What is the name of a virus written in a macro language and placed within a document or spreadsheet.

Answers

Answer 1

Answer:

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications).

Answer 2
Coronavirus dis shi real

Related Questions

name two components required for wireless networking
(answer fastly)​

Answers

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

What is the difference between organizing your data in a list and organizing it in a data extension?

Answers

The difference between organizing your data in a list and organizing it in a data extension is that in a list, you organize subscribers by name. In a data extension, you organize them by region.

What is Data extension?A data extension contains contact information. A data extension is just a table with fields for contact information.Data extensions can work independently or in conjunction with other data extensions.The data may be used for searches, information retrieval, and sending to a selection of subscribers.You have two options for importing data extensions: manually or automatically using Automation Studio or the Marketing Cloud API.Both Contact Builder and Email Studio allow the usage of data extensions, but Email Studio is the only place where sharing, permissions, and other features are available.

To learn more about data extension, refer to the following link:

https://brainly.com/question/28578338

#SPJ4

1 )Write two ways to customize the
pictures in HTML document.​

Answers

Answer:

a)If anyone wants to append the picture on the website then he can do this with the help of <img> tag. ...

b)The CSS is used to set the border, color, height, and width of the elements of the HTML.e

(1) prompt the user for a title for data. output the title. (1 pt) ex: enter a title for the data: number of novels authored you entered: number of novels authored (2) prompt the user for the headers of two columns of a table. output the column headers. (1 pt) ex: enter the column 1 header: author name you entered: author name enter the column 2 header: number of novels you entered: number of novels (3) prompt the user for data points. data points must be in this format: string, int. store the information before the comma into a string variable and the information after the comma into an integer. the user will enter -1 when they have finished entering data points. output the data points. store the string components of the data points in an array of strings. store the integer components of the data points in an array of integers. (4 pts) ex: enter a data point (-1 to stop input): jane austen, 6 data string: jane au

Answers

The program prompts the user to enter a title for the data, then asks for the headers of two columns for a table. After that, it allows the user to input data points in the format of a string followed by an integer.

The program stores the string components in an array of strings and the integer components in an array of integers.

The program begins by requesting the user to provide a title for the data they wish to input. This title will be used to label the information they enter later. Once the user enters the title, it is displayed as output.

Next, the program asks for the headers of two columns in a table. The user is prompted to input the header for the first column and then the header for the second column. The program displays the column headers as output.

After that, the program enters a data input loop where the user can enter data points. Each data point consists of a string followed by an integer, separated by a comma. The program reads each data point and stores the string component in an array of strings and the integer component in an array of integers. This process continues until the user enters -1 to indicate that they have finished entering data points.

Finally, the program outputs the data points entered by the user and displays them on the screen.

This program allows the user to organize and store data in a structured manner, making it easier to analyze and manipulate the information as needed.

Learn more about Prompts

brainly.com/question/30273105

#SPJ11

A chipset's North Bridge connects to a processor via which of the following? A. PCI Bride B. IO Hub C. South Bridge D. Front Side Bus.

Answers

The North Bridge is a crucial component of a chipset and serves as an intermediary between the processor and other components on the motherboard. Hence, the correct answer is D. Front Side Bus (FSB).

The Front Side Bus facilitates communication between the processor and the North Bridge, allowing for the transfer of data and instructions. This connection plays a vital role in the overall performance of the system, as it governs the speed at which data is exchanged. In contrast, the other options you mentioned, such as the PCI Bridge, IO Hub, and South Bridge, have different functions within a computer system and do not directly connect the North Bridge to the processor.

In summary, the chipset's North Bridge connects to the processor via the Front Side Bus (FSB), ensuring efficient communication and data transfer between these components.

Learn more about motherboard here:

https://brainly.com/question/29834097

#SPJ11

For each of the properties listed below, indicate whether that property is for created threads, created processes, both or neither.
They share the same call stack Choose... - They share the same process ID Choose... They share the same heap Choose... - If the created thread ( process) encounters a segmentation fault and terminates, the main thread (process ) does not terminate Choose... If the created thread (process ) has terminated normally, the created thread (process ) remains in a zombie state until main thread (parent process ) calls join (wait) to reap the return value, or the main thread (process ) terminates Choose...

Answers

They share the same call stack: Created threads

They share the same process ID: Created processes

They share the same heap: Neither

If the created thread (process) encounters a segmentation fault and terminates, the main thread (process) does not terminate: Created processes

If the created thread (process) has terminated normally, the created thread (process) remains in a zombie state until the main thread (parent process) calls join (wait) to reap the return value, or the main thread (process) terminates: Created processes

They share the same call stack: Created threads share the same call stack. Threads within the same process share the same memory space, including the call stack. This allows threads to share local variables and function calls.

They share the same process ID: Created processes have their own process ID (PID). Each process is assigned a unique identifier to distinguish it from other processes running on the system.

They share the same heap: Neither created threads nor created processes necessarily share the same heap. The heap is a region of memory used for dynamic memory allocation, and it is typically managed separately for each process or thread.

If the created thread (process) encounters a segmentation fault and terminates, the main thread (process) does not terminate: This property applies to created processes. If a process encounters a segmentation fault and terminates due to a critical error, other processes or the main process on the system are not affected and can continue execution.

If the created thread (process) has terminated normally, the created thread (process) remains in a zombie state until the main thread (parent process) calls join (wait) to reap the return value, or the main thread (process) terminates: This property applies to created processes. When a process terminates but has not been fully cleaned up by its parent process, it enters a zombie state. The parent process needs to call the `join` or `wait` system call to collect the exit status of the terminated child process and free its resources.

Created threads share the same call stack, created processes have their own process ID, neither share the same heap, if a created process encounters a segmentation fault, the main process does not terminate, and if a created process terminates normally, it remains in a zombie state until the parent process calls `join` or `wait` to collect the exit status.

To know more about Segmentation Fault, visit

https://brainly.com/question/30765755

#SPJ11

. Write a function find_space which returns the number of spaces in a set of input characters. Write a main function that calls the *** character. The input is terminated by entering function find_space then prints the number of spaces entered.

Answers

The given content describes a task involving writing a program in a programming language. Here's a breakdown of the requirements:
def find_space(inp_str):
   count_space = 0
   
   for char in inp_str:
       if char == ' ':
           count_space += 1
   
   return count_space


def main():
   input_str = input("Enter a string:")
   print(find_space(input_str))


if __name__ == '__main__':
   main()```
The above code implements two functions. One is find_space() which takes a string as input and returns the number of spaces in that string.The other is main() function which takes an input string from the user and calls find_space() function to find the number of spaces in that string.

After entering the string, the user has to enter 'function find_space' to terminate the input. Then the number of spaces in the entered string will be printed.

To know more about  programming language visit:

https://brainly.com/question/23959041

#SPJ11

Sender FSM in RDT over Reliable Channel With Bit Errors & ACK/NAK Error Handling (RDT 2.1)

Answers

RDT 2.1 is an improvement of RDT 2.0 and uses a checksum to detect bit errors in received packets. In addition, it has added ACK/NAK error handling to improve reliability.

The Sender FSM in RDT 2.1 sends data packets with sequence numbers and waits for an ACK or NAK packet from the Receiver FSM.

If the Sender FSM receives a NAK packet, it re-sends the previous packet.

The Sender FSM also has a timeout mechanism to re-send packets that are not acknowledged within a certain time.

Learn more about reliable Channel at:

https://brainly.com/question/29107241

#SPJ4


Please Explain in a complete answer!
•Compare memory replacement algorithms
X86-based processor L1 and L2 memory (Intel and
AMD)

Answers

Memory replacement algorithms are widely used in computer architecture and are used to decide which memory locations will be overwritten when a new data is added to a full cache.

Here we will compare the memory replacement algorithms, FIFO, LRU and random replacement algorithms. Also, we will discuss the memory organization of X 86-based processor L1 and L2 memory from Intel and AMD. Memory Replacement Algorithms First, we will discuss the memory replacement algorithms.

FIFO stands for first in, first out which means that the oldest item in a cache will be removed first. This algorithm is simple to implement, but not optimal in terms of cache performance. LRU stands for least recently used. It means that the item that was least recently used will be replaced. LRU is the best algorithm in terms of performance because it gives the best possible cache hit rate. Random replacement is a straightforward algorithm that chooses a random memory block to replace when there is no space for new data. X86-based processor L1 and L2 memory Intel and AMD both produce X86-based processors.

They differ in the organization of their L1 and L2 memory. Intel processors have split L1 caches for data and instructions. These caches are further divided into four 32KB sections. One of these sections can be used for instruction prefetching. On the other hand, AMD processors have a combined L1 cache for both data and instructions. The L2 cache of both Intel and AMD processors is shared between all cores.

Intel processors use a ring bus to connect all cores to the cache, while AMD uses a hyper-transport link. In conclusion, memory replacement algorithms are essential for optimal cache performance.

To know more about algorithms visit:

https://brainly.com/question/21172316

#SPJ11

udp is sometimes the protocol of choice for flooding attacks on the internet because it is easy to send udp packets with spoofed source address.

Answers

The statement udp is sometimes the protocol of choice for flooding attacks on the internet because it is easy to send udp packets with spoofed source address is true because UDP is a connectionless protocol that does not require a handshake or reliable delivery of data like TCP.

One common type of flooding attack is the UDP flood attack, where an attacker sends a large volume of UDP packets to a target system or network, overwhelming its resources. This can result in a denial of service (DoS) situation where the target becomes unable to handle legitimate network traffic.

The ease of spoofing the source address in UDP packets adds to the appeal for attackers. By spoofing the source address, they can hide their true identity and make it difficult to trace the attack back to its source.

Learn more about udp https://brainly.com/question/20038618

#SPJ11

During the first 10 weeks of a resistance training program, the initial increase in muscular strength are due primarily to

Answers

During the first 10 weeks of a resistance training program, the initial increase in muscular strength is primarily due to neuromuscular adaptations.

These adaptations include improvements in motor unit recruitment and synchronization, increased neural drive to the muscles, and enhanced intermuscular coordination. In other words, the nervous system becomes more efficient at activating the muscles, resulting in greater force production. This initial increase in strength is often referred to as neural adaptation, as opposed to hypertrophy (muscle growth), which takes longer to develop. However, as the individual continues with the resistance training program, hypertrophy becomes a more significant factor in increasing strength. It is essential to note that proper form, progressive overload, and sufficient recovery are crucial for optimizing strength gains during the initial 10 weeks and beyond.

To know more about  muscular strength visit:

https://brainly.com/question/12088161

#SPJ11

A train traveled at a constant speed for six hours and traveled a distance of 408 miles. What is the best estimate of the number of miles the train could travel in 2.5 hours? *

Answers

Answer:

this is math but htthe answer is 163.2 but you can just put 163

Expla

a unit that moves shelves in the unit around a central hub to bring files to the operator is

Answers

The unit you are describing is called a "rotary file system" or a "rotary filing cabinet." It is a type of storage system that consists of circular shelves that rotate around a central hub to bring files or other stored items to the user.

Files are a common means of organizing and storing information in various formats, such as text, images, and multimedia. They are typically identified by a unique name and extension, which denotes the type of data they contain. Files can be stored on different types of storage media, including hard drives, flash drives, CDs, and cloud storage. They can be opened and edited using specific software applications or viewed in a web browser. Effective file management is essential for maintaining organization, security, and accessibility of information. This includes practices such as naming conventions, version control, and backup strategies. With the increasing amount of digital data generated, efficient file management is becoming increasingly important in personal and professional settings.

Learn more about files here:

https://brainly.com/question/14194096

#SPJ11

A unit that moves shelves in the unit around a central hub to bring files to the operator is known as an automated storage and retrieval system (ASRS).

High-density storage systems that automatically store and retrieve things are known as automated storage and retrieval systems (ASRS). They are utilised in many different places, such as factories, warehouses, and distribution centres. The automated storage and retrieval of objects provided by the ASRS system helps to increase productivity and lower labour expenses.

Comparing the ASRS system to conventional storage systems reveals a number of advantages. It offers high-density storage, which allows for the storage of more objects in a smaller area. As a result, less space is needed for storage, which can result in significant financial savings. Additionally, the technology allows for quicker item access, which boosts productivity and lowers labour expenses.

The ASRS system can also be connected with other systems, such as order fulfilment and inventory management systems. Errors are decreased and overall efficiency is increased thanks to this integration.

Learn more about the storage and retrieval system :

https://brainly.com/question/8042791

#SPJ11

were i can use screwdriver

Answers

Answer:

On a screw

Explanation:

When _____ is typed in a cell, it will be left-aligned.
A. =A1+A2
B. 700.22
C. '01254
D. 01254

Answers

Answer:

A1+A2

Explanation:

got it right

Why is traversal with a for loop a good method for accessing and updating items in a lengthy list?

Answers

Answer:

Because you want to process every item in the list in a similar way, you can use a loop to iterate through every item and take some action with it.

Explanation:

hopefully this helped

A for loop provides a simple and efficient method of performing ;

a particular operation on every item in a specified range or listUsing every item in a list to achieve a certain objective.

The for loop method provides a straight forward process of picking items or values in a specified range one after the other.

The selected values in the range may be used to perform a particular operation such as multiplying each number in a range by another value.

When a specified task is to be accomplished requiring that items in a certain range are required, then a for loop provides the convenience to achieve such task.

Therefore, for loops are very popular in programming due to their capability in handling repetitive task on a range of items.

Learn more :https://brainly.com/question/18768438

write java statements to accomplish each of the following tasks: display the value of element 6 of array f. initialize each of the five elements of one-dimensional integer array g to 8. total the 100 elements of floating-point array c. copy 11-element array a into the first portion of array b, which contains 34 elements. determine and display the smallest and largest values contained in 99-element floating-point array w.

Answers

Display element 6 of array f, Initialize each element of array g to 8. Total the elements of array c. Copy array a to the start of array b. Find and display the smallest and largest values in array w.

Here are Java statements that accomplish each of the tasks:

System.out.println(f[6]);

int[] g = new int[5];

Arrays.fill(g, 8);

double total = 0.0;

for (int i = 0; i < c.length; i++) {

   total += c[i];

}

System.out.println("Total: " + total);

int[] b = new int[34];

System.arraycopy(a, 0, b, 0, 11);

double smallest = w[0];

double largest = w[0];

for (int i = 1; i < w.length; i++) {

   if (w[i] < smallest) {

       smallest = w[i];

   } else if (w[i] > largest) {

       largest = w[i];

   }

}

System.out.println("Smallest value: " + smallest);

System.out.println("Largest value: " + largest);

Learn more about Java here:

https://brainly.com/question/29897053

#SPJ11

my PC won't output any data does anyone have any ideas​

Answers

have you tried using a different drive?

20 points for ez question lol

Which are characteristics of effective presentations? Check all that apply.

The presentation is well organized.
The presenter speaks clearly.
The presenter reads from notecards.
The presentation is enhanced with visual aids.
The presentation includes some delay to set up audio or video.
The presentation captures the audience’s attention.

Answers

The characteristics of effective presentations are:

The presentation is well organized. The presenter speaks clearly.

What are characteristics of an effective presentation?

Others are:

The presentation is enhanced with visual aids. The presentation captures the audience’s attention.

A good presentation is known to be one that is often concise and also  focused on the topic that is under discussion.

Note that when the above presentation follows the option written above, it is said to be an effective or good presentation.

Learn more about presentations from

https://brainly.com/question/24653274

#SPJ2

Answer:

A,B,D,F

Explanation:

The presentation is well organized.

The presenter speaks clearly.

The presentation is enhanced with visual aids.

The presentation captures the audience’s attention.

which of the following describes the transfer risk response method

Answers

The transfer risk response method involves transferring the risk of a potential negative event to a third party. This is done by purchasing insurance, outsourcing a task to a vendor, or entering into a contractual agreement that shifts the responsibility for the risk to another party.

The transfer risk response method is one of the several methods that organizations use to respond to risks. It involves transferring the risk to a third party, such as an insurance company, a vendor, or another organization. The objective of the transfer risk response method is to reduce the impact of the potential negative event on the organization by shifting the responsibility for managing the risk to a party that is better equipped to handle it.

One common way to transfer risk is through purchasing insurance. Insurance policies can cover a wide range of risks, from property damage to liability claims, and they provide financial protection to the organization in case of a loss. The organization pays premiums to the insurance company, and in exchange, the insurance company agrees to pay for any losses that fall within the policy's coverage. This method of risk transfer is commonly used by organizations to mitigate the financial impact of potential losses. Another way to transfer risk is through outsourcing tasks to vendors or contractors. By outsourcing, the organization shifts the responsibility for the risk associated with the outsourced task to the vendor. For example, an organization might outsource its IT infrastructure management to a third-party vendor, who would then be responsible for managing the risk associated with maintaining the IT infrastructure. This method of risk transfer is often used when the organization does not have the expertise or resources to manage the risk internally. Lastly, organizations can also transfer risk through contractual agreements. For example, a construction company might enter into a contract with a client that includes a clause that transfers the risk of project delays to the client. By doing so, the construction company reduces its exposure to the risk of project delays, as the client is now responsible for managing the risk. This method of risk transfer is often used in industries where contracts are a common part of doing business. In summary, the transfer risk response method involves shifting the responsibility for managing a potential negative event to a third party. This can be done through purchasing insurance, outsourcing tasks to vendors or contractors, or entering into contractual agreements that transfer the risk to another party. By using this method, organizations can reduce their exposure to risk and mitigate the potential impact of a negative event. the transfer risk response method is a risk management technique where the responsibility and ownership of a risk are shifted to another party, such as through insurance or outsourcing. This approach helps in mitigating the potential impact of the risk on the project.

To know more about transferring visit:

https://brainly.com/question/31945253

#SPJ11

given that k is an integer array starting at location 2000, kptr is a pointer to k, and each integer is stored in 4 bytes of memory, what location does kptr 2 point to? (a) 2004 (b) 2008 (c) 2012 (d) 2024

Answers

The position to 2008 will kptr 2 point based on the information provided in the query.

What in programming is a pointer?

A port is a type of variable that holds as its value the memory location of another type of variable. The * operator creates a pointer variable, which refers to a type of data (like an int) of the same type.

Why is C using pointers?

For handling files, pointers are utilized. To allocate memory dynamically, pointers are utilized. A pointer to a class name in C++ could be used to retrieve an object of a subclass. A reference to a subclass, however, is unable to access a base class object.

To know more about pointer visit:

https://brainly.com/question/19570024

#SPJ4

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

A variable, usually a bool or an int, that signals when a condition exists is known as a(n):

Answers

A variable, usually a bool or an integer, that signals when a condition exists is a flag.

What is a variable?

Generally, variables are containers for storing values.

A variable is a memory location where you store a value.

The value that you have stored may change in the future according to the specifications.

Therefore, a a variable usually a bool or an integer, that signals when a condition exists is a flag

learn more on variable here: https://brainly.com/question/14500181

#SPJ2

write a recurseive string-returned function replace that accepts a string and returns a new string consisting of the original string with each blank replace with an asterisk

Answers

Answer:

Write a recursive, string -valued method, replace, that accepts a string and returns a new string consisting of the original string with each blank replaced with an asterisk (*)

Explanation:

Replacing the blanks in a string involves: Nothing if the string is empty Otherwise: If the first character is not a blank, simply concatenate it with the result of replacing the rest of the string If the first character IS a blank, concatenate an * with the result of replacing the rest of the string

More help with Python please help! Either of the questions I'd appreciate!

More help with Python please help! Either of the questions I'd appreciate!

Answers

Answer:

lol i just forgot it sorry if i remember than i will answer

The weather in a particular location is influenced by _______.

Answers

Answer:

the latitude,altitude, and vegetation.

Explanation:

Those are the only ones I can think of right now.

How many bits strings of length 12 contain (8 pts)? a. exactly three 1s? b. at most three 1s? c. at least three 1s? d. an equal number of 0s and 1s?

Answers

1. Exactly three 1 s?

\($$\left(\begin{array}{c}12 \\3\end{array}\right)=220$$\)

2. At most three\($1 \mathrm{~s}$\) ?

\($$\left(\begin{array}{c}12 \\0\end{array}\right)+\left(\begin{array}{c}12 \\1\end{array}\right)+\left(\begin{array}{c}12 \\2\end{array}\right)+\left(\begin{array}{c}12 \\3\end{array}\right)=1+12+66+220=299 \text {. }$$\)

3. At least three 1 s?

Take a shortcut by using the previous answer:\($2^{12}-66-12-1=4017$\)

4. An equal number of\($0 \mathrm{~s}$\) and \($1 \mathrm{~s}$\) ?

\($$\left(\begin{array}{c}12 \\6\end{array}\right)=924$$\)

What is strings ?

The C programming language includes a set of functions executing operations on strings in its standard library. Different operations, such as copying, concatenation, tokenization, and searching are supported.

In C programming, a string exists as a sequence of characters terminated with a null character \0. For example char c[] = "c string"; When the compiler discovers a sequence of characters enclosed in the double quotation marks, it appends a null character \0 at the end by default. The C language does not have a distinctive "String" data type, the way some other languages such as C++ and Java do. Instead, C stores strings of characters as arrays of chars, completed by a null byte.

1. Exactly three 1 s?

\($$\left(\begin{array}{c}12 \\3\end{array}\right)=220$$\)

2. At most three\($1 \mathrm{~s}$\) ?

\($$\left(\begin{array}{c}12 \\0\end{array}\right)+\left(\begin{array}{c}12 \\1\end{array}\right)+\left(\begin{array}{c}12 \\2\end{array}\right)+\left(\begin{array}{c}12 \\3\end{array}\right)=1+12+66+220=299 \text {. }$$\)

3. At least three 1 s?

Take a shortcut by using the previous answer:\($2^{12}-66-12-1=4017$\)

4. An equal number of\($0 \mathrm{~s}$\) and \($1 \mathrm{~s}$\) ?

\($$\left(\begin{array}{c}12 \\6\end{array}\right)=924$$\)

To learn more about strings refer to:

https://brainly.com/question/27251062

#SPJ4

FILL IN THE BLANK The base class access specification determines how ____ members in the base class may be accessed by derived classes

Answers

The base class access specification determines how inherited members in the base class may be accessed by derived classes.

In object-oriented programming, a base class (also known as a superclass or parent class) is a class that serves as the foundation for derived classes (also known as subclasses or child classes). The base class can define various members, such as variables, methods, and properties.

The access specification in the base class determines the visibility and accessibility of these members when they are inherited by derived classes. It specifies the level of access that derived classes have to the members inherited from the base class.

There are typically three access specifiers used in most object-oriented programming languages: public, protected, and private.

Public access allows derived classes to access the inherited members as if they were their own. Public members in the base class are accessible and visible to derived classes.Protected access restricts direct access to inherited members from outside the class hierarchy. Derived classes can access and modify protected members inherited from the base class.Private access restricts access to the inherited members to only the base class itself. Derived classes cannot directly access or modify private members inherited from the base class.

By specifying the appropriate access specification for the base class members, developers can control how derived classes interact with and modify inherited members, ensuring encapsulation, data hiding, and proper abstraction in object-oriented programming.

Learn more about Programming languages: https://brainly.com/question/16936315

#SPJ11

Who here has an old (preferably 80s) Toyota Celica i just bought mine and want to know how you guys like yours because mine is fine ash ;)

Answers

Answer:

Explanation:

The 1980 Toyota Celica is a great car, it was my first car and I loved it. It has many luxury features that you don't see much in cars of that year. It is also extremely reliable and can take lots of use before beginning to give problems. I used to use it to get to and from school on a daily basis and it never once left me stranded. It includes power steering, cruise control, AC, etc. Not much more you can ask for in a car, it is also a very beautiful looking car, especially a well taken care of one. Enjoy your car.

do you believe people or more or less ethical then they were fifty years ago?

Answers

Answer:

Explanation:Most people, including adults, are followers when it comes to ethics. When asked or told to do something unethical, most will do so. ... Fact: "Unethical behavior is nothing new and people are probably not less ethical than they used to be.

Other Questions
ead the sentence a student wrote.As he listened to the haunting notes of the song the author realized he had found the inspiration for his next suspense novel.The teacher reviewing this sentence would point out that since this is acomplex sentence, there should be a comma after song.compound sentence, there should be a comma after realized.complex sentence, there should be a comma after inspiration.compound sentence, there should be a comma after found. In a random sample of 750 bowling balls at a manufacturing plant, four were found to have manufacturing defects or imperfections. If there are 4,125 bowling balls being produced in the current run, how many of them could be expected to have defects or imperfections? Which sentence from the passage best supports the generalization that the best goals are ones that you have control over?Savvy goals are easy to understand and use.Measurable goals define exactly what you intend to accomplish.Active goals tell you what specific action youre taking.Reachable goals stretch you but still feel within your reach. anthropology emerged as a discipline in the ___________, during the peak of european colonialism and imperialism. Why is the Kampanpangan language dying out? in a race a car travels 60 times around a 3.6km track, this takes 2.4 hours. What is the average speed of the car ? Yeah lease help me yall I would really appreciate it thank you!! ms Gregory has a coupon for dsw for 1/7 off of her total purchase. she purchases 4 pairs of shoes for her and her friends wich are $252. how much will she pay with her coupon Required : You are to prepare the Arc's federal income tax return in good form . You are not to complete an Ohio state income tax return . The following and schedules are required and may be found in parts 1 Suppose you want to have $300,000 for retirement in 35 years. Your account earns 4% interest. How much would you need to deposit in the account each month? what are the two main elements found in ceramics? sodium (na) and silicon (si) carbon (c) and oxygen (o) hydogen (h) and silicon (si) oxygen (o) and silicon (si) An example of a vestigial structure in humans is the complete set of ______ for wiggling our ______, similar to that of many other mammals I need to know if this is a function Problem 1 (20 points) The beamABCis subjected to a point load at the middle of segmentABand a uniformly distributed load at the segmentBC, as shown in the figure. a) Find the equation of the elastic curve for the segmentAB. b) Find the maximum absolute value of the deflection between the supportsAandBc) Find the deflection at the middle of the segmentABd) Find the deflection at point C. Setw 0 =3 N/m,L=2 m,EI=25000Nm^2. Use the method of superposition for all parts. Hint: forx>L/2in segmentAB, the solution can be obtained from the table by replacingxbyLx. Michelle is working on a design for a new building. She has built a model of the building according to the client's specifications.The height of the model is 15 inches, the slant height of the model is approximately 17 inches, and the base has a length of14 inches and a width of 20 inches.wNote: picture not drawn to scale.Michelle must order appropriate equipment to heat and cool the building, so she must use the model to determine how muchspace there will be inside. What is the volume of her model? (Round to the nearest hundredth, if necessary.)OA5,600 cubic inchesOB1,400 cubic inchesOC. 280 cubic inchesOD980 cubic inches Five types of electronic sensors include: inductive, capacitive, photoelectric, hall effect, and __________. how to make 1/250 a percent TIME STAMP PROMPT.Please create a 1-1/2 page story based on the following:3:41 PMThat's it. 3:41 PM. Now come up with some magic!!! You can write anything that includes this time . A is a finite non-empty set. The domain for relation R is the power set of A.(Recall that the power set of A is the set of all subsets of A.) For X A and Y A, X is related to Y if X is a proper subsets of Y (i.e., X Y). Choose the description that accurately describes relation R. a. Symmetric and Reflexive b. Anti-symmetric and Reflexive c. Symmetric and Anti-reflexive d. Anti-symmetric and Anti-reflexive Please help. Are they parallel?