Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​

Answers

Answer 1

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows

1. Start

2. Get input for principal, time and rate

3. Calculate Interest using Interest = Principal * Rate * Time/100

4. Print Interest

5. Stop

Draw A Flow Chart Except The Principle, Time And Date From The User. And Display The Simple Interest

Related Questions

Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.

Answers

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

While in high school, you need to complete a specific number of ___ to be accepted into a four-year college

Answers

Answer:

credits

Explanation:

I'm still in highschool

Answer:

If these are your options:

A: electives

B: Advanced Placement courses

C: course requirements

D: dual enrollment courses

It's C, course requirements

Explanation:

1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.​

Answers

Answer:

The SQL queries are as follows:

1. select * from customer

select * from sale

select * from product

2. select name, sex from customer

3. select * from customer where sex = 'male'

4. select name, age from customer where sex = 'male'

5. select name, price, color from product

Explanation:

Given

Tables: customer, sale, product

Required

Answer question 1 to 5

(1) All data in the given tables

To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.

So, we have:

select * from customer --> This lists all data from customer table

select * from sale --> This lists all data from sale table

select * from product --> This lists all data from product table

(2) Selected details from customer table

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, sex from customer

(3) Male customers

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve male customers, we introduce the where clause

So, we have:

select * from customer where sex = 'male'

(4) Name and age of male customers

In (3), we have:

select * from customer where sex = 'male'

To retrieve the name and age, we replace * with name and age. So, we have:

select name, age from customer where sex = 'male'

(5) Name, price and color of products

In (1), we have:

select * from product --> This lists all data from product table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, price, color from product

_____ is a feature of electronic meeting systems that combines the advantages of video teleconferencing and real-time computer conferencing.

Answers

Answer:

The answer is desktop conferencing.

Explanation:

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?

Answers

You can get a antivirus subscription that will kill malwaresAlso, you can avoid going on websites you don't trustI hope this helps you.

What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard

Answers

Answer:

The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

Explanation:

1. First, convert to the binary (base 2) the integer part: 0.

Divide the number repeatedly by 2.

Keep track of each remainder.

We stop when we get a quotient that is equal to zero.

division = quotient + remainder;

0 ÷ 2 = 0 + 0;

2. Construct the base 2 representation of the integer part of the number.

Take all the remainders starting from the bottom of the list constructed above.

0(10) = 0(2)

3. Convert to the binary (base 2) the fractional part: 0.125.

Multiply it repeatedly by 2.

Keep track of each integer part of the results.

Stop when we get a fractional part that is equal to zero.

#) multiplying = integer + fractional part;

1) 0.125 × 2 = 0 + 0.25;

2) 0.25 × 2 = 0 + 0.5;

3) 0.5 × 2 = 1 + 0;

4. Construct the base 2 representation of the fractional part of the number.

Take all the integer parts of the multiplying operations, starting from the top of the constructed list above:

0.125(10) =

0.001(2)

5. Positive number before normalization:

0.125(10) =

0.001(2)

6. Normalize the binary representation of the number.

Shift the decimal mark 3 positions to the right so that only one non zero digit remains to the left of it:

0.125(10) =

0.001(2) =

0.001(2) × 20 =

1(2) × 2-3

7. Up to this moment, there are the following elements that would feed into the 32 bit single precision IEEE 754 binary floating point representation:

Sign: 0 (a positive number)

Exponent (unadjusted): -3

Mantissa (not normalized):  1

8. Adjust the exponent.

Use the 8 bit excess/bias notation:

Exponent (adjusted) =

Exponent (unadjusted) + 2(8-1) - 1 =

-3 + 2(8-1) - 1 =

(-3 + 127)(10) =

124(10)

9. Convert the adjusted exponent from the decimal (base 10) to 8 bit binary.

Use the same technique of repeatedly dividing by 2:

division = quotient + remainder;

124 ÷ 2 = 62 + 0;

62 ÷ 2 = 31 + 0;

31 ÷ 2 = 15 + 1;

15 ÷ 2 = 7 + 1;

7 ÷ 2 = 3 + 1;

3 ÷ 2 = 1 + 1;

1 ÷ 2 = 0 + 1;

10. Construct the base 2 representation of the adjusted exponent.

Take all the remainders starting from the bottom of the list constructed above:

Exponent (adjusted) =

124(10) =

0111 1100(2)

11. Normalize the mantissa.

a) Remove the leading (the leftmost) bit, since it's allways 1, and the decimal point, if the case.

b) Adjust its length to 23 bits, by adding the necessary number of zeros to the right.

Mantissa (normalized) =

1 000 0000 0000 0000 0000 0000 =

000 0000 0000 0000 0000 0000

12. The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

Which software system is used to store appointments, scheduling, registration, and billing and receivables

Answers

Answer:

"Practice Management System (PMS)" is the appropriate answer.

Explanation:

It's the kind of technology that has been discovered in healthcare professionals, developed to handle the day-to-day activities utilizing the desktop application.Is therefore typically utilized assurance and consulting tasks, but can also be connected to medical digital records dependent on multiple treatment practices requirements.

Thus the above is the correct answer.

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

Who is the father of computer?​

Answers

Answer:

The first automatic digital computer has been designed by the English mathematician and inventor Charles Babbage. Babbage developed the Analytical Engine Plans for the mid-1830s.

Explanation:

Babbage has developed the concept of a digital, programmable computer and was a mathematician, philosopher, inventor, and mechanical engineer. Some regard Babbage as a "computer father" The inventing of its first mechanical computer, the difference engine, is attributable to Babbage, which eventually resulted in more complex electronic designs, although Babbage's Analytical Engine is the main source of ideas for modern computers. He was described as the "prime" among the numerous polymaths of his century by his varied work in another field.

a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat

Answers

Answer:

5000 passcodes

Explanation:

5x10x10x10 = 5000

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

List three ways of breaking a copyright law with the illegal copy of software.​

Answers

Answer:

Using itSelling it Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoice line items for the month. But the sum of the sales produced by the query did not agree with the sum of the monthly sales revenue reported on the company's general ledger. This is best described as a problem with

Answers

Answer:

The correct answer is "Consistency".

Explanation:

It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.

Thus, the above is the correct answer.

Realiza un algoritmo que calcule la edad de una persona y si es mayor = a 18 que imprima mayor de edad de lo contrario que imprima menor de edad

Answers

Answer:

Explanation:

El siguiente codigo esta escrito en Java. Le pide al usario que marque la edad. Despues el programa analiza la edad y imprime a la pantalla si el usario es mayor de edad o menor de edad. El programa fue probado y el output se puede ver en la imagen abajo.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Cual es tu edad?");

       int age = in.nextInt();

       if (age > 18) {

           System.out.println("Mayor de Edad");

       } else {

           System.out.println("Menor de Edad");

       }

   }

}

MyProgramming Lab

It needs to be as simple as possible. Each question is slightly different.

1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].

Associate the list with the variable arith_prog.

2.

An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].

Associate the list with the variable arith_prog.

3.

A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.

Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].

Associate the list with the variable geom_prog.

Answers

Answer:

The program in Python is as follows:

#1

d = int(input("distance: "))

n = int(input("n: "))

arith_prog = []

for i in range(1,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#2

d = int(input("distance: "))

m = int(input("m: "))

n = int(input("n: "))

arith_prog = []

for i in range(m,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#3

r = int(input("ratio: "))

n = int(input("n: "))

geom_prog = []

m = 1

count = 0

while(m<n):

   m = r**count

   geom_prog.append(m)

   count+=1

print(geom_prog)

Explanation:

#Program 1 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from 1 to n (inclusive) with an increment of d

for i in range(1,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 2 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for m

m = int(input("m: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from m to n (inclusive) with an increment of d

for i in range(m,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 3 begins here

This gets input for ratio

r = int(input("ratio: "))

This gets input for n

n = int(input("n: "))

This initializes the list, geom_prog

geom_prog = []

This initializes the element of the progression to 1

m = 1

Initialize count to 0

count = 0

This is repeated until the progression element is n

while(m<n):

Generate progression element

   m = r**count

Append element to list

   geom_prog.append(m)

Increase count by 1

   count+=1

This prints the list

print(geom_prog)

what is the fullform of ETA in computer term​

Answers

Answer:

Estimated Time of Arrival.

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops

Answers

Answer:

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

Explanation:

Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.​

Answers

Answer: First person

Explanation:

First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.

In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

Answers

The good answer is: Sacrificial

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

write history of computer virus. I will mark as brainliest answer ​

Answers

Answer:

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.

Mark Brainliest please

Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.

The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.

"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.

Since then, many new viruses have been introduced and the trend is growing exponentially every year.

Infamous viruses of the digital age
Following are some of the most well-known or significant viruses that have grown in step with the role of information technology in society:

In 1991, the "Michelangelo" virus was first discovered in Australia. It would lay dormant until 6th March every year and then overwrite the first one hundred sectors on the storage devices with zeros, preventing the computer from booting. Only 20,000 computers were reported infected.

In 1998, CIH was released. It infected around 60 million computers and caused significant damages by overwriting important system files. It was written by a Taiwanese student.

In 1999, "Melissa" was released. This one, was the first wide spread Word Macro Virus. It was distributed via email and would automatically send itself to the first 50 people in the Outlook address book. It did not harm the computer as it was sending out passwords for some erotic websites which required membership. It caused so much email traffic resulting in email servers to crash.

2000 was the year of "iloveyou". Again, it came via email however it sent itself to all contacts. It also overwrote office, image, and audio files. The virus came from the Philippines and infected over 50 million computers in less than 10 days. Most companies back then decided to turn off their email servers to stop spreading the virus.

Since 2000, so many new viruses have been unleashed to wreak havoc on the world at large that it is difficult to list the most infamous. "Anna Kournikova", Code Red, Nimba, Beast, SQL Slammer, Blaster, Sobig, Sober, MyDoom, Netsky, Zeus, Conficker, Stuxnet, CryptoLocker, Locky, Mirai and WannaCry, are a few examples that come to mind.

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

Other Questions
1) What type of resources do you think the Pacific Ocean and Gulf of Mexico provided the Aztec?(As well as the various rivers that run through the land). A buffer is a solution that: Select one: a. Results from mixing a strong acid and a strong base. b. When added to another solution, decreases the pH. c. When added to another solution, increases the pH. d. Prevents a drastic change in pH when an acid or base enters a solution. Mr. Rodriguez has a cancerous tumor in his lower abdomen. The cancer does not involve any organs, Is encapsulated, and has not spread to other areas of the body. What treatment option will Mr. Rodriguez's cancer specialist MOST LIKELY recommend?1. radiation2. a combination therapy of surgery followed by chemotherapy3. chemotherapy4. surgery 19) The x coordinate of a point that lies on the x-axis is negative. In 4 years Craston's age will be the same as Terrins age is now. In 2 years, Terrin will be twice as old as craston. Find their ages now You stole $500 from your mom you need to write paper explaining why you took the money and why you shouldn't be in trouble. If you can't convince your mom you had a good reason you will be grounded for a year with no electronics and no sports. BE CREATIVE. You are telling me a story to explain the missing money. I NEED IT ASAP please help me is for my homework PLEASE HELP ME ANSWER THIS QUESTION solve it please. Just wanted to check my drawing skill but please solve it Which best describes Mongol rule in Russia? Distinguish between type 1 and type 2 diabetes. AND How are their effects on the body similar? What type of forces do not change the motion of an object? Acceleration forces Balanced forces Inertia forces Unbalanced forces the sum of two numbers A and B is 25. if one fourth of A is 1 more than one third of B, find the number A. Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech. The map represents the northwest region of the United States. A line extends across the region from east to west moving over the Rocky Mountains towards the coastal region of Oregon.Review the map above. Which answer best explains why the Oregon Territory was important to the United States? It allowed for increased trade opportunities with Canada, Mexico, and Asia. It increased hunting and trapping opportunities for settlers from the East. It was the intended settlement area for the new effort to relocate Native Americans. Its waterways offered access further into the interior than any other regional features in America. A composite figure is made up of one simple figure.True orFalse What is the first thing travelers usually do after arriving at an airport to catch a plane?A. aller senregistrerB. sembarquer dans lavionC. passer le contrle de scuritD. aller la livraison des baggages How much cement is needed for a hole 0.4m wide and 1m long. Determine the experimental probability of rolling a sum of 5 with 2 dice 50 times Is there symbolic, abstract or metaphorical meaning behind Piet Mondrian pieces?