for each farm. Additionally, inferential statistics, such as hypothesis testing or confidence intervals, can be employed to determine if there is a significant difference in yields between the two farms.

3. Interpretation and Conclusion: The final step would involve interpreting the results obtained from the analysis and drawing conclusions. This would include discussing the findings, highlighting any statistically significant differences or similarities in yields between the two farms, and offering insights into potential factors contributing to the observed outcomes.

By conducting a thorough analysis of the data on yields from the two cotton farms, Farmer Pat can gain valuable insights into the performance and productivity of each farm. This information can inform decision-making processes related to resource allocation, farming practices, and optimization strategies.

Learn more about series of data

brainly.com/question/32108761

#SPJ11

what information is provided by a convective outlook (ac)?

Answers

A convective outlook provides information about the potential for severe weather, including the risk of thunderstorms, tornadoes, and other convective phenomena, over a specific area and time period.

Convective outlooks are issued by meteorological agencies, such as the Storm Prediction Center (SPC) in the United States, to communicate the level of risk and probability of severe weather occurrences. They typically classify the risk into different categories, such as "slight," "enhanced," "moderate," or "high," depending on the severity and coverage of the anticipated convective activity. The convective outlook takes into account various atmospheric conditions, such as instability, wind shear, moisture content, and synoptic-scale weather patterns, to assess the potential for severe thunderstorms and other convective events. This information helps the public, emergency management agencies, and meteorologists to better prepare for and respond to severe weather events.

Learn more about  risk of thunderstorms here;

https://brainly.com/question/31834813

#SPJ11

A radio station records an interview with a computer scientist using a computer and audio recording software. Explain how sampling is used to store audio recordings.

Answers

The way sampling is used to store audio recordings are:

Sound capture.converting digital signal.sound wave capture, etc.

How is sampling used to store audio recordings?

In this process,  sound is taken in by the use of a microphone and so it is later converted into a digital signal.

Note that an analogue-to-digital converter is often used to taken in or capture a sound wave at frequent  time intervals. This recording is then regarded as a sample and the data is stored in a file for future use.

Learn more about interview  from

https://brainly.com/question/8846894

#SPJ1

The way a text looks or is designed is its _____
A. content
B. format
C. analysis
D. inference

I think the answer is B, format, please correct me if I’m wrong

Answers

Answer:

The correct answer is B.) So you are correct.

B is the correct answer

Which of the following statements are true regarding cognitive impairments? Select 3 options.
Speech input devices help those who are cognitively impaired understand the contents of the screen.
Delivering content in different ways, such as using video, animations, and text, helps promote cognitive accessibility.
To improve cognitive accessibility, the developer should focus on a clear and consistent design.
Even though there are different causes for cognitive impairment, many of the resulting functional issues are similar.
Cognitive issues are learning disabilities caused by genetic disorders.

Answers

Answer:

The correct options are;

Delivering content in different ways, such as using video, animations, and text, helps promote cognitive accessibility

To improve cognitive accessibility, the developer should focus on a clear and consistent design

Even though there are different causes for cognitive impairment, many of the resulting functional issues are similar

Explanation:

Cognitive impairment is the condition of a person having difficulty in concentrating, learning, recalling from memory, or making functional decisions. Depending on the severity, cognitive impairment may be classified as severe or mild

Symptoms includes, loss of memory, asking the same questions or telling the same story frequently, unable to recognize people they already know, or places they have already been to, having problems with vision and being unable to plan or see tasks through

Answer:

The correct options are;

Delivering content in different ways, such as using video, animations, and text, helps promote cognitive accessibility

To improve cognitive accessibility, the developer should focus on a clear and consistent design

Even though there are different causes for cognitive impairment, many of the resulting functional issues are similar

Explanation:

Gives information on hurricane strength when storms are far from land. a. e. buoys b.c. dropsonde c. b. ASOS d. d. satellite e. a. radar

Answers

When storms are far from land, satellite provides valuable information on hurricane strength.

Satellites equipped with specialized sensors can observe hurricanes from space and provide crucial data on their characteristics, including cloud patterns, temperature gradients, wind speeds, and overall structure. These observations help meteorologists assess the strength and intensity of hurricanes, track their movement, and make predictions about potential impacts.

Satellite imagery allows for a comprehensive view of the storm's size and organization, enabling forecasters to analyze cloud formations, eye wall development, and other indicators of storm intensity. By monitoring changes in the storm's structure and cloud-top temperatures, meteorologists can estimate wind speeds and categorize hurricanes based on their strength, such as the Saffir-Simpson Hurricane Wind Scale.

Know more about satellite here:

https://brainly.com/question/28766254

#SPJ11

when coding an operative report, what action would not be recommended

Answers

When coding an operative report, it is not recommended to make assumptions or guess the codes without proper documentation or clear guidelines. This can lead to inaccurate coding and potential billing or reimbursement issues.

Coding an operative report requires careful review and analysis of the documentation provided. It is crucial to accurately assign the appropriate codes based on the documented procedures, diagnoses, and medical terminology. Making assumptions or guessing the codes without proper documentation can lead to incorrect coding, which can have various consequences. Firstly, inaccurate coding can result in claim denials or delays in reimbursement, as the codes may not align with the services provided. It can also lead to incorrect representation of the patient's condition and medical history, which can impact future medical decision-making and patient care.

Learn more Coding an operative here;

https://brainly.com/question/30550038

#SPJ11

Why are abbreviations like BRB, TBH, and IDK appropriate in some situations but not in others?

Answers

Answer: Depends on which situation

Explanation: When you are talking casually to your friends or someone close to you, it’s appropriate to say those abbreviation. But when you are talking to someone professional or your teacher, you shouldn’t talk in those  abbreviations. You should not talk in those abbreviations to elderly because they may not understand it.

This act creates a set of requirements that allow for insurance portability, significant provisions regarding "administrative simplification" and standards for "privacy and security."
a. Consumer Directed Health Plans
b. Health Insurance Portability Accountability Act
c. Healthcare Integrity and Protection Data Bank
d. Employee Retirement Income Security Act

Answers

The correct answer is: b. Health Insurance Portability Accountability Act (HIPAA).

HIPAA ensures that employees and their families who lose their job-based health insurance are able to continue their coverage through the Consolidated Omnibus Budget Reconciliation Act (COBRA). The act also introduced administrative simplification provisions to promote efficiency and cost savings in the healthcare system.

HIPAA creates a set of requirements that allow for insurance portability, includes significant provisions regarding "administrative simplification" and establishes standards for "privacy and security." The other options, such as Consumer Directed Health Plans, Healthcare Integrity and Protection Data Bank,

To know more about HIPAA visit:-

https://brainly.com/question/14308448

#SPJ11

The act that creates a set of requirements allowing for insurance portability, significant provisions regarding "administrative simplification," and standards for "privacy and security" is the Health Insurance Portability Accountability Act (HIPAA). HIPAA was signed into law in 1996 and aims to protect individuals' health information while also making it easier for them to switch health insurance plans and providers.

One significant provision of HIPAA is the establishment of national standards for electronic healthcare transactions and code sets, which aim to simplify the administrative process and reduce healthcare costs. Additionally, HIPAA created the Privacy and Security Rules, which require healthcare providers and insurance companies to protect patients' personal health information from unauthorized access and disclosure.

HIPAA also established the Healthcare Integrity and Protection Data Bank, which is a national database that tracks healthcare providers who have been convicted of fraud or abuse. Finally, while HIPAA is often associated with healthcare providers and insurers, it also has provisions that relate to employee benefits under the Employee Retirement Income Security Act (ERISA).

Overall, HIPAA is a complex law with far-reaching implications for the healthcare industry, patients, and employers.

To know more about Health Insurance Portability visit:

https://brainly.com/question/30677213

#SPJ11

Describe how computer simulations have helped to improve mathematical models and the significance they play in developing solutions.

Answers

Answer:

Kindly check explanation

Explanation:

Simulation means the act of using computer programs to generate a replica of real world or intended rela life application which are being tested, monitored and adjusted over time. Simulated models have played a huge role in developing solutions that have been built and refined by these simulation softwares such that it is much more easier to test these models before coming to make a real life match for it. This often save cost and offers a faster way of building models as there is no need for physical coupling before generating the model. In filed such as health, simulation models of body parts and other fragile areas can be made withoutvthe need for a real human during testing or building.

There are different functions of computer. Computer simulations have become a useful part of mathematical modelling because they help in the;

Mathematical modelling of a lot of natural systems that are found in physics, chemistry and biology.

Mathematical modelling of a lot of human systems such as those found in economics, psychology, and social science etc.

They have help us to have a preview or insight into the various work or operation of those systems.

Computer simulations that are build models in science, technology and entertainment has help to save time and money, and allow man to do things that would be impossible to do before.

Learn more about computer simulations from

https://brainly.com/question/24912812

who was the first woman to host a network news program solo?

Answers

Answer: Katie Couric

Explanation: On September 5, 2006, Katie Couric makes headlines—and TV history—with her highly publicized debut as the first female solo anchor of a weekday network evening news broadcast, CBS Evening News with Katie Couric.

THE BONUS QUESTION PART FOUR:

what is the most popular game that's lived for soo long

Answers

Answer:

Senet

Explanation:

Apply the default name for the rule (Gloria Vivaldi) and turn it on for current and future messages.

Answers

The steps to set up a rule with the default name "Gloria Vivaldi" in Microsoft Outlook is given below.

What are the steps needed?

Open Microsoft Outlook.

Click on the "File" tab and select "Manage Rules & Alerts."

Click on the "New Rule" button to create a new rule.

In the "Rules Wizard" window, select "Apply rule on messages I receive" and click "Next."

Choose the conditions that you want to apply to the rule, such as specific senders or keywords in the subject line. Click "Next" after making your selections.

Choose the action that you want the rule to perform, such as moving the message to a specific folder or marking it as read.

Click "Next" after making your selections.

In the "Step 2: Edit the rule description" section, give your rule a name, such as "Gloria Vivaldi." You can also add any exceptions to the rule in this section. Click "Finish" when you're done.

The rule will be applied immediately to any incoming messages that meet the conditions you specified. You can also choose to run the rule on your existing messages by selecting the "Run Rules Now" option in the "Rules and Alerts" window.

Learn more about Microsoft on:

https://brainly.com/question/29576990

#SPJ1

Write a program where you print this sequence.

1

3

5

7

9

Answers

init = 1

choice = int(input("How far into the sequence would you like to go to? "))

i = 0

while i < choice:

   print(init)

   init += 2

   i += 1

If you enter 5, you'll get 1,3,5,7,9. You can also go to whatever place in the sequence you want. I wrote my code in python 3.8. Hope this helps

Which of the following processor features used is MOST likely to dynamically reduce power consumption based on current operating conditions?
Overclocking
Throttling
Caching
Multi-core
Hyper-threading

Answers

The processor feature that is most likely to dynamically reduce power consumption based on current operating conditions is called Throttling.

Throttling is the process of dynamically reducing the power consumption of a processor based on current operating conditions. This can be achieved in a variety of ways, but the most common is through the use of frequency scaling. Frequency scaling adjusts the clock speed of a processor based on its workload, reducing the clock speed when the processor is idle and increasing it when it is under heavy load. Throttling can also be used to reduce the power consumption of other components in a computer system, such as the graphics card or hard drive. This is achieved through a variety of techniques, such as reducing the refresh rate of the display or placing the hard drive into a low-power mode when it is not in use. The purpose of throttling may vary depending on the specific scenario and requirements. Some common use cases of throttling include:

Bandwidth Throttling: In network communications, bandwidth throttling is used to limit the amount of data transfer or restrict the network speed for specific users, applications, or services. This helps to prevent network congestion, ensure fair usage, and prioritize critical traffic.

API Throttling: API throttling is used to limit the number of API requests that can be made within a certain time period. It helps to prevent abuse, protect server resources, and maintain overall system performance and stability. API providers may set different rate limits for different users or API endpoints.

CPU Throttling: CPU throttling, also known as dynamic frequency scaling, is a technique used to reduce the processing speed or clock frequency of a CPU. It is often employed in laptops, mobile devices, or servers to conserve power, reduce heat generation, and prevent overheating.

Application Throttling: Throttling can be implemented within software applications to limit certain operations or functionalities. For example, an application may throttle the rate of sending email notifications to prevent spamming or restrict the number of concurrent connections to a database to avoid overwhelming it.

Throttling mechanisms typically involve monitoring and enforcing predefined limits, such as data transfer rates, request rates, or resource usage thresholds. When the limits are reached, the throttling mechanism kicks in and slows down or restricts the flow of data or resources accordingly. Throttling helps to balance the utilization of resources, maintain system stability, and prevent resource exhaustion or performance degradation.

Learn more about power:https://brainly.com/question/11569624

#SPJ11

When running an MPI program with 10 processes that call MPI_Gather using the default communicator where each source process sends an array of 10 elements, how many elements does each destination process receive?

Answers

Each destination process receives a total of 100 elements. MPI_Gather is a collective communication routine in the Message Passing Interface (MPI) library that allows a group of processes to gather data from all processes in the group to a single process.

In the case of 10 processes calling MPI_Gather with each source process sending an array of 10 elements, the destination process will receive the concatenated data from all processes, resulting in a total of 100 elements. The destination process does not receive any data directly from the source processes, but rather receives the combined data from all source processes through the MPI_Gather operation. The order in which the source processes send their data is determined by their process rank in the default communicator, which is typically determined by the order in which the processes are launched. Overall, understanding the data distribution and communication patterns of MPI programs is critical for writing efficient and scalable parallel code.

Learn more about  elements here;

https://brainly.com/question/13025901

#SPJ11

Find the TWO integers whos product is 8 and whose sum is 6

Answers

Answer:

2 and 4

Explanation:

The two numbers that have a product of 8 and a sum of 6 are 2 and 4 as an example 2 • 4 = 8  2 + 4 = 6

Answer

What two numbers have a product of 8 and a sum of 6?" we first state what we know. We are looking for x and y and we know that x • y = 8 and x + y = 6.

Before we keep going, it is important to know that x • y is the same as y • x and x + y is the same as y + x. The two variables are interchangeable. Which means that when we create one equation to solve the problem, we will have two answers.

To solve the problem, we take x + y = 6 and solve it for y to get y = 6 - x. Then, we replace y in x • y = 8 with 6 - x to get this:

x • (6 - x) = 8

Like we said above, the x and y are interchangeable, therefore the x in the equation above could also be y. The bottom line is that when we solved the equation we got two answers which are the two numbers that have a product of 8 and a sum of 6. The numbers are:

2

4

That's it! The two numbers that have a product of 8 and a sum of 6 are 2 and 4 as proven below:

2 • 4 = 8

2 + 4 = 6

Note: Answers are rounded up to the nearest 6 decimals if necessary so the answers may not be exact.

Explanation:

IBM has a computer it calls the Blue Gene/L that can do 136.8 teracalculations per second. How many calculations can it do in a nanosecond?

Answers

The correct answer is 1.368 105 computations per nanosecond based on the information provided in the question.

What is a computer?

An electronic device used to process data or information is a laptop. It is large enough to hold, retrieving, and processing data. You may already be aware of the fact that you can are using a computer to surf the Internet, send emails, type documents, and play games.

What use does a computer serve?

Obtaining, analyzing, returning, and storing information are regular actions carried out by computer as part of their functions. Information systems can be categorised as input devices, automation systems, external devices, & storage devices, in that order, to assist computer systems in carrying out these tasks.

To know more about computer visit:

https://brainly.com/question/2501378

#SPJ4

Can anybody tell me why when I use my camera to scan the question is not working?

Answers

Answer:

Have you tried reseting or updating your device?

Explanation:

Answer:

im not sure, I tried scanning a question, and when I do it scans only half the question.

Explanation:

You work as the IT security administrator for a small corporate network. Organizational units (OUs) in the domain represent departments. All user accounts for a department are within its departmental OU. As part of your user account maintenance, you need to modify restrictions for user accounts.

In this lab, your task is to perform the following:

Borey Chan is a temporary sales account assistant in the Sales/TempSales OU.Allow logon Monday–Friday, 9:00 am–5:00 pm only.Expire the user account on December 31st.

Pat Benton has been fired from the Research-Dev department. Disable her account until her replacement is found.

Wendy Pots in the Research-Dev department is returning from maternity leave. While she was gone, you disabled her account to prevent logon. Enable her account to allow logon.

For all users in the Support OU (but not the SupportManagers OU), allow logon only to the Support computer.



Answers

The tasks for IT security administrator include modifying restrictions for specific user accounts, such as setting logon schedules, disabling/enabling accounts, and restricting logon access to specific computers.

What tasks does the IT security administrator need to perform for user account maintenance in the given scenario?

The paragraph describes a scenario where the IT security administrator is responsible for managing user accounts within a small corporate network. The administrator needs to make specific modifications and restrictions for different user accounts.

1. Borey Chan, a temporary sales account assistant in the Sales/TempSales OU, should only be allowed to log in on weekdays from 9:00 am to 5:00 pm. Their account should expire on December 31st.

2. Pat Benton, who has been terminated from the Research-Dev department, should have her account disabled until a replacement is found.

3. Wendy Pots, an employee in the Research-Dev department returning from maternity leave, had her account disabled during her absence. The administrator needs to enable her account to allow login.

4. Users in the Support OU (excluding the SupportManagers OU) should only be able to log in to the Support computer. This restriction ensures that only users in the Support department can access the designated computer.

The administrator's tasks involve managing account permissions, enabling/disabling accounts, setting login restrictions based on time and location, and ensuring account expiration when needed. These actions help maintain security and control access within the network.

Learn more about security administrator

brainly.com/question/14280720

#SPJ11

Electronic Computers could not understand our language of the alphabet and our number system. so what do you think had to be done to assist Computers to understand our Language and how we express our language.

Answers

Answer: All data in a computer system consists of binary information. 'Binary' means there are only 2 possible values: 0 and 1. Computer software translates between binary information and the information you actually work with on a computer such as decimal numbers, text, photos, sound, and video. Binary information is sometimes also referred to as machine language since it represents the most fundamental level of information stored in a computer system.

Explanation:

Answer:

I think a better way is to develop higher technology. Something like 5G will allow Electronic Computers to turn faster and understand our language.

Staples print shop prints whatever the customer requests. What class of technology does it use?.

Answers

In the technology education class, students experiment with project learning and learn about common technologies by doing it themselves.

Technology-related skills are contemporary handicrafts that can be used for artistic expression. Students that use technology in the classroom are more engaged with the lessons being taught. EdTech empowers students to become active learners through everything from online educational games to immersive virtual reality. Gamification that is challenge-based, for instance, can boost students' performance by as much as 89%. IT is a wide field that includes many different technologies. This also implies that job seekers wishing to succeed in the IT sector have a wide range of possibilities to pick from, including, among others, artificial intelligence, blockchain, internet of things, and big data.

Learn more about technology here-

https://brainly.com/question/9171028

#SPJ4

1. what is method overloading? is it permissible to define two methods that have the same name but different parameter types?

Answers

Method overloading is the concept in object-oriented programming where a class can have two or more methods with the same name but different parameter types. Yes, it is permissible to define two methods with the same name but different parameter types, as this is the core idea behind method overloading.

Method overloading is a feature in object-oriented programming that allows a class to have multiple methods with the same name but different parameters.

This means that you can define two or more methods with the same name, but each method has a different number or type of parameters.The main advantage of method overloading is that it allows you to reuse the same method name, which makes your code more readable and easier to maintain.It is permissible to define two methods that have the same name but different parameter types. In fact, this is one of the key benefits of method overloading. For example, you might have a class with a method called "print" that can accept either a string or an integer as a parameter. By defining two versions of the "print" method with different parameter types, you can make your code more flexible and versatile. Just be careful to ensure that each method is unique in terms of its parameter types and return type, or else you may encounter errors or unexpected behavior.

Know more about  the Method overloading

https://brainly.com/question/30269956

#SPJ11

What is the main difference between a search engine and a web browser?
A. Your computer only comes installed with a web browser.
B. You use a search engine to find your web browser.
C. You need to use a web browser to get to the search engine.
D. Web browsers are databases and search engines are indexes.

Answers

Answer:

c

Explanation:

You need to use a web browser to get to the search engine. The correct option is C.

What is web browser?

A web browser is a piece of software that allows you to access and view web pages on the Internet.

A web browser is a software application that is used to access and display websites on the internet, whereas a search engine is a website or programme that allows users to search for information on the internet by typing in keywords or phrases.

To put it another way, a web browser allows users to view and navigate websites, whereas a search engine assists users in finding specific information within those websites or across the internet.

Although a web browser is commonly used to access a search engine, it is not the only method.

Thus, the correct option is C.

For more details regarding web browser, visit:

https://brainly.com/question/9776568

#SPJ7

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

Other Questions
Trying out for the school play would be an example of Unhealthy Risk Not a Risk Healthy Risk ///////////////////;;;;;;;;hfdtty .Jill rolled a regular 6-faced die three times and got 2 each time.What is the probability that she will roll 2 again on the next roll? How many mL of 0.55 M CaCl2 have 18.67 g of CaCl2 in them? two messenger services deliver to a small town. service a has 75% of all the scheduled deliveries, and service b has the remaining 25%. their on-time rates are 80% and 60% respectively. calculate the probability that a package is delivered on time. A 19th century businessman who wanted to raise a lot of capital for a big business and limit his liability should:find a partner.go into business himself.form a corporation.set-up a cottage industry. How could you distinguish granite from gneiss?The gneiss will not scratch glass but the granite will.The granite reacts to hydrochloric acid.The gneiss has banding and the granite n general, total deductible home office expenses are limited to the gross income derived from the business minus business expenses unrelated to the home (that is, they are limited to net business income before home office expenses). Wendy searched the internet and found a bug bed that is 7 inches long 4 inches wide and 3 inches tall . If f she wants to build a bug barn with volume greater than this would either of the above barns work which of the following does not characterize an intercultural alliance? Determine the number of moles of Sulfur in 3.73 x 1035 atoms of S? PLEASE HELP ILL MARK BRAINEST!!!! which of the following is equivalent to the expression 44 46? i need help with this tysm According to the steps in problem 4, what is the fraction equivalent of 0.5? 9/5 4/9 5/9 5/13 any one 2"n! dx [(x - 1)"} w Ex: Show that Pn(x) satisfies: npn = (2n-1)Pn-1-(n-1)Pn-21 n2 you can use any Legendre Polynomials in/21 (-1)*(2n - 2k )!**- 66. P.(x)= x - 2"k!(n-k)!(n-2k)! 1 d" 67. P.(x)=; or use 68. (1 - 2xt + t2-12 - P.(x)" (1 - 2xt + t) + (t - x)w = 0 at 69. P (1)=1; P.(-1)=(-1)" 70. P (1)="/;n(n + 1); P(-1) =(-1)*-*[/2n(n + 1)] (-1)"(2n)! 71. P.(O) = 22n (n!) ; P2n+1(0) = 0 72. (n +1)Pn+1(x) - (2n +1)xP, (x) + n.P.-1(x) = 0 73. Pn+1(x) - 2xP(x) +PH-(x) - P.(x) = 0 74. P+(x) - P(x)-(n + 1), (x) = 0 75. XP/(x)-P-(x)-nP, (x) = 0 76. P...(x) - PK-1(x) - (2n +1)P.(x) 77. (1 - **)P)(x)=nP, -1(x) - nxP, (x) 78. (1-x^)P(x) - 2xP(x) + n(n + 1), (x) = 0 RO The width of a rectangle is 5n2.5 feet and the length is 2.5n+6 feet. Find the perimeter of the rectangle. The first four terms of a sequence are shown.1/8, 1, 8, 64, ...Which expression can be used to find the nth term in the sequence?A. 1/8(8)^n-1B. 8(1/8)^n-1C. 1/8(8)^nD. 8(1/8)^n Tami is proud of her intellectual skills and abilities, and she is pleased when others notice and admire her superior intelligence. According to Karen Horney, these behaviors illustrate a neurotic need for:________ Choose the correct pronoun to fill in the blankThe babysitter seemed impatient whenarrived.O usO themO theytheir