true and false
a)undo option is used to cancel the previous action...................
b) there are four case option offered by world....................
c)you can see line number on the screen only in print layout view................................
d)indents are used to set the paragraph's
margin.....................
e)A grid of cells arranged in rows and columns is called table.......................​

Answers

Answer 1

Answer:

false it is used to reverse the previous action

true

true

true

true


Related Questions

The ADT stack lets you peek at its top entry without removing it. For some applications of stacks, you also need to peek at the entry beneath the top entry without removing it. We will call such an operation peek2:
· If the stack has more than one entry, peek2 method returns the second entry from the top without altering the stack.
· If the stack has fewer than two entries, peek2 throws InsufficientNumberOfElementsOnStackException.

Write a linked implementation of a stack that includes a method peek2
Skeleton of LinkedStack class is provided. The class includes main with test cases to test your methods.

public final class LinkedStack implements TextbookStackInterface
{
private Node topNode; // references the first node in the chain

public LinkedStack()
{
this.topNode = null;
// TODO PROJECT #3
} // end default constructor

public void push(T newEntry)
{

// TODO PROJECT #3
} // end push

public T peek() throws InsufficientNumberOfElementsOnStackException
{
// TODO PROJECT #3
return null; // THIS IS A STUB
} // end peek

public T peek2() throws InsufficientNumberOfElementsOnStackException
{
// TODO PROJECT #3
return null; // THIS IS A STUB
} // end peek2

public T pop() throws InsufficientNumberOfElementsOnStackException
{
// TODO PROJECT #3
return null; // THIS IS A STUB
} // end pop

public boolean isEmpty()
{
// TODO PROJECT #3
return false; // THIS IS A STUB
} // end isEmpty

public void clear()
{
// TODO PROJECT #3

} // end clear

// These methods are only for testing of array implementation
public int getTopIndex()
{
return 0;
}
public int getCapacity() { return 0; }

private class Node
{
private S data; // Entry in stack
private Node next; // Link to next node

private Node(S dataPortion)
{
this(dataPortion, null);
} // end constructor

private Node(S dataPortion, Node linkPortion)
{
this.data = dataPortion;
this.next = linkPortion;
} // end constructor
} // end Node

public static void main(String[] args)
{
System.out.println("*** Create a stack ***");
LinkedStack myStack = new LinkedStack<>();

System.out.println("--> Add to stack to get: " +
"Joe Jane Jill Jess Jim\n");
myStack.push("Jim");
myStack.push("Jess");
myStack.push("Jill");
myStack.push("Jane");
myStack.push("Joe");
System.out.println("Done adding 5 elements.\n");

System.out.println("--> Testing peek, peek2, and pop:");
while (!myStack.isEmpty())
{
String top = myStack.peek();
System.out.println(top + " is at the top of the stack.");
try
{
String beneathTop = myStack.peek2();
System.out.println(beneathTop + " is just beneath the top of the stack.");
} catch (InsufficientNumberOfElementsOnStackException inoeose)
{
System.out.println(" CORRECT - exception has been thrown: " + inoeose.getMessage());
}
top = myStack.pop();
System.out.println(top + " is removed from the stack.\n");

} // end while

System.out.println("--> The stack should be empty: ");
System.out.println("isEmpty() returns " + myStack.isEmpty());
try
{
String top = myStack.peek();
System.out.println(top + " is at the top of the stack.");
} catch (InsufficientNumberOfElementsOnStackException inoeose)
{
System.out.println(" CORRECT - exception has been thrown: " + inoeose.getMessage());
}
try
{
String top = myStack.pop();
System.out.println(top + " is at the top of the stack.");
} catch (InsufficientNumberOfElementsOnStackException inoeose)
{
System.out.println(" CORRECT - exception has been thrown: " + inoeose.getMessage());
}
try
{
String beneathTop = myStack.peek2();
System.out.println(beneathTop + " is just beneath the top of the stack.");
} catch (InsufficientNumberOfElementsOnStackException inoeose)
{
System.out.println(" CORRECT - exception has been thrown: " + inoeose.getMessage());
}
System.out.println("*** Done ***");
} // end main
} // end LinkedStack
public class InsufficientNumberOfElementsOnStackException extends RuntimeException
{
public InsufficientNumberOfElementsOnStackException(String reason)
{
super(reason);
}
}

Answers

An example of the  implementation of the LinkedStack class that includes the peek2Skeleton method is given below.

What is the The ADT stack?

The final declaration of the LinkedStack class prevents it from being a superclass.

The linked stack has a class named Node, which is a private inner class that represents a singular node. Every node within the stack comprises a data component and a link to the subsequent node (next).  

One can see that i presumed the precise and individual implementation of the TextbookStackInterface in the given code. The inclusion of the InsufficientNumberOfElementsOnStackException class serves to ensure thoroughness.

Learn more about  linked implementation  from

https://brainly.com/question/13142009

#SPJ4

The ADT stack lets you peek at its top entry without removing it. For some applications of stacks, you
The ADT stack lets you peek at its top entry without removing it. For some applications of stacks, you
The ADT stack lets you peek at its top entry without removing it. For some applications of stacks, you
The ADT stack lets you peek at its top entry without removing it. For some applications of stacks, you

Type the correct answer in the box. Spell all words correctly.
Which software is used to play, create, and modify audio and video files?
_______software is used to play, create, and modify audio and video files.

Type the correct answer in the box. Spell all words correctly.Which software is used to play, create,

Answers

Answer:

Adobe Premire pro

Explanation:

Answer:

video editing

Explanation:

The ____ view displays the worksheet the way it will look when it prints.

A) Normal

B) Page layout

C) Break

D) Page settings

Answers

I think you are looking for page layout. You can typically see it before printing out a page
page layout should be correct

By definition, what is the process of reducing security exposure and tightening security controls?

Answers

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

https://brainly.com/question/27912668

#SPJ4

T/F. regional accents present challenges for natural language processing.

Answers

The given statement "regional accents present challenges for natural language processing" is true because it involves tasks such as speech recognition, machine translation, and sentiment analysis.

What are the potential difficulties that regional accents pose for natural language processing?

Regional accents can pose challenges for natural language processing, especially for systems that rely on speech recognition. This is because accents can cause variations in speech patterns, intonation, and pronunciation, which can make it difficult for the system to accurately interpret spoken language. As a result, natural language processing systems may struggle to accurately transcribe spoken language or understand the meaning behind certain phrases or words.

For example, a system designed to transcribe speech in a British accent may struggle to accurately transcribe speech in a Scottish accent, due to the differences in intonation and pronunciation between the two. Similarly, a system designed to interpret American English may struggle to understand certain words or phrases when spoken with a Southern or New England accent.

To overcome these challenges, natural language processing systems must be trained on a wide variety of accents and dialects. This can help the system to better understand and interpret different variations of spoken language, and improve its overall accuracy.

Learn more about Natural language processing

brainly.com/question/28524480

#SPJ11

leo's box has eccentric knockouts what makes them eccentric

Answers

Eccentric knockouts are holes cut into an electrical box that are larger in diameter than the inner diameter of the device being installed, such as when an oversized wiring device or conduit fitting is being used. Allowing for larger frames and deeper boxes, these knockouts give installers a lot more room to work when it comes to fitting bulky components into tight spaces. They can also make wiring much easier if an appliance or conduit fitting requires a bigger hole in the box

Who invented the ENIAC? More than one answer may apply.
John Mauchly
Steve Jobs
Ada Lovelace
O Presper Eckert
O Bill Gates

Answers

Answer:John Mauchly and Presper Eckert

Explanation:

The ENIAC was invented by John Mauchly and Presper Eckert option (A) John Mauchly and (D) Presper Eckert are correct.

What is ENIAC?

Completed in 1945, ENIAC was the first programmable, electronic, general-purpose digital computer.

These features were available on other computers, but the ENIAC offered everything all in a convenient package.

It could solve "a vast class of computer mathematical problems" by retraining and was Turing-complete.

ENIAC was invented by John Mauchly and Presper Eckert.

The first programmable general-purpose electronic digital computer was created during World War II by the United States and is known as ENIAC, or Electronic Numerical Integrator and Computer.

Thus, the ENIAC was invented by John Mauchly and Presper Eckert option (A) John Mauchly and (D) Presper Eckert are correct.

Learn more about the ENIAC here:

https://brainly.com/question/13385199

#SPJ2

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:

72.7% complete question how does a one-time password work? a.the existing password is sent to a user after having requested a password change on a website. b.a unique password is generated using an algorithm known to both a device (fob) and the authenticating server. c.a temporary password is sent to a user via email after requesting a password reset. d.a user must enter a hardware token, like a smart card, and enter a password or pin.

Answers

The  one-time password is a temporary, unique code used to authenticate a user's identity

A one-time password (OTP) is a security mechanism used to authenticate a user's identity. It is a unique code that is generated for a single use and is valid only for a short period of time. OTPs are often used in addition to traditional passwords to provide an extra layer of security, as they are more difficult to hack or steal.

The most common way that OTPs are generated is through an algorithm known to both the device or fob and the authenticating server. This algorithm produces a unique code that is valid for a short period of time, usually around 30 seconds, before it expires and cannot be used again. The user must enter this code along with their username and password to access the system or service.

OTP can also be generated through a hardware token like a smart card, which the user must enter along with a password or PIN to authenticate themselves. This provides an added layer of security, as the user must possess both the hardware token and the correct password or PIN to gain access.

In conclusion, . It is generated through an algorithm known to both the device or fob and the authenticating server, or through a hardware token and password or PIN. OTPs are an effective way to enhance security and protect against unauthorized access.

To learn more about : authenticate

https://brainly.com/question/14699348

#SPJ11

The first commercially available digital camera was which of the following?

Answers

Kodak Professional Digital Camera System

hope it helps

pls mark me as brainliest

Answer:

D

Explanation:

None of the above

If the controller of a system is a computer, the controlled signal is sent to the actuator: O a. Through a summing system O b. Through an amplifier O c. With the disturbance Od. Directly Oe. Through a sensor

Answers

If the controller of a system is a computer, the controlled signal is sent to the actuator directly. A computer-based controller measures the system's response to the controlled variable and then sends the signal to the actuator to operate on the controlled system.

It is essential to understand that the feedback control loop comes from the controlled variable, and the controlled signal sent to the actuator comes from the controller to maintain the desired output. The controller algorithm controls the system using a direct current (DC) signal.

A direct current signal is sent to the actuator by a computer-controlled system to regulate the variable's output. A sensor would not be used to send signals to the actuator since it is only used to sense physical quantities. The correct option is O(d) Directly.

Learn more about the controlled signal at https://brainly.com/question/30426048

#SPJ11

Determine whether mr.Mullins is eligible. Why or why not

Answers

Mr. Mullins is not eligible as he made some critical decisions without actually getting to the root of them.

How to determine Mr. Mullin's eligibility

The text about Mr. Mullins and Mr. Conatser was because the former gave the latter permission to drive a truck because he had seen him driving a similar vehicle.

The only condition in which Mr. Mullins would be eligible would be if he had followed the right steps in determining the legal right of Mr. Conatser to drive a truck.

Learn more about eligibility here:

https://brainly.com/question/1138155

#SPJ1

The web can be modeled as a directed graph where each web page is represented by a vertex and where an edge starts at the web page a and ends at the web page b if there is a link on a pointing to b. This model is called the web graph. The out-degree of a vertex is the number of links on the web page. True False

Answers

The given statement is true.The web graph is a model for a directed graph that helps to represent the web. This model is important because the internet is a vast and complex network of web pages that are linked together. Each web page is represented by a vertex in the graph, and an edge that starts at vertex a and ends at vertex b is created if there is a link on a that points to b.

In other words, each vertex is a webpage, and each directed edge represents a hyperlink from one webpage to another. The out-degree of a vertex is the number of links that point away from it. This means that the number of edges that originate from a vertex is equal to its out-degree. Therefore, the main answer is True. :We can define web graph as follows: The web graph is a model for a directed graph that helps to represent the web. This model is important because the internet is a vast and complex network of web pages that are linked together.

Each web page is represented by a vertex in the graph, and an edge that starts at vertex a and ends at vertex b is created if there is a link on a that points to b.In other words, each vertex is a webpage, and each directed edge represents a hyperlink from one webpage to another. The out-degree of a vertex is the number of links that point away from it. This means that the number of edges that originate from a vertex is equal to its out-degree. Therefore, the main answer is True.

To know more about web visit:

https://brainly.com/question/12913877

#SPJ11

State true or false: for every high level language, there are certain grammatical rules, violation of which a comp

Answers

true pls make me brainlyest

Calculate and print the average mark achieved for a test for a group of four students.

Answers

Answer:

To calculate the average, add the test scores together and divide the sum (483) by six.

Explanation:

(a) What are computer scanning device
(b)Name the type of scanner used:

Answers

Answer
Answer A):- A scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display. Scanners work by converting the image on the document into digital information that can be stored on a computer through optical character recognition (OCR).

Answer b):-The information will include; cost, and how its used The four common scanner types are: Flatbed, Sheet-fed, Handheld, and Drum scanners.
Hope it Helps!

Web technologies like Flash, CSS, Java, and HTML often depend on APIs to accomplish what task?

Answers

In Programming, web technologies like the front end part e.g Flash, CSS, Java, and HTML  depends on back end APIs for task like data persistence, sending and getting data e.g post and get request in summary perform CRUD(Create, read, update and delete) operations

The development of web application is basically divider into two

The front end, done basically with technologies like HTML CSS, JavaScriptBack end, this can be done using Python, C#, Java, or any suitable language

Th front end depends on the back end for sending and retrieving information

Learn more:

https://brainly.com/question/8391970

Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs

Answers

The type of typeface that Derek should use is option D: humanist sans.

What is an typeface?

A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.

What defines a humanist font?

The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often  include forms that looks like the stroke of a pen.

Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.

Learn more about typeface from

https://brainly.com/question/11216613

#SPJ1

Question 1 (10 points)


When using MLA format your font type and font size should be what?
Question 1 options:


Rockwell 12


Calisto 11


Times New Roman 11


Times New Roman 12
Question 2 (10 points)


What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:


Insert


Design


View


References
Question 3 (10 points)


What tab do you go to to put a header on your paper
Question 3 options:


References


Insert


Layout


Home
Question 4 (10 points)


When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:


Synonym


Homonym


Antonym


Metronym
Question 5 (10 points)


In Word you can force a page break
Question 5 options:


By positioning your cursor at the appropriate place and pressing the F1 key


By hitting the enter key twice really fast


By clicking the Insert Tab and selecting Page Break in the ribbon


By changing the font size of your document
Question 6 (10 points)


In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:


First Line Indent


Hanging Indent


Tab


Left Indent
Question 7 (10 points)


Which would you choose to save a document with a new name?
Question 7 options:


Press Ctrl+S


Click File, Save


Click Tools, Options, Save


Click File, Save As
Question 8 (10 points)


To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:


Insert


References


Design


View
Question 9 (10 points)


User can use ______ commands to search for and correct words in a document
Question 9 options:


Copy and Paste


Find and Replace


Header and Footer


Print and Print preview
Question 10 (10 points)


What tab do you go to for the spelling and grammar check?
Question 10 options:


Home


Review


Insert


File

Answers

Answer:

Find and replace header and footer

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

what is the name of the large background area of the windows environment that holds icons for files, folders, and applications?

Answers

Answer: desktop is the name of the large background area of the Windows environment that holds icons for files, folders, and applications

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer

Answers

In this scenario, the loopback address for the Wrk2 computer is 127.0.0.1. It is used for local network testing and communication within the device itself.

The loopback address for the Wrk2 computer in the given scenario is 127.0.0.1.

The loopback address is a special IP address used to test network connectivity on a local machine without actually sending data over a physical network. It allows a device to communicate with itself.

In IPv4, the loopback address is defined as 127.0.0.1 and it is reserved for this purpose. When a device sends data to the loopback address, it is looped back to the device itself without going out to the network.

In the given scenario, the Wrk2 computer has been assigned the IP address 192.168.1.55. This IP address belongs to the local network, and it can be used to communicate with other devices on the same network. However, if the Wrk2 computer wants to test its own network connectivity, it can use the loopback address 127.0.0.1.

For example, if the Wrk2 computer wants to check if its network stack is functioning properly, it can ping the loopback address. By sending a ping to 127.0.0.1, the Wrk2 computer will receive a response from itself, confirming that its network stack is working correctly.



Learn more about local network testing here:-

https://brainly.com/question/31106950

#SPJ11

Describe two key features of project management software that Hugh could use to make sure the project is complete before the deadline.

Answers

Two key features of project management software that Hugh could use to ensure project completion before the deadline are -  

Task Scheduling and Tracking Gantt Chart Visualization

How  is this so?

1. Task Scheduling and Tracking  -  Project management software allows Hugh to schedule tasks, assign them to team members, and track their progress in real-time.

This feature helps him stay on top of task deadlines, identify bottlenecks, and take necessary actions to ensure timely completion of all project tasks.

2. Gantt Chart Visualization -   Gantt charts provide a visual representation of the project timeline, showing the duration of each task, dependencies, and critical path.

Hugh can use this feature to identify any potential delays or overlapping tasks, allowing him to make adjustments and allocate resources effectively to meet the project deadline.

Learn more about project management software at:

https://brainly.com/question/29646049

#SPJ1

Write an application in Java that prompts a user for two integers and displays every integer between them. Display There are no integers between X and Y if there are no integers between the entered values. Make sure the program works regardless of which entered value is larger. It starts out with this:

import java.util.Scanner;
public class Inbetween {
public static void main (String args[]) {
// Write your code here
}
}

Answers

The complete program written in java is shown below

Completing the program in java

The possible implementation of the program in Java is as follows

import java.util.Scanner;

public class Inbetween {

   public static void main (String args[]) {

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the first integer: ");

       int num1 = input.nextInt();

       System.out.print("Enter the second integer: ");

       int num2 = input.nextInt();

       if (num1 == num2) {

           System.out.println("There are no integers between " + num1 + " and " + num2);

       } else if (num1 < num2) {

           for (int i = num1 + 1; i < num2; i++) {

               System.out.print(i + " ");

           }

       } else {

           for (int i = num2 + 1; i < num1; i++) {

               System.out.print(i + " ");

           }

       }

   }

}

Read more about programs at

https://brainly.com/question/26497128

#SPJ1

Write the name kalia in a creative way in your own handwriting

Answers

Just write it in cursive capitalized

1. what is the purpose of giving an id to an html element when using javascript?

Answers

Answer:

It is also used by JavaScript to access and manipulate the element with the specific id.

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

Write the pseudocode that could be used for a program that will test if a
number is odd or even and print the result.
esult.

Answers

Here's an example of pseudocode that could be used for a program that will test if a number is odd or even and print the result:

1. Ask the user for an integer input and store it in a variable called "number."
2. Check if the number is divisible by 2 using the modulo operator (%).
3. If the result of the modulo operator is 0, print "The number is even."
4. If the result of the modulo operator is 1, print "The number is odd."

Here's an implementation of the pseudocode using Python:

```
number = int(input("Enter an integer: "))

if number % 2 == 0:
print("The number is even.")
else:
print("The number is odd.")
```

This program will ask the user to enter an integer and then check if it is even or odd using the modulo operator. If the number is even, it will print "The number is even." If the number is odd, it will print "The number is odd."

Suppose you have the following numbers and need them to be written in the two other numbering
systems. Before you could translate them, you would need to identify what numbering system is currently
used. Which numbering systems do the following numbers represent? (4 points)
a) 2C
b) 109

Answers

Answer:

Explanation:

a) hexadecimal

because hexadecimal numbers use 0-9 and letters A-F

b) decimal

109 is just a regular number and the standard numbering system that humans use is decimal

Other Questions
how much money will be in an account in 5 years it $10,000 is deposited now at an interest rate of 1% per month? use three different interest rates HELP PLS LIKE RIGHT NOW PLSSSSSS Need help sorry i suck at this one paradox of chinatowns is that a. few chinese live in them. b. they are virtually nonexistent. c. their image of bright lights and exotic sounds conceals widespread poverty. d. their affluence works to the advantage of overseas chinese. 3. In which pair of figures can Figure A be taken to Figure B by a rotation?You may you help my Randy is designing a circular garden that is 18 feet in diameter. He is buying plastic edging that costs $1. 50 per foot. He can only buy edging in whole-foot amounts. How much does it cost Randy to buy edging for his garden? Use 3. 14 for pie. I WILL GIVE BRAINLIEST!!!Which of these civilizations would you like to live in and why?Aryans - Mohenjo-Daro/Harappa - Dravidian How do I answer this question What is the most significant limitation that Carl Schurz's work has as a resource for a historian?A. Schurz was too young to be a reliable witness.B. Schurz was not an eyewitness to the events he describes.C. Schurz wrote his account about fifty years after the events occurred.D. Schurz was a government official likely biased against the revolution.Answer is C. Schurz wrote his account about fifty years after the events occurred since we are treating light as a particle it is appropriate to consider a pool ball bouncing off the edges of How important do you think trade was in China? Why? Isabelle visits Ashfall Fossil Beds State Historical Park in Nebraska. She sees the sites where paleontologists discovered the remains of many extinct species.She learns that the fossil record helps people understand life on Earth millions of years ago. Which statement is true about the fossil record? Any help with this will greatly appreciated! In national business environments, ________ plays a pivotal role in all international commercial activity. Who founded the trading post of quebec. A. james oglethorpe B. william penn C. vikings D. samuel de champlain E. hohokam how can money be deposited into spruce? tax refund. direct deposit. linked bank account. all of the above. Find the value of a - 6 ifa = 5 most intelligence tests group of answer choices measure a student's multiple intelligence.. are highly visual. correlate well with mathematics tests. do not accurately measure various forms of intelligence aside from verbal skills. This activity is an example of which threat to biodiversity? A thin uniform-density rod whose mass is3.6kg and whose length is2.6m rotates around an axis perpendicular to the rod, with angular speed39radians/s. Its center moves with a speed of12m/s.(a) What is its rotational kinetic energy?Krot=J(b) What is its total kinetic energy?Ktotal=J