explains your analysis of the impacts of this new internet distribution on people and businesses.

Answers

Answer 1

Answer:

A business' ability to communicate with its employees, customers and associates changed dramatically when the Internet yielded new communication tools. Email and instant messaging have changed the face of business communication.


Related Questions

in Python
# Create a function called get_total. The function should have 2 parameters : price and count
# if either parameter value is negative return 0
# otherwise return total which is calculated as price * count
# call the function with the values 3 and 8
# print the returned result. (NOT in the function)
# call the function again with the values -5 and 4
# print the returned result. (NOT in the function)

Answers

Note that the Phyton function that executes the above-described tasks is given as follows:

def get_total(price, count):

   if price < 0 or count < 0:

       return 0

   else:

       return price * count

# Call the function with the values 3 and 8

result1 = get_total(3, 8)

print(result1)

# Call the function again with the values -5 and 4

result2 = get_total(-5, 4)

print(result2)



What is the rationale for the above response?

In the first function call, the values of price and count are both positive, so the function returns their product, which is 24.

In the second function call, the value of price is negative, so the function returns 0.

Note that the output wil be


24

0

Learn more about Phyton:
https://brainly.com/question/19070317

#SPJ1

.[2] ) Describe how Optical Mark Recognition is used to process the details from the form. ....[3]​

Answers

Optical Mark Recognition is used to process data from a form. First, design and print the form on special paper with pre-printed bubbles or checkboxes.

What is the Optical Mark Recognition?

Optical Mark Recognition technology captures data from paper forms with checkboxes or bubbles through specialized scanners that detect and convert marks into digital data.  

There is also Completed form scanned by OMR scanner. Process and verify OMR data: Software analyzes and converts shaded bubbles into digital data, which is verified for accuracy and corrected as needed. Export data to spreadsheet or database for analysis.

Read more about Optical Mark Recognition  here:

https://brainly.com/question/30623318

#SPJ1

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

Answers

There are different kinds of movement. The technique that was the threat actor using to move through the network is Lateral Movement.

Network Lateral Movement, is simply known as a method used by cyber attackers, or threat actors, to quickly move through a network as they search for the key data and assets that are the main hit or target of their attack work.

In this kind of movement, when an attacker do compromise or have the power or control of one asset within a network, it quickly transport or moves on from that device to others while still within the same network.

 Examples of Lateral movement are:

Pass the hash (PtH) Pass the ticket (PtT) Exploitation of remote services, etc.

See full question below

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

A. Initial Compromise

B. Lateral movement

C. Privilege escalation

D. Data exfiltration

Learn more about Lateral movement from

https://brainly.com/question/1245899

Declare a 4 x 5 list called N.

Using for loops, build a 2D list that is 4 x 5. The list should have the following values in each row and column as shown in the output below:

1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
Write a subprogram called printList to print the values in N. This subprogram should take one parameter, a list, and print the values in the format shown in the output above.

Call the subprogram to print the current values in the list (pass the list N in the function call).

Use another set of for loops to replace the current values in list N so that they reflect the new output below. Call the subprogram again to print the current values in the list, again passing the list in the function call.

1 1 1 1 1
3 3 3 3 3
5 5 5 5 5
7 7 7 7 7

Answers

Answer:

# Define the list N

N = [[0 for j in range(5)] for i in range(4)]

# Populate the list with the initial values

for i in range(4):

   for j in range(5):

       N[i][j] = 2*j + 1

# Define the subprogram to print the list

def printList(lst):

   for i in range(len(lst)):

       for j in range(len(lst[i])):

           print(lst[i][j], end=' ')

       print()

# Print the initial values of the list

printList(N)

Output
1 3 5 7 9

1 3 5 7 9

1 3 5 7 9

1 3 5 7 9

--------------------------------------------------------------------

# Update the values of the list

for i in range(4):

   for j in range(5):

       N[i][j] = 2*i + 1

# Print the new values of the list

printList(N)

Output

1 1 1 1 1

3 3 3 3 3

5 5 5 5 5

7 7 7 7 7

Explanation:

Dropdown Which shape is used for input and output?

Answers

Answer:

Parallelogram

Explanation:

Input/output Box The input/output box is represented by a parallelogram. This symbol indicates any function of an input/output device such as keyboard or printer.

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

role of the computer for the development of a country​

Answers

Computers have a transformative impact on the development of a country by driving economic growth, revolutionizing education, fostering innovation, improving governance, and promoting connectivity.

Economic Growth: Computers play a crucial role in driving economic growth by enabling automation, streamlining processes, and increasing productivity. They facilitate efficient data management, analysis, and decision-making, leading to improved business operations and competitiveness.

Education and Skills Development: Computers have revolutionized education by providing access to vast amounts of information and resources. They enhance learning experiences through multimedia content, online courses, and virtual simulations.

Innovation and Research: Computers serve as powerful tools for innovation and research. They enable scientists, engineers, and researchers to analyze complex data, simulate experiments, and develop advanced technologies.

High-performance computing and artificial intelligence are driving breakthroughs in various fields, such as medicine, energy, and engineering.

Communication and Connectivity: Computers and the internet have revolutionized communication, enabling instant global connectivity. They facilitate real-time collaboration, information sharing, and networking opportunities. This connectivity enhances trade, international relations, and cultural exchange.

Governance and Public Services: Computers play a vital role in improving governance and public service delivery. They enable efficient data management, e-governance systems, and digital platforms for citizen engagement. Computers also support public utilities, healthcare systems, transportation, and security infrastructure.

Job Creation: The computer industry itself creates jobs, ranging from hardware manufacturing to software development and IT services. Moreover, computers have catalyzed the growth of other industries, creating employment opportunities in sectors such as e-commerce, digital marketing, and software engineering.

Empowerment and Inclusion: Computers have the potential to bridge the digital divide and empower marginalized communities. They provide access to information, educational opportunities, and economic resources, enabling socio-economic inclusion and empowerment.

For more such questions on economic growth visit:

https://brainly.com/question/30186474

#SPJ11

What is the data type of the following variable?
name = "John Doe"

Answers

In computer programming, a variable is a storage location that holds a value or an identifier. A data type determines the type of data that can be stored in a variable. The data type of the following variable, name = "John Doe" is a string data type.

In programming, a string is a sequence of characters that is enclosed in quotes. The string data type can store any textual data such as names, words, or sentences.The string data type is used in programming languages such as Java, Python, C++, and many others. In Python, the string data type is denoted by enclosing the value in either single or double quotes.

For instance, "Hello World" and 'Hello World' are both strings.In conclusion, the data type of the variable name is string. When declaring variables in programming, it is important to assign them the correct data type, as it determines the operations that can be performed on them.

For more such questions on variable, click on:

https://brainly.com/question/28248724

#SPJ8

Jk fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection.which of the following do you think is ideally suited in this scenario

Answers

Racks are the best suited option for the unit for storing the routers and various switches that are to be used in setting up the network connection.

What is Network Switch?

A network switch connects devices on a network (typically a local area network, or LAN*) and routes data packets to and from those devices. A switch, unlike a router, only sends data to the single device for which it is designed (which could be another switch, a router, or a user's computer), not to networks of multiple devices.

Features of Switches:

A switch operates in the OSI model's layer 2, or data link layer.It is a smart network device that functions as a multiport network bridge.It sends data packets to selected destination ports using MAC addresses (medium access control sublayer addresses).It receives and forwards data packets from the source to the destination device using the packet switching technique.

To learn more about Network Swtich, visit: https://brainly.com/question/14507957

#SPJ9

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if it’s somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you’ve received? Does it assign a high point total to some legitimate e-mails you’ve received?

Answers

Answer:

Words found in phishing messages are:

Free gift

Promotion

Urgent

Congratulations

Check

Money order

Social security number

Passwords

Investment portfolio

Giveaway

Get out of debt

Ect. this should be a good starting point to figuring out a full list

What is referential integrity

Answers

The association between tables is referred to as referential integrity. A primary key is required for each table in a database and can appear in other tables as a result of its connection to the data in those other tables. Foreign keys are used when a primary key from one table appears in another table.


As discussed in the chapter, one push by computer manufacturers is making computers run as
efficiently as possible to save battery power and electricity. What do you think is the motivation
behind this trend? Is it social responsibility or a response to consumer demands? Should the energy
consumption of electronic devices be regulated and controlled by the government or another
organization? Why or why not? How responsible should consumers be for energy conservation in
relation to electronic use? In your opinion, what, if anything, should all computer users do to practice
green computing?


Answers

The motivation behind making computers run efficiently is likely a combination of social responsibility and consumer demand.

What is the role of customers here?

Consumers increasingly prioritize energy efficiency and environmental sustainability in their purchasing decisions, which drives manufacturers to create products that meet those expectations.

While government regulation may help enforce energy consumption standards, it is also important for consumers to take responsibility for their own energy use and make conscious choices to conserve energy when using electronic devices.

Simple actions like adjusting screen brightness and turning off devices when not in use can make a difference in reducing energy consumption. Additionally, manufacturers should continue to prioritize energy efficiency in product design and development.

Read more about computers here:

https://brainly.com/question/28498043

#SPJ1

When it comes to cyberbullying, “power imbalance” is the term used for

Answers

Answer:

no

Explanation:

because

Answer:

intimidating someone online with threats

Explanation:

Just did the quiz on edg

You install antimalware software on your computer. What is the major attack you are trying to prevent the users from executing?(1 point)
installing software
compromising password
phishing
accessing the USB port

Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are stolen?(1 point)
multiple copies
cloud backup
encryption
inventory

Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
see the SSID
have strong password
connect secured
be on an approved list

What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of unencrypted confidential data on the device?(1 point)
encrypt the data
lock the phone
locate the phone
wipe the data

Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with employees to be the most effective?(1 point)
present it at a meeting
training the employee
post in a public area
mailing the policies

Answers

Answer:b,c,a,c,b

Explanation:

Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching experience. For example, a beginning teacher in the Lexington School District might be paid $30,000 the first year. For each year of experience after this first year, up to 10 years, the teacher receives a 2% increase over the preceding value. Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

Answer:

Here is the python code:

StartingSal = int(input("Enter the starting salary: "))

AnnualIncrease = (int(input("Enter the annual % increase: ")) / 100)

Years = int(input("Enter the number of years: "))

for count in range(1,Years+1):  

  print("Year ", count, " Salary: ", StartingSal*((1+AnnualIncrease)**(count-1)))

  

Explanation:

This program prompts the user to enter starting salary, percentage increase in salary per year and number of years.

The for loop has range function which is used to specify how many times the salaries are going to be calculated for the number of years entered. It starts from 1 and ends after Years+1 means one value more than the year to display 10 too when user inputs 10 days.

The year and corresponding salary is displayed in output. At every iteration the starting salary is multiplied by annual percentage increase input by user. Here count is used to count the number of salaries per year, count-1 means it will start from 30000.

Which of the following is an operating system?
MacBook Air
Windows 10
Dell

Which of the following is an operating system?MacBook AirWindows 10Dell

Answers

macbook air.
hope this helps
Windows 10 I believe would be your answer because the other are things that are different yeah

Read the following e-mail that Natalie sent. Give Natalie some advice to help her improve her electronic communication. Be sure to describe at least two netiquette guidelines that she should follow.

Read the following e-mail that Natalie sent. Give Natalie some advice to help her improve her electronic

Answers

Using Proper punctuation and capitalization,Also Correctly signing off an email.

My program below produce desire output. How can I get same result using my code but this time using Methods. please explain steps with comments. Ex.

public class Main {
static void myMethod() {
// code to be executed
}
}

My program below produce desire output. How can I get same result using my code but this time using Methods.

Answers

To achieve the desired output using methods, one need to modify your code.

java

public class Main {

   public static void main(String[] args) {

       double[] subtotalValues = {34.56, 34.00, 4.50};

       double total = calculateTotal(subtotalValues);

       System.out.println("Total: $" + total);

   }

   public static double calculateTotal(double[] values) {

       double sum = 0;

       for (double value : values) {

           sum += value;

       }

       return sum;

   }

}

What is the program?

A computer program could be a grouping or set of informational in a programming dialect for a computer to execute.

Computer programs are one component of program, which moreover incorporates documentation and other intangible components. A computer program in its human-readable shape is called source code.

Learn more about program  from

https://brainly.com/question/30783869

#SPJ1

what must be the same for each variable in an array in compiled languages?

Answers

The data type must be the same for each item in the array.

Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usability known as __________.

Answers

The dimension of usability that is being addressed by Beth is known as efficiency.

The dimension of usability.

In Usability Engineering, there are five (5) qualities of a usable product suggested by Jakob Nielsen and these include the following:

LearnabilityMemorabilityEfficiencyErrors (low rate, easy to recover)Satisfaction

In this scenario, we can infer and logically deduce that the dimension of usability that is being addressed by Beth is known as efficiency because she's focused on identifying early-stage interface problems in software.

Read more on software here: brainly.com/question/26324021

#SPJ1

What is the correct way of referring to an external CSS?

Answers

The correct way of referring to an external CSS is use the <link> tag inside the head element.

How can external CSS be reffered to?

It should be noted that External stylesheets use the <link> tag  which can be seen in in the head element., howerv the rel attribute  helps to shed light to the link which is very common to the way the sheet is arranged.

Therefore, External CSS can be decribed as the type of  CSS  that can be utilized in the process of  adding styling to multiple HTML pages and this can help in the designing of the layout of many HTML web pages .

Learn more about CSS  at:

https://brainly.com/question/30395364

#SPJ1

Problem: Longest Palindromic Substring (Special Characters Allowed)

Write a Python program that finds the longest palindromic substring in a given string, which can contain special characters and spaces. A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward. The program should find and return the longest palindromic substring from the input string, considering special characters and spaces as part of the palindrome. You do not need a "words.csv" as it should use dynamic programming to find the longest palindromic substring within that string.

For example, given the string "babad!b", the program should return "babad!b" as the longest palindromic substring. For the string "c bb d", the program should return " bb " as the longest palindromic substring.

Requirements:

Your program should take a string as input.
Your program should find and return the longest palindromic substring in the input string, considering special characters and spaces as part of the palindrome.
If there are multiple palindromic substrings with the same maximum length, your program should return any one of them.
Your program should be case-sensitive, meaning that "A" and "a" are considered different characters.
You should implement a function called longest_palindrome(string) that takes the input string and returns the longest palindromic substring.
Hint: You can use dynamic programming to solve this problem. Consider a 2D table where each cell (i, j) represents whether the substring from index i to j is a palindrome or not.

Note: This problem requires careful consideration of edge cases and efficient algorithm design. Take your time to think through the solution and test it with various input strings.

Answers

A Python program that finds the longest palindromic substring in a given string, considering special characters and spaces as part of the palindrome is given below.

Code:

def longest_palindrome(string):

   n = len(string)

   table = [[False] * n for _ in range(n)]

   # All substrings of length 1 are palindromes

   for i in range(n):

       table[i][i] = True

   start = 0

   max_length = 1

   # Check for substrings of length 2

   for i in range(n - 1):

       if string[i] == string[i + 1]:

           table[i][i + 1] = True

           start = i

           max_length = 2

   # Check for substrings of length greater than 2

   for length in range(3, n + 1):

       for i in range(n - length + 1):

           j = i + length - 1

           if string[i] == string[j] and table[i + 1][j - 1]:

               table[i][j] = True

               start = i

               max_length = length

   return string[start:start + max_length]

# Example usage

input_string = "babad!b"

result = longest_palindrome(input_string)

print(result)

This program defines the longest_palindrome function that takes an input string and uses a dynamic programming approach to find the longest palindromic substring within that string.

The program creates a 2D table to store whether a substring is a palindrome or not. It starts by marking all substrings of length 1 as palindromes and then checks for substrings of length 2.

Finally, it iterates over substrings of length greater than 2, updating the table accordingly.

The program keeps track of the start index and maximum length of the palindromic substring found so far.

After processing all substrings, it returns the longest palindromic substring using the start index and maximum length.

For more questions on Python program

https://brainly.com/question/30113981

#SPJ8

You are working as a marketing analyst for an ice cream company, and you are presented with data from a survey on people's favorite ice cream flavors. In the survey, people were asked to select their favorite flavor from a list of 25 options, and over 800 people responded. Your manager has asked you to produce a quick chart to illustrate and compare the popularity of all the flavors.

which type of chart would be best suited to the task?
- Scatter plot
- Pie Chart
- Bar Chart
- Line chart

Answers

In this case, a bar chart would be the most suitable type of chart to illustrate and compare the popularity of all the ice cream flavors.

A bar chart is effective in displaying categorical data and comparing the values of different categories. Each flavor can be represented by a separate bar, and the height or length of the bar corresponds to the popularity or frequency of that particular flavor. This allows for easy visual comparison between the flavors and provides a clear indication of which flavors are more popular based on the relative heights of the bars.

Given that there are 25 different ice cream flavors, a bar chart would provide a clear and concise representation of the popularity of each flavor. The horizontal axis can be labeled with the flavor names, while the vertical axis represents the frequency or number of respondents who selected each flavor as their favorite. This visual representation allows for quick insights into the most popular flavors, any potential trends, and a clear understanding of the distribution of preferences among the survey participants.

On the other hand, a scatter plot would not be suitable for this scenario as it is typically used to show the relationship between two continuous variables. Pie charts are more appropriate for illustrating the composition of a whole, such as the distribution of flavors within a single respondent's choices. Line charts are better for displaying trends over time or continuous data.

Therefore, a bar chart would be the most effective and appropriate choice to illustrate and compare the popularity of all the ice cream flavors in the given survey.

for more questions on Bar Chart

https://brainly.com/question/30243333

#SPJ8

Consider the following language:

L={ |M is a Turing Machine and M accepts at least one palindrome,

and rejects at least one palindrome}

a. Is L a decidable language? Prove your answer.

b. Is L a recognizable language? Prove your answer.

Answers

L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

How do you know if a language is decidable?

A language is said to be decidable only when there seems to exists a Turing machine that is said to accepts it,

Here, it tends to halts on all inputs, and then it answers "Yes" on words that is seen in the language and says "No" on words that are not found in the language. The same scenario applies to recognizable language.

So,  L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

Learn more about programming language from

https://brainly.com/question/16936315

#SPJ1

4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).

Answers

Answer:

Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:

import java.util.ArrayList;

import java.util.Scanner;

import java.io.File;

import java.io.FileNotFoundException;

public class SalesDemo {

   public static void main(String[] args) {

       // Ask the user for the name of the file

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the name of the sales file: ");

       String fileName = input.nextLine();

       // Read the daily sales data from the file

       ArrayList<Double> salesData = new ArrayList<>();

       try {

           Scanner fileInput = new Scanner(new File(fileName));

           while (fileInput.hasNextDouble()) {

               double dailySales = fileInput.nextDouble();

               salesData.add(dailySales);

           }

           fileInput.close();

       } catch (FileNotFoundException e) {

           System.out.println("Error: File not found!");

           System.exit(1);

       }

       // Calculate the total and average sales

       double totalSales = 0.0;

       for (double dailySales : salesData) {

           totalSales += dailySales;

       }

       double averageSales = totalSales / salesData.size();

       // Display the results

       System.out.printf("Total sales: $%.2f\n", totalSales);

       System.out.printf("Average daily sales: $%.2f\n", averageSales);

   }

}

Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.

I hope this helps!

Explanation:

The executive ________ is the person ultimately responsible to their company for the project's success.

fill in blank

Answers

Answer:

Manager.

Explanation:

Just thank me later and make sure to click the crown at the top of this answer ;)

Answer:

sponsor i took the test

Explanation:

Usually senior executives, executive sponsors, are the ones ultimately responsible to their company for the project's success.

Is the use of technology to control human behavior a necessary evil or an
unethical breach of privacy and freedom?

Answers

Answer:

The use of technology to control human behavior is a very contentious topic and the answer to this question depends on the individual's opinion and values. Some may argue that technology can be used to limit freedom, however, it can also be used to protect people from harm, such as in the case of automated speed cameras limiting the speed of drivers to prevent accidents. Others may argue that the use of technology to control behavior is an unethical breach of privacy and freedom as it can be used to monitor and restrict people's actions. Ultimately, it is up to the individual to decide whether the use of technology to control human behavior is a necessary evil or an unethical breach of privacy and freedom.

What is the function for displaying differences between two or more scenarios side by side?
Macros
Merge
Scenario Manager
Scenario Summary

Answers

Answer:

its d

Explanation:

Answer:

scenario summary

Explanation:

to move an inline picture, which of the following should be done? a. click and drag the picture to the desired location. b. ctrl shift click and drag the picture to the desired location. c. ctrl click and drag the picture to the desired location. d. alt click and drag the picture to the desired location.

Answers

Using control click we can move and drag inline picture at desired location.

Inline picture: Images enhance a webpage's value by completing the user's aesthetic and visual experience. Images add value, convey information, and serve as ornamentation. Additionally, there are many types of images in terms of development. Users mostly encounter two sorts of images on websites: inline images and background images. Both offer excellent chances to inform an audience, and each also poses its own special problems to ensuring that the highest standards of web development are met. users envision inline pictures when they see an image. When compared to backdrop pictures, they are full-image displays. The user can gain value and information from inline graphics. Inline pictures can be used with many different types of files, including jpg,

For move inline picture we can use control click and drag image easily.

Know more about inline picture:

https://brainly.com/question/15177582

#SPJ4

i want to touch it but if i talked about the past , it would be i wanted to touch it or i wanted to touched it?​

Answers

Answer:

I wanted to touch it

Explanation:

since you put the setting in the past you can use present verbs because we already know it's something that already happened

Other Questions
for 15 POINTS. this is due today!!! 82) Which equivalent expression uses GCF and Distributive Property to find thesum of to 16+28?1(16+28)O2(8+14)2(8+28)4(4+7)* When there is a decrease in the price level, all else held equal, net exports will:_______ How will you return a cell formatted as a date or time, back to its default or original format?. Question 23 Fetal hemoglobin has a higher affinity for oxygen than mother's hemoglobin due to inability of fetal hemoglobin to bind O Oxygen O 2,3-DPG O Carbon dioxide O Carbon monoxide women who enter pregnancy with iron-deficiency anemia have a greater risk of _____. need answer important pls why did aristarchus believe in the radical notion that the sun was at the center of the universe and that earth moved around it in an orbit what is the median of 4, 4, 7, 13, 12, 9 Joseph baked cookies for his french class's end-of-year party. there are 28 people in joseph's french class including joseph and his teacher. joseph baked enough cookies for everyone to get 3 cookies each. how many cookies did joseph bake? The soccer team at your school wants to spray paint a design on the middle of the playing field. the design will include this soccer ball. you have been asked to enlarge the drawing of this ball to use for the painting on the field. explain how to accurately enlarge or reduce the size of objects such as the soccer ball. There is a pair of parallel sides in the following shape. 9,4,5 What is the area of the shape? Which triangle is NLM congruent to ? Please answer !!!!! Will mark Brianliest !!!!!!!!! URGENT HELPP!!Methane (CH4) undergoes combustion. Which products form?A. CO and HB. C and HOC. CO and HOD. CO, HO, and 02 The tip-of-the-tongue phenomenon can be best described as an instance of. Lance Richter39 Helton WayNew York, New York, 00921Dear Mr. Richter,Thank you for submitting a photo of Mr. Puff Puff to Dog Daze Monthly. Unfortunately, while he is indeed a very handsome boy, we areunable to use your picture at this time.Thank you for your interest and we wish you better success at another publication.Regretfully,Pella LundergardEditorial AssistantWho is the author of the letter? In a professional division of a Hockey league, there are 9 total teams. How many different rankings are possible at the end of the year Over a long period of time, running water in a river erodes the riverbed. this erosion causes the river to "Rabia is a lawyer herself. She mostly does immigration stuff. Her office takes up the corner of a much larger open space that I think is a Pakistani travel agency, though it's hard to tell. It's in this little strip mall. Across the parking lot, there's a new Pakistani restaurant, an African evangelical church, an Indian clothing shop, a convenience store. On the sidewalk outside, I found a teeny weeny bag of marijuana. Baltimore County is like this, at least on the west side." In 1-2 sentences, explain why it is important for the author to include details of the setting. the compatibilist believes that not all events are deterministically caused.