A program is
O the language computers use to communicate.
O writing a program in a specific language.
a set of instructions given to a computer.
a specific coding language.
A program is ?

Answers

Answer 1

Answer:

The correct answer is option 3: a set of instructions given to a computer.

Explanation:

A computer works on the instructions that are given by the user. The user has to provide both, the data and the instructions. There are several methods to give input to a computer. One of them is a program which is written in a programming language.

Hence,

A program is a set of instruction given to a computer

The correct answer is option 3: a set of instructions given to a computer.


Related Questions

Which of the following members of the creative department is responsible for any fixed movement in a video game?

a.director
b.animator
c.rigger
d.concept artist

Answers

The member of the creative department who is responsible for any fixed movement in a video game is a rigger.

A rigger is an expert in setting up skeletal systems that allow for the precise manipulation of 3D models in the context of video games, movies, and other multimedia projects. The rigger creates a virtual skeleton beneath the skin of an object to enable it to move or be manipulated with greater accuracy.A rigger is responsible for any fixed movement in a video game, which involves the creation of custom rigs with various constraints and control schemes. They also use automated techniques to expedite the rigging process, and they work closely with other artists and animators to guarantee that the objects they rig are both aesthetically pleasing and properly functioning.Riggers play a critical role in ensuring that a video game's 3D models are both aesthetically appealing and function correctly. They are responsible for creating the structures that enable characters, creatures, and other objects to move, deform, and respond to environmental and player-controlled input. A rigger's responsibilities vary depending on the project's specifics, and the person's skillset and experience also influence the level of their participation. However, a skilled rigger is crucial for creating a polished and immersive video game that is visually stunning and mechanically sound.

To know more about creative visit:

https://brainly.com/question/32101517

#SPJ11

a person trained to provide assistive technology services to individuals with disabilities is a(n)

Answers

The answer to your question is an assistive technology specialist. An assistive technology specialist is a professional firewalls who is trained to provide assistive technology services to individuals with disabilities. T

his specialist works with individuals with disabilities to assess their needs and provide them with the necessary assistive technology devices and services to improve their quality of life and help them function more independently. This could include everything from helping someone with a visual impairment use a computer to helping someone with limited mobility access their home more easily.

In summary, the long answer to your question is that an assistive technology specialist is a professional who is trained to provide a wide range of assistive technology services to individuals with disabilities.  A person trained to provide assistive technology services to individuals with disabilities is an Assistive Technology Specialist.

To know more about firewalls visit:

https://brainly.com/question/29869844

#SPJ11

A friend a just opened his own barber shop and has asked you to develop a program to track the type of service the customer is receiving and the cost for the service and also include any tips the customer may give to the barber. The name of your friend's barber shop is Big Al's and on each customer receipt he wants to display the name of his shop, customer name, the type of service, cost of the service, and the amount of the tip for a total price of the service rendered. Name your variables Declare your variables

Answers

Answer:

class Barber(object):

   barber_shop = "Big AI's barber shop"

   def __init__(self, customer_name, type_of_service=[], tip=0):

       self.cust_name = customer_name

       self.tos = type_of_service

       self.tip = tip

   def service_type(self, *args):

       for i in args:

           self.tos.append(i)

   def total(self):

       

       services = {'trimming':10, 'hair_cut':20, 'shaving':15, 'washing':5, 'dyeing':5}

       contain = ''

       total = 0

       for service in self.tos:

           if service in services.keys():

               total += services[service]

               contain += f'{service}: {services[service]}\n'

       

       print(self.barber_shop,'\n', self.cust_name,'\n', 'Services:',contain.splitlines(),'\n', \

           f'total: ${total}', '\n',f'Tip: ${self.tip}')

mycust = Barber('John',['washing'],6 )

mycust.service_type('shaving', 'dyeing')

mycust.total()

Explanation:

The Barber class is a blueprint used to create an object instance of customers that visits the barber-shop. It has two methods 'service_type' and 'total' which are just defined functions of the class that appends services to the type of service variable and total that prints the total cost of services on the screen.

Paths describe the location of folders and files on your computer. If you have saved your work to c:\documents, then your work has been saved to your
A. computer’s hard drive.
B. flash drive
C. student drive
D. OneDrive

Answers

The answer is D and it can also be C

Answer:

la ventana de micros word

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of uids and gids available for use?

Answers

One common configuration file that often includes these parameters is

The configuration file that contains parameters for the default location for e-mail, password expiration information, minimum password length, and the range of) available for use varies depending on the operating system or software being used.

However, one common configuration file that often includes these parameters is the

The file is a system configuration file found in Unix-like operating systems, such as Linux. It is used by the login process to set default values and policies for user accounts.

This file allows system administrators to define various parameters related to user authentication and account management.

It's important to note that the specific configuration file and parameter names may vary depending on the operating system or software being used.

Therefore, it is recommended to consult the documentation or specific resources for the particular system you are working with to determine the exact location and names of the configuration file and parameters in question.

For more such questions on configuration,click on

https://brainly.com/question/14114305

#SPJ8

The configuration file that contains the parameters mentioned is typically "/etc/login in Unix-like systems.

What is the configuration file?

The  file is a arrangement file in the direction of Unix-like wholes, such as Linux. It is secondhand for one login help to outline various scheme-expansive limits had connection with user login and report administration.

Therefore, the "MAILDIR" parameter in the  file sets the default point for consumer email depository. It specifies the guide way place consumer-specific mailboxes or mail spools are situated.

Learn more about configuration file from

https://brainly.com/question/30260393

#SPJ1

Which statement about icon sets in conditional formatting is true?
(A) You can create up to five custom icon sets for a cell's value.
(B) lcon sets display icons directly in the cells.
(C) lcon sets can be displayed only in a separate cell from the cell's value.
(D) You cannot change the rules for icon sets.

Answers

The statement that is true about icon sets in conditional formatting is:

(B) Icon sets display icons directly in the cells.

Icon sets in conditional formatting allow you to assign different icons to cell values based on specific conditions. These icons are displayed directly within the cells themselves, providing visual representation of the data based on predefined rules.

The icons can help in quickly understanding and analyzing the data in a visual manner.

Learn more about Icon sets, here

https://brainly.com/question/31667665

#SPJ1

team_id INT NOT NULL AUTO_INCREMENT,

team_name VARCHAR(50),

team_rank INT NOT NULL DEFAULT 0

Refer to code example 5-1.) What are the values of the team_id, team_name, and team_rank columns after the following statement is executed, assuming that the Teams table has one row in it with a team_id of 1?

Answers

After executing the given statement, the values in the columns would be as follows: team_id = 2, team_name = NULL, team_rank = 0.

The statement mentioned does not provide any explicit values for the columns team_name and team_rank. Therefore, the default values will be assigned. For the team_id column, the AUTO_INCREMENT attribute is set, which means it will automatically generate a new unique value for each new row inserted.

Since the Teams table already has one row with a team_id of 1, executing the statement will insert a new row. The team_id column, being AUTO_INCREMENT, will generate the next unique value, which is 2. So, team_id will be 2 for the new row.

As for team_name, no value is provided in the statement, so it will be set to NULL by default.

Similarly, team_rank column does not have a value specified in the statement, and it has a DEFAULT constraint set to 0. Hence, the team_rank will be assigned the default value of 0.

In conclusion, after executing the statement, the values in the columns will be: team_id = 2, team_name = NULL, and team_rank = 0.

learn more about statement here:

https://brainly.com/question/17238106

#SPJ11

pls help help me is good help me helping is very good

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

A network of people and services with which we share ties and which provide support is.

Answers

A network of people and services with which we share ties and which provide support is social support.

What is Social support?

This is known to be a form of “support that is opened to any body as a result of social ties to other people, groups, and the bigger community.

Note that A network of people and services with which we share ties and which provide support is social support.

Learn more about social support from

https://brainly.com/question/7463943

#SPJ1

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

Answers

Answer:

DDoS

Explanation:

Distributed Denial of Service

Which of the following is a common identification method that can verify the identity of specific files?
A. Firewall
B. Binary pattern
C. Hashing
D. Data sanitization

Answers

Hashing is a common identification method that can verify the identity of specific files.

In cryptography, hashing refers to the method of transforming a data set of any size into a fixed size of data that may be checked readily. The output is a hash value or merely a hash, which is a representation of the original data set. The hash is typically a unique identifier for the original data when it is hashed.

Hashing is one of the most efficient ways to store and retrieve data since it allows for rapid comparisons. A common application of hashing is to check the validity of data transferred across a network. Furthermore, hashing may be used to safeguard the secrecy of passwords by storing hash values instead of actual passwords.

To conclude, hashing is a common identification method that can verify the identity of specific files.

Know more about the Hashing

https://brainly.com/question/13164741

#SPJ11

5. What is a domain name used for?​

Answers

Answer:

Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols. A domain name may represent entire collections of such resources or individual instances.

Explanation:

*Hope this helps*

Arrange the steps in the process of manually installing software.

If the contents of the CD open, click on the executable file.

This action will start the installation wizard.


You might need to reboot your computer. So, do it now.


Insert the software installation CD in the CD-ROM.


Follow the installation wizard prompts.

Go to My Computer and then open the CD-ROM drive

Answers

The proper order is: 5,3,1,4,2. We must first open the CD-ROM and then put the installation CD into it in order to install software on your computer.

If the CD's contents are displayed, click the executable file to launch the wizard and then adhere to its instructions. Finally, after installing a new program, we frequently need to restart our computer. A piece of software called an installer is used to install software applications on a system. The user is given a step-by-step process with the option to choose the desired options by installers, which streamlines the software installation process.

Learn more about software here-

https://brainly.com/question/11973901

#SPJ4

8.2 code practice edhesive?

Answers

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

Kevin recently discovered that unknown processes are running in the background on his company’s web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred?

Answers

Answer: botnet

Explanation:

The type of attack that occurred is botnet. Botnets refers to the networks relating to hijacked computer devices that are used for scams and cyberattacks.

They're Internet-connected devices, where each one of them each runs one or more bots which can be used to steal data, and send spam.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Which Photoshop tool allows users to select an area of an image using a specific color, or color range?

Answers

Answer:

Color picker tool.

Explanation:

There are a few different ways that you can select a specific color in Photoshop. One way is to use the color picker tool. With this tool, you can click on any area of your image and the color picker will sample the color for you.

A company stores data about employees on networked computers. Discuss the methods available to maintain network security and protect the data from cyberattacks

Answers

Answer:Network Security Methods

Explanation

Answer: Maintaining network security and protecting sensitive employee data from cyberattacks is crucial for any company. Here are some methods available to achieve this:

Firewalls: Implementing firewalls is a fundamental step in securing a network. Firewalls monitor and control incoming and outgoing network traffic, blocking unauthorized access and potential threats.

Intrusion Detection and Prevention Systems (IDPS): IDPS monitors network traffic for suspicious activity, such as malware, intrusion attempts, or abnormal behavior. It can detect and respond to potential threats in real-time, preventing successful attacks.

Access Control: Implement strict access controls to ensure that only authorized individuals can access sensitive employee data. This involves assigning unique user accounts, strong passwords, and role-based access controls (RBAC) that limit access based on job roles and responsibilities.

Encryption: Use encryption techniques to protect data both at rest and in transit. Encrypting employee data ensures that even if it falls into the wrong hands, it remains unreadable without the decryption key.

Regular Updates and Patching: Keep all software and operating systems up to date with the latest security patches. Regular updates address vulnerabilities and weaknesses that could be exploited by cybercriminals.

Employee Training and Awareness: Educate employees about best practices for network security, including strong password hygiene, recognizing phishing attempts, and avoiding suspicious downloads or websites. Regular training and awareness programs help create a security-conscious culture.

Multi-factor Authentication (MFA): Implement MFA as an additional layer of security. This requires employees to provide multiple forms of authentication, such as a password and a unique code sent to their mobile device, to gain access to the network.

Regular Data Backups: Perform regular backups of employee data to ensure it can be restored in the event of a cyberattack or data loss. Keep backups offline or in secure, separate locations to prevent their compromise.

Network Monitoring: Continuously monitor network activity using security information and event management (SIEM) tools. This helps detect any suspicious or unauthorized access attempts and enables timely responses to potential threats.

Incident Response Plan: Develop and regularly update an incident response plan to outline the steps to be taken in the event of a cyberattack. This plan should include procedures for isolating affected systems, notifying appropriate personnel, and restoring operations.

Regular Security Audits: Conduct periodic security audits and penetration testing to identify vulnerabilities and assess the effectiveness of existing security measures. These audits help identify areas for improvement and ensure compliance with security standards and regulations.

Vendor and Third-Party Risk Management: If the company relies on third-party vendors or partners, establish a comprehensive vendor risk management program. Assess the security practices of vendors and implement appropriate controls to mitigate any potential risks associated with their access to employee data

To maintain network security and protect employee data from cyberattacks, several methods and best practices are available. Here are some key methods to consider:

1. Firewalls and Intrusion Detection/Prevention Systems: Implementing firewalls helps control incoming and outgoing network traffic, filtering potential threats. Intrusion detection and prevention systems can detect and respond to unauthorized access attempts or malicious activities, enhancing network security.

2. Secure Network Configuration: Configuring the network infrastructure securely is essential. This involves implementing strong passwords, disabling unnecessary services and ports, regularly updating firmware and software, and utilizing encryption protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) for data transmission.

3. Access Control and User Authentication: Employing robust access control mechanisms and user authentication methods is crucial. This includes implementing strong password policies, multi-factor authentication (MFA), and limiting access privileges based on job roles and responsibilities. Regularly reviewing and revoking access for former employees or those who no longer require it is also important.

4. Regular Patching and Updates: Keeping all software, operating systems, and applications up to date with the latest security patches and updates helps protect against known vulnerabilities. Regularly applying patches ensures that security flaws are addressed promptly, reducing the risk of cyberattacks.

5. Data Encryption: Encrypting sensitive employee data, both in transit and at rest, provides an additional layer of protection. Encryption converts the data into a format that can only be deciphered with the appropriate decryption key, making it difficult for unauthorized individuals to access or understand the information.

6. Employee Training and Awareness: Educating employees about cybersecurity best practices is crucial. Training programs can cover topics such as identifying phishing emails, avoiding suspicious links or downloads, using strong passwords, and reporting any security incidents promptly. Regular awareness campaigns can help employees stay vigilant and actively contribute to network security.

7. Regular Security Audits and Testing: Conducting periodic security audits and vulnerability assessments helps identify potential weaknesses in the network infrastructure. Penetration testing can be performed to simulate real-world attacks and identify vulnerabilities that could be exploited by cybercriminals.

8. Incident Response and Disaster Recovery Plans: Developing robust incident response plans and disaster recovery procedures is essential. These plans outline the steps to be taken in case of a security breach or cyberattack, ensuring a swift and effective response to mitigate the damage and restore normal operations.

It is important to note that maintaining network security is an ongoing process that requires constant monitoring, adaptation to emerging threats, and staying updated with the latest security practices and technologies.

Made from zinc and copper, brass has been manufactured for thousands of years. It is used in weapons, pipes, musical instruments, and many other important ways. Which of these words best describes brass?.

Answers

Brass has been manufactured for thousands of years and has a wide range of uses, including in weapons, pipes, musical instruments, and many other important applications.

It is known for its strength, durability, and corrosion resistance, as well as its ability to be molded, shaped, and worked into a variety of different forms.

What is Brass?

Brass is a metallic alloy. An alloy is a mixture of two or more elements, at least one of which is a metal. Alloys are typically made by combining different metals in specific proportions to create materials with specific properties and characteristics. Brass is an example of an alloy that is made from the metals zinc and copper.

To learn more about corrosion resistance, visit: https://brainly.com/question/13926854

#SPJ4

Which sentence describes a contract comprehensively?
A contract needs to have an offer and a legal purpose. A contract includes an offer and acceptance without any consideration. A contract
includes an offer, acceptance, and consideration without a legal purpose. A contract includes an offer, acceptance, consideration, and a legal
purpose.

Answers

Answer:The sentence that describes a contract comprehensively is the last option - a contract includes an offer, acceptance, consideration, and a legal purpose.

These four terms are all very important parts of a contract, without which an agreement couldn't even exist. A contract has to have all four parts in order to be legally valid, so this is the reason why the other options cannot be correct as all of them lack one or more terms.

Explanation:

Answer:

A contract includes an offer, acceptance, and consideration without a legal purpose.

Explanation:

use autofilter to filter the query results first to show only records where value of the staffid field is mo or shannon

Answers

According to the scenario, in the Home Ribbon tab in the Sort and Filter ribbon group, you clicked the selection button, followed by an advanced button.

What do you mean by Autofilter?

Autofilter may be characterized as an easy way to turn the values in an Excel column into filters based on the column's cells or content. This feature is used to find, show, or hide values in one or more columns of data.

You can definitely filter the data and content based on choices you make from a list, or search to find the data that you seek. When you filter data, entire rows will be hidden if the values in one or more columns don't meet the filtering criteria.

In the access table, you clicked the arrow at the top of the StaffID column.

To learn more about Autofilter, refer to the link:

https://brainly.com/question/14047951

#SPJ1

Which function is used to create a shortcut that opens a document stored on a network server, an intranet, or the internet?.

Answers

Hyperlink function is used to create a shortcut that opens a document stored on a network server, an intranet, or the internet.

What is an hyperlink function ?

A document saved on a network server, an intranet, or the Internet can be opened by using the HYPERLINK function to create a shortcut that jumps to another position in the current workbook. Excel moves to the specified place or opens the specified document when you click a cell that has a HYPERLINK function.

Hence, Hyperlink function is used to create a shortcut that opens a document stored on a network server, an intranet, or the internet.

You can learn more about Hyperlink from the given link:

https://brainly.com/question/21475311

#SPJ4

PLS ANSWER ASAP!!!!

In three to five sentences, explain the function of utilities.

Answers

Answer:

In economics, utility function is an important concept that measures preferences over a set of goods and services. Utility represents the satisfaction that consumers receive for choosing and consuming a product or service.  Utility function is widely used in the rational choice theory to analyze human behavior.

Explanation:


Which tool can most easily be used to find synonyms for words in
your document?

Answers

Answer:

The Thesaurus

Explanation:

Answer:

The dictionary

Explanation:

listen to exam instructions frank, a technician, has finished installing a wireless router. jessica is connected to the wifi. however, she can only see the company intranet pages. what should frank do to troubleshoot the problem? answer clear the browser cache. disable the pop-up blocker. configure the browser proxy settings. apply a firmware update.

Answers

Frank, a technician, has finished installing a wireless router. Jessica is connected to the wifi. However, she can only see the company intranet pages. Frank should clear the browser cache to troubleshoot .

the problem.A web cache is a system that temporarily stores web documents like HTML pages and images to decrease server lag. A browser cache is a temporary storage place on your computer where web page data is stored. When you load a webpage for the first time, the browser will save some of the data on your computer so that it doesn't need to re-download everything every time you visit the same site. The browser cache is refreshed periodically, and the data is overwritten.A technician is a skilled worker who specializes in installing, maintaining, and repairing technical systems. Technicians are needed in various industries, from electronics and IT to manufacturing and construction. They ensure that technical systems are operating correctly, install new systems, diagnose and repair issues, and conduct routine maintenance.Firmware is a term used to describe software that is integrated into a piece of hardware. This term can be used to refer to a variety of different types of software, including BIOS (Basic Input/Output System) firmware, which is used to control a computer's basic hardware functions. Another common use of the term firmware is to refer to the software that controls the functionality of consumer electronics devices like digital cameras and MP3 players. Firmware is typically designed to be low-level software that is highly specific to the hardware it is designed to work with.

Learn more about browser   here:

https://brainly.com/question/28504444

#SPJ11

The upcoming Spiderman movie releases a commercial on ABC showing a child wearing a Spiderman Halloween costume. The Spiderman costume shows a stunt actor flying from building while wearing the costume, and the advertisement says: "you can fly just like Spiderman: try it at home by jumping off of your roof!" If a group of concerned parents sue the costume makers, the best argument that either party can make under the 1st amendment is:

Group of answer choices

That the costume makers are entitled to free speech protection as the speech is not libelous or obscene

That the costume makers engaged in unprotected artistic speech because the commercial is based on the movie Spiderman and is being shown on television

That the costume makers engaged in unprotected commercial speech because the commercial is false or misleading

That the costume makers are entitled to free speech protection as the speech is based on a movie, which is artistic speech

Answers

In a lawsuit involving a commercial for Spiderman Halloween costumes, the best argument that either party can make under the First Amendment is that the costume makers are entitled to free speech protection as the speech is not libelous or obscene.

The First Amendment of the United States Constitution protects the freedom of speech. In this case, the argument that the costume makers are entitled to free speech protection would be based on the premise that the speech in the commercial is not libelous or obscene. Free speech rights generally extend to commercial speech as long as it is not false, misleading, or deceptive.

The argument that the commercial is protected artistic speech because it is based on the movie Spiderman and is being shown on television may not hold as much weight, as commercial speech is given less protection under the First Amendment compared to non-commercial artistic speech.

Similarly, the argument that the commercial is unprotected commercial speech because it is false or misleading could be made by the concerned parents, but it may not be the strongest argument under the First Amendment.

Learn more about freedom of speech here:

https://brainly.com/question/7723076

#SPJ11

What are the types of security awareness?

Answers

Traditional security awareness training is delivered in one of four ways:

Classroom-based training program.Visual aids (including video)Through simulated attacks.Computer-based training.

Attendees are taken away from their typical roles and given at least a few hours to participate in a workshop in which an instructor walks them through the intricacies of at least one security topic, such as phishing, malware, or a social engineering assault.

Again, visual aids are exactly what they sound like: visual indicators that provide bite-sized security advice.

Simulated attacks or cybersecurity awareness simulations are mock attacks aimed at users, aiming to test people's response to threats "in the field".

Online security awareness training is usually an introduction to security awareness campaigns and a mainstay in a chief information security officer's (CISO's) arsenal, although what it actually is might vary drastically from provider to provider.

To know more about security awareness, visit;

brainly.com/question/23991359

#SPJ4

define a function findlot() that takes two integer parameters as the hourly parking price and the parking duration, and returns the parking lot allocation as an integer. the lot is returned as follows:

Answers

a function findlot() that takes two integer parameters as the hourly parking price and the parking duration, and returns the parking lot allocation as an integer.

The lot is returned as follows:

int ComputeValue(int value1, int value2)

{

  return (value1 * value2) - 8;

}

//We assume that this function returns an int, but the product of the two values can get quite big.

The result may not fit into an int variable. If the values can exceed the limits of int, it might be better to change the return value to a 64 bit value.

//

long long ComputeValue(int value1, int value2)

{

   return ((long long)value1 * value2) - 8;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

what is the term for delivering an application over the internet called?

Answers

Answer:

Cloud computing

Explanation:

The termnology which is used to describe the delivering of an application over the internet is called SaaS.

What is SaaS?

SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).

This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.

Read more on SaaS here: https://brainly.com/question/24852211

Wires,plugs,speakers, chis are all examples of what

Answers

Answer:

Ch1kenT3nders

Explanation:

Other Questions
Whats the domain and range ??USE INTERVAL NOTATION.Only answer if you know! Figure ABCD is a rhombus.Rhombus A B C D is shown. Angle A is (5 x + 25) degrees and angle D is (7 x minus 1) degrees.What is the value of x?13142628 while gabby is trying to watch the video in the kind care text, she is interrupted and distracted by a flurry of other text messages. in a communication exchange, these other text messages are known as what is real poverty, according to shiva, and how is it caused/brought about? plot the points (-7,1)and (3, -3) on the graph and fine the distance between points Julie chooses two nonzero numbers, m and n, where m+n=0.Select whether each statement is always true, sometimes true, or never true.Always true Sometimes trueNever truem and n are odd.m and n are positive.m and n are negative.Im is equal to Inl.Im| is not equal to In.m is positive and n is negative. Why is the bid rent theory important to urban planning? A rental car company charges $20 per day to rent a car and $0.10 for every mile driven. Addison wants to rent a car, knowing that:She plans to drive 100 miles.She has at most $80 to spend. Divine Apparel has 2,100 shares of common stock outstanding. On October 1, the company declares a $0.75 per share dividend to stockholders of record on October 15. The dividend is paid on October 31. Record all transactions on the appropriate dates for cash dividends. (If no entry is required for a particular transaction/event, select "No Journal Entry Required" in the first account field.) Journal entry worksheet < 1 2 3 Record the declaration of cash dividends. Note: Enter debits before credits. Date General Journal Debit Credit October 01 Record entry Clear entry View general journal PLEASE HELP ME QUICK PLEASE a group of students volunteered to help a fruit farmer wonder pick fruits. the total number of apples and plums were 286. the total number of apples and guavas was 106. the number of guavas was 2/7 of plums. how many apples were there? Which new material did Neolithic people invent and use for making tools A $1 million grant is to be divided amongfour charities, J, K, L, and M. If L and M willbe awarded $125,000 more than K and$325,000 less than J, how much of the grantwill be awarded to M? Fill in the blank with the suitable pronoun.After they had seen the show,_____went out for dinner.TheyweyouTheir What were his ideas regarding eugenics, cloning, and stem cells? Do you agree or disagree on his points regarding these issues? Why or why not? Enumerate the writers use of paradox, irony, symbol, plot, characterization, and style of narration. Do any of these relate to one another or to the theme.send help guys!!!! thank you what 2 numbers multiply to get -30 but adds up to 7 Find value of f(4) its on a graph so Fernando is selling cupcakes and muffins. He sells 84 items on Sunday. He sells cupcakes for $3.00 each and muffins for $2.00 each and makes a total of $208which equations could be used to represent this situation? select all that apply?A.) 2m + 3c = 84B.) c + m = 84C.) c + m = 208D.) 3c + 2m = 208 On Wednesday, Joel, who is right-footed, takes exactly 20% of his practice shots with hisleft foot. Joel took 14 shots with his left foot last Wednesday.How many shots did Joel take on Wednesday on his right foot?How many total shots did Joel take on Wednesday when he was practicing.1 ton, ta, tes:tu as __ rgle?tu as __ cahiers?tu as __ crayons?tu as __ ordinateur de poche?tu as __ stylo?tu as __ gomme?tu as __ classeur?tu as __ sac?