Whats the impact of the three distinguishing the computing power of computers

Answers

Answer 1

Processor speed: The processor speed refers to the clock speed at which the CPU (Central Processing Unit) can execute instructions. The speed at which a computer can conduct computations distinguishing

In the context of computing power, "distinguishing" refers to the characteristics that distinguish one computer from another in terms of performance. These aspects often have something to do with the computer's technical specs, such as the CPU speed, memory size, and storage size. By differentiating computers according to these criteria, we may assess and compare their relative processing capability and decide which one is more appropriate for a given task. For instance, a computer with more memory and a faster CPU could be more suited to multitasking than one with less memory and resource-intensive applications. Making intelligent selections when purchasing computers requires the ability to identify them based on their computational

Learn more about differentiating here:

https://brainly.com/question/1558432

#SPJ4


Related Questions

Write a program that continually reads user input (numbers)
until a multiple of 7 is provided. This functionality must be
written in a separate function, not in main().

Answers

Here is a Python program that continually reads user input (numbers) until a multiple of 7 is provided. This functionality is written in a separate function, not in main(). The program uses a while loop to keep reading input until the user enters a multiple of 7:```def read_until_multiple_of_7():

x = int(input("Enter a number: "))  

while x % 7 != 0:    

x = int(input("Enter another number: "))  print("Multiple of 7 detected: ", x)```Here's how the code works:1. The function `read_until_multiple_of_7()` is defined.2. The variable `x` is initialized to the integer value entered by the user.3. A while loop is used to keep reading input until the user enters a multiple of 7.

The loop condition is `x % 7 != 0`, which means "while x is not a multiple of 7".4. Inside the loop, the user is prompted to enter another number. The input is read as an integer and stored in the variable `x`.5. When the user finally enters a multiple of 7, the loop exits and the function prints a message indicating that a multiple of 7 was detected, along with the value of `x`.Note: Make sure to call the `read_until_multiple_of_7()` function from your `main()` function or from the interactive interpreter to test it out.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ11

How can middleware be used in angular.

Answers

Answer:

when a rquest comes in to the application

You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?

a. Video should use lossy compression because it usually has a large file size which we need to reduce.
b. Text should use lossy compression because it always has a large file size which we need to reduce.
c. Audio should use lossy compression to save data and transmit quickly.

Answers

Answer: I think that it should all use lossless compression.

Explanation: it will reduce the space it take up in the files and it was be able to save data and help with transmission.

A Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos

What is Lossy compression?

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

The type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.

Since lossless compression is such that even after the file size is reduced, the quality remains unchanged. There are type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.

Hence, Lossy compression should be applied to text messages and music. Lossless compression should be applied to images and videos.

Read more about file compressions at:

brainly.com/question/13663721

#SPJ2

A method of changing unproductive thoughts into constructive ones is called

meditation.
visualization.
positive self-talk.
deep breathing.

Answers

A method of changing unproductive thoughts into constructive ones is called meditation. Hence, option A is correct.

What is unproductive thoughts?

An inclination or habit is a mindset that doesn't offer any benefits, effects, or results. Such a mindset pulls the client's focus away from his goals, fulfillment, and empowerment. Negative thoughts may be part of an unproductive mindset.

Overthinking, sometimes referred to as rumination, is when you keep returning to the same idea or event in your mind until it starts to interfere with your life. The two primary forms of overthinking are worrying about the future and brooding on the past.

People who have previously faced difficulty for which they were unprepared may get into the habit of catastrophizing.

Thus, option A is correct.

For more information about unproductive thoughts, click here

https://brainly.com/question/16875515

#SPJ6

Answer:positive self talk

Explanation:

modifications to the source code of an open source program cannot be added to the product.

Answers

We can see here that it is false that modifications to the source code of an open source program cannot be added to the product.

What is source code?

Source code is the human-readable version of a computer program. It is written in a programming language that is designed to be easy for humans to read and understand. The source code is then compiled into machine code, which is a series of instructions that can be directly executed by the computer.

Modifications to the source code of an open source program can be added to the product. In fact, this is one of the main benefits of open source software.

Learn more about source code on https://brainly.com/question/4593389

#SPJ4

education leads to higher wages lower unemployment.* True or false

Answers

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

apps can help facilitate one-on-one communication between a manager and each employee, developing a higher-quality relationship that increases performance according to what theory?

Answers

According to transactional leadership, apps can assist in facilitating one-on-one communication between a manager and each employee, creating a higher-quality relationship that boosts performance.

What can managers do to enhance communication with their staff members?

This advice is very useful for managers. One of the best things you can do is let your staff know what's going on at the firm because effective communication depends on everyone being informed. Not obvious enough? It turns out that many workers believe they are not involved in the decisions made by management.

What exactly is managing up, and why is it crucial?

Additionally, it's your best opportunity to hear from your employee, and it's their time, not yours. In its most basic form, managing up refers to the concept of controlling your manager.

To know more about transactional leadership visit :-

https://brainly.com/question/11210892

#SPJ1

what is the shortcut key that repeats the last task?

Answers

Answer:

Cntrl+Y

Explanation:

100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.

Answers

The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.

Learn more about Pseudo code here:

https://brainly.com/question/21319366

#SPJ11

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Which of the following are protocols that you find at the application layer of the OSI model? a. TCP and UDP b. IP and ICMP c. HTTP and FTP d. Ethernet and Token Ring

Answers

The application layer of the OSI model deals with the communication protocols that enable user applications to access the network services. Among the given options, the protocols that are commonly found at the application layer are c. HTTP and FTP. HTTP (Hypertext Transfer Protocol) is used to transfer web pages over the internet and is the foundation of the World Wide Web.

FTP (File Transfer Protocol) is used for transferring files between servers and clients over the internet. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that provide communication between devices on a network. They ensure that data is delivered reliably and accurately from one device to another. IP (Internet Protocol) and ICMP (Internet Control Message Protocol) are network layer protocols that provide routing and addressing capabilities in the network. IP is responsible for delivering packets of data from one network device to another while ICMP is used for error reporting and network diagnostics. Ethernet and Token Ring are data link layer protocols that provide the physical connection between devices on a network. They deal with the transmission of data between devices on the same network segment. In conclusion, HTTP and FTP are the protocols that are commonly found at the application layer of the OSI model.

Learn more about Hypertext Transfer Protocol here-

https://brainly.com/question/3308534

#SPJ11

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards. Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it is not displayed in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem

Answers

Answer: reboot

Explanation:

literally most if not all driver errors are solved by a reboot, and if that doesnt work then you reinstall the driver by going to the manufacturers website

Why is it necessary to develop the quality of being responsible? A. B. C. to nurture successful careers and set an example fo to impress your colleagues and seniors to achieve success at a faster rate O D. for effective time management​

Answers

To nurture successful careers and responsibility is crucial because it gives people a sense of purpose and helps society as a whole develop resilience in the face of adversity.

Why is it important to develop responsibility?The capacity to act is what we call responsibility.Not unable to move because of nervousness, immobilized by dread, or delaying, hiding the issue.Being responsible entails being organized but not overly anxious. Planning is necessary, but not meticulous schemes in order to manage the unpredictable.Accepting uncertainty, knowing you'll control what you can, and letting go of what you can't are all components of responsibility.In order to be responsible, a reaction must be proportionate to the issue and flexible enough to accommodate new challenges.Responsible people respect others' rights, are dependable, keep their word, and care about the environment. All facets of our life - including athletics, providing opportunities for others to flourish, and making the right decisions - are infused with responsibility.

Learn more about responsibility refer to :

https://brainly.com/question/1088493

#SPJ9

a network requires at least three computers and a shared resource. group of answer choices true false

Answers

True. A network requires at least three computers and a shared resource.

In order to establish a network, a minimum of three computers and a shared resource are necessary. A network enables the computers to communicate and share information, files, or services with each other. The shared resource could be a printer, a file server, an internet connection, or any other component that can be accessed and utilized by multiple computers within the network. Having at least three computers allows for connectivity and interaction between multiple nodes, creating a networked environment where data can be transmitted and shared.

Learn more about network here:

https://brainly.com/question/29350844

#SPJ11

give atleast 10 examples of transition and animation​

Answers

fade in and outZoom in or out Slide up, down, left and right, horizontally or vertically, clockwise or counterclockwise, Jump in and out Wipe up, down, left, and right. Dissolve Fly in and out split vertically or diagonally

With samples, define animation and transition.

A slide's individual elements, such as text, a shape, an image, etc., can have a unique effect called an animation. When you leave one slide and progress on to the next during a presentation, a transition takes place.

Which four motion and transition effects are there?

Entrance, emphasis, exit, and motion paths are the four different kinds of animation effects available in PowerPoint. These represent the moment at which the animation should start.

To know more about fade in visit:

https://brainly.com/question/31260859

#SPJ9

James is creating a presentation for his class. The presentation includes photos of his classmates throughout the year. He would like some of the photos to fit inside shapes. How should James insert the shapes onto the slide?​

Answers

Answer: crop and shape.

Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that calculations. What could she use instead?

Answers

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

How to determine the code to use

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

\(y = x^\frac13\)

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

https://brainly.com/question/365670

Answer:

The code that Rachelle can use is x**(1/3).

Explanation:

#BrainliestBunch

To sign into an online portal, you must enter a certain password. You have n passwords to choose from, but only one of them matches the correct password. You will select a password at random and then enter it. If it works, you are logged in. Otherwise, you will select another password from the remaining n−1 passwords. If this one works, you are logged in after two attempts. If not, you will choose a third password from the remaining n−2 passwords and so on. You will continue this process until access is granted into the portal. (a) What is the probability you will gain access on the kth login attempt, where k∈{1,2,3,…,n−1,n} ? (b) Suppose now that n=500, and the system will automatically lock after three failed login attempts. What is the probability you will gain access into the portal?

Answers

(a) The probability of gaining access on the kth login attempt, where k∈{1,2,3,…,n−1,n}, can be calculated using the concept of conditional probability.

(b) To determine the probability of gaining access into the portal when n=500 and the system locks after three failed attempts, we need to consider the different scenarios that lead to successful login within three attempts.

How can we calculate the probability of gaining access on the kth login attempt and the probability of gaining access when n=500 with a maximum of three attempts?

(a) The probability of gaining access on the kth login attempt can be calculated as follows:

The probability of selecting the correct password on the first attempt is 1/n.The probability of selecting an incorrect password on the first attempt and then selecting the correct password on the second attempt is (n-1)/n * 1/(n-1) = 1/n.Similarly, for the kth attempt, the probability is 1/n.

Therefore, the probability of gaining access on the kth attempt is 1/n for all values of k.

(b) When n=500 and the system locks after three failed attempts, we need to consider the scenarios in which access is gained within three attempts.

The probability of gaining access on the first attempt is 1/500.The probability of gaining access on the second attempt is (499/500) * (1/499) = 1/500.The probability of gaining access on the third attempt is (499/500) * (498/499) * (1/498) = 1/500.

Therefore, the probability of gaining access within three attempts is 3/500 or 0.006.

Learn more about probability

brainly.com/question/31828911

#SPJ11

A four-stroke engine is one in which the piston goes through evolutions for each power stroke: intake, compression, power, and exhaust.


True

False

Answers

Answer:

that is true.

........

.

True the reason why is because of the way it is built and how it contrasts in between these

1. DISCUSSION - 90% of adults are older than average All Sections 1515 unread replies.4747 replies. A researcher said that in a certain city, 90% of adults are older than the average age of adults in the city. Discuss whether or not this is possible.

Answers

No, it is not possible for 90% of adults to be older than the average age of adults in a city as it contradicts the concept of calculating an average based on the entire population.

Is it possible for 90% of adults to be older than the average age of adults in a city?

It is not possible for 90% of adults to be older than the average age of adults in a city. By definition, the average age represents the sum of all ages divided by the number of individuals.

If 90% of adults were older than the average age, it would mean that the remaining 10% of adults would have to be significantly younger to bring down the average.

However, the average age includes all adults, so it is mathematically impossible for the majority (90%) to be older than the average.

This statement appears to be contradictory or based on a misunderstanding of how averages work.

Learn more about average age

brainly.com/question/18029149

#SPJ11

Consider the line of code used in the photo resistor lab, int reading analogRead (lightPin); If the value of the variable reading is 40, what is the voltage read from the lightPin in Volts?

Answers

If the value of the variable reading is 40, the voltage read from the lightPin is approximately 0.195 Volts.

To calculate the voltage read from the lightPin in the photoresistor lab when the variable "reading" has a value of 40, you can use the following steps:

1. Take the value of the reading, which is 40.
2. Divide the reading value by the maximum ADC value, which is 1023 for a 10-bit ADC like the one used in Arduino boards.
3. Multiply the result by the reference voltage, which is 5V for most Arduino boards.

Therefore, in the photoresistor lab, if the value of the variable "reading" is 40, the voltage read from the lightPin can be calculated as follows:

Voltage = (40 / 1023) * 5V
Voltage ≈ 0.195V

Therefore, the voltage read from the lightPin is approximately 0.195 Volts.

To learn more about voltage visit : https://brainly.com/question/27861305

#SPJ11

are the following statements h0 : = 7 and h1 : ≠ 7 valid null and alternative hypotheses? group of answer choices no, there are no parameters contained in these statements.

Answers

The statements h0: = 7 and h1: ≠ 7 are not valid null and alternative hypotheses since they do not contain any parameters to test. A valid hypothesis should have parameters that can be tested statistically.

No, the statements h0: = 7 and h1: ≠ 7 are not valid null and alternative hypotheses. This is because they do not contain any parameters to test.A hypothesis is a statement made to assume a particular event or relationship among different events. A null hypothesis is a hypothesis that is assumed to be true until proven otherwise by statistical analysis.

An alternative hypothesis is the hypothesis that is assumed to be true if the null hypothesis is rejected or proved to be incorrect.In statistics, the null hypothesis is denoted by h0 while the alternative hypothesis is denoted by h1. Both h0 and h1 should contain parameters that can be tested statistically. In this case, h0: = 7 and h1: ≠ 7 do not contain any parameters to test. Therefore, they are not valid null and alternative hypotheses.

A null hypothesis is a statement that assumes that there is no relationship between variables. It is used to test the statistical significance of the relationship between variables. An alternative hypothesis, on the other hand, assumes that there is a relationship between variables.The statements h0: = 7 and h1: ≠ 7 do not contain any parameters to test. Therefore, they are not valid null and alternative hypotheses. They cannot be used to test the relationship between variables. A valid hypothesis should have a parameter that can be tested statistically.

To know more about hypotheses visit:

brainly.com/question/33444525

#SPJ11

Which of the following is not one of the five characteristics common to high-quality information? A. Accuracy B. Completeness C. Quantity D. Consistency

Answers

The characteristic that is not common to high-quality information is Quantity.

So, the correct answer is C.

The other four characteristics - accuracy, completeness, consistency, and relevancy - are all important in ensuring that information is of high quality.

Accuracy refers to the correctness of the information, completeness refers to whether all necessary information is included, consistency refers to the absence of contradictions, and relevancy refers to whether the information is pertinent to the topic at hand.

While having a large quantity of information may be useful, it is not a guarantee of quality and can even detract from the usefulness of the information if it is not relevant or accurate.

Hence, the answer of the question is C.

Learn more about accurate information at https://brainly.com/question/30713249

#SPJ11

(True or False) The speed at which data travels on a bus is referred to as the word size.

Answers

Answer:

True

Explanation:

The given statement "The speed at which data travels on a bus is referred to as the word size" is false because the speed at which data travels on a bus is referred to as the bus speed, bus frequency, or bus clock speed.

Given that;

The speed at which data travels on a bus is referred to as the word size.

Now, The word size, on the other hand, refers to the number of bits that a CPU or computer system can process at once.

It is a fundamental characteristic of a computer's architecture and is determined by the number of bits that the CPU can process in a single instruction.

Hence the correct answer is option B. False.

Learn more about CPU bus speed at

brainly.com/question/8179207

#SPJ3

You want to connect the lan port on a router to the uplink port on a switch. The switch does not support auto-mdi. Which type of cable should you use?.

Answers

You should use a lan port but if that doesnt work than contact nintendo

The minimum wage of a country today is $ 25,000 per month. the minimum wage has increased steadily at the rate of 3% per year for the last 10 years. write a program c to determine the minimum wage at the end of each year in the last decade. (solve using the concepts of loop controls with c programming)

Answers

The C program is given below that calculates the minimum wage at the end of each year for the last decade:

#include <stdio.h>

int main() {

   float wage = 25000.0;

   printf("Minimum wage at the end of each year for the last decade:\n");

   for (int i = 1; i <= 10; i++) {

       wage += wage * 0.03;

       printf("Year %d: $%.2f\n", i, wage);

   }

   return 0;

}

Explanation:

We start by initializing the minimum wage variable to $25,000.Then we use a for loop to iterate over the 10 years, using the loop variable i to keep track of the current year. Inside the loop, we update the minimum wage by adding 3% to it using the formula wage += wage * 0.03. Finally, we print out the year and the minimum wage at the end of that year using printf(). The %.2f format specifier is used to print the wage as a floating-point number with 2 decimal places.

To know more about the  for loop click here:

https://brainly.com/question/30706582

#SPJ11

When heading styles have been applied to a document, the user has the option to navigate through the document using which tab on the navigation pane?.

Answers

When heading styles have been applied the user can nagivigate documents using the Headings tab

What is mearnt by the term Navigation?

In Computing, navigation is use to mean routing or moving from one screen or one page on a website to another.

There are different types of navigation depending on the use case, they are:

Drawer NagivigationBottom NavigationTab Navigation etc.

Learn more about Navigation here:

https://brainly.com/question/2191665

#SPJ2

which button is used to run the program in QBASIC

Answers

Answer:

S key

Explanation:

(Alternative) Hit the S key (or just hit Enter) to run the program. The menu shows shortcuts to do the same thing, Shift+F5 or just F5 alone. The program runs: Since the program was run once before, the first output (the first "Hello") remains on the screen.

you are configuring common gpo properties for folders. you want to specify that only portable computers that are docked have a preference applied. which choice will accomplish this?

Answers

To specify that only portable computers that are docked have a preference applied when configuring common GPO properties for folders, the option that can accomplish this is the Item-level targeting.The use of Group Policy Preferences has made it easier to manage common GPO settings.

Group Policy Preferences (GPP) is a feature of Group Policy that enables users to configure, deploy, and handle settings on domain-joined computers and users.The Item-level targeting option in GPPs is one of the important functions that enable you to specify the types of users, computers, or security groups to whom a preference applies. As a result, the portable computers can be differentiated by Item-level targeting to accomplish the requirement in the question. Here are the steps for configuring the portable computers that are docked using Item-level targeting:Create a GPO object and then right-click on the folder you want to modify and choose Properties.The Edit Preference dialog box will open. Select the Common tab to access the options.Choose the Item-Level Targeting option to configure specific criteria for applying the folder preference to only portable computers that are docked.In the New Item dialog box, specify a name for the target computer and select Portable computer under Targeting Item. From the drop-down menu, choose the option "Is Docked."Only portable computers that are docked will have the preference applied as a result of the above configurations.

For more such question on configurations

https://brainly.com/question/26084288

#SPJ11

on the line below, write one situation for which merge cells may not work well

Answers

Answer:

When the data in the cells being merged contains different data types (e.g., text and numbers) or when some of the cells being merged are merged with others.

Explanation:

Other Questions
Bella made fancy purple costume decorations for each of the dancers in her year-end dance performance. She used 1/6 of a meter of ribbon for each decoration, which she got by cutting 2/3 of a meter of ribbon into equal pieces. How many decorations did Bella make?Write your answer as a fraction or as a whole or mixed number. At a certain temperature, the solubility of aluminum hydroxide is (8.70x10^-13) M. What is the Ksp at this temperature? the area of a rectangle is 72cm2, in which the width is twice the length. what are the dimensions Oprah Winfrey achieved things that no African American woman had achievedbefore. Process technology alliances are most important at the __________________ stage of the product life cycle, Group of answer choices Vocabulary Match each word in the column A Warm Fresh Sharp Giant Afraid Scatter Entrance 4 B Blunt Bold Gather Exit Cold Dwarf Stable Which sections are part of a career plan? Select all that apply.career definitioncareer requirementscurrent statusshort-term goalsintermediate goalseconomic obstacle The lecture on film genre described the hollywood system of film genres as offering both ________ and _______. Select the correct answer. Which graph represents the solutions to this equation? x2 + 8x = -20 A. Linear-quadratic system graph shows upward parabola with vertex at (minus 2, 4) and passing through x and y-axis (minus 8, 0), and (0, 0) B. Linear-quadratic system graph shows upward parabola with vertex at (minus 4, 4) and passing through (minus 2, 8), and (minus 6, 8) C. Linear-quadratic system graph shows upward parabola with vertex at (4, 0) and passing through (1, 4), and (6, 4) D. Linear-quadratic system graph shows a downward parabola with vertex at (0, 8) which intercepts the x-axis at 3 and minus 3 units. Reset Next PLZ HELP ME OM THIS TEST The photograph above shows an event that took place in Hawaii in December 1941What was the immediate consequence of this event?A. The United States declared war on Japan B. Congress approved the Lend-Lease program. C. The President authorized the Manhattan Project to develop the atomic bomb D. Congress enacted military conscription in peacetime. In triangle xyz, m z > m x m y. which must be true about xyz? m x m z < 90 m y > 90 x and y are complementary m x m y < 90 _____ generates energy emissions from the sun that warm and sustain life on the Earth.a. atomic fusionb. gravityc. magnetic gravityd. oxygene. magnetic fusion 50 Points for whoever does it and shows their work. Maya has four glasses of milk. The temperature and the amount of milk in each glass are shown: Glass A: 20 grams of milk at 10 C Glass B: 50 grams of milk at 80 C Glass C: 20 grams of milk at 50 C Glass D: 50 grams of milk at 80 C Which statement is correct? At the Arctic weather station, a warning light turns on if the outside temperature is below -25 degrees Fahrenheit. Which inequality models this situation? TRUE OR FALSE NJCKI MINAJ CREATED THE EARTH An electric current is made up of _____ charged electron. a deck of 52 cards with 13 hearts are distributed at random into two players such that each player receives 13 cards. find the probability that at lease one player will receive exactly 6 hearts. Diane 4 1/3 cut feet of tape. How much is this in inches? Pleasee helppp answer correctly !!!!!!!!!!! Will mark Brianliest !!!!!!!!!!!!!!!!!! x+3y=0. Solve for y, then graph the equation