Generally, a business should consider insuring against an event when the risk value is _____.

Answers

Answer 1

Answer:high

Explanation:apex

Answer 2

Answer:

Generally, a business should consider insuring against an event when the risk value is High.


Related Questions

11. FROM WHICH MENU WOULD YOU BE ABLE TO FIND COLUMNS? *
5 points
FILE
EDIT
INSERT
FORMA

Answers

the answer is insert

Can someone pls help with this (20 points)

Can someone pls help with this (20 points)

Answers

Answer:

1. A

2. D

3. C

4. B

Explanation:

Hope this helps! Not sure if this is correct but im pretty sure the answers I gave are accurate. If Im wrong about any of the answers i put someone please correct me in the comments! :)

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

identify the missing entity in the following equation: 241uhe2 β- ? a. 238am b. 237pa c. 237th d. 236ac e. none of these

Answers

The missing entity in the following equation is 237Th. The correct option is C.

The given equation represents a beta minus (β-) decay. In this type of decay, a neutron in the nucleus is converted into a proton, and an electron (called a beta particle) is emitted. The atomic mass number remains the same, but the atomic number increases by 1.

In this case, we have the initial isotope 241U (where U represents uranium, 241 is the mass number, and the "he2" part can be disregarded as it seems to be a typo). When it undergoes β- decay, the atomic number increases by 1, while the mass number remains the same. Therefore, the missing entity in the equation is 237Th (thorium-237), with the same mass number but an atomic number one greater than uranium.

To know more about entity visit:-

https://brainly.com/question/30741642

#SPJ11

the process of normalization constructs tables such that every table has a ________.

Answers

Normalizing is used because it causes microstructures to reform into more ductile structures.

What is process of normalization?

Data organisation in a database is done by normalisation. This entails building tables and linking those tables together in accordance with principles intended to safeguard the data and increase the database's adaptability by removing duplication and inconsistent reliance.

Disk space is wasted by redundant data, and maintenance issues result. If data that already exists in multiple locations needs to be modified, it must be changed in exactly the same way everywhere. If the information is kept solely in the Customers table and nowhere else in the database, changing a customer's address is significantly simpler to do.

A few guidelines govern database normalisation. There is a "normal form" for each rule. As with many formal rules and specifications, real world scenarios do not always allow for perfect compliance.

To learn more about  process of normalization refer to:

https://brainly.com/question/13262367

#SPJ4

What happened when the disk you inserted is not readable by this computer?

Answers

When the disk you have inserted is not readable by the computer, it means that the computer is unable to access or retrieve any data from the disk.

This can happen due to several reasons. One possibility is that the disk is corrupted or damaged. In such cases, the computer may display an error message stating that the disk is unreadable or cannot be recognized. Another possibility is that the disk format is not supported by the computer's operating system. Different operating systems have different file systems, and if the disk is formatted in a file system that is not compatible with the computer, it won't be readable. Additionally, if the disk is encrypted or password-protected, the computer won't be able to read it without the correct credentials. In conclusion, when the disk you inserted is not readable by the computer, it could be due to disk corruption, incompatible file system, or encryption/ password protection.

To know more about Operating system , Visit:

https://brainly.com/question/29532405

#SPJ11

I WILL GIVE YOU BRAINIEST IF YOU GIVE A GOOD ANSWER
SOLVE THESE 2 QUESTIONS PLEASE

2. You and your roommate decide to reduce your environmental impact by recycling more, going
paperless, and using environmentally safe cleaning products. You know you also can use green
computing tactics to reduce electronic waste, minimize power use, and more. Create a list of five
reasons why you should add green computing to your efforts. List 10 ways you can apply green
computing to your daily life.

3. Research the trend of BYOD in workplaces. Compare the advantages to any potential disadvantages.
Do you think more companies should adopt this policy? Why or why not?

Answers

Answer:

5 Ways to Practice Green Computing

Buy "Energy Star" labeled monitors, desktops, laptops, and printers . ...

Put laptops in "sleep" mode when not in use. ...

Even better, turn OFF computers and other equipment when not in use. ...

E-cycle used computer equipment. ...

Buy the new "Smart Strip" power strip.

Explanation:

what is constant layout in android studio​

Answers

"A ConstraintLayout is a ViewGroup allows you to position and size widgets in a flexible way. Note: ConstraintLayout is available as a support library that you can use on Android systems starting with API level 9 (Gingerbread)"

For what purposes do students collect data? Check all that apply.
to check a statement's credibility
to answer a question
to support an argument
to evaluate a statement
to examine a question's reliability

Answers

Answer:

sounds like all of the above

Explanation:

only one im not 100% sure on is to examine a question's reliablity

Answer:

1

2

3

4

Explanation:

will give brainliestSelect the code that a program would follow to draw a triangle after the pen down command. (2 points)


a

Move 100 steps, turn right 120 degrees, move 100 steps with two iterations


b

Move 100 steps, turn right 120 degrees with three iterations


c

Turn right 120 degrees, move 100 steps, turn right 120 degrees with two iterations


d

Turn right 120 degrees, move 100 steps with zero iterations


Question 2 (2 points)

(04.01 LC)


Select the function that will tell the sprite to draw a square. (2 points)


a

block-based code with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 90 degrees with 4 iterations

© Scratch 2018


b

block-based code with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 100 degrees with 4 iterations

© Scratch 2018


c

block-based code blocks with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 90 degrees with 3 iterations

© Scratch 2018


d

block-based code with the commands draw square left bracket right bracket, and move 100 steps turn 90 degrees with 4 iterations

© Scratch 2018


Question 3 (2 points)

(04.01 LC)


Sebastian wants to write a program to have his sprite draw a pentagon, move ten steps, and draw another pentagon in a different color. What is the last block he needs to add to complete his code? (2 points)


block-based code with the commands when space key pressed, draw pentagon left bracket right bracket, move 10 steps

© Scratch 2018


a

block-based code with the commands change color by ten, draw pentagon left bracket right bracket

© Scratch 2018


b

block-based code with the commands change pen size by 1, draw pentagon left bracket right bracket

© Scratch 2018


c

block-based code with the commands pen down, draw pentagon left bracket right bracket

© Scratch 2018


d

block-based code with the commands set pen color to blue, draw rhombus left bracket right bracket

© Scratch 2018


Question 4 (2 points)

(04.01 MC)


Madison wants to create a code that will turn on the lights if it is dark, and turn off the lights if it is sunny. There is a bug in her code. Which block is the bug? (2 points)


block-based code with the commands if it is sunny, then turn on lights, if it is dark then turn on lights


a

block-based code with the commands if it is dark then empty space


b

block-based code with the commands if it dark, then turn on the lights


c

block-based code with the commands if it is sunny then turn on the lights


d

block-based code with the commands turn off the lights


Question 5 (2 points)

(04.01 MC)


Jim is debugging his code. What should he do first? (2 points)


a

Change the code to fix the bug.


b

Check whether the bug is fixed.


c

Know what the code is supposed to do.


d

See where the error is.


Question 6 (2 points)

(04.01 MC)


Select the block of code that will create this picture. (2 points)


a triangle

© Scratch 2018


a

block-based code with the commands define draw triangle left bracket right bracket, pen down, turn right 120 degrees, move 100 steps with three iterations

© Scratch 2018


b

block-based code with the commands define draw triangle left bracket right bracket, pen down, turn right 120 degrees, move 100 steps with two iterations

© Scratch 2018


c

block-based code with the commands define draw triangle left bracket right bracket, pen up, turn right 120 degrees, move 100 steps with three iterations

© Scratch 2018


d

block-based code with the commands define draw triangle left bracket right bracket, pen up, turn right 60 degrees, move 100 steps with three iterations

© Scratch 2018


Question 7 (2 points)

(04.01 LC)


In order to draw a shape on the stage, what does the following function need? Move 100 steps, turn right 90 degrees with four iterations. (2 points)


a

Event block with the commands when space key pressed, then draw square


b

If-then block with the commands if draw square, then run function


c

Known initial condition using the pen down command


d

Loop block with two iterations


Question 8 (2 points)

(04.01 LC)


Dexter is trying to draw a rhombus and play the pop sound at the same time in his program. How should he correct the error in this algorithm? When space key pressed, draw rhombus, play pop sound. (2 points)


a

Add another when space key pressed event and move play pop sound to that event.


b

Change the draw rhombus command to a draw triangle command.


c

Put the code inside a loop block with two iterations.


d

Use a conditional block so that the code is if draw rhombus, then play pop sound.


Question 9 (2 points)

(04.01 LC)


Select the code that a program would follow to draw a rectangle after the pen down command. (2 points)


a

Move 100 steps, turn right 90 degrees, move 50 steps, turn right 90 degrees with four iterations


b

Move 100 steps, turn right 90 degrees, move 50 steps, turn right 90 degrees with two iterations


c

Move 100 steps, turn right 90 degrees with four iterations


d

Move 100 steps, turn right 90 degrees with two iterations


Question 10 (2 points)

(04.01 MC)

Answers

Answer:

LOOK AT IMAGE, MARK AS BRAINLIEST!

will give brainliestSelect the code that a program would follow to draw a triangle after the pen down
will give brainliestSelect the code that a program would follow to draw a triangle after the pen down
will give brainliestSelect the code that a program would follow to draw a triangle after the pen down
will give brainliestSelect the code that a program would follow to draw a triangle after the pen down
will give brainliestSelect the code that a program would follow to draw a triangle after the pen down

Place the steps in order for inserting an index in a document.

Answers

Answer:mark entries, use AutoMark, select the concordance file, place cursor at the insertion point, insert the index and click okay

Explanation:

The steps that are needed in order for inserting an index in the document :

mark the entries, use the AutoMark, select concordance file, place cursor in insertion point, insert the index and click okay.What is a document?

A document is a written printed or electronic matter that provides information and evidence and serves an official record. The document may be written or photographic and is a sign of proof that states the record of data.

Find out more information about the document.

brainly.com/question/25534066

assume that a file containing a series of integers is named numbers.txt. write a program that calculates the average of all the numbers stored in the file. quizlet

Answers

The following is the solution to your question. Here's the code to write a program that calculates the average of all the numbers stored in the file named "numbers.txt":```
def main():
   try:
       total_sum = 0
       count = 0
       
       # Open the file 'numbers.txt'
       file = open('numbers.txt', 'r')
       
       # Read the file contents and add each integer to total_sum
       for line in file:
           total_sum += int(line)
           count += 1
       
       # Close the file
       file.close()
       
       # Calculate the average of all the numbers in the file
       average = total_sum / count
       
       # Print the average
       print("The average of all the numbers in 'numbers.txt' is:", average)
       
   except FileNotFoundError:
       print("Error: File not found.")
       
   except ZeroDivisionError:
       print("Error: The file is empty.")    
main()```
In this program, we are first initializing two variables, total_sum and count to 0. We will use these variables to keep track of the sum of all the integers in the file and the count of the number of integers in the file, respectively. Then, we use the open() function to open the file 'numbers.txt' in read mode.

Next, we use a for loop to iterate through each line of the file. For each line, we convert the string to an integer using the int() function and add it to the total_sum variable. We also increment the count variable by 1 for each integer read from the file.

Once we have read all the integers from the file, we close the file using the close() method. Then, we calculate the average by dividing the total_sum by the count. Finally, we print out the average of all the numbers in the file.


The given program reads the file 'numbers.txt' that contains integers and calculates the average of all the integers present in the file. This program handles the case when the file is not found and the file is empty, using appropriate exception handling.

To know more about integers  :

brainly.com/question/33503847

#SPJ11

How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data on secondary storage. Users can only read and write data on primary storage. The CPU can only read and write data on primary storage. Users can only read and write data on secondary storage.​

Answers

Answer:

i don't know but you can get Socratic  it scan questions and tell answers

Explanation:

Answer:

The CPU can only read and write data on primary storage.

 Users can only read and write data on secondary storage

Explanation:

i got it correct

Certain communications systems have different types of limitations, yet many are versatile.
True
False

Answers

The answer should be true

Decimal numbers are based on __________.

letters (a and b)
16 digits
10 digits
two digits (1s and 0s)

Answers

They are based on 10 digits.

I’m not sure.

Answer:

They are based on 10 digits.

Explanation:

I just did the test and got the answer right.

______ command is used to delete the file apache2.conf under /etc/apache2/ but it should prompt the user before executing the delete command.

Answers

The `rm` command with the `-i` option is used to delete the file `apache2.conf` under `/etc/apache2/` and prompt the user before executing the delete command.

The command that is used to delete the file apache2.conf under /etc/apache2/ but prompt the user before executing the delete command is:
```
rm -i /etc/apache2/apache2.conf
```
In this command, `rm` is used to remove files, and `-i` is an option that makes the command interactive, which means it will prompt the user for confirmation before proceeding with the deletion.

To delete the `apache2.conf` file under `/etc/apache2/` and prompt the user before executing the delete command, you should use the command `rm -i /etc/apache2/apache2.conf`.

Learn more about prompt visit:

https://brainly.com/question/13209308

#SPJ11

100 POINTS!!! Write in python

100 POINTS!!! Write in python

Answers

Here's a Python statement to create a label widget with the text "Programming is fun!" as a child of self.main_window:

The Python Program

tk.Label(self.main_window, text="Programming is fun!").pack()

This statement creates a new Label widget with the specified text as the child of the self.main_window parent widget using the tk.Label() constructor.

\

The .pack() method is then called on the Label widget to add it to the window.

The pack() function is among the various layout managers offered by Tkinter, which is the premier Python GUI toolbox. Multiple geometry managers, such as .grid() and .place(), offer varied options for controlling the spatial placement and arrangement of widgets in a window.

Read more about programs here:

https://brainly.com/question/28938866

#SPJ1

which of these is not a valid relationship type

Answers

where is the items or options

There’s is no options to pick from

briefly explain the emerging trends in micro computer technology according to size

Answers

Answer:

Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

what discovery demonstrated that atoms are not the smallest particles

Answers

The discovery of subatomic particles demonstrates that atoms are not the smallest particles.

Subatomic particles are particles that are smaller than atoms and are made up of protons, neutrons, and electrons. They were discovered in the early 1900s by scientists who were interested in understanding the fundamental nature of matter.The discovery of subatomic particles revealed that atoms are made up of even smaller particles that have their own properties and behaviors.

The proton, neutron, and electron are the three primary subatomic particles that make up atoms. Protons are positively charged particles found in the nucleus of an atom, while neutrons are neutral particles found in the nucleus as well. Electrons, on the other hand, are negatively charged particles that orbit the nucleus of an atom. The discovery of these subatomic particles was significant because it changed the way scientists understood the structure of atoms.

Before the discovery of subatomic particles, atoms were thought to be the smallest particles that made up all matter. However, with the discovery of subatomic particles, scientists realized that atoms are made up of even smaller particles, which are the building blocks of matter. In conclusion, the discovery of subatomic particles demonstrated that atoms are not the smallest particles, and that there are even smaller particles that make up atoms.

Know more about the Subatomic particles

https://brainly.com/question/28306590

#SPJ11

In general, mainframe or server production programs and data are adequately protected against unauthorized access. Certain utility software may, however, have privileged access to software and data. To compensate for the risk of unauthorized use of privileged software, IT management can:______________

a. Keep sensitive programs and data on an isolated machine.

b. Restrict privileged access to test versions of applications.

c. Prevent privileged software from being installed on the mainframe.

d. Limit the use of privileged software

Answers

Answer:

a. Keep sensitive programs and data on an isolated machine.

Explanation: In general, mainframe or server production programs and data are adequately protected against unauthorized access. Certain utility software may, however, have privileged access to software and data. To compensate for the risk of unauthorized use of privileged software, IT management can:______________

1. You are being asked to write a pseudocode to calculate the gross pay for five (5)
employees.
The user should enter:
✓ the employee’s name
✓ the level of the employee
✓ the number of hours worked
NB Hours worked in excess of the normal 40 hours are paid overtime at 1.5 times the
employee's hourly pay rate
Display the name of the employee, number of hours worked and the gross pay.

Answers

Here is the pseudocode to calculate the gross pay for five employees:

START Initialize employee name, employee level, hours worked, and overtime rate values to 0

Set overtime rate to 1.5Set normal working hours to 40

FOR i = 1 TO 5    OUTPUT "Enter employee name"    INPUT employee name    OUTPUT "Enter employee level"    INPUT employee level    OUTPUT "Enter number of hours worked"    INPUT hours worked    IF hours worked > normal working hours THEN        SET overtime hours to hours worked - normal working hours        SET gross pay to (normal working hours * employee level) + (overtime hours * employee level * overtime rate)    ELSE        SET gross pay to hours worked * employee level    END IF    OUTPUT "Employee name: ", employee name    OUTPUT "Hours worked: ", hours worked    OUTPUT "Gross pay: $", gross payNEXT i

The above pseudocode will calculate the gross pay for each employee by taking into account the hours worked and the employee level.

If an employee works more than 40 hours, then the overtime rate will be applied to their pay rate to calculate their gross pay. The name of the employee, number of hours worked, and the gross pay will be displayed for each employee.

For more such questions on pseudocode, click on:

https://brainly.com/question/24735155

#SPJ8

SaaS refers to: managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. easy-to-use software tools for displaying Web pages. self-contained services that communicate with each other to create a working software application. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis. supplying online access over networks to storage devices and storage area network technology.

Answers

Answer:

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, etc.


The science of how an object reacts to its motion through air is called
(12 letters)

Answers

Answer:

The science of how an object reacts to its motion through air is called aerodynamics

Explanation:

Aerodynamics is the science 〔ç) of studying, designing, and manufacturing vehicles such that they can operate in atmospheric conditions. Aerodynamic efficiency has many aspects respect to generating flight including maneuverability and make use of minimum amount of fuel needed for lift. Aerodynamics also deal with the flow around objects or what a rotational fluid must do as it flows along a curved surface or moves past a blunt body that creates turbulence.

The science of how an object reacts to its motion through air is called aerodynamics.

What is motion?

Motion is the shift in such an item's location with regard to time. Translocation, the act or process of changing or shifting locations or positions. It is described as a movement that occurs repeatedly at set intervals of time.

The examination of forces and how they cause anything to move through the air is known as aerodynamics. We can estimate the strengths of lift, whose enable an aircraft to defy logic, and drag, that is the opposition an aircraft "feels" as it traverses the air, by observing the movements of the air over an item. By directing air in this method, a component referred as drag attributable to lift is created, which slows the forward speed of the aircraft.

Learn more about motion, here:

https://brainly.com/question/22810476

#SPJ2

which eigrp parameter must match between all routers forming an eigrp adjacency?

Answers

The eigrp parameter that must match between all routers forming an eigrp adjacency is the autonomous system number (ASN).

In order for routers to form an EIGRP adjacency, they must be configured with the same autonomous system number (ASN). The ASN is a 16-bit number that identifies the EIGRP routing domain and is used to differentiate between multiple EIGRP domains in a network.

If the ASN does not match on all routers, they will not form an adjacency and will not exchange routing information. Other EIGRP parameters that must match for routers to form an adjacency include the K-values, the hello and hold timers, and the interface network types.

By ensuring that all routers have the same ASN, network administrators can ensure that EIGRP adjacencies are formed and that routing information is exchanged between routers in the same EIGRP domain.

Know more about eigrp parameter, here :

https://brainly.com/question/31933561

#SPJ11

what are the basic data types supported in C programing language?

Answers

Answer:

The C language provides the four basic arithmetic type specifiers char, int, float and double, and the modifiers signed, unsigned, short, and long.

C Primary Data types:

The C language has 5 basic (primary or primitive) data types, they are:

Character - ASCII character set or generally a single alphabet like 'a', 'B', etc.Integer - Used to store whole numbers like 1, 2, 100, 1000, etc.Floating-point - Decimal point or real numbers values like 99.9, 10.5, etc.Double - Very large numeric values which are not allowed in Integer or Floating point type.Void - This means no value. This data type is mostly used when we define function.

Hope Helps!!

What areas does ABET provide accreditation?
students
programs
institutions
teaching staff
industries

Answers

It is a form of quality assurance for programs in the areas of applied and natural science, computing, engineering, and engineering technology. Our accreditation is recognized globally as evidence that a program meets the standards set by its technical profession.

"We are a nonprofit, non-governmental agency that accredits programs in applied and natural science, computing, engineering and engineering technology." - ABET

FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___

Answers

Spreadsheets  software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.

Why do people use spreadsheets?

One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.

Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.

Learn more about Spreadsheets from

https://brainly.com/question/26919847
#SPJ1

Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?

for
else
else-if
while

Answers

Answer: D

Explanation:

Answer:

im pretty sure its for

Explanation:

Other Questions
I only have 2 more including this pls help sunny window. The plants receive water and fertilizer and remain on the windowsill. What will most likely happen? *-Most of the leaves on the window side will wilt and die-The roots of the plants will grow upward from the soil-Water droplets will collect on the leaves facing away from the window-The stem will bend toward the window please draw the chemical structures of the sugars with their names when answering the questions.1. are the following sugars D or L sugars.2. name the following aldose and draw the chemical structuresa. the c-2 epimer of d-arabinoseb. the c-3 epimer of d-mannosec. the c-3 epimer of d-threose what is the value of k ? If Help meh please. I just want to turn in as much work as I can. During the _many people moved into _. 3.Green Planet Pty Ltd was incorporated to research and develop a new technology to produce biodegradable plastic from seaweed. After making losses for several years, a venture capital company purchased 60% of the shares in the company. The company then discovered that the "seaweed to plastic" technology can also be used to make an organic fertiliser. This new product contributed 40% of the turnover of the company, which turned around and made a profit in the current income year. Advise whether the company can use the carry forward losses in this income year. Which does not fit with the others? multiple choice government planning and regulation the invisible hand The animals are protected as well as possible against items thrown over the fence that may injure the cats or be eaten. Look at the underlined section marked. Choose the answer that best corrects this sentence, if appropriate A)The animals are protected as well as possible, that may injure the cats or be eaten, against items thrown over the fence. B)Against items thrown over the fence that may injure the cats or be eaten,the animals are protected as well as possible. C)The animals are protected as well as possible against items that may injure the cats or be eaten thrown over the fence. D)Correct as is. HELP PLEASEWrite an essay of at least 500 words in which you trace the references in Dr. Kings I Have a Dream speech to other literary works, including governmental documents, Scripture, and musical works. Identify at least three specific references (that is, tell exactly where in the document the quote or reference comes from). If you find a reference to a song, provide the complete lyrics of the song. Discuss the possible reasons King may have had for using these references and the impact they may have had on his audience. What do these choices by Dr. King tell you about his audience? when c9h20 reacts with oxygen, it makes carbon dioxide what is the balanced chemical equation for this How do i prove for this and this has to be in paragraph form as well What is the function of the transition in this sentence?Plans for a transcontinental railroad began years before the Civil War, yet officials from around the country could not agree on a location. (5 points) aTo summarize ideas bTo show an exception cTo emphasize Excited lithium atoms emit visible light that has a frequency of 4.53 x 1015 Hz. What is the wavelength of this radiation in meters danielle has test scores of 92, 86, 83, 90, and 91 in her math class. what score does she need on her next test to bring her average up to 90% (if possible)? Question The perimeter of the base of a right square pyramid is 24 cm. The height of the pyramid is 6 cm. What is the volume of the pyramid? list the three legislative powers you believe are the most important, and explain why. When Handel arrived in London, he established his fame by composingsecular cantatasoratoriosconcertosoperas The character in our video multiplied the original value for black paint by 5 to get the new value for black paint. So, she also multiplied the original value for green paint by 5 to get the new value for green paint. There are multiplicative relationships, relationships related to multiplication, in a ratio table. To get from values for green and black in one ratio to values for green and black in another ratio, we can multiply both the initial values by the same number. For example, to get from the ratio 3:2 to the ratio 6:4, we multiply both the 3 and 2 by 2. And to get from the ratio 3:2 to the ratio 15:10, we multiply both the 3 and 2 by 5.Sometimes, there are also relationships related to addition, called additive relationships, in a ratio table. To get from one value for green to another value for green, we can add 3. To get from one value for black to another value for black, we can add 2. When using the multiplicative relationship to find equivalent ratios, we can multiply both columns by the same number. But when using the additive relationship, we cannot add the same number to both columns.A cookie mixture requires 3 teaspoons of sugar for every 4 teaspoons of salt. You want to triple the mixture. Which of these describes the ratio of teaspoons of sugar to salt you will use?A5:6B9:12C3:8D3:2