menu. pin onenote to the taskbar. unpin microsoft edge from the taskbar. use settings to view detailed system information. answer the first three questions. use settings to set the display resolution to 1600 x 900. set the screen saver to blank and specify that it activate after 15 minutes of inactivity. use computer management to determine which users have been created for this system. answer the last question. on the desktop, create a shortcut to the event viewer.

Answers

Answer 1

Use the Windows 10 Interface and Change Display Settings. A taskbar is a component of a graphical user interface that serves a number of functions.

What is a taskbar in Microsoft?A taskbar is a component of a graphical user interface that serves a number of functions. Typically, it displays a list of the active programs. The taskbar's arrangement and specific appearance vary depending on the operating system, although it typically takes the shape of a strip that runs along one side of the screen. At the bottom of the screen, an operating system component called the taskbar can be found. It enables you to search for and open programs using Start and the Start menu, as well as view any open programs. he taskbar is typically located at the bottom of the desktop, but you can alternatively shift it to either the side or the top.

To learn more about taskbar, refer to:

https://brainly.com/question/1360051

#SPJ4


Related Questions

Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?

Small Booklet style
Medium Booklet style
Memo style
Card style

Answers

Answer:

D

Explanation:

did the quiz

Answer:

D: card style

Explanation:

just took the unit test on edge and made a 100%

why is preserving the integrity of data, information, and systems an important cybersecurity goal?

Answers

Preserving the integrity of data, information, and systems is an important cybersecurity goal because it ensures that data, information, and systems are accurate, consistent, and reliable.

What is cybersecurity ?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity involves technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.

It also helps to protect data, information, and systems from unauthorized access, manipulation, and malicious attacks. Furthermore, preserving data, information, and systems integrity ensures that the data and information remain secure and accessible only to authorized users.

To learn more about cybersecurity
https://brainly.com/question/28004913
#SPJ4

What is used to see the fine details of
graphics on a screen

Answers

Answer:

graphics card

Explanation:

use the internet to research the internet of things (iot). in your own words, what is iot? how is it being used today? how will it be used in the near future? what impact will iot have on technology, society, and the economy over the next five years? what are its advantages and disadvantages? finally, identify five of the most unusual iot devices that you can find described online. write a one-page paper on the information that you find.

Answers

The Internet of Things (IoT) refers to the network of physical devices embedded with sensors, software, and connectivity capabilities that enable them to collect and exchange data over the internet.

These devices can range from everyday objects like appliances, vehicles, and wearable devices to industrial equipment and infrastructure components. The IoT allows these devices to communicate with each other, gather and analyze data, and make intelligent decisions.

Today, the IoT is being used in various sectors such as healthcare, agriculture, transportation, smart homes, and manufacturing. For example, in healthcare, IoT devices are used to monitor patients remotely and gather real-time health data, improving patient care and enabling timely interventions. In agriculture, IoT sensors help optimize irrigation systems and monitor soil conditions, leading to more efficient water usage and improved crop yields.

In the near future, the IoT is expected to expand its presence significantly. It will likely find applications in smart cities, autonomous vehicles, energy management, and more. The impact of IoT on technology, society, and the economy over the next five years will be substantial. Advancements in connectivity, data analytics, and artificial intelligence will enable more sophisticated IoT applications, resulting in increased efficiency, automation, and connectivity.

The advantages of IoT include enhanced efficiency, improved decision-making, increased productivity, and convenience. However, it also brings challenges such as data security and privacy risks, interoperability issues, and potential job displacement due to automation.

Some of the most unusual IoT devices found online include: Smart Diapers: Diapers with embedded sensors that can monitor a baby's urine levels and notify parents when a change is needed.

Smart Plant Sensors: Devices that monitor soil moisture, light levels, and temperature to help optimize plant growth and provide real-time plant care recommendations.

Smart Toothbrushes: Toothbrushes with sensors that track brushing habits and provide feedback to improve oral hygiene.

Smart Trash Bins: Bins equipped with sensors that can detect when they are full and notify waste management services for timely collection.

Smart Umbrellas: Umbrellas that provide weather forecasts, reminders, and alerts to users based on real-time weather data.

In conclusion, the IoT is a network of connected devices that has transformative potential across various sectors. Its current applications range from healthcare to agriculture, and it is poised to expand further in the near future. The IoT's impact on technology, society, and the economy over the next five years will be significant, with advantages such as increased efficiency and productivity, but also challenges related to security and privacy. Unusual IoT devices demonstrate the diverse and innovative ways in which this technology is being applied to everyday objects, enhancing functionality and user experiences.

Learn more about software here

https://brainly.com/question/28224061

#SPJ11

What does music mean to you? Is it a big part of your life, or is it just "there". Answer in at least two complete sentences.

Answers

Answer:

Music means a lot to almost everyone and plays a significant role in most people's lives. With all of the different genres, music encompasses a wide range of moods and emotions, and there is something for almost everyone.

Answer:

Music plays a crucial role in several people's lives. There is proof that music has helped benefit people's lives to be more positive, and some studies show that students that listened to music and meditated with music during school, had anxiety levels less than students who didn't get such an opportunity.

Explanation:

(I've read a paper somewhere for school for a health project abt stress and anxiety)

User can use ______ commands to search for and correct words in a document

Copy and Paste


Find and Replace


Header and Footer


Print and Print preview

Answers

find and replace is the answer

Using the sequence of references from Exercise 5. 2, show the nal cache contents for a three-way set associative cache with two-word blocks and a total size of 24 words. Use LRU replacement. For each reference identify the index bits, the tag bits, the block o set bits, and if it is a hit or a miss.


references: 3, 180, 43, 2, 191, 88, 190, 14, 181, 44, 186, 253

Answers

Due to the complexity of the calculation and the formatting required to present the final cache contents, it is not possible to provide a complete answer within the 100-word limit.

What is the difference between a hit and a miss in the context of cache memory?

To solve this problem, we need to use the given references to simulate the behavior of a three-way set associative cache with two-word blocks and a total size of 24 words, using LRU replacement policy.

Assuming a cache organization where the index bits are selected using the middle bits of the memory address, and the tag bits are selected using the remaining high-order bits, we can proceed as follows:

Initially, all cache lines are empty, so any reference will result in a cache miss.

For each reference, we compute the index bits and the tag bits from the memory address, and use them to select the appropriate set in the cache.

We then check if the requested block is already in the cache by comparing its tag with the tags of the blocks in the set. If there is a hit, we update the LRU information for the set, and proceed to the next reference. Otherwise, we need to evict one of the blocks and replace it with the requested block.

To determine which block to evict, we use the LRU information for the set, which tells us which block was accessed least recently. We then replace that block with the requested block, update its tag and LRU information, and proceed to the next reference.

After processing all the references, the cache contents will depend on the order in which the references were made, as well as the cache organization and replacement policy. To report the final cache contents, we need to list the tag and block offset bits for each block in the cache, grouped by set, and ordered by LRU.

Note that we can compute the number of index bits as log2(number of sets), which in this case is log2(24/3) = 3. The number of tag bits is then given by the remaining bits in the address, which in this case is 16 - 3 - 1 = 12.

Due to the complexity of the calculation and the formatting required to present the final cache contents, it is not possible to provide a complete answer within the 100-word limit.

Learn more about Cache

brainly.com/question/15730840

#SPJ11

true/false. a functional analysis condition in which you present the ao for the behavior and do not provide the reinforcer for the behavior if it occurs.

Answers

False. The functional analysis condition described is called "extinction."

How is extinction used in behavior analysis?

The statement presented is false. The described condition, where the antecedent is presented but the reinforcer is intentionally withheld following the occurrence of a behavior, is actually known as "extinction" in behavior analysis. Extinction is a procedure used to reduce or eliminate undesirable behaviors by removing the reinforcer that previously maintained the behavior. It aims to weaken the behavior over time through a lack of reinforcement. By systematically withholding the reinforcer, individuals learn that the previously reinforced behavior no longer produces the desired outcome, leading to a decrease in the frequency and strength of the behavior.

Extinction is a well-established technique in behavior analysis and is commonly employed in various settings, such as classrooms, therapy sessions, and animal training. It is particularly effective in addressing behaviors that have been reinforced inconsistently or inadvertently. However, it is important to note that extinction can initially result in an increase in the behavior, known as an extinction burst, as individuals may engage in more vigorous attempts to obtain the previously reinforced outcome. Consistency and adherence to the extinction procedure are crucial during this phase.

It is worth mentioning that functional analysis is a distinct process in behavior analysis that involves identifying the functional relationship between behavior and its antecedents and consequences. Functional analysis aims to determine the specific environmental factors that influence behavior, such as the functions or purposes the behavior serves for the individual. In contrast, extinction focuses on altering behavior by eliminating reinforcement without specifically examining the function of the behavior.

Learn more about reinforcer

brainly.com/question/5162646

#SPJ11

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

Taylor is getting ready to send an e-mail. In three to five sentences, give Taylor some advice for sending an effective email.

Answers

Answer:

Include subject lines since they are importantuse bullet pointskeep it shortavoid too many exclamation markswatch your tone

How is hashing used?

A. used to protect the transmission of software and large files to be downloaded
B. used for authentication, digital signatures, and message authentication codes
C. ecommerce protocols and bitcoin generation
D. all the above

Answers

Answer: Its A. used to protect the transmission of software and large files to be downloaded

Explanation: Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file. A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit o...

T/F : ________ advertising is utilized most often by mature, well-known brands.

Answers

True, brand advertising is often utilized most often by mature, well-known brands.

This is because these brands have already established their reputation and awareness among their target audience, and therefore do not necessarily need to focus on selling a specific product or service. Instead, they can focus on creating a positive image of their brand and its values through emotional appeals, storytelling, and other creative strategies. Brand advertising helps to reinforce a brand's position in the market and build long-term relationships with customers. It also helps to differentiate a brand from its competitors and create a sense of loyalty among consumers. Examples of well-known brands that utilize brand advertising include Coca-Cola, Nike, and Apple. However, brand advertising is not exclusive to large companies and can also be effective for small businesses looking to build brand awareness and loyalty among their target audience.

Know more about brand advertising here:

https://brainly.com/question/15082282

#SPJ11

What is the name for the software used to convert an assembly language program into machine code?

Answers

Assembler is the answer

An assembler is a program that converts the assembly language into machine code. It takes the basic commands and operations from assembly code and converts them into binary code that can be recognized by a specific type of processor. Assemblers are similar to compilers in that they produce executable code.

Hope this helps have an excellent day!

Art directors win awards for their work, and awards can make their careers. Art directors win awards for work in fields like the following:

film
animation
television
advertising
gaming
For this project, focus on the career of one award-winning art director in one of the above fields and research award(s) that he or she has won through the Art Directors Guild within the past five years. .

As this is a visual arts area, you will need to present examples of the art. Be sure the Terms of Use from your sources allow for student use. You can research your topic and the available range of topics by a variety of means:

internet searches
movie databases
the award organization archives
industry news and magazines
Use reliable sources and factual content while keeping quotes to a minimum. Present the topic in your own words, and do not present copied text from published sources as your own reporting.

In your paper, include a timeline, a discussion of your chosen art director’s education, and career highlights. You will need to show why the art director won the award.

Your presentation should be 3-4 pages if written, or five minutes long if presented as a Power Point presentation. Use your own words, and use quotes sparingly. If your presentation is oral, practice presenting your project and adjust your length for a clear, calm, and concise delivery. Check your work.

Please include the following:

A title
Introduction to your topic
Why you chose it
Background info, and bio of the subject of your presentation
Explanations of terms as needed
What you found out about your subject
Examples, timeline, photos, artwork
What you particularly like about your subject
Conclusion, with personal ideas if you imagine a similar career for yourself
Citations of sources
Question # 1
File Upload
Submit your biography of an art director.

Answers

Answer:

N/A

Explanation:

im sorry mate, but this sounds like its supposed to be a paper by you, i cant write a paper for you, but i can help you make one, ive got some methods and tricks i can share to make it easier

again not trying to be mean, just trying to help the best way i can :)

Answer:

slide 1

A title

And the Art Direction Award Goes to...ME

slide 2

Intro to Tamara Deverell

Tamara Deverell is an actress who has appeared in Nightmare Alley (2021), Guillermo del Toro's Cabinet of Curiosities (2022), and Star Trek: Discovery (2017). Since February 7, 1992, she has been married to Ken Woroner. They've got two kids.

slide 3

Career

Tamara Deverell is a production designer who has worked on Star Trek: first two seasons as well as the live action episodes of Star Trek: Short Treks. She received the 2019 Directors Guild of Canada Award for Best Production Design - Dramatic Series for her work on the episode "Such Sweet Sorrow, Part 2" of Star Trek: Discovery.

Deverell was interviewed for the DIS Season 1 DVD and Blu-ray special feature "Designing Discovery," as well as the Star Trek: Discovery Official Companion feature "Making Discovery.

In the late 1980s, Deverell attended Capilano University in Vancouver, completed a four-year degree at the Emily Carr Institute of Art and Design, and began working in film art departments in Montreal.

slide 4

Citations of source

Image from wiki

What is the size of BIOS?

Answers

Answer:

The size of BIOS is 32 megabytes

What is the size of BIOS?

Answer:

32 megabytes

Explanation:

Chapter 7: Investigating Network Connection Settings Using a computer connected to a network
1. What is the hardware device used to make this connection (network card, onboard port, wireless)? List the device’s name as Windows sees it in the Device Manager window.
2. What is the MAC address of the wired or wireless network adapter? What command or window did you use to get your answer?
3. For a wireless connection, is the network secured? If so, what is the security type?
4. What is the IPv4 address of the network connection?
5. Are your TCP/IP version 4 settings using static or dynamic IP addressing?
6. What is the IPv6 address of your network connection?
7. Disable and enable your network connection. Now what is your IPv4 address?

Answers

To know the hardware device used for network connection (network card, onboard port, wireless), One need to open the Device Manager window. You can access it by right-clicking on the Start button, selecting "Device Manager," and then making wider the "Network adapters" category.

What is the hardware device

To find MAC address, use ipconfig /all in Command Prompt or PowerShell. Find the network adapter and locate the MAC address (Physical Address).

To check wireless security, right-click connection icon, select "Open Network & Internet settings," click "Wi-Fi," choose network and view security type. Use ipconfig in Command Prompt/Powershell to find network IPv4 address.

Learn more about  hardware device from

https://brainly.com/question/24370161

#SPJ4

by default, where are storage reports saved?

Answers

By default, storage reports are saved on the computer's local hard drive. The exact location may vary depending on the operating system and the version of the software being used.

In Windows operating systems, storage reports are typically saved in the "Documents" or "Downloads" folder. In macOS, storage reports can be found in the "Downloads" or "Documents" folder as well. It is important to note that the location of storage reports can be changed by the user to a different location if desired. This can be done by adjusting the settings within the software or by manually moving the report to a different location on the computer.

To learn more about default click here: brainly.com/question/31761368

#SPJ11

how many bridge tables will the relational schema mapped from the central school library er diagram have?

Answers

The relational schema mapped from the central school library ER diagram will have three bridge tables. Bridge tables (also known as linking tables, junction tables, or mapping tables) are database tables that map relationships between two other database tables.

These tables include a composite key made up of the primary keys of the two related tables, as well as any additional attributes that are relevant to the relationship. In a school library database, there may be several relationships between entities such as books, authors, and students. One bridge table might link books and authors, while another might link books and students. The relational schema mapped from the central school library ER diagram would require bridge tables to represent these many-to-many relationships. Thus, the relational schema mapped from the central school library ER diagram would require three bridge tables, as per the ER diagram.

Learn more about ER diagram here https://brainly.com/question/30710118

#SPJ11

Write the code (from to )using for loop andif elseif statementto accept themobile phone numbersof200 residents of Dubaiasstringand check if thelength of eachmobile number is10. Depending on the first 3 characters of the mobile number,display the messagefrom the table below:First 3 charactersMessage“050”, “054”, “056”Etisalat number“052”,“055”, “058”DunumberFor anyother input(if the phone number is not a ten digit number or if it does not start with any of the above digits)Not a valid mobile number

Answers

Answer:

In Python:

nos = int(input("How many phone number: "))

for i in range(1,nos+1):

   phn = input("Phone Number: ")

   if not len(phn) == 10:

       print("Invalid")

   else:

       charactersMessage = phn[0:3]

       if charactersMessage in ['050', '054', '056']:

           print("Etisalat Number")

       elif charactersMessage in ['052', '055', '058']:

           print("Du Number")

       else:

           print("Invalid")

Explanation:

Prompts the user for the frequency of phone numbers to check

nos = int(input("How many phone number: "))

This iterates through the phone numbers

for i in range(1,nos+1):

This prompts the user for phone number

phn = input("Phone Number: ")

Prints invalid id number length is not 10

if not len(phn) == 10:

   print("Invalid")

If otherwise

else:

This gets the first 3 characters

   charactersMessage = phn[0:3]

Prints Etisalat number if the characters are either 050, 054 or 056

   if charactersMessage in ['050', '054', '056']:

       print("Etisalat Number")

Prints Du number if the characters are either 052, 055 or 058

   elif charactersMessage in ['052', '055', '058']:

       print("Du Number")

Prints error if otherwise

   else:

       print("Invalid")

(a) how many blocks (words) can the main memory of this system store? [2 points]

Answers

The amount of memory a system can store is typically measured in bytes, not blocks or words.

The number of blocks or words that can be stored depends on the size of each block or word, which is not provided in the question. Additionally, the capacity of a system's main memory can vary widely depending on the specific hardware and configuration being used.

For more questions like Memory click the link below:

https://brainly.com/question/28754403

#SPJ11

Ethan's family member pays for new systems software. Which of the following would best protect Ethan's laptop?
thumb drive
O anti-virus software
O photo-editing software
O a microphone
O thumb drive

Answers

Answer:

Anti-virus software

Explanation:

The reason being, if Ethan downloaded any files/extensions that aren't 100% safe, they might result in virus(es), if the proper protection for the software isn't in play.

Answer:

A

Explanation:

You can _____ IF functions to allow for three or more outcomes.
A.) Link
B.) Cycle
C.) Loop
D.) Nest

Answers

The correct answer is D) Nest.

IF functions in Excel are a powerful tool that allow you to test a condition and return one value if the condition is true, and another value if it's false. However, sometimes you may need to test for more than two outcomes. For example, you may want to categorize sales data as "low," "medium," or "high," depending on the amount of sales. To achieve this, you can nest IF functions inside one another. This means that you can use one IF function to test a condition, and if that condition is true, you can use another IF function to test a second condition, and so on. By nesting multiple IF functions, you can create a formula that can handle three or more outcomes.

Learn more about functions here

https://brainly.com/question/27816534

#SPJ11



Which of the following will be output data type of int +int ?

Answers

Answer:

int data type

Explanation:

Given

int + int

Required

Determine the data type of the output

I'll answer this question with the following illustration.

int x = 1

int y = 2

print(x + y)

At line 3, 1 and 2 will be added together.

\(1 + 2 = 3\)

And 3 will be printed as integer.

Because 1 and 2 are of type integer.

Hence, when two or more integer variable are added together, the result is also an integer.

PLEASE HELP !!!!!! INTERNET SAFTEY



Which of the following is a
place where cyberbullying doesn't occur?
O chat messages
O online groups
O on the football field
O cyberspace

Answers

On the football field

Answer:

C

Explanation:

If your on the foot ball field you cannot cyber bully there, for cyber bullying is online. Hope this helps :)

which sql statement is used to extract data from a database?a. EXTRACTb. GETc. SELECTd. OPEN

Answers

The SQL DELETE is used to delete data from a database.

Give an example of what SQL delete means.

The Data Manipulation Language, a subset of SQL that enables the alteration of data in databases, includes the Delete command. Existing records in a table can be deleted with this command. You can use this to either delete all the records from a table or selected records based on a criterion.

What do DELETE and truncate mean?

Depending on the supplied condition, the delete statement can be used to remove one or more records from an existing table. A table's whole contents are removed by the truncate command, but the table itself is left in place. It keeps the schema or table structure intact.

Learn more about The SQL DELETE

brainly.com/question/30629585

#SPJ4

7. On a control drawing, what's indicated by the bar under the rung location for a set of relay contacts?

Answers

Answer:

On a control drawing , the bar under the rung location for a set of relay contacts indicates (d) normally closed relay contact on that rung.

Explanation:

On a control drawing , the bar under the rung location for a set of relay contacts indicates normally closed relay contact on that rung.

As , when it resets that , the relay is in open. Normally relays works on low current rating upto 10A°

   

You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you can't even get to it at all. Your friends seem to be having the same problem. What could be happening? It might be getting hit with a DDoS attack. You might have malware preventing you from getting to the site. Your firewall is blocking the site. The site is undergoing upgrades and will be back soon.

Answers

Answer:

You might be geting hit by a DDoS

Explanation:

You have been trying all day to check your direct messages on social media. The site is really slow to

What three actions happen when you cloak a folder or file?

Answers

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

This question involves a class named RandomWord which will have a constructor and instance variables. When creating a new RandomWord object, you will need to pass it to two separate words as parameters. The RandomWord class contains
the following two methods:

randomLetter - This method returns a random letter from the specified word. It has one integer parameter, which is either 1 (to select a random letter from the first word), or 2 (to select a random letter from the second word). This method also concatenates this random letter to the end of the new random word.

getNewWord - This method returns the new word which was constructed from the random letters and also reinitializes the new word so that the next word can be generated.

The code needs to be written in Java

Answers

The Random Word class in this implementation has a function Object() { [native code] } that accepts two words as input and initialises instance variables for the words, the new random word, and a random object.

What are the methods and constructors for this Java random class?

The two constructors for the Java Random class are listed below: Random() generates new random numbers. With the provided seed, Random(long seed) generates a new random generator.

import random from java.util;

private Strings word1, word2, private String newWord, and private Random random make up the public class RandomWord.

This.word1 = word1; This.word2 = word2; This.newWord = ""; This.random = new Random(); public RandomWord(String word1, String word2);

char public randomLetter (int wordIndex) a string representing the word; if (wordIndex == 1), word should be word1; otherwise word equals word2, and

char letter = word; int index = random.nextInt(word.length()).

letter; newWord += letter; return letter; charAt(index);

public String getNewWord() String result = newWord; newWord = ""; return result;

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1

Select the correct answer. Ali is creating a document on a system using his login credentials. His colleague needs to use his system to access documents. His colleague does so with his own credentials while Ali is still logged in. What type of OS allows this kind of operation? A. single-user/single-tasking B. single-user/multitasking C. multiuser/single-tasking D. multiuser/multitasking

Answers

Answer:

Multiuser/Multitasking

Explanation:

The question will be answered using the following two points:

- The fact that the operating system allows Ali and his friend to be logged on at the same time is known as a multiuser operating system

- The fact that the operating system allows Ali's friend to access documents while Ali is still logged in is refer to as multitasking.

Combining these two, we can conclude that option D correctly answers the question.

Answer:

The answer is D. Multiuser/Multitasking.

Explanation:

Got it right on the edmentum test.

Other Questions
hey can u answer this pls Jane and Beth are selling cookies and cakes to make money they sell the cookies for $3 each and the cakes for $12 each in order for Jane and best to make at least $300 what is the minimum number of cakes they must sell if they only sell 25 cookies What is the output?>>> answer = "five times">>> answer[2:7] carla has a red shirt, a pink shirt, and a white shirt. She has blue jeans, yellow jeans, and black jeans. She also has solid colored shoes and striped colored shoes. How many different combinations can she make? periodontitis is associated with high proportions of: group of answer choices a) aerobic bacteria b) nonmotile bacteria c) gram-negative bacteria d) innocuous bacteria 1. A group of elements that includes the most active of the nonmetals is thea. nitrogen group.c. noble gases.b. alkaline earths.d. halogens. Write an equation if the line that passes through (0,-2) and (2,2) How is the federal government different from other producers? A. The government does not have to pay workers the minimum wage. B. The government must sell goods at less than what it costs to produce them. C. The government must get direction from producers on what it should develop. D. The government does not make a profit on what it produces. y is inversely proportional to a*3. when y=10, a=2. a is directly proportional to x. when x=4, a=20. find the formula of y in terms of x The internal rate of return takes into account all of an investment's cash flows over a period of time.True or false? Over the second half of the twentieth century, jazz subgenres still maintained the core foundations of bebop musicTrue or false QUESTION 2 There are four main factors that contribute to high or low self-esteem. Explain the bene of being confident and having a positive self-image. 2.1 Biologicalphysical factors looking good) 2.2 Paychological/mind factors 2.3 Spirtual/religious/mons factors 2.4 Social factors Helloooo possess I need help as soon as possible The ratio x:y is equal to is 2 : 5, and y is 80% of z. Write an equation to represent the proportional relationship between x and z. match each sentence to the tone it conveys. A gaseous hydrocarbon contains 80% carbon and 20% hydrogen, 1dm3 of the compound at s.t.p weighs 1.35g find the molecular formular (1 mole of any gas at s.t.p occupies 22.4dm3, C=12, H=1) Which of the following people were notinvolved in Japan's industrial prosperityafter World War I?A. farmers and industrial workersB. peasants and rural workersC. women and men of the country Part A: The sun produces 3.9 1033 ergs of radiant energy per second. How many ergs of radiant energy does the sun produce in 3.25 103 seconds?Part B: Which is the more reasonable measurement of the distance between the tracks on a railroad:1.435 103 mm or 1.435 103 mm? Justify your answer. How did the triangular slave trade work?A.Triangular trade never occurred B.Trade was expanded to India and West AfricaC.Ships sailed to three islands to reach West AfricaD.Ships sailed to West Africa,North/South Africa and Europe and made triple profit with cargo Estimate 81.244.+65.33 by first rounding each number to the nearest whole number