2. A block of text is selected and now you
wish to center align them. Which of the
following command will let you do it?​

Answers

Answer 1
Paragraph command from format menu
Answer 2

Answer:

The command Ctrl+E will be used to center align the selected text.

Or the center align command from the Insert Tab can be sued for this purpose.

Explanation:

Alignment is how the text appears on the screen or on printed page. There are four types of alignment in word.

LeftRightJustifiedCenter

There are commands and menus on the word interface and shortcut keys to center align a text.

Hence,

The command Ctrl+E will be used to center align the selected text.

Or the center align command from the Insert Tab can be sued for this purpose.


Related Questions

What is the best use of network in homes

Answers

Answer:

Spectrem

Explanation:

how to create a structure using c# programming

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

C# uses the struct keyword to declare structure.

The are used to store related data item.

For example the record of Student i-e his name, father name, address and class no can be declared using structure

using system

struct Student {

  public string name;

  public string father_name;

  public string address;

  public int class_no;

};

What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?

Answers

Answer:

dd if=/dev/drive1 of=/dev/backup

Explanation:

Linux operating system is an open-source computer application readily available to system operators. The terminal is a platform in the operating system used to write scripts like bash and directly communicate with the system kernel.

There are two commands used in bash to copy files, the "cp" and "dd". The dd is mostly used to copy files from one storage or partition to another. The syntax of dd is;

dd if= (source partition/directory) of= (target partition/directory)

Answer for 3 and 4 please

Answers

Answer:

3. D: px

4. B: web page

Explanation:

All font sizes are measured in px unless specified otherwise (in em's for example).

The correct answer is a web page because itself is a unique file that displays multimedia components.

Answer:

Q3: Font size is measured in pt (point)  which can be converted into centimeter(cm)

Q4: The answer is webpage

Explanation:

Q3: Font size is measured in pt (point)  which can be converted into centimeter(cm)

Q4: A unique file with unique name and address is  a webpage.

because webserver and browser are software while website is collection of webpages.

What is meant by the term visual communication?

Answers

Answer:

eye contact

Explanation:

Create a c program that calculates the amount of time and fuel for a 1980 Cessna 172N to fly a specified distance.

Answers

Solution :

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   //declaring variables

   int mile, hours ,minute;

   char option='Y';

   float fuel;

   //display welcome message

   cout<<"Aircraft Fuel Calculator\n\n";

   //this loop will run untill user enter Y or y

   while(option=='Y' || option=='y'){

   //asking user to enter miles

       cout<<"Distance in nautical miles : ";

       cin>>miles;

       //calculating hour and minutes

       hour=miles/120;

       minutes=(miles%120)/2;

       //setting 1 decimal place

       cout << fixed << setprecision(1);

       fuel=(miles/120.0 + 0.5)*8.4;

       //display data

       cout<<"Flight time: "<<hour<<" hour(s) and "<<minutes<<" minute(s)"<<endl;

       cout<<"Required fuel: "<<fuel<<" gallons\n\n";

       cout<<"Continue? (y/n): ";

       cin>>option;

       cout<<"\n";

   }

   cout << "Bye!" << endl;

   return 0;

What is the main reason for assigning roles to members of a group?

Answers

So that people with strengths in different areas can work on what they do best, plus it divides the workload.

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to create nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack

Answers

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

Hackers use packet sniffing attacks to intercept or steal potentially unprotected data from networks. A network-generated threat is a sniffing attack, also known as a packet sniffing assault. Thus, option D is correct.

What are the hacker using sniffing network?

Snooping gives ethical hackers a lot of information about how a network functions and how its users behave, which can be used to improve a company's cybersecurity.

Sniffing can, however, be utilized by unscrupulous hackers to conduct catastrophic attacks against gullible targets.

A network sniffer can detect someone using excessive bandwidth at a college or commercial organization and hunt them down.

Therefore, replay attacks are employed so that the attacker can find the hash and obtain the desired object. Once the attacker has received the object, the replay attack causes the object to return to the original connection.

Learn more about  sniffing network here:

https://brainly.com/question/10316246

#SPJ5

Display ad traffic from mobile devices may appear to be unprofitable, but the ads might be profitable if

Answers

Answer:

They meet required amount of traffic or clicks.

Explanation:

AdSense is an advertisement platform for businesses. It advertises the registered business on various target client platform like mobile app and web app who allow these adverts for profit with a commission rate for a certain amount of traffic generated from the platform on the advertised business.

WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user operating systems c. can provide files via NFS, but not via CIFS d. cannot provide files via NFS

Answers

Answer:

A. Is a distributed file system

Explanation:

The WAFL is a distributed file system. It is blocked based and it has to make use of inodes to describe it's files. This is a proprietary file system, ystem layout. The WAFL makes use of files for the storage of meta-data which gives a description of the layout of the file system.

The WAFL is named the Write Anywhere File Layout because all data can be written in any part on the disk.

The question is in the photo

Answers

Answer:

a

the most suitable answer

A method which applies to the class in which it is declared as a whole and not in response to method calls on a specific object is called a:_______

a. method call
b. an object method
c. private method
d. static method

Answers

Answer:

D) Static method

Explanation:

A static method is a method that is created only for the class and not it's instance variables or objects. Such methods can only be accessed by calling them through the class's name because they are not available to any class instance. A static method is created by prefixing the method's name with the keyword static.

A static method cannot be overridden or changed. You create a static method for a block of code that is not dependent on instance creation and that can easily be shared by all instances or objects.

Summing Three Arrays Write an assembly language subroutine that receives the offsets of three arrays, all of equal size. It adds the second and third arrays to the values in the first array. When it returns, the first array has all new values. Write a test program in C/C++ that creates an array, passes it to the subroutine, and prints the contents of the first array.

Answers

Answer:

SumThreeArrays PROC USES eax ebx esi,

  array1:PTR DWORD, array2:PTR DWORD,

  array3:PTR DWORD, arraySize:DWORD

  LOCAL sz:BYTE       ; local sz for jump

  mov sz, 4                   ; size of each iteration jump

  mov ecx, arraySize           ; set ecx to size of arrays for loop

L1:

  mov eax, arraySize           ; move array size into eax

  sub eax, ecx               ; subtract whats left

  mul sz                       ; multiply by 4 to know how much to jump  

  mov esi, array1               ; set esi to start of array 1

  mov ebx, [esi+eax]           ; move value of esi+jump into ebx

  mov esi, array2               ; set esi to start of array 2

  add ebx, [esi+eax]           ; add value of esi+jump to ebx

  mov esi, array3               ; set esi to start of array 3

  add ebx, [esi+eax]           ; add value of esi+jump to ebx

  mov esi, array1               ; set esi to start of array 1

  mov [esi+eax], ebx           ; move value of ebx into esi+jump

  LOOP L1

  ret

SumThreeArrays ENDP

END

Explanation:

The subroutine "SumThreeArrays" from the assembly language gets from memory three defined arrays from a C++ source code and extend the size of the first array with the values of the second and the third arrays.

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

25 pts) Level 1 Programming Task Write the function getPop(char myCode[3]), which takes in a two-digit string representing the state or territory code and returns the associated state or territory population. The function should open and scan the file USpops.txt for the input two-digit code, myCode. If myCode is not found in the file, the function should return -1. Make sure to close the file once the file reading is complete.

Answers

Answer:

The method definition to this question can be defined as follows:

int getPop(char myCode[3])//defining a method getPop that takes char array in its parameter

{

FILE* f = NULL;//defining a pointer variable

int pop;//defining integer variable

char s_code[2];//defining char array state_code

char s_name[100];//defining char array stateName

f = fopen("state", "r");//using pointer variable that use fopen method for open file

if(f == NULL)//defining if block that check file is empty

{

return -1;//return value -1

}

while(!feof(f))//defining while loop for input value in file

{

fscanf(f, "%s %s %d",s_code, s_name, &pop);//input value

if(strncmp(myCode, s_code, 2) == 0)//use if block to compare string value

{

printf("Population for %s: %d", s_name, pop);//print value

return 0;//return 0

}

}

fclose(f);//close file

return 0;

}

Explanation:

In the above code, a method "getPop" is defined that accepts a character array "myCode" in its parameter, and inside the method, one pointer variable "f", one integer variable "pop", and two char array "s_code and s_name" is declared.

In the method firstly fopen method is used that holds a file and use if block to check it is not empty, if the condition is true it will give a value that is "-1".

In the next step, a while loop is declared, that input value and use if block to compare string value, and return 0, and at the last, it closed the file.    

(10 points) Make a user interface to get 3 points from the user which will be placed on the coordinate plane. Then write a Python3 function to check whether the points entered forms a right triangle. And another Python3 function to check whether the points entered forms a equilateral triangle. Call your functions for three user-entered points on the coordinate plane.

Answers

Answer:

def cord_input():

Global coordinates

coordinates = {'x1': 0, 'y1': 0, 'x2':0, 'y2':0, 'x3':0, 'y3':0}

for key, i in enumerate(coordinates.keys()):

if i < 2:

index = 1

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

elif i >= 2 and i < 4:

index = 2

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

else:

index = 3

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

def sides(p1, p2, p3):

nonlocal a, b, c

a = ((p2[0] - p1[0])**2) + ((p2[1] - p1[1])**2)

b = ((p3[0] - p2[0])**2) + ((p3[1] - p2[1])**2)

c = ((p3[0] -p1[0])**2) + ((p3[1] - p2[1])**2)

def is_right_triangle(p1, p2, p3):

sides(p1, p2, p3)

if a+b == c or b+c == a or a+c == b:

print(f"Sides {a}, {b} and {c}")

return True

else:

return False

def is_equilateral(p1, p2, p3):

sides(p1, p2, p3)

if a==b and b==c:

print(f"Sides {a}, {b} and {c}")

return True

else:

return False

cord_input()

Explanation:

The python code above defines four functions, cord_input (to input a global dictionary of coordinates), sides ( to calculate and assign the sides of the triangle), is_right_triangle ( to check if the coordinates are for a right-angle triangle), and is_equilateral for equilateral triangle check.

Question #11
If A = 5 and B = 10, what is A* B equal to?
estion #2
estion # 3
restion #4
testion5
O 15
O Five
OTwo
O 50
Read Question

Answers

Answer:

Option 4: 50 is the correct answer.

Explanation:

Arithmetic operations can be performed using the programming languages. Some symbols used in programming languages are different from what we use in mathematics.

The symbol * is used to represent multiplication in programming languages.

Given

A = 5

B = 10

So, A*B will be equal to: 5*10 = 50

Hence,

Option 4: 50 is the correct answer.

Research the significance of the UNIX core of macOS and write a few sentences describing your findings.

Answers

Answer:

The Unix core used in Apple's macOS is called Darwin which is similar to the BSD Unix operating system. The Darwin in macOS has evolved, providing a slick aqua-graphical user interface for users to interact with the application by clicking rather than writing Unix commands in terminals.

Explanation:

The macOS is the operating system used by Apple computer brands. The operating system is a subset of the Unix's BSD operating system. It still makes use of the traditional Unix terminal and scripts but with a few alterations.

The significance of the UNIX core of macOS can be briefly described as:

It makes use of an aqua-graphical user interface to easily communicate with the application for seamless use.

What is UNIX core?

This refers to the different kernel subsystems which are a part of the process management and memory allocation of a device.

Hence, the significance of the UNIX core of macOS has made it very easy for Apple users to communicate with their device in real time and also to power the phone.

Read more about UNIX here:

https://brainly.com/question/26338728

In java
Write a program that draws out a path based on the user input. The starting coordinates for the path is the middle of the DrawingPanel. Ask the user to enter an x and a y coordinate for a DrawingPanel. Your program will draw a line from the last coordinates to the current coordinates the user enters. If the user enters an x value or y value out of bounds of the DrawingPanel, then end the program.

Answers

Answer:

import javax.swing.JPanel;

import javax.swing.JOptionPane;

import javax.swing.JFrame;

import javax.swing.JLabel;  

import javax.swing.JTextField;

import javax.swing.border.Border;

import java.awt.event.ActionEvent;

import java.awt.event.ActionListener;

import javax.swing.BorderFactory;

import javax.swing.JButton;

import java.awt.BorderLayout;

import java.awt.Color;

import java.awt.FlowLayout;

import java.awt.Graphics;

import java.awt.Rectangle;

public class DrawingPanel{

 

private static final int width = 800;

private static final int heigth = 500;

private static JFrame mainFrame;

private static JPanel mainPanel, inputPanel, drawPanel;

private static JLabel xLabel, yLabel;

private static JTextField xField, yField;

private static JButton drawButton;

 

public static void main(String[] args)

{

mainFrame = new JFrame("Draw Path");

mainPanel = new JPanel(new BorderLayout());

 

inputPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

xLabel = new JLabel("X Coordinate: ");

xField = new JTextField(5);

yLabel = new JLabel("Y Coordinate: ");

yField = new JTextField(5);

drawButton = new JButton("Draw");

inputPanel.add(xLabel);

inputPanel.add(xField);

inputPanel.add(yLabel);

inputPanel.add(yField);

inputPanel.add(drawButton);

 

Border border = BorderFactory.createLineBorder(Color.black);

drawPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

drawPanel.setBorder(border);

 

mainPanel.add(inputPanel, BorderLayout.NORTH);

mainPanel.add(drawPanel, BorderLayout.CENTER);

 

mainFrame.add(mainPanel);

mainFrame.setSize(PANEL_WIDTH, PANEL_HEIGHT);

mainFrame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

mainFrame.setLocationRelativeTo(null);

mainFrame.setResizable(false);

mainFrame.setVisible(true);

 

// action listener for draw button

drawButton.addActionListener(new ActionListener() {

(use the at sign here)Override

public void actionPerformed(ActionEvent e) {

if(xField.getText().equals("") || yField.getText().equals(""))

JOptionPane.showMessageDialog(null, "Please enter the x and y coordinates!");

else

{

int x2 = Integer.parseInt(xField.getText().trim());

int y2 = Integer.parseInt(yField.getText().trim());

if(x2 > WIDTH || y2 > HEIGHT)

JOptionPane.showMessageDialog(null, "x and y coordinates should be less than "

+ width + " and " + height + " respectively!");

else

drawPath(x2, y2);

}

}

});

}

 

public static void drawPath(int x2, int y2)

{

int x1 = (int)drawPanel.getBounds().getCenterX();

int y1 = (int)drawPanel.getBounds().getCenterY();

 

Graphics g = drawPanel.getGraphics();

Rectangle r = drawPanel.getBounds();

g.setColor(drawPanel.getBackground());

g.fillRect(r.x, r.y, r.width, r.height);

 

g.setColor(Color. blue);

g.drawLine(x1, y1, x2, y2);

}

}

Explanation:

The class DrawingPanel is a Java class that gets the user input for the coordinate of a path with predetermined heigth and width (defined in the class). The methods of the class are; getGraphics(), getBounds(), getBackground(), setColor() and fillRect(). The result is a rectangular path GUI on the screen.

Which attitudes are most common among successful IT professionals?

Answers

openness to learning new things and interest in technology

emotional resilience and enjoyment of leadership positions

tough-mindedness and a focus on financial gain

empathetic and motivated by a concern for others


hopefully that helps!

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

C++ please
Write a program that does the following.
Create a dynamic two dimensional squarearray of unsigned integers (array_one). Prompt the user to enter the number of rows and columns they want (maximum of 30) (rows and columns must be the same for a square array)
Pass the array to a function that will initialize the two dimensional array to random numbers between 0 and 4000 using the rand() library function. Here is the kicker: The array cannot have any repeated values!
Create another dynamic two dimensional array of the same size (array_transpose)
Pass both arrays to a function that will generate the transpose of array_one returning the values in array_transpose. (If you don’t already know the transpose swaps the rows and columns of an array.) Example: Suppose you have a 4 x 4 array of numbers (array_one). The transpose is shown below (array_transpose)
Array One Array Transpose
1 2 3 4 1 5 9 13
5 6 7 8 2 6 10 14
9 10 11 12 3 7 11 15
13 14 15 16 4 8 12 16
Pass each array to a print_array function that will print (to the screen or a file) the results of a test case with a 20 by 20 array.

Answers

Answer:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int n;

   cout<< "Enter the row and column length: ";

   cin>> n;

   int array_one[n][n];

   int array_transpose[n][n];

   for (int i = 0; i < n; i++){

      for (int j= 0; j < n; j++){

           srand((unsigned) time(0));

           array_one[i][j] = (rand() % 4000)

           array_transpose[j][i] = array_one[i][j];

       }

   }

}

Explanation:

The C source code has three variables, 'array_one', array_transpose' (both of which are square 2-dimensional arrays), and 'n' which is the row and column length.

The program loops n time for each nth number of the n size to assign value to the two-dimensional array_one. the assign values to the array_transpose, reverse the 'i' and 'j' values to the two for statements for array_one to 'j' and 'i'.

Identify security gaps or opportunities in training related to human factors. Describe the impact associated with not addressing each gap or opportunity to individuals and the organization.

Answers

Answer:

The description and as per the circumstance has been described in the following portion.

Explanation:

Security gaps including human factor-related opportunities are security-related education that should have been given to all workers as new employees were most vulnerable to potential hazards and may also unintentionally clicking on any of the suspicious URLs. Whether this distance isn't crossed, it could contribute to trouble like crying out and therefore vulnerability management attacks, leading to privacy concerns and a lack of brand performance.

I really need help on this if you get it right I will say thank you my friend

Answers

I Think the answer is C

Answer:

A

Explanation:

A. Makes the the most sense

B. Not exactly

C. Doesn't make any sense

D. Complete Garbage

The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.

Answers

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

The relational algebra expressions can be rearranged and achieve the same result but with a better processing time. A selection on an attribute can be moved from the outside of a query to a selection on just one of the relations being joined (if it isn't an attribute on both relations). Why would this be an improvement?
a. The selection on the joined results would cause a cartesian product operation
b. Moving the selection to the innermost relation keeps the depth of operations that have to be processed more shallow
c. This would reduce the number of tuples to involve in the join resulting in a more efficient query.
d. The outer selection would prevent the optimizer from picking the correct index

Answers

Answer:

c. This would reduce the number of tuples to involve in the join resulting in a more efficient query.

Explanation:

SQL or structured query language is a database querying language used to communicate or interact with databases. A database query could be as simple as returning all the columns from a database table to complex like joining several query results which in turn forms an algebra expression.

Every query statement or expression is executed with time, execution time needs to be minimized for efficiency, so, a well-arranged and reduced joining in the query improves the efficiency of the query.

How does technology change thinking?

Answers

Answer:

Answer

Technology has altered human physiology. It makes us think differently, feel differently, even dream differently. It affects our memory, attention spans and sleep cycles. This is attributed to a scientific phenomenon known as neuroplasticity, or the brain's ability to alter its behavior based on new experiences.

have a nice day <3

if this helped, rate 5 stars

Chegg Suppose the heap is a full tree, size 2^n-1. what is the minimum number of steps to change a min heap to a max heap. Show your logic.

Answers

Answer:

Explanation:

We start from the bottom-most and rightmost internal node of min Heap and then heapify all internal modes in the bottom-up way to build the Max heap.

To build a heap, the following algorithm is implemented for any input array.

BUILD-HEAP(A)

   heapsize := size(A)

   for i := floor(heapsize/2) downto 1

       do HEAPIFY(A, i)

   end for

Convert the given array of elements into an almost complete binary tree.

Ensure that the tree is a max heap.

Check that every non-leaf node contains a greater or equal value element than its child nodes.

If there exists any node that does not satisfy the ordering property of max heap, swap the elements.

Start checking from a non-leaf node with the highest index (bottom to top and right to left).

Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered

Answers

Answer:

import numpy as np

word = input("Enter a word: ")

acc = []

with open("Downloads/record-collection.txt", "r") as file:

   lines = file.readlines()

   for line in lines:

       if word in line:

           line = line.strip()

           acc.append(int(line[0]))

   if np.mean(acc) >= 2:

       print(f"The word {word} is a positive word")

       print(f"{word} appeared {len(acc)} times")

       print(f"the review of the word {word} is {round(np.mean(acc), 2)}")

   else:

       print(f"the word {word} is a negative word with review\

{round(np.mean(acc), 2)}")

Explanation:

The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.

The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.

Which of the following is a characteristic of vector graphics?

Answers

Answer:

A

Explanation:

Vector graphics consist of mathematical descriptions of shapes as a combination of these numerical vectors. Because the vector graphics define the path that the lines should take, rather than a set of points along the way, they can be used to calculate any number of points, and so can be used at any image resolution.

The characteristics of vector graphics are they are based on mathematical/geometric expression. The correct option is A.

What are vector graphics?

Vector graphics are mathematical descriptions of shapes created by combining these numerical vectors. Because vector graphics indicate the course that the lines should travel rather than a set of locations along the way, they may be used to calculate any number of points and thus work at any image resolution.

Raster images generate commonly used image files such as gif, jpeg, jpg, and so on. These can be made with picture editing software such as "Photoshop." Because these work on pixels, when we zoom the image, we can see tiny squares that are nothing more than pixels.

Therefore, the correct option is A, they are based on mathematical/geometric expression.

To learn more about vector graphics, refer to the link:

https://brainly.com/question/9759991

#SPJ2

Other Questions
After a long day at the office, the last thing Mark wanted todo was go to his thing. He would much rather have sat outon his thing with something and watched somethinghappen.A. After a long day at the office, the last thing he wanted to do wasgo to his party. He would much rather have sat out on his thingwith an iced tea and watched something.B. After a long day at the office, the last thing he wanted to do wasgo to his thing. He would much rather have sat out on his patiowith a tall glass of iced tea and watched the sunset.C. After a long day at the office, the last thing Mark wanted to do wasgo to his birthday party. He would rather have sat out on his patiowith a tall glass of iced tea and watched the sunset spread acrossthe sky john wants to earn money over the summer mowing lawns to buy several CD's which will cost $59. He earns $14 for each lawn he mows. How many days will john have to mow to earn enough money? Read the text and question carefully and choose the option with the best answer to the question.Mi abuela de noventa y cinco aos necesita estar tranquila, y no necesita estar preocupada. A ella le encantan las flores. Ella no es atltica.What can some friends suggest her to try, on a beginner's level? (1 point)O Quieres correr con nosotras?O Quieres practicar las artes marciales con nosotras?Quieres hacer yoga con nosotras hoy en el jardn?O Quieres patinar con nosotras hoy en la tarde? What group would be active in a professional Group ? Bankers Agriculture Farmers UNION workers Lawyers The frequency of sickle-cell anemia, an autosomal recessive condition, is 0.007. Assuming that the population is in H-W equilibrium, what is the frequency of the recessive allele that causes the condition? Enter your answer to the nearest 0.001. the shark can run faster than any other fish because they have no bones Which of the following is not a sentence fragment 1.The pretty girl with beown hair. 2.even though im allergic to ice cream Explain how to find the Great Common Factor. A golfer hits a golf ball with a club. The mass of the ball is 0.05 kg. The ball accelerates at 2000 m/s2. What is the net force, to the nearest newton, that accelerates the ball? A model car is built to a scale of 1 in. : 2.5 ft. If the model is 5.8 in. Long how long is the car in real life? Pleas help me fast! C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32)C=59(F32) Triangle XYZ has coordinates X(2, 4), Y(-3, -1), and Z(4, 5). If the triangle is translated 1 unit to the right, what are the coordinates of X'? f(x)=Tan^-1 (1)PLEASE ANSWER! WILL GIVE BRAINLIEST These equations represent the number of bacteria in four different dishes as a function of time, t,in days. Which equation represents the population with the greatest growth factor?Aa(t) = 1000(65)tBb(t) = 80050tc(t) = 600 o52Dd(t) = 400 3+ The first step in the performance planning and appraisal process involves? A. Assembling information for the appraisal B. Observing employee job behavior C. Designing the performance plan D. Setting standards and expectations PLS HELP !! I WILL GIVE BRAINLIEST !!! I JUST NEED THE ANSWER WITH A SENTENCE EXPLANATION !!! Does the word common have a negative or positive connotation? I NEED THE ANSWER FAST PLZZZ What is the conflict in the following text? Jennifer wanted to win thebeauty contest. Unfortunately, her best friend Alice was also competing.Will Alice and Jennifer's friendship survive the competition?*person vs. natureO person vs. selfO person vs. personO person vs. technology WILL GIVE NRAINEST TO WHOEVER SOLVES IT CORRECTLY AND FASTWhat is a nation-state? (4 points) a A region that is part of a country with citizens from different places b A country ruled by an elected prime minister and a parliament c A kingdom that is part of a union that is led by a senate and president d A geographic area whose citizens have a shared culture and history