explain the evolution of computers​

Answers

Answer 1

Answer:

vintage computers

Computers have changed drastically since the 1930s. AP

From the 1930s to today, the computer has changed dramatically.

The first modern computer was created in the 1930s and was called the Z1, which was followed by large machinery that took up entire rooms.

In the '60s, computers evolved from professional use to personal use, as the first personal computer was introduced to the public.

In the 1980s, Apple introduced its first computer, the Macintosh, and has dominated the computer industry ever since with laptops and tablets.

Visit Insider's homepage for more stories.

Although computers seem like a relatively modern invention, computing dates back to the early 1800s.

Throughout computing history, there has not been a lone inventor or a single first computer. The invention of the computer was incremental, with dozens of scientists and mathematicians building on their predecessors. The modern computer, however, can be traced back to the 1930s.

The 1930s marked the beginning of calculating machines, which were considered the first programmable computers.

computer in the 1930s

A calculating machine in the 1930s. AP

Konrad Zuse created what became known as the first programmable computer, the Z1, in 1936 in his parent's living room in Berlin. He assembled metal plates, pins, and old film, creating a machine that could easily add and subtract. Although his early models were destroyed in World War II, Zuse is credited with creating the first digital computer.

In the 1940s, computers took up entire rooms, like the ENIAC, which was once called a "mathematical robot."

computer room vintage

A computer room. AP

John Mauchly created the ENIAC during World War II to help the Army with ballistics analytics. The machine could calculate thousands of problems each second. The large-scale ENIAC weighed 30 tons and needed a 1,500-square-foot room to house the 40 cabinets, 6,000 switches, and 18,000 vacuum tubes that comprise the machine.

Some call this invention the beginning of the computer age.

In the 1950s, computers were strictly used for scientific and engineering research, like the JOHNNIAC, which was once described as a "helpful assistant" for mathematicians.

A man working at a computer in the '50s. AP

The JOHNNIAC was completed in 1954 and was used by RAND researchers. The massive machine weighed just over two tons with over 5,000 vacuum tubes. This early computer operated for 13 years or 51,349 hours before being dismantled.

In the 1960s, everything changed when the Programma 101 became the first desktop computer sold to the average consumer.

Programma 101. Pierce Fuller/ Wikimedia Commons

Up until 1965, computers were reserved for mathematicians and engineers in a lab setting. The Programma 101 changed everything, by offering the general public a desktop computer that anyone could use. The 65-pound machine was the size of a typewriter and had 37 keys and a printer built-in.

The Italian invention ushered in the idea of the personal computer that would last to this day.

As personal computers became popular in the 1970s, the Xerox Alto helped pave the way for Steve Jobs' Apple.

Xerox Alto. Francisco Antunes/ Flickr

The Xerox Alto was created in the '70s as a personal computer that could print documents and send emails. What was most notable about the computer was its design, which included a mouse, keyboard, and screen. This state-of-the-art design would later influence Apple designs in the following decade.

The Alto computers were also designed to be kid-friendly so that everyone — no matter the age — could operate a personal computer.

In the '80s, Apple's Macintosh was described as a game-changer for the computer industry.

The Macintosh. Raneko/ Flickr

When Steve Jobs introduced the first Macintosh computer in 1984, Consumer Reports called it a "dazzling display of technical wizardry." Like the Xerox Alto, the Macintosh had a keyboard, a mouse, and a small 9-inch screen. The computer — which weighed in at 22 pounds and cost $2,495 — was applauded for its interface of windows and icons.

Answer 2

this is very long chapter cannot be type here so please watch video regarding this or search it in Google. I would have definitely helped you but it is not possible to type and help you , it is so long chapter that it might consume 15 to 25 pages to explain it .

Don't think and take my suggestion negatively. I am really sorry.


Related Questions

how to make a website

Answers

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

You can use wix.com it’s super easy to use and will only take 30 minutes

Drag each option to the correct location on the image.
faulty cables remove and reinsert cables blinking lights
ensuring that the computer is
drawing power from the outlet
restarting the computer
NETWORK ISSUES
network collision
TROUBLESHOOTING TECHNIQUES
4

Answers

Here is the correct placement of the options on the image:

NETWORK ISSUES

* faulty cables

 * remove and reinsert cables

* blinking lights

* ensuring that the computer is drawing power from the outlet

* restarting the computer

* network collision

How to explain the information

If the network cable is faulty, it can cause network issues. To fix this, remove and reinsert the cable.

If the network lights on your computer or router are blinking, it can indicate a problem with the network connection. To fix this, check the cables and make sure that they are properly plugged in.

Ensuring that the computer is drawing power from the outlet: If the computer is not drawing power from the outlet, it will not be able to connect to the network. To fix this, make sure that the power cord is plugged in properly.

Learn more about network on

https://brainly.com/question/1326000

#SPJ1

The reason that many of the innovations of the twenty-first century is coming to pass is the result of
O more computer scientists.
O better computer components.
O quantum computers.
O better operating systems.

Answers

The reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Why did technology advance so fast in the 21st century?

The use of Technology as well as Technological evolution is one that has increase a lot exponentially.

This is due to the fact that each generation of technology is one that often makes better  over the last, the rate of progress is one that is different from version to version and it is one that do speeds up.

Therefore,  a better operating system tends to make innovation to be more faster and so. the reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Hence, option d is correct.

Learn more about operating systems from

https://brainly.com/question/22811693
#SPJ1

Please help not to sure if I’m right ?

Please help not to sure if Im right ?

Answers

Answer:

Explanation:

b

Answer:

A) When setting up the e-mail program for each employee’s computer, the IT professional has the employee enter his or her e-mail password to protect privacy.

Explanation:

Password access should be protected as much as possible by IT specialists. Rather than asking clients or workers for their password information, have them input it themselves.

Maintain the secrecy of all password information. Do not make it available to the public in any form.

Without their knowledge and permission, do not access clients' or employees' computers for any purpose. It is a breach of privacy to view another person's browser history without their agreement.

OAmalOHopeO

Insecure network architecture falls under which category


a system flaw
B network vulnerabilities
C a physical vulnerability
D the lack of an audit trail

Answers

Answer:

B

Explanation:

Insecure network architecture falls under the category of B) network vulnerabilities.

THE ANSWER IS NETWORK VULNERABILITY

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

Which ad extensions can serve automatically?

Answers

Answer:

Sitelink, structured snippets, and callout.

Explanation:

Those 3 are the 3 main ad extensions that can serve automatically. I learned this on Monday.  

For a quick analysis of the individual amenities, you will add Sparklines.

In cell range H5:H11, add Column Sparklines that chart the advertising expense by amenity type over the months January to June.
Apply the style Dark Blue Sparkline Style Accent 5, Darker 50%.

Answers

See how to utilise sparklines to represent your data visually and demonstrate data trends. Use check marks to draw attention to certain values in the Sparkline chart.

What do Excel sparklines serve?

Sparklines are tiny graphs that show data graphically in spreadsheet cells. Sparklines can be used to draw attention to the highest and lowest values as well as patterns in a variety of values, such as seasonal peaks or valleys or business cycles. A sparkline should be placed as close as possible to its data.

What kind of sparklines are these?

Sparklines come in three varieties: Line: creates a line graph out of the data. Similar to a clustered column chart, column: visualises data as columns. Win/Loss: This method uses colour to represent the data as either positive or negative.

To know more about Sparklines visit:-

https://brainly.com/question/31441016

#SPJ1

Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing lines of asterisks. The first line will have one asterisk, the next two, and so on, with each line having one more asterisk than the previous line, up to the number entered by the user. On the next line write one fewer asterisk and continue by decreasing the number of asterisks by 1 for each successive line until only one asterisk is displayed. (Hint: Use nested for loops; the outside loop controls the number of lines to write, and the inside loop controls the number of asterisks to display on a line.) For example, if the user enters 3, the output would be:_______.a. *b. **c. ***d. **e. *

Answers

Answer:

Implemented using Python

n = int(input("Sides: "))

if(n>=1 and n <=50):

    for i in range(1,n+1):

         for j in range(1,i+1):

              print('*',end='')

         print("")

       

    for i in range(n,0,-1):

         for j in range(i,1,-1):

              print('*',end='')

         print("")

else:

         print("Range must be within 1 and 50")

Explanation:

This line prompts user for number of sides

n = int(input("Sides: "))

The line validates user input for 1 to 50

if(n>=1 and n <=50):

The following iteration uses nested loop to print * in ascending order

   for i in range(1,n+1):

         for j in range(1,i+1):

              print('*',end='')

         print("")

The following iteration uses nested loop to print * in descending order        

    for i in range(n,0,-1):

         for j in range(i,1,-1):

              print('*',end='')

         print("")

The following is executed if user input is outside 1 and 50

else:

         print("Range must be within 1 and 50")

The
tests the ability of a networking technician to install,
maintain, troubleshoot, and support a network, and understand various aspects of
networking technologies, including TCP/IP and the OSI models.
COMPTIA NETWORK+
COMPTIA A+
COMPTIA ACCESS
COMPTIA A+

Answers

The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies, including TCP/IP and the OSI models.

Who is a Network Technician?

This refers to a person that oversees a network to check and control the vulnerabilities in it.

Hence, we can see that The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies.

Read more about network certifications here:

https://brainly.com/question/14472075

#SPJ1

Answer:compita network+

Explanation:I just did it and got it right big w

BestMed Medical Supplies Corporation sells medical and surgical products
and equipment from more than 700 manufacturers to hospitals, health clinics,
and medical offices. The company employs 500 people at seven locations in
western and midwestern states, including account managers, customer service
and support representatives, and warehouse staff. Employees communicate by
traditional telephone voice services, email, instant messaging, and cell phones.
Management is inquiring about whether the company should adopt a system for
unified communications. What factors should be considered? What are the key
decisions that must be made in determining whether to adopt this technology?
Use the web, if necessary, to find out more about unified communications and
its costs.

Answers

Management  of the company should adopt a system for unified communications.

What is unified communications?

Unified Communications (UC) is a term that connote a kind of a phone system that uses or “unifies” a lot of communication methods within one or the same business.

Note the one's business can be able to communicates in a lot of ways such as  phone calls, video conferencing and as such, Best Med Medical Supplies Corporation  should be considered adopting a system for unified communications.

They should look into:

The level of productivityTotal costsCompatibility with their business model Productivity.

Learn more about communications from

https://brainly.com/question/26152499

#SPJ1

Sir Tim Berners-Lee wrote the three fundamentals for the Web. What are these three fundamentals? Choose the answer. OO HTMT, IP, URL (or URI) HTML, HTTP, URR HTTP, HTML, IP HTML, HTTP, URL (or URI)​

Answers

Answer:

HTML, HTTP, and URI/URI

Explanation:

In 1990, Berners-Lee developed three fundamental technologies: HTML, HTTP, and URI/URL; which remain the core of the web as we know it today.

Hope it helped! :)

Which of the following might a technical review board (TRB) identify? requirements, job tasks, and roles and responsibilities

risks or issues in the implementation plan

the statement of work for the implementation plan

allocation of resources in the implementation plan​

Answers

All the items listed as Requirements, job tasks, roles and responsibilities will be assessed during Technical Review Board(TRB).

What is Technical Review Board(TRB)?

The dedicated review process for a supplier that is in charge of the quality management program's implementation, the upkeep of all qualified and certified processes, process change management, reliability data analysis, failure analysis, device recall procedures, and the technology's qualification status.

What is the role of Quality Management?

Monitoring various organisational processes and tasks to guarantee that the goods and services provided, as well as the methods employed to deliver them, are consistent is known as quality management.

Requirements, Job Tasks, roles and Implementation are assessed by Technical Review Board(TRB).

Hence, all the given are assessed.

To learn more about the Quality Management from the given link

https://brainly.com/question/7498492

#SPJ9

which term means the push that makes electrons move in a wire?
A. adapter
B. digital signal
C. voltage
D. current​

Answers

Answer:

C. Voltage

Explanation:

Answer:

Other person is correct it is voltage

Explanation:

1. Write a program in C++ that can convert a given integer value
into words. Assume the largest integer value to be 999 billion
For an input of say 1108 your out should be ONE THOUSAND
ONE HUNDRED AND EIGHT​

Answers

Answer:

Hope this works

#include <iostream>

   #include <string>

   #include <vector>

   using namespace std;

   string digitName(int digit);

   string teenName(int number);

   string tensName(int number);

   string intName(int number);

   vector<string> ones {"","one", "two", "three", "four", "five", "six", "seven", "eight", "nine"};

   vector<string> teens {"ten", "eleven", "twelve", "thirteen", "fourteen", "fifteen","sixteen", "seventeen", "eighteen", "nineteen"};

   vector<string> tens {"", "", "twenty", "thirty", "forty", "fifty", "sixty", "seventy", "eighty", "ninety"};

   string nameForNumber (long number) {

       if (number < 10) {

           return ones[number];

       } else if (number < 20) {

           return teens [number - 10];

       } else if (number < 100) {

           return tens[number / 10] + ((number % 10 != 0) ? " " + nameForNumber(number % 10) : "");

       } else if (number < 1000) {

           return nameForNumber(number / 100) + " hundred" + ((number % 100 != 0) ? " " + nameForNumber(number % 100) : "");

       } else if (number < 1000000) {

           return nameForNumber(number / 1000) + " thousand" + ((number % 1000 != 0) ? " " + nameForNumber(number % 1000) : "");

       } else if (number < 1000000000) {

           return nameForNumber(number / 1000000) + " million" + ((number % 1000000 != 0) ? " " + nameForNumber(number % 1000000) : "");

       } else if (number < 999000000001) {

           return nameForNumber(number / 1000000000) + " billion" + ((number % 1000000000 != 0) ? " " + nameForNumber(number % 1000000000) : "");

       }

       return "error";

   }

   int main()

   {

       long input;

       do

       {

           cout << "Please enter a positive integer: ";    

           cin >> input;

           cout << "\n" << nameForNumber(input) << endl;

           cout << "\n\n" << endl;

       }while (input > 0);

       return 0;

   }

ICT4AD was meant to modernize the civil service through E-governance implementation.

Explain why you believe that this policy has achieved or not achieved this goal?

Answers

ICT4AD work through E-governance implementation fail as a result of:

Lack of Infrastructure. High cost of running its affairs as it needs  huge public expenditure. Issues with Privacy and Security and others.

What is the aim of e-governance?

The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of  fast administration of services and information.

Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.

Learn more about civil service from

https://brainly.com/question/605499

Adding effects that move your text or pictures in your presentation is called:

Answers

the answer should be it’s a transitionl

Which of the following expressions could be used to perform a case-insensitive comparison of two String objects named str1 and str2? A) str1 || str2 B) str1.equalsignoreCase(str2) C) str1 != str2 D) str1.equalsinsensitive(str2)

Answers

Note that the expressions could be used to perform a case-insensitive comparison of two String objects named str1 and str2 is: (Option B)

str1.equalsIgnoreCase(str2) is the correct expression to perform a case-insensitive comparison of two String objects named str1 and str2.

What is the rationale for the above response?

The equalsIgnoreCase() method is used to compare two String objects irrespective of their case. It returns true if the two strings are equal regardless of case, and false otherwise.

Option A) str1 || str2 is not a valid expression to perform a case-insensitive comparison of two String objects. The || operator is used for logical OR operations and cannot be used for String comparison.

Option C) str1 != str2 is used to compare two String objects for inequality. This expression does not take into account the case of the strings being compared.

Option D) str1.equalsinsensitive(str2) is not a valid method to compare two String objects. The equals() method is used for comparing two String objects, but it is case-sensitive. The equalsinsensitive() method is not a standard String method in Java.

Learn more about  String objects at:

https://brainly.com/question/30746133

#SPJ1

What does the list "car_makes" contain after these commands are executed?

car_makes = ["Ford", "Volkswagen", "Toyota"]
car_makes.remove("Ford")


1. ['', 'Porsche', 'Vokswagen', 'Toyota']
2. ['Volkswagen', 'Toyota']
3. ['Toyota', 'Ford']
4. [null, 'Porsche', 'Toyota']

Answers

Answer:

The correct answer is option 2: ['Volkswagen', 'Toyota']

Explanation:

After the remove method is called on the car_makes list to remove the element "Ford", the list car_makes will contain the elements "Volkswagen" and "Toyota"

in the situation above, what ict trend andy used to connect with his friends and relatives​

Answers

The ICT trend that Andy can use to connect with his friends and relatives​ such that they can maintain face-to-face communication is video Conferencing.

What are ICT trends?

ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.

If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.

Learn more about ICT trends here:

https://brainly.com/question/13724249

#SPJ1

Declare an array to store objects of the class defined by the UML. Use a method from the JOptionPane class to request the length of the array from the user.

Declare an array to store objects of the class defined by the UML. Use a method from the JOptionPane

Answers

Answer:

it's a test ?                                                  

The showInputDialog method is a part of the JOptionPane class in Java Swing, which provides a set of pre-built dialog boxes for displaying messages and obtaining user input.

Here's an example of how you can declare an array to store objects of a class, and use a method from the JOptionPane class to request the length of the array from the user:

import javax.swing.JOptionPane;

public class MyClass {

   // Define your class according to the UML

   public static void main(String[] args) {

       // Request the length of the array from the user using JOptionPane

       String lengthInput = JOptionPane.showInputDialog("Enter the length of the array:");

       // Parse the user input to an integer

       int arrayLength = Integer.parseInt(lengthInput);

       // Declare the array to store objects of the class

       MyClass[] myArray = new MyClass[arrayLength];

       // Now you have an array of the desired length to store objects of your class

       // You can proceed to instantiate objects and store them in the array

   }

}

In this example, we use the showInputDialog method from the JOptionPane class to display an input dialog box and prompt the user to enter the desired length of the array. The user's input is then parsed into an integer using Integer.parseInt() and stored in the arrayLength variable.

Therefore, an array myArray of type MyClass is declared with the specified length, ready to store objects of the MyClass class.

For more details regarding the showInputDialog method, visit:

https://brainly.com/question/32146568

#SPJ2

If you are going to refer to a few dozen classes in your application, how do
you do it?

Answers

Answer:

Explanation:

use the  "includes" statement  to have access to those classes  :)

narrative report in computer system servicing

Answers

Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.

Classify correctly linear and nonlinear multimedia.
movie at cinema
web page
video game
live video feed
e-book with links
instructional video
slideshow
Linear Multimedia
Nonlinear Multimedia

Answers

Answer:

movie at cinema - Linear Multimedia

web page - Nonlinear Multimedia

video game - Nonlinear Multimedia

live video feed - Nonlinear Multimedia

e-book with links - Nonlinear Multimedia

instructional video - Linear Multimedia

slideshow - Linear Multimedia  

Explanation:

The linear multimedia will go from the start all the way through to the finish without variation.

The Nonlinear Multimedia is the opposite; it doesn't follow that one-way structure and instead allows free movement around all aspects of the multimedia in any order.

movie at cinema - Linear Multimedia

web page - Nonlinear Multimedia

video game - Nonlinear Multimedia

live video feed - Nonlinear Multimedia

e-book with links - Nonlinear Multimedia

instructional video - Linear Multimedia

slideshow - Linear Multimedia

Change the file name for index.html to index.php
Add PHP code to index.php to display an error message named $error_message just below the page heading. Be sure to check that $error_message is not an empty value. Format it to be bold, red text.
Display error messages if the Product Description, List Price and Discount Percent fields are empty after the user submits the form. (1)
Display an error message if the List Price or Discount Percent data entered is not a number after the user submits the form.
Display an error message if the List Price or Discount Percent data entered is less than zero after the user submits the form.
If an error message is displayed, take the user back to the index.php page.
Add a sales tax calculation of 8% based on the discounted price. Then, display the sales tax rate and the calculated sales tax amount after the discounted price.

Answers

The PHP code is given below:

PHP code

if(isset($_REQUEST['login_btn'])){

       $email = filter_var(strtolower($_REQUEST['email']),FILTER_SANITIZE_EMAIL); //strtolower changes email to all lower case

       $password = strip_tags($_REQUEST['password']);

The remaining code is in the file attached.

 

Read more about PHP here:

https://brainly.com/question/27750672

#SPJ1

Which of the following is the keyboard command for "paste"?This question is required. *
A
Ctrl + V / Command + V
B
Ctrl + P / Command + P
C
Ctrl + C / Command + C
D
Ctrl + A / Command + A

Answers

Answer:A: Ctrl + V / Command + V

Explanation:

Complete each of the following sentences by selecting the correct answer from the list of options.

The CPU converts
into information.

The CPU is the mastermind of the computer, controlling everything that goes on through a series of
.

Another name for the CPU is
.

Answers

The CPU converts instructions and data into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of electrical signals and calculations.

The CPU, or central processing unit, is the primary component of a computer that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer.

The CPU interprets and executes instructions, performs calculations, and manages the flow of data within the computer system. It is responsible for coordinating and controlling the activities of other hardware components, such as memory, storage, and input/output devices, to carry out tasks and run programs.

Learn more about CPU on:

https://brainly.com/question/21477287

#SPJ1

What is a file manger ? The file manger is user A . Medium B.platform C. Interface .

Answers

Answer: C. Interface.

Explanation:

File manager is an interface between the hardware part of a computer and the software. the main function of a file manager is to help the user manage all files which they have stored up on their computers. for example the file managers allows the users to view, copy, delete and edit the files which they have stored up on their computer storage devices.

A brand of shame .. from infancy " is a brand on Jocasta​

Answers

Answer: DIDN'T UNDERSTAND

Write a python function that takes an array of integers and multiplies each one by 3.

Answers

def multiply(array):

   return [x * 3 for x in array]

Other Questions
Of the choices below, which one is not an ionic compound?A) PCl5B) MoCl6C) RbClD) PbCl2E) NaCl A customer asks you a question, but you do not know the answer. You feel that they expect you to know the answer. What would you be most likely to do? Hallie bought a gift for her brother. She placed the gift in the gift box shown in the diagram. Each square represents an area of one square centimeter.How much wrapping paper will Hallie need to cover the entire box? how do I find which of the answers in the drop box go with the correct blank? what is heathcliffs opinion of linton when he sees him the first time in chapter 20 of wuthering height The heat from the bonfire is transferred to the student's hands through the process ofconductionconvectionradiationreflection a 6-year-old boy is admitted to the pediatric ward for evaluation of complaints of increasing clumsiness over the past 2 months. his mother states that she has noticed him tilting his head to the right over the past 2 weeks. he complains of headaches when he first wakes up in the morning and has vomited several mornings this week. his midnight vital signs are as follows: temperature, 37.5c; heart rate, 78 beats/minute; respiratory rate, 22 breaths/minute; blood pressure, 96/76 mmhg. of the following, which is most likely to establish a diagnosis for this patient? Read the statement below and answer the question that follows. According to the Healthy Active Kids South Africa Report Card (2022), more research is needed to understand the relationship between screen time and sedentary behaviour. The concern is that as children spend more time watching television, playing video games and interacting with smartphones, they become physically inactive. Do you agree that there is a relationship between childrens increasinglysedentary lifestyle and technology? Why do you agree or disagree? (Mentionthree points to support your view.) (6)[ ________ approaches to personality emphasize people's innate goodness and desire to achieve higher levels of functioning. Active management strategies assume markets are efficient. True or False? How do I git gud at yugioh card game? Please Answer A Real Answer What was Mao's goal for the Great Proletarian Cultural Revolution?A. to purge the party of those who deviated from Mao's visionB. to modernize agriculture and industryC. to move towards socialism with the establishment of communes and the collectivization ofagricultureD. to promote economic growth in China through the Four ModernizationsPlease select the best answer from the choices provided Find the other endpoint of the line segment with the given endpoint and midpoint.Endpoint: (4,-9)Midpoint: (10,8) During the Great Depression, thousands of people changed social class unexpectedly, usually in a downward spiral. This event was the impetus for a type of social mobility called _______ mobility. what part of the water cycle is when water changes from a liquid to a gas? You have 42 marbles in a bag. Inside the bag are 15 red marbles, 5 blue marbles, and therest are whitd. If you reach into the bag and randomly select a marble, then what is theprobability the selected marble will be white?Round to the 4th decimal place. A boy wishes to makea catapults out ofa rubber band of width 9mm and thickness 1.55mm. Determine the length of the bandhe must use so that when the stretches it by 0.25 of its natural length and releases it, the velocity of the pebble of mass 0.0006kg is 30ms - Take the youngs modulus of the rubberto be 4x10000000nm-2 Jacob saw a model of a building that will be built in his city. The model has a height of 40 centimeters and will be built to a scale of 1:50. What is the actual height of the building? (1 m = 100 cm) meters 2 5 6 6 8 8 9 9 An electrician leans an extension ladder against the outside wall of a house so that it reaches an electric box 31 feet up. The ladder makes an angle of 78 with the ground.Find the length of the ladder. Round your answer to the nearest tenth of a foot if necessary. Your client is placed on a cardiac monitor. The rate seems regular so you decide to calculate the rate using the fast large box method. There are 4 large boxes between every R wave what would the ventricular rate be?