1:A presentation program which is developed by Microsoft
option 1: word
option 2: flash
option 3: PowerPoint ​

Answers

Answer 1
Option 3: PowerPoint.
Answer 2

Answer:

option 3: PowerPoint is developed by Microsoft


Related Questions

Which of the following would typically not be considered to be a basic operation of an algorithm?
A. variable assignment
B. a while loop
C. variable initialization
D. all of the above

Answers

All of the given options are considered to be basic operations of an algorithm. A variable assignment involves assigning a value to a variable, which is a crucial step in algorithm development. A while loop is a fundamental control flow structure that repeats a set of instructions as long as a certain condition is met.

Variable initialization refers to the process of giving an initial value to a variable before using it in the algorithm. Therefore, all of the given options are essential and are considered to be basic operations of an algorithm.  An algorithm is a set of instructions or a procedure that solves a problem or accomplishes a specific task. The basic operations of an algorithm are fundamental steps that are used to develop an algorithm. These operations include input/output operations, arithmetic operations, control structures, and variable manipulation.

Variable assignment, while loops, and variable initialization are all operations that are frequently used in algorithm development. Variable assignment involves assigning a value to a variable. A while loop is used to execute a set of instructions repeatedly as long as a specific condition is met. Variable initialization is the process of assigning an initial value to a variable.  In conclusion, all of the given options (A, B, and C) are considered to be basic operations of an algorithm and are crucial steps in algorithm development.

To know more about algorithm development visit :

https://brainly.com/question/20595602

#SPJ11

the font size sets the size of text​

Answers

Answer:

Yup thats correct

Explanation:

Let us define a multiplication operation on three symbols a, 6. c according to the following table; thus ab = b, ba = c, and so on. Notice that the multiplication operation defined by the table is neither associative nor commutative. a b c a b b a
b c b a
c a c c
Find an efficient algorithm that examines a string of these symbols, say bbbbac, and decides whether or not it is possible to parenthesize the string in such a way that the value of the resulting expression is a. For example, on input bbbbac your algorithm should return yes because ((b(bb))(ba))c = a.

Answers

One possible approach to solve this problem is to use dynamic programming.

Let's define the following notation:

DP[i][j][k] = true if it is possible to parenthesize the substring from index i to index j in such a way that the value of the resulting expression is k.

We can fill the DP table bottom-up, starting from substrings of length 1 and building up to the full length of the input string. For substrings of length 1, we can fill the table as follows:

DP[i][i][a] = true if the ith symbol is 'a'.

DP[i][i][b] = true if the ith symbol is 'b'.

DP[i][i][c] = true if the ith symbol is 'c'.

For substrings of length greater than 1, we can use the following recurrence relation:

DP[i][j][k] = true if there exists a value of m such that DP[i][m][x] and DP[m+1][j][y], where x and y are the values obtained by multiplying the expressions represented by the substrings [i, m] and [m+1, j], respectively, and (x, y, k) is one of the entries in the multiplication table.

We can compute the values of DP[i][j][k] using a nested loop over i, j, k, and m, where i <= j and k is one of the three possible values (a, b, or c). The time complexity of this algorithm is O(n^4), where n is the length of the input string.

To check whether it is possible to obtain the value 'a' from the entire string, we just need to look at the value of DP[0][n-1][a], where n is the length of the input string.

If this value is true, then it is possible to parenthesize the string in such a way that the value of the resulting expression is 'a'. Otherwise, it is not possible.

Read more about multiplication operation here:

https://brainly.com/question/28768606

#SPJ1

Determining which computer platform (operating system) would be best for a particular student often depends on what the student wants to study and in which industry she or he wants to enter after graduation. Students who plan to study graphic design or want to focus on photo production or publishing should strongly consider the __ platform since it is generally considered the industry standard in those fields.

Answers

Answer: Window OS

Explanation:

Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.

Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.

How many questions do you have the answer before you can start messaging on this app.

Answers

Answer: As many as possible

Explanation:

Answer: That’s what I came here to know toooo

Explanation:

A company hesitates to upgrade to the latest version of an operating system (OS). Which of the following is of LEAST concern for the company?

A) Network compatibility
B) Software compatibility
C) Cost
D) Web application compatibility

Answers

The least concern for the company when hesitating to upgrade to the latest version of an operating system (OS) would be network compatibility.

Among the given options, network compatibility is likely to be of least concern for the company. Network compatibility refers to the ability of the operating system to seamlessly integrate with the company's existing network infrastructure, including routers, switches, and other network devices.

While network compatibility is important for smooth communication and data transfer within an organization, it is typically a less critical factor when deciding whether to upgrade to a new OS version.

On the other hand, software compatibility is a significant concern for companies considering an OS upgrade. Compatibility with existing software applications ensures that they can continue to function properly after the upgrade.

Cost is also an important consideration as upgrading to a new OS version may involve expenses such as licensing fees, hardware upgrades, and employee training. Web application compatibility is another key factor as companies rely heavily on web-based applications for various operations, and ensuring their compatibility with the new OS version is crucial for uninterrupted workflow.

In conclusion, while network compatibility is important, it is generally of least concern compared to software compatibility, cost, and web application compatibility when a company hesitates to upgrade to the latest version of an operating system.

Learn more about operating system here:

https://brainly.com/question/31551584

#SPJ11

PLS HELP WITH THIS ACSL PROGRAMMING QUESTION ASAP. WILLING TO GIVE A LOT OF POINTS ! Pls answer ONLY IF YOU ARE SURE IT'S CORRECT. WILL GIVE BRAINLIEST! CHECK IMAGE FOR PROBLEM.

PLS HELP WITH THIS ACSL PROGRAMMING QUESTION ASAP. WILLING TO GIVE A LOT OF POINTS ! Pls answer ONLY

Answers

Here is one way to solve the problem statement in Python:

def create_tree(string):

   # Initialize the first array with the first letter of the string

   letters = [string[0]]

   

   # Initialize the second array with a value of 0 for the first letter

   values = [0]

   

   # Process the remaining letters in the string

   for i in range(1, len(string)):

       letter = string[i]

       value = 0

       

       # Check if the letter is already in the array

       if letter in letters:

           # Find the index of the existing letter and insert the new letter before it

           index = letters.index(letter)

           letters.insert(index, letter)

           values.insert(index, values[index])

       else:

           # Find the index where the new letter should be inserted based on the value rule

           for j in range(len(letters)):

               if letter < letters[j]:

                   # Insert the new letter at this index

                   letters.insert(j, letter)

                   # Determine the value for the new letter based on the value rule

                   if j == 0:

                       value = values[j] + 1

                   elif j == len(letters) - 1:

                       value = values[j - 1] + 1

                   else:

                       value = max(values[j - 1], values[j]) + 1

                   values.insert(j, value)

                   break

       

       # If the new letter was not inserted yet, it should be the last in the array

       if letter not in letters:

           letters.append(letter)

           values.append(values[-1] + 1)

   

   # Output the letters in order of their value

   output = ""

   for i in range(max(values) + 1):

       for j in range(len(letters)):

           if values[j] == i:

               output += letters[j]

   return output

What is the explanation for the above response?

The create_tree function takes a string as input and returns a string representing the letters in order of their value. The function first initializes the two arrays with the first letter of the string and a value of 0. It then processes the remaining letters in the string, inserting each letter into the first array in alphabetical order and assigning a value in the second array based on the value rule.

Finally, the function outputs the letters in order of their value by looping through each possible value (from 0 to the maximum value) and then looping through the letters to find the ones with that value. The output string is constructed by concatenating the letters in the correct order.

Here's an example of how you can use the function:

string = "BDBAC"

tree = create_tree(string)

print(tree) # Output: ABBBCD

In this example, the input string is "BDBAC", so the output string is "ABBBCD" based on the value rule.

Learn more about phyton at:

https://brainly.com/question/16757242

#SPJ1

how many instructions are supercomputers capable of processing in a single second?

Answers

Answer:

Trillions

Explanation:

A Supercomputer can process trillions of instructions in a second

Which three devices can perform both input and output operations

Answers

Answer:

router ,speaker, and nic card

Explanation:

cloud kicks has decided to delete a custom field. what will happen to the data in the field when it is deleted?

Answers

When a custom field is deleted in a system like Cloud Kicks, the exact outcome for the data in that field depends on how the system is designed and implemented. However, in general, here are a few possible scenarios:

Data loss: If the system simply removes the field without taking any measures to preserve the data, then the data in that field will be permanently lost. This means that any information stored exclusively in the deleted field will no longer be accessible or recoverable.Data migration: In some cases, the system might offer the option to migrate the data from the deleted field to another existing field or a new custom field. This would ensure that the data is preserved and available in a different location within the system.Data archiving: Another possibility is that the system automatically archives the data from the deleted field before removing it. Archiving involves storing the data in a separate location or backup for future reference or retrieval if needed.

It's important to note that the specific behavior and consequences of deleting a custom field will depend on the implementation choices made by the Cloud Kicks system developers and administrators. It is recommended to consult the system's documentation or contact their support team for accurate information about the consequences of deleting a custom field in their specific implementation.

for similar questions on cloud kicks.

https://brainly.com/question/32817809

#SPJ8

11
What layout tool is used to layout lines at an angle?
Multiple Choice (select the best answer)
O Plain Protractors
O Parallels
O Divider
O none of the above

Answers

Answer: Plain Protractor for sure.

However since it is a multi choice you might include parallels.

Explanation:

Sorry if it is wrong

a 3072×8 memory has how many words?

Answers

A 3072x8 memory has 3072 words. Each word consists of 8 bits.

A 3072x8 memory is a type of computer memory that is organized as a rectangular grid of cells, with 3072 rows and 8 columns. Each row represents a single memory location or address, and each column represents a bit of data that can be stored in that location. In this case, the memory has a total of 3072 words, where each word is 8 bits long.

So, each memory location in this 3072x8 memory can store 8 bits or 1 word of data. This means that the total amount of data that can be stored in this memory is 3072 x 8 = 24,576 bits or 3,072 bytes. It's worth noting that the size of a memory word can vary depending on the computer architecture and the specific application.

Learn more about 3072x8 memory: https://brainly.com/question/24688176

#SPJ11

Why is compression important for video
streaming?
Oto increase the number of frames per second
so that motion appears smooth
Oto watch video without waiting for it to
download
O to improve image quality
O to increase file size
DONE✔
Question

Answers

Compression, important for video streaming to watch video without waiting for it to download.

The technique of compressing a video file such that it takes up less space than the original file and is simpler to send across a network or the Internet is known as video compression.

Since compression makes it possible for video data to be transferred over the internet more effectively, it is crucial for video streaming. The video files are often huge, they would take an extended period to download or buffer before playback if they weren't compressed.

Learn more about video, here:

https://brainly.com/question/9940781

#SPJ1

Prompt the user to guess your favorite color. Using a while loop, if the user didn't guess your favorite color [pick one for this activity] then tell them they are incorrect, then ask them again. Whenever they guess the color correctly, output that they are correct and how many guesses it took them.

Create a variable and assign it the value of 1
Prompt the user to guess your favorite color
While their guess is not equal to your favorite color
Tell them they are incorrect
Prompt them to guess again
Add one to the variable above
Output to the user, they were correct and how many attempts it took using the variable

Answers

Answer:

Favorite color is blue; Final prompt 5/29= 17%

Explanation:

Person 1: took 8 tries to guess correctly, 1/8 times

Person 2: 1/4 times

Person 3: 1/2 times

Person 4: 1/14 times

Person 5: 1/1 times

You have just been hired by a large organization which uses many different AWS services in their environment. Some of the services which handle data include: RDS, Redshift, ElastiCache, DynamoDB, S3, and Glacier. You have been instructed to configure a web application using stateless web servers. Which services can you use to handle session state data

Answers

Answer:

Elasticache and DynamoDB

Explanation:

The session data can be stored on Elasticache and DynamoDB

ElastiCache is the best fit for front end data stores thereby ensuring a high performance with extremely high request rates and/or low latency requirements

_____ allows information to be viewed at a glance without needing to address the individual elements of the information separately or analytically.

Answers

Spatial representation allows information to be viewed at a glance without needing to address the individual elements of the information separately or analytically.

What do you mean information?Information is a stimulus with meaning for the receiver in a specific situation. Data is a broad term that refers to information that is entered into and stored in a computer.Data that has been processed, such as formatting and printing, can be interpreted as information again.When you communicate verbally, nonverbally, graphically, or in writing, you are passing on knowledge gained through research, instruction, investigation, or reading the news.Information is known by many different names, including intelligence, message, data, signal, and fact.Information helps to avoid study duplication. Information stimulates the cognitive processes of users, particularly scholars. Scientists, engineers, academics, and others benefit from the use of information.

To learn more about Information, refer to:

https://brainly.com/question/4231278

#SPJ4

What does DOS stand for?

Answers

Answer:

Disk Operating System

Explanation:

"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."

Which characteristics differentiate a solid state drive (ssd) from a hard disk drive (hdd)? select all that apply.

Answers

The characteristics that differentiate a solid state drive (ssd) from a hard disk drive (hdd) is option B and C:

Smaller form factorNon-moving parts

What is SSD about?

SSDs employ more recent technology that saves data on memory chips that are readily accessible. SSDs are more dependable, faster, quieter, smaller, and use less energy. HDDs are more affordable, offer greater storage space, and make data recovery from damage simpler.

Therefore, in terms of smaller form factor; SSDs use non-volatile memory in addition to having no moving parts and a tiny form factor and in terms of non-moving components; SSDs are smaller, use non-volatile memory, and contain no moving parts.

Learn more about solid state drive from

https://brainly.com/question/28346495

#SPJ1

See full question below

What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.

High RPMs

Smaller form factor

Non-moving parts

Uses Disk Platters

Order the steps for sharing a contacts folder in Outlook 2016

Order the steps for sharing a contacts folder in Outlook 2016

Answers

Answer:

Enter the Contacts view-Select folder in the navigation pane-Click Share Contacts-Fill the To: field with a recipient's address-Click Send.

Explanation:

Got it right on Edge  

Outlook is a management application that includes personal information.  The first step in sharing the contact folder includes entering the contact view.

What is contact sharing?

Outlook is the web platform that contains the personal information of the client and also, the messages, contact cards, calendars, and webmails. etc.

To share contact the contact view should be opened and then the folder should be selected in the navigation pane. The button for sharing contacts should be selected.

In the share contact pop-up, fill out the field to whom the contact is to be shared with their address. After entering the receiver's name and address click the send button to share the contact card.

Learn more about Outlook here:

https://brainly.com/question/19026125

#SPJ2

A music company has a website that allows users to stream music the music is stored in sound files
The sound files are compressed using lossless compression
Describe how the sound files are compressed using lossless compression

Answers

Lossless compression is a type of data compression that allows the original data to be perfectly reconstructed from the compressed data. In the case of sound files, lossless compression algorithms are used to reduce the size of the files without compromising the quality of the audio.



1)The most common method of lossless compression used for sound files is called FLAC (Free Lossless Audio Codec). FLAC works by analyzing the audio data and removing redundancies and unnecessary information. This results in a smaller file size without any loss in quality.

2)During the compression process, FLAC also allows for the use of metadata to be embedded into the file. This metadata contains information about the song, such as artist name, album title, and track number.

3)Another commonly used method of lossless compression is called ALAC (Apple Lossless Audio Codec). ALAC uses a similar algorithm to FLAC but is optimized for use on Apple devices.

4)Overall, lossless compression is an essential tool for music companies that want to provide high-quality streaming services to their users. By reducing the size of sound files without compromising the audio quality, users can stream music quickly and efficiently while enjoying the same level of audio fidelity as they would with uncompressed files.

For such more question on compression

https://brainly.com/question/17266589

#SPJ11

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets the answer correct. The cmputer should be telling the user if the number they are guessing is too low or too high.

Answers

import random

#You can change the range.

answer = random.randint(1,1000)

counter = 0

while(True):

   guess = int(input("Make a guess: "))

   message = "Too high!" if guess>answer else "Too low!" if guess<answer else "You won!"

   print(message)

   if(message=="You won!"):

       print("It took",counter,"times.")

       break

   else:

       counter+=1

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets

Structured query language (sql) is used to?

a. Insert data

b. Delete data

c. Create a table

Answers

Structured query language (SQL) is used to insert data, delete data, and create a table.So option a,b and c are correct.

Structured Query Language (SQL) is a programming language specifically designed for managing relational databases. SQL is used for various operations, including:

a. Insert data: SQL provides commands like INSERT INTO to add new rows or records to a database table.

b. Delete data: SQL offers the DELETE command to remove specific rows or records from a database table.

c. Create a table: SQL allows the creation of database tables using the CREATE TABLE statement. This includes defining the table's structure, specifying column names, data types, constraints, and other attributes.

In addition to these operations, SQL also supports querying and retrieving data with SELECT statements, updating existing data with UPDATE statements, and managing database schemas, indexes, views, and more. SQL is a powerful tool for interacting with and managing relational databases.

Therefore option a,b and c are correct.

To learn more about SQL visit: https://brainly.com/question/23475248

#SPJ11

an attacker has intercepted near-field communication (nfc) data and is using that information to masquerade as the original device. which type of attack is being executed?

Answers

Answer: Relay Attacks

Explanation:

which feature offered by some database management systems masks confidential data within database fields so that it cannot be accessed by unauthorized users? a. lookup tables b. redaction c. blind fields d. tps

Answers

The feature offered by some database management systems that masks confidential data within database fields so that it cannot be accessed by unauthorized users is b. redaction.

The feature offered by some database management systems that masks confidential data within database fields so that it cannot be accessed by unauthorized users is known as redaction.

Redaction is a process that replaces sensitive or confidential data with asterisks or other symbols in order to keep it hidden from unauthorized access. This feature is often used in databases that store personal or financial information, such as credit card numbers, social security numbers, and medical records. While there are other techniques that can be used to secure data, such as encryption and access controls, redaction is a useful tool for protecting data from both internal and external threats. In summary, redaction is a long answer to the question of which feature offered by some database management systems masks confidential data within database fields.

Know more about the database management systems

https://brainly.com/question/24027204

#SPJ11

A client server realationship is a basic form of?

Answers

division and diction

How are computers used in education and entertainment? List them.​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

              "computers used in education and entertainment"

Computers started as very and simplistic machines data.Most of these files were text-based reports used in a work environment.As technology advanced,computer became increasingly versatile in what they could do.With the creation of the internet and faster processors,file sharing and entertainment became a popular use for personal computer everywhere.Computer have endless users in the entertainment industry by directly marketing products to users.

MusicTelevision and moviesArtGames

Many websites services allow users to purchase individual tracks or albums directly to their computer.Most record labels take advantage of these services to makeup for lost revenue from illegal downloading.

When the advantages of video card and internet speed,moving and streaming television are now at the click of a mouse button.Some websites even offer free streaming episodes of certain TV series with internet commercials.

Art is something that is readily available online at any moment. Pictures,Painting,Poetry and more are just a click away.Popular browsers offer specific image search option to quickly browse through art with a single keyword.Beside general use,computer photo editing programs and animation programs are also the sources behind most movies and professional photographs.

The concurrent process model defines a set of "states." describe what these states represent in your own words, and then indicate how they come into play within the concurrent process model.

Answers

Answer:

Explanation:

Concurrent Process model can be regarded as evolutionary process model as well as software engineering is concerned, it allows to know the current state of activities as well as their associated states.

The set of states In the concurrent process model are:

✓awaiting changes

✓Inactive

✓baselined

✓under development

✓under revision

✓under review

✓done

The stated "states" above give a representation of externally observable mode as regards to the behaviour of activities of a particular software engineering.

The existence of activities of software engineering do exist at same period

In concurrent process model, though each of the activities occur in different states so that process network is produced. The movement from one state to another of activity of software engineering is as a result of

predefined events.

A chatbot is a computer program designed to emulate human conversation. For this program, you will use if statements, user input, and random numbers to create a basic chatbot.

The Scenario
You have decided to design a fashion chatbot that helps people pick out their fashion preferences. Your bot can gauge what types of clothes and accessories the user might like.

Your chatbot should ask the user the following (minimum requirements for the grader) and then give answers depending on the answers the user inputs:

at least 6 questions
at least 3 if-elif-else statements
​​the use of the random module and randomly generated numbers
Based on these criteria, some responses will be based on what the user types and some will be based on random numbers.

For example, if the chatbot asks what is your favorite head accessory, your chatbot might respond I also think baseball hats are best. in response to a user input of baseball hats, or I love beanies! in response to a user input of beanies.

Additionally, you could also have a random number generated between, say, 1 and 3 and have a corresponding response depending on the number to randomly answer with That’s in right now. or Wow, so stylish!, and so on.

Note that in order to pass all of the test cases, your randomly generated numbers should not be dependent on user input (for example, you would not want to include a situation where if the user inputs a specific phrase, then a random number is generated). The randomly generated numbers should prompt a reply from the chatbot, and should do so separately from the user input statements that prompt a reply from the chatbot.

Answers

Based on the fact that you would use a ch.a tbot to emulate human conversation and we decide to design a fashion ch.a tbot that helps people pick out their fashion preferences, a program that would gauge what types of clothes and accessories the user might like is given below:

The Program

import random

good_responses = (["That's cool!", "Wow!", "That's great to hear!", "Tell me more"])

bad_responses = (["I'm sorry", "That is too bad!"])

first_name = input("What's your first name? ")

last_name = input("What's your last name? ")

print(f"Hello {first_name} {last_name}, nice to meet you!")

age = int(input(f"How old are you, {first_name}? "))

if age > 17:

  print("Nice, you are considered an adult")

else:

  print("You are young, our children's section is to aisle 10.")

color = input("What's your favorite color? ")

print(good_responses[random.randint(0,3)])

feeling = input(" What is your current mood (sad/happy) ")

if feeling == 'sad':

  print(bad_responses[random.randint(0,1)])

else:

  print ( good _ responses [ random . randint ( 0 , 3 ) ] )

print(f"It's been a nice ch. at time with you, { first _ name } ! " )

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

Question 7 (1 mark) In a computer information system control procedures that provide reasonable assurance that the recording, processing and reporting of data are properly performed for specific appli

Answers

Control procedures in a computer information system ensure proper recording, processing, and reporting of data for specific applications.

In a computer information system, control procedures play a vital role in maintaining the integrity, accuracy, and reliability of data. These procedures are designed to provide reasonable assurance that the recording, processing, and reporting of data are performed correctly and in accordance with predefined standards and objectives.

Control procedures encompass a range of measures implemented to minimize the risks associated with data manipulation and ensure the system operates effectively. They can include both preventive and detective controls. Preventive controls aim to prevent errors or irregularities from occurring in the first place, while detective controls focus on identifying and correcting errors or discrepancies that may have occurred.

Examples of control procedures include access controls, segregation of duties, data validation and verification, data backup and recovery mechanisms, error handling procedures, and audit trails. These procedures are typically documented and enforced through policies, protocols, and system configurations.

By implementing control procedures, organizations can reduce the risk of data inaccuracies, unauthorized access, and fraudulent activities. They provide a level of assurance that data is processed in a controlled and secure manner, ensuring the reliability of the information produced by the computer information system.

Learn more about control procedures

brainly.com/question/30623695

#SPJ11

there is a large directory structure that needs to be renamed. what mv command options should you consider employing?each correct answer represents a complete solution. choose all that apply.

Answers

1. -n: This option will prevent the mv command from overwriting an existing file or directory.

What is Command?

Command is a directive or instruction given to a computer program or system. It tells the program or system to carry out a specific task. Commands are usually issued through a command line interface, such as the command prompt in Windows or the terminal in Linux/Unix. Command-line instructions can also be inputted through a graphical user interface (GUI).

2. -i: This option will prompt the user for confirmation before overwriting an existing file or directory.

3. -f: This option will force the mv command to overwrite an existing file or directory without prompting.

4. -v: This option will produce verbose output, showing the names of the files being moved.

To learn more about Command

https://brainly.com/question/25808182

#SPJ1

Other Questions
b. Use the graph to determine the equation that models the number of calories Jenny burns within a certain number of minutes. two options a pregnant teenager has about the pregnancy? Please I need help Ive been through 7 tutors I need help with number three Of 100% of the countries, what percentage are republics? Bob sold manufacturing equipment to a dealer for $50,000. Hebought the equipment for $55,000 several years ago and has claimed$12,500 of depreciation expense on the equipment. What is theamount and If you are using words instead of pictures to store and retrieve memories you are using your ______ side of your brain Which of the following is a correctly written thermochemical equation?2C8H18 +25O2 16CO2 + 18H2O, H = 5,471 kJ/molCorrect AnswerC5H12 (g) + 8O2 (g) 5CO2 (g) + 6H2O (l), H = 3,536.1 kJ/molIncorrect ResponseC3H8 (g) + O2 (g) CO2 (g) + H2O (l), H = 2,220 kJ/mol is an atom with one valence electron more reactive than an atom with two electrone? Factor out the greatest common factor. If the greatest common factor is 1,just retype the polynomial. 3t Joe is 3 years less than twice as old as Sara. The sum of the ages of Joe and Sara is 42. If x represents Sara's age, Is triangle ABC obtuse-angled?. PLease help me! Due tonight thank you! Write the correct form of the verb set or estate according with the sentence Carlos _______ trabajador An investment project costs $10,000 and has annual cash flows of $2,920 for six years. How many years is the discounted payback period if the discount rate is 14 percent? (Enter your final answer in 2 decimal spaces without any letter. the textbook describes that one possible goal of psychotherapy for people with did is to reintegrate their separate personalities together into one. neither lani nor jan appears to have reintegrated their personalities. is personality integration always a critical goal for a person with did? for the evidence below, the author provides? holly epstein ojalvo noted that, in the past, "courts have held that when an audicne rings someone to campus to speak, the school bears a consitutional responsibitliy not to interfere" is this a strong source information, weak, or no source information, strong reporting verb A curve that is derived by summing horizontally individual demand curves is called:________ On a 10 kg cart (shown below), the cart is brought up to speed with 50N of force for 7m, horizontally. At this point (A), the cart begins to experience an average frictional force of 15N throughout the ride.Find: a) The total energy at (A)b) The velocity at (B)c) The velocity at (C)d) Can the cart make it to Point (D)? Why or why not? The width of a vegetable garden is 1/4 times its length. If the length of the garden is 5 1/2 feet, what is the width in simplest form? what are the four areas of comprehensive sexuality education