List the four types of computer cases

Answers

Answer 1

Answer:

full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).

I hope it helps.

Answer 2
This is the answer. Hope it’s helpful
List The Four Types Of Computer Cases

Related Questions

What can be used to store data, plant viruses, or steal data?

Answers

Answer:

ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

outline three difference each of a raster filled and vector file​

Answers

Answer:

Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

Explanation:

Which of the following will cause you to use more data than usual on your smartphone plan each month?

a. make a large number of outbound calls

b. sending large email files while connected to wifi

c. streaming movies from Netflix while not connected to Wi-Fi

d. make a large number of inbound calls

Answers

Outbound calls. You would most likely make more calls TO people rather than receive.


Calculator is an example of
computer
A. analogue
B. hybrid
C. manual
D. digital
E. public​

Answers

D. digital

Explanation:

I hope it helps you

Which terms means device that converts one voltage to another ?

Answers

Answer:

I believe it is an adapter

Explanation:

An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.

A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has a UPS and a generator to protect against power outages Making sure there are no unmanaged third-party service level agreements Performing a walkthrough of the disaster recovery plan Testing that super user (SYSADMIN) access is limited to only appropriate personnel

Answers

Answer:

Testing that super user (SYSADMIN) access is limited to only appropriate personnel.

Explanation:

A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.

g A catch block that expects an integer argument will catch Group of answer choices all exceptions all integer exceptions any exception value that can be coerced into an integer C

Answers

Answer:

Hence the correct option is 2nd option. all integer exceptions.

Explanation:

A catch block that expects an integer argument will catch all integer exceptions.

You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple normalized source databases that need consolidation for reporting and analytics. What type of database would you recommend and why

Answers

Answer:

The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.

Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.

Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?

what is the python ?​

Answers

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

This is my Opinion.

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.

Hope this helps you :)

College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away

Answers

Answer:

Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...

Browse Online Tutorials. ...

Build-up online profile. ...

Learn new Tools. ...

Implement what you learned. ...

Enrich your skillset. ...

Try-out and Apply.

Give examples of applications that access files by each of the following methods:
+ Sequentially.
+ Random.

Answers

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

The operating system (OS) of an information system contains the software that executes the critical functions of the information system. The OS manages the computer's memory, processes, and all of its software and hardware. It allows different programs to run simultaneously and access the computer's memory, central processing unit, and storage.

a. True
b. False

Answers

Answer:

a. True

Explanation:

An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).

Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.

c)what formula would be in the cell E2

Answers

Excel will generally be able to handle any properly-input mathematical formula, if valid operators are used. Commonly used operators include "+" (addition), "-" (subtraction), "*" (multiplication) and "/" (division).  (Microsoft has a complete list of valid operators to be used in Excel formulas on the Office website).  Here are some examples of formulas using common operators:

Formula                                                                              Description

=C2-B2                                                                Subtracts contents of B2 from contents of C2

=C2/B2                                                                Divides contents of C2 by contents of B2

=(B2+C2+D2)/3                                                  Adds contents of B2, C2, and D2 and divides result by 3

After hitting "Enter", the cell will display the calculated value, while the formula bar will still display the formula.  (Note: Always hit “Enter” when finished entering a formula, manually.  If you click off the cell, the cell you click to will be added to your formula.)Formulas

Formulas in Excel are basically mathematical expressions that use cell references (e.g., “A5”,” D17”) as arguments.  For example, a formula that adds the contents of cell E5 and E6 could be written as follows:

 

= E5+E6

 

(Note: all formulas in Excel need to be preceded by an “=” sign.) If the values contained in E5 and E6 are 6 and 11, respectively, the formula will produce 17 as the value it displays. If you change E5 to 7, the result will automatically change to 18.

Example

Let's say you were putting together an office supply order, and you wanted to keep track of much you were spending. You could put together a spreadsheet like the one below, with the list of items to be purchased, their unit prices, the number of each item ordered, and the total spent for each.  It would make sense to enter the things you know in advance (like the price of individual items and the number ordered), but you could let Excel calculate the totals for you.  For the first item listed below (pencils), this could be done by making the value of the total price (cell D2), the value of the unit price (held in cell C2) multiplied by the number of items ordered (held in D2).  This formula would be written "=B2*C2".

Once you click "OK", your completed formula will be input into the cell.

Copying and pasting formulas

Often, you will need Excel to do a series of similar computations, where the only things that will change are the cells used as arguments.  For instance, in the example above, you would probably like Excel to calculate the Total Price for each item in the order.  You could re-input the same formula used to get the total price for pencils in each cell in that row, just changing the cells referenced (i.e. "=PRODUCT(B3:C3)", "=PRODUCT(B4:C4)", etc.), but Excel has simpler method for this. If you have multiple cells in the same row or column that need to do the same computation, you can simply copy the value in the cell you entered a formula, and then paste it into the subsequent cells.  Excel will then automatically adjust which cells are included in the formula, based upon which cell the formula was pasted to.  So, if the original formula entered in D2 was "=PRODUCT(B2:C2)", the formula pasted into D4 would be "=PRODUCT(B4:C4)"

More simply, if you have a formula you want repeated in a number of directly adjoining cells, you can just click and drag the bottom right corner of the cell with the original formula (see image below) onto the cells you want the same formula entered, and Excel will automatically copy and paste the formula for you, with appropriate adjustments made to the cell numbers in the formula.

After selecting "PRODUCT" and clicking OK, you will get another dialog box, that allows you to select the cells to be multiplied.  You can do this for individual cells, by selecting cells separately in the "Number1" and  "Number2" boxes shown below, or by selecting an array of cells, by clicking and dragging on the range cells you want to use on the spreadsheet, itself.  (Note: if you try to enter a formula in a cell using the Insert Formula button and there are adjacent cells with numbers, Excel will often select those cells automatically, so make sure the cells selected in the dialog box are the correct ones.) Excel also has built-in functions that can do a lot of useful calculations.  These are most easily accessed by hitting the Insert Function button, which is represented by the “fx” symbol next to the formula bar.  For example, instead of entering the formula shown above, the same result could have been achieved using the built-in "PRODUCT" function by clicking in cell D2 and hitting the Insert Formula button.  This would give a dialog box like the one shown, below.

After choosing “PRODUCT” and pressing OK, a new dialogue box will appear where you may choose which cells should be multiplied. By selecting particular cells in the “Number1” and “Number2” boxes as shown below, you can do this for specific cells.

What is the formula would be in the cell E2

Additionally, Excel contains many useful built-in functions that can perform calculations. The button shown by the “fx” sign next to the formula bar, “Insert Function,” can be used to access these the simplest way by clicking it.

Make sure the cells selected in the dialogue box are the proper ones because if you try to insert a formula in a cell using the Insert Formula button and there are adjacent cells containing numbers. Excel will frequently select those cells automatically.)

Therefore, by deciding a range of cells on the spreadsheet itself by clicking and dragging on the desired range of cells.

Learn more about cell E2 here:

https://brainly.com/question/6961706

#SPJ2

Develop Swimlane Activity diagram for Assignment announcement and submission system.

Answers

Using cases can be visualized in greater detail in this report of an activity diagram. In other words, it's a behavioral diagram that regulates the number of actions via systems. They can also be used to show sequences of activities in business operations. UML Activity Diagrams A business process can be examined to determine its flow and demands that use these tools.

The steps to this question can be defined as follows:

For step 1:

The task is to decide the action steps depending upon your use case.

For step 2: Identify all parties involved

If you know whoever the actors are, it's easier to determine the acts they are liable for.

For step 3: Establish a movement among activities

Change the priority in which the action is required by studying the flowchart. If you need to add any branches to the graph, note the conditions that must be met for certain processes to take place. Furthermore, do you even have to finish some tasks before moving onto someone else?

For step 4: Adding swimlanes

We know who is to blame for each act. It's time to assign everyone a swimming lane and group every action they are accountable for under it.Some many activities and actions make up your sales system or process.

Please find the diagram in the attachment file.

Learn more:

Assignment submission: brainly.com/question/11714037

What values are in the vector named pressures after the following code is executed? vector pressures; pressures.push_back(32.4); pressures.push_back(33.5); pressures.insert(pressures.begin(), 34.2); int index = 2; pressures.insert(pressures.begin() + index, 31.8); pressures.push_back(33.3); index = 1; pressures.erase(pressures.begin() + index); a. 34.2, 31.8, 33.3 b. 34.2, 33.5, 31.8, 33.3 c. 34.2, 33.5, 33.3 d. 34.2, 31.8, 33.5, 33.3

Answers

Answer:

Hence the correct option is A that is "34.2 31.8 33.5 33.3".

Explanation:  

Program:-  

#include <iostream>

#include<vector>  

using namespace std;  

int main()

{

int count =0;

vector<double> pressures;

pressures.push_back(32.4);

pressures.push_back(33.5);

pressures.insert(pressures.begin(), 34.2);

int index = 2;

pressures.insert(pressures.begin() + index, 31.8);

pressures.push_back(33.3);

index = 1;

pressures.erase(pressures.begin() + index);

for (auto it = pressures.begin(); it != pressures.end(); ++it)

cout << ' ' << *it;

return 0;

}

You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."

Answers

Answer:

Code:-

using System;

using System.Collections.Generic;

class MainClass {

public static void Main (string[] args) {

int Val1,Val2,total;

string input;

double overall;

Console.Write("Cost of First Item (in $)");

      input = Console.ReadLine();

Val1 = Convert.ToInt32(input);

Console.Write("Cost of Second Item (in $)");

      input = Console.ReadLine();

Val2 = Convert.ToInt32(input);

total=Val1+Val2;

if (total >= 100)

{

overall=.9*total;

Console.WriteLine("Your total purchase is $"+overall);

}

else if (total >= 50 & total < 100)

{

overall=.95*total;

Console.WriteLine("Your total purchase is $"+overall);

}  

else

{

Console.WriteLine("Your total purchase is $"+total);

}  

}

}

Output:

hi, please help me.solution.​

Answers

Answer:

aahdbdnsjajaissjdjdhskakwjdhbebs

11111 Power 2 sovle ​

Answers

123,454,321. you just multiply 11111 by itself

Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.

Answers

Answer:

Code:-

#include <iostream>

using namespace std;

int main()

{

   // take array size from user

   int n;

   cout << "Enter array size:";

   cin >> n;

   // Declare array size with user given input

   int a[n];

   

   // take array elements from user & store it in array

   cout << "Enter array elements:";

   for(int i=0 ; i < n ; i++){

       cin >> a[i];

   }

   

   /* ----- Solution Starts ----- */

   // i & j for checking disarray & count is for counting no. of disarray's

   int i=1, j=0, count=0;

   

   for(int k=0; k < n ; k++){

       

       if(a[i] > a[j]){

           // if disarray found then increament count by 1

               count++;

               

               }

               // increament i & j also to check for further disarray's

               i++;

       j++;

       }

       // Print the disarray count

   cout << "Pairs of disarray in given array:" << count;

   

   /* ----- Solution Ends ----- */

   

   return 0;

}

Output:-

explain the working principle of computer? can anyone tell​

Answers

Answer:

input process and output hehe

Components of micro computer with diagram

Answers

Answer:

CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator.

Explanation:

There are six basic components of a microcomputer which includes CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator. CPU is the central processing unit which is considered as the brain of the computer. It is the part of a computer that executes instructions. Data memory is the place where data is stored that is present in the CPU.

Discuss the DMA process​

Answers

Answer:

Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).

Explanation:

A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.

In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.

ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.

ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.

A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:

   I/O addresses    Memory addresses.    Interrupt request numbers (IRQ).    Direct memory access (DMA) channels.

DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.

A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.

With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.

In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.

However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.

Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.

Answer:

See explanation

Explanation:

DMA [tex]\to[/tex] Direct Memory Access.

The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.

The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.

The SEI/CERT website is full of best-practices for developing secure code for various popular programming languages. Select a software threat/vulnerability of your choice and idenitfy two secure coding practices to mitigate that threat/vulnerability. You may choose any programming language you wish.

Answers

Answer:  

Input-Output rule:  

char *file_name:

FILE *f+ptr;  

f_ptr = fopen(file_name, "w");

if(f_ptr == NULL){

}  

if(fclose(f_ptr)!=0){

}  

if(remove(file_name) !=0){

}  

Expression:  

void set_fl(int num ,int *s_fl){

if(NULL == s_fl){

return;

}  

if(num>0){

*s_fl =1;

}

else if(num <0) {

*s_fl = -1;

}

}  

int is_negative(int num) {

int s;

set_fl(num , &s);

return s<0;

Explanation:  

Computer Emergency Response Team(CERT) has found most vulnerabilities discovered in applications stem from a comparatively small number of common programming errors that developers repeatedly make. The CERT secure coding initiative is functioning to determine secure coding standards for commonly used programming languages and to advance the practice of secure coding.

There are many security coding practices:  

SEI CERT C coding standard:  

The C rules and proposals are a piece ongoing and reflect the present thinking of the secure coding community. As rules and proposals mature, they're published in report or book form as official releases.

discribe two ways you can zoom in and out from an image

Answers

How to zoom in: u get any two of ur fingers and instead of going inward like ur tryna pop a zit, you go out

How to zoom out: pretend like ur popping pimples on ur phone/device screen

Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents - qtr * 25

dms = int(cents/10)

cents = cents - dms * 10

nkl = int(cents/5)

pny = cents - nkl * 5

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Explanation:

The program in Python is as follows:

cents = int(input("Cents: "))

This calculate the number of quarters

qtr = int(cents/25)

This gets the remaining cents

cents = cents - qtr * 25

This calculates the number of dimes

dms = int(cents/10)

This gets the remaining cents

cents = cents - dms * 10

This calculates the number of nickels

nkl = int(cents/5)

This calculates the number of pennies

pny = cents - nkl * 5

The next 4 lines print the required output

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

explain the elements of structured cabling systems​

Answers

Answer:

From this article, we can know that a structured cabling system consists of six important components. They are horizontal cabling, backbone cabling, work area, telecommunications closet, equipment room and entrance facility.

dismiss information I have here and hope you like it and hope you will get this answer helpful and give me the thankyou reactions

Which of the following is true for creating a new file?

a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None

Answers

Answer:

create a file with the same name as an existing file ,you will be prompted to rename your new file

WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA

Answers

Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D

In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g

Answers

Answer:

Explanation:

Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.

import threading

import time

def thread_function(name):

   print("Thread {name}: starting")

   time.sleep(2)

   print("Thread {name}: finishing")

thread1 = threading.Thread(target=thread_function, args=(1,))

thread1.start()

time.sleep(1)

thread2 = threading.Thread(target=thread_function, args=(2,))

thread2.start()

thread2.join()

Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity​

Answers

Answer:

The algorithm is as follows:

1. Start

2. Capacity = 100%

3. Input Status (True/False)

4. While Status == True

    4.1. Read Quantity (%)

    4.2. Capacity = Capacity - Quantity

    4.3. If Capacity < 40%

          4.3.1 Display Yellow Flash

    4.4. Input Status (True/False)

5. Stop

Explanation:

This starts the algorithm

1. Start

The capacity of the machine is initialized to 100%

2. Capacity = 100%

This gets the status of the sales

3. Input Status (True/False)

The following iteration is repeated until the status is false

4. While Status == True

Read current sales quantity from the user

    4.1. Read Quantity (%)

Remove the quantity from the capacity

    4.2. Capacity = Capacity - Quantity

Check is capacity is below 40%

    4.3. If Capacity < 40%

If yes, display yellow flashes

          4.3.1 Display Yellow Flash

This gets the status of the sales

    4.4. Input Status (True/False)

End algorithm

5. Stop

Other Questions
XYZ Company estimates the amount of materials handling overhead cost that should be allocated to the company's two products using the data that are given below: Wall Mirrors Specialty Windows Total expected units produced 9,000 6,000 Total expected material moves 400 100 Expected direct labor-hours per unit 7 5 The total materials handling cost for the year is expected to be $6,800. The materials handling cost is allocated based on the number of materials moves. What is the total materials handling cost allocated to the specialty windows 1.This hotel looks clean and ............................(COMFORT) 2.There isn't any.............................. In this village nowadays.(ELECTRIC) 3.My parents ........................... Me to the park in that competition.(COURAGE) 4.There is a very ......................... Programme on TV tonight.(INTEREST) 5.Easter is a joyful festival which is .................. In many countries all over the world.( CELEBRATION) 6. You must be when you open that door. ( CARE) 7. The tsunami in Japan in 2011 was the most of the year. ( DISASTER ) 8. Bi Rain is ___________known by teenagers in my country. ( WIDE ). 9. The garden is ____ with trees and flower. ( beauty) 10. They enjoy the ____ atmosphere here. ( PEACE) can someone give me a little assistance and an explanation ? Suppose Event A is taking 15 or more minutes to get to work tomorrow and Event B is taking less than 15 minutes to get to work tomorrow. Events A and B are said to be complementary events.a. Trueb. False Panther Co. had a quality-assurance warranty liability of $350,000 at the beginning of 2021 and $310,000 at the end of 2021. Warranty expense is based on 4% of sales, which were $50 million for the year. What amount of warranty costs were paid during 2021?a. $0.b. $1,960,000.c. $2,000,000.d. $2,040,000. Please help I will give brainliest to whoever helps Data related to Meenas and Malinis journey is given below, plot a graph of theirrespective journey on a graph paper. You have already plotted Meenas Journey during thesummer vacation. On the same graph paper, now plot Malinis Journey.PDF task 2Please do this for me urgent I can give you extra points if someone answers this in less than 1 hour. how entrepreneurs that operate in the sharing economy use creative thinking to develop and improve businesses? lution: What is the molarity of 245 g of H, SO4 dissolved in 1.00 L of solution? Format wars, in the context of high-technology industries, refer to: a. battles to control the source of differentiation, and thus the value that such differentiation can create for the customer. b. the confusion among customers that arises as a result of several choices of formats for PCs and other gadgets. c. the price-based battles in the network of complementary products, which is a primary determinant of the demand for an industry's product. d. conflicts within an organization about which format to adopt for their products. e. price-based battles among companies producing similar products. lyrics " LUKA" ~ Killing me Inside Bandpleasee why do children need more protein in there diet subtract these polynomials What is the congruence correspondence, if any, that will prove the given triangles congruent?multiple choices on pic (a) 4x + 3y + 2x + 7y NO LINKS OR ANSWERING WHAT YOU DON'T KNOW. THIS IS NOT A TEST OR AN ASSESSMENT!!!. Please help me with these math questions. Chapter 10 part 23. How do solving for solving to a rational function differ from solving for solutions to a rational inequality? How they are similar? 4. How is the difference quotient of a function determined? And how is the difference quotient related to the secant line? Is there a pattern for the difference quotient of linear functions? which statement best describes a chemical property of a mineral 41. If two fair coins are tossed what is the probability of getting at least one head? _____________ What was one result of French rule in Vietnam?A. Existing Vietnamese leaders are allowed to maintain their leadership positions.B. All leaders were required to renounce their Vietnamese citizenship.C. Vietnamese rulers were given impressive-sounding, but meaningless, positions.D. Anyone who converted to Christianity was allowed many rights and benefits that were not given to others. -8z^{-2} Write the expression using only positive exponents. Assume no denominator equals zero.