How do operating system work?

Answers

Answer 1

Answer:

The "operating system" manages software and hardware on the computer. Uploads files, has great memory and processes management.


Related Questions

Monitors with __________ technology are considered to have better picture sharpness and brightness, are sleeker and lighter, consume less power, but are more expensive.

Answers

Answer:

OLED

Explanation:

Kind of a wild guess but this question seems to describe exactly what OLED technology does.

Feel free to update me if I'm wrong :)

what is the printed version of what you see on the computer screen​

Answers

Answer:

screenshot

Explanation:

screenshot

Answer:

a  image of  what is on your screen on paper

Explanation:

This is a  image of the screen of your computer with all images pasted out in paper form

A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be:

Answers

Answer:

a simple IF statement using Regex

Explanation:

In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.

Write a program that reads in the first name, hourly rate and number of hours worked for 5 people. Print the following details for each employee. Name of employee The number of hours worked Their weekly gross pay.This is calculated by multiplying hours worked times hourly rate. If hours worked per week is greater than 40, then overtime needs to also be included. Overtime pay is calculated as the number of hours worked beyond 40 * rate * 1.5 Taxes withheld Our tax system is simple, the government gets 20% of the gross pay. Net paid The amount of the check issued to the employee.

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    String name;

    double hourlyRate;

    int hours;

    double grossPay = 0.0;

    double netPaid = 0.0;

    double taxes = 0.0;

   

    Scanner input = new Scanner(System.in);

   

    for (int i=1; i<=5; i++){

        System.out.print("Enter the name of the employee #" + i + ": ");

        name = input.nextLine();

       

        System.out.print("Enter the hourly rate: ");

        hourlyRate = input.nextDouble();

       

        System.out.print("Enter the hours: ");

        hours = input.nextInt();

        input.nextLine();

       

        if(hours > 40)

            grossPay = (40 * hourlyRate) + ((hours - 40) * hourlyRate * 1.5);

        else    

            grossPay = hours * hourlyRate;

       

        taxes = grossPay * 0.2;

        netPaid = grossPay - taxes;

       

       

        System.out.println("\nName: " + name);

        System.out.println("The number of hours worked: " + hours);

        System.out.println("The weekly gross pay: " + grossPay);

        System.out.println("Taxes: " + taxes);

        System.out.println("Net Paid: " + netPaid + "\n");

    }

}

}

Explanation:

*The code is in Java

Declare the variables

Create a for loop that iterates 5 times (for each employee)

Inside the loop:

Ask the user to enter the name, hourlyRate and hours

Check if hours is above 40. If it is, calculate the gross pay and overtime pay using the given instructions. Otherwise, do not add the overtime pay to the gross pay

Calculate the taxes using given information

Calculate the net paid by subtracting the taxes from grossPay

Print the name, hours, grossPay, taxes, and netPaid

To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, _____.a. add a reference line whose value follows a reference parameter.b. add the sheet you want to control as the bottom-right element in the layout.c. also add a URL action that points to the dashboard itself.d. add a reference line with a per pane scope and a tooltip.

Answers

Answer:

a. add a reference line whose value follows a reference parameter

Explanation:

To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, "add a reference line whose value follows a reference parameter."

This is because to dynamically change a reference line using parameter action, one needs to do the following:

1. Attribute the reference line with a parameter

2. Utilize a parameter action to make the parameter interactive.

3. As your users interact with the view, the reference lines automatically update to deliver more context to the data.

Answer:

add a reference line whose value follows a reference parameter

Explanation:

add a reference line whose value follows a reference parameter

We have an N x N square grid.


We will paint each square in the grid either black or white.

If we paint exactly A squares white, how many squares will be painted black?

A and N are integers,

Print the number of squares that will be painted black.
C++

Answers

Answer:

The solution in C++ is:

#include <iostream>

using namespace std;

int main(){

   int N, A;

   cout<<"Grids: ";    cin>>N;

   cout<<"White: ";    cin>>A;

   cout<<"Black: "<<N * N - A;

   return 0;

}

Explanation:

This declares N and A, as integers

   int N, A;

This gets inputs for N

   cout<<"Grids: ";    cin>>N;

This gets inputs for A, (the white grids)

   cout<<"White: ";    cin>>A;

This calculates and prints the number of black grids

   cout<<"Black: "<<N * N - A;

PS

From the question, we understand that the grid is N by N square grids.

This means that:

[tex]Total = N * N[/tex]

So, the number of black grids is:

[tex]Black = Total - A[/tex]

How does porter’s competitive forces model help companies develop competitive strategies using information systems?

Answers

Answer:

Porter's competitive forces model helps companies determine what they should do to be more productive by comparing what their competitors are doing. It also brings the companies costs down and makes them more efficient as a business by using Information Systems.

For this assignment, you will use pointers to write a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to include comments throughout your code where appropriate.
Complete the C++ code

Answers

Answer:

Following are the program to the given question:

#include <iostream>//header file

#include <bits/stdc++.h>//header file

using namespace std;

int main()//main method

{

   int x,i,sum=0;//defining integer variable

   double average, median;//defining double variable

   cout<<"How many students were surveyed? ";//print message

   cin>>x;//input value

   int *a = new int[x]; //dynamically created array

   for(i = 0;i<x;i++)//defining for loop to input value in array

   {

       cout<<"Enter the number of movies seen by student number "<<i+1<<": ";//print message  

       cin>>a[i];//input value

   }

   for (int i = 0; i < x; i++)//defining loop for add value

       sum += a[i];   //use sum to add array value

   average = (double)sum/x;//defining average variable to calculate average

   cout<<"Average is "<<average<<endl;//print average value with message

   sort(a, a+x); //use sort method to sort array to find the median

   if (x % 2 != 0)//use if to check the even value

      median = (double)a[x/2];//calculating the median value

   else//esle block

       median = (double)(a[(x-1)/2] + a[x/2])/2.0;//calculating median value

   cout<<"Median is "<<median<<endl;//print median value with message

   int m_count=1 ,mode= a[0], c_count = 0;//defining integer variable

   for( i=1;i<x;i++)//defining for loop arrenge value

   {

       if(a[i]==a[i-1])//use if to check array value

       {

           c_count++;//increment c_count variable value

       }

       else//else block

       {

           if(c_count>m_count)//use if to check c_count greater than m_count

           {

               m_count = c_count;//holding value in m_count

               mode = a[i-1];//holding mode value

           }

           c_count = 1;//holding value integer value in c_count

       }

   }

   cout<<"Mode is "<<mode;//print mode value with message

   return 0;

}

Output:

Please find the attachment file.

Explanation:

Including header file.Defining the main method. Declaring integer and double type variables.Declaring integer array.Use the loop to the input value.After input, the value uses double variable "average, the median" that uses the for loop and conditional statement to check the value and hold in its variable.In the next step, another integer variable "m_count, mode, and c_count" is defined that uses the loop and conditional statement to check the median and mode value and hold its value into their variable.

Which of these is unused normal, unvisited link ??

Answers

Answer:

hover

Explanation:

hope my answer help you

A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gie guests the option to create their own login accounts.
How can a network administrator help meet these criteria?
A. Choose the Internal captive portal with email registration option for the guest WLAN.
B. Make sure to create a guest provisioning account for the guest WLAN.
C. Disable authentication in the captive portal profile for the guest WLAN.
D. Choose ClearPass or the other external captive portal option for the guest WLAN.

Answers

Answer: D. Choose ClearPass or the other external captive portal option for the guest WLAN.

Explanation:

The Aruba Instant On mobile app allows the configuration and monitoring of a network from anywhere. It provides an affordable solution to small businesses and they're reliable and secure.

Based on the criteria given in the question, the network administrator can meet the criteria by choosing a ClearPass or the other external captive portal option for the guest WLAN.

Your friend Amy calls you asking for help with her new LCD monitor. She says the monitor isn't showing the whole picture. What is the resolution you should recommend for her to use

Answers

Answer:     probably 1080p (which is HD)

Explanation:    Lcd monitors mainly support 1080p.

Write a Java program which displays a menu to allow user the following functionality: 1. Load employees’ data - prompts user for the number of employees to be loaded and then prompts for each employee name, id (5 digit number), and annual salary

Answers

Answer:

Explanation:

The code I created is written in Java. It creates an Employee class that holds the employee's name, id, and salary. Then the main method has a menu that asks the user if they want to load data, print data, or exit. Each of which is fully functioning. If the user wants to load data, it asks them how many employees they want to add and then allow them to add the employees by calling the Employee class every time and saving the objects in an ArrayList. The program has been tested and the output can be seen in the image below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

      Scanner in = new Scanner(System.in);

      ArrayList<EmployeeData> companyData = new ArrayList<>();

      boolean loopAgain = true;

      while (loopAgain) {

          System.out.println("Menu:");

          System.out.println("1: Load Employee Data");

          System.out.println("2: Print Employee Data");

          System.out.println("3: Exit");

          int answer = in.nextInt();

          switch (answer) {

              case 1: {

                  System.out.println("How many employees will you add?");

                  int loop = in.nextInt();

                  for (int i =0; i < loop; i++) {

                      companyData.add(new EmployeeData());

                  }

              } break;

              case 2: {

                  for (EmployeeData x : companyData) {

                      x.printData();

                  }

              } break;

              case 3: loopAgain = false; break;

          }

      }

   }

}

class EmployeeData {

   String name;

   int id, salary;

   public EmployeeData() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Employee Name: ");

       String name = in.nextLine();

       System.out.println("Enter Employee ID:");

       int id = in.nextInt();

       System.out.println("Enter Employee Salary: ");

       int salary = in.nextInt();

       this.name = name;

       this.id = id;

       this.salary = salary;

   }

   public void printData() {

       System.out.println("Employee: " + this.name);

       System.out.println("ID: " + this.id);

       System.out.println("Salary: " + this.salary);

   }

}

You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:

Production 500 hosts
Sales 60 hosts
Maintenance 12 hosts
Management 30 hosts

Required:
What will be the last host-usable address in the seattle office?

Answers

Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question

answer:

/23 /26 /27 /28   option A

Explanation:

Breakdown of the last four subnet masks given to the subnets

For the subnet of 500 production host the mask = /23 which will produce 512 hosts

For the subnet of 60 sales host the mask = /26 which will produce 64 hosts

For the subnet of  12 host the mask = /27 which will produce 32 hosts

For the subnet of 30 hosts the mask = /28 which will produce 16 hosts

What are the types of Operating System​

Answers

Answer:

1. Gestión de la memoria principal

Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.

2. Gestión de la memoria secundaria

Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.  

3. Gestión de procesos

Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.

4. Gestión de recursos  

¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.

5. Gestión de usuarios  

El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.  

6. Gestión de la seguridad  

Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.

Select the correct answer.
A software development team is currently in the database creation phase of a project. Which activity will they undertake in this phase?
A.
memory allocation
B.
database design
C.
selecting a DBMS
D.
loading data

Answers

Answer:

database design is the correct e

Answer:

memory allocation

Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application. Which of the following could he possibly use that should allow for an easier migration from one cloud service provider to another?
a. Virtual machines.
b. Containerization.
c. Orchestration.
d. Serverless computing.

Answers

Answer:

d. Serverless computing.

Explanation:

Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application.

Therefore, the use of Serverless computing should allow for an easier migration from one cloud service provider to another.

This is because, serverless computing has to do with a cloud computing model which gives the machine resources tasks to take care of servers on behalf of clients.

You are sitting at the local coffee shop, enjoying your favorite latte. You pull out your laptop and, using the wireless network available at the coffee shop, access your e-mail. List all the different networks possibly involved in this operation.

Answers

Answer:

Laptop computer is connected to wireless connection in the coffee shop, which is connected to an ISP which is connected to the Internet.

Explanation:

The laptop's Wireless connection is turned on such that it is enabled to find wireless connection access signals within a certain Radius. The ability to connect to a wireless network is that the coffee shop has open wireless connection which is detected by the laptop signals and connects to it. The wireless connection provided by the coffee shop is connected to a certain internet service provider which eneblws connected networks to be able to access the internet.

What will be the output of the following code
1 Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
2
3
Pim val As Double
val - Math.Sqrt (12)
5
TextBox1.Text = val
6
7 End Sub

Answers

Answer:

3.4641016151377544

Explanation:

See picture for corrected code. The OCR messes up the code.

Explain the bad effect and good effect of mobile phone and internet.

Answers

Internet goes out when you have a really old phone. The good thing is phones are a really good use to make contact to other people

Answer:

Bad effect of mobile phone: mobile phones can be a distraction and good effect is that your able to call for emergency and be able to connect with people.

bad effect of internet: internet can be deceiving when hearing a tragedy happen and the good effect is that your able to know news and important things.

The details of various measurable characteristics related to IT outcomes of a cloud environment, are typically expressed in a

Answers

Answer:

Service-Level Agreement (SLA).

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

The details of various measurable characteristics related to information technology (IT) outcomes of a cloud environment or service, are typically expressed in a Service-Level Agreement (SLA).

Generally, a service level agreement (SLA) is usually between a service provider and its customers (end users).

In order to define and provide satisfactory service, organizations that provide services are expected to implement a service level agreement and it should comprise of the following parameters; responsibilities, expectations, metrics, time and frequency.

Study the following two class interfaces: class Question { public: Question(); void set_text(string new_text); void set_answer(string new_answer); void display() const; private: string text; string answer; }; class ChoiceQuestion : public Question { public: ChoiceQuestion(); void set_text(string new_text); }; Which member function from the Question class is overridden in the ChoiceQuestion class?

Answers

Answer:

The question function

Explanation:

The ChoiceQuestion function inherits from the Question class and should have it's functions and attributes as it is now a child of the Question class. It however overides the Question class function where it sets the ChoiceQuestion class function in the first function definition of the ChoiceQuestion class definition. This allows the child class to have it's own functions as well have access to the attributes and functions of the parent class.

Which of the following represents knowledge as a set ofâ rules? A. Neural networks.B. Machine learning systems.C. Robotics.D. Expert systems.E. Genetic algorithms.

Answers

Answer:

D. Expert systems

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;

I. Non-algorithmic processing.

II. Symbolic processing.

In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.

Hence, expert systems represents knowledge as a set of rules.

Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.

Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.

The Expert systems represent the knowledge as a set of rules. Thus option D is correct.

What is an expert system?

The system is the computer-based system that emulates all decision-making abilities of man and is designed to solving the complex problems by use of reasoning through the representation of IF-THEN rules.

The expert system is divided into the two types of systems such as knowledge base and inference engines. The knowledge base shows the facts and rules. The inference applies those facts to know the rules.

Find out more information about the expert systems.

brainly.com/question/9619145

While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The Critical Path Method(CPM) is used to determine the maximum time to finish a project based on the total maximum time of the network of interdependent activities in the project. The CPM is usually used in conjunction with the Program Evaluation Review Technique(PERT). If an activity is in the critical path then it is at its maximum or longest duration time and cannot be more flexible at this point.

discuss extensively, the historical development of public Administration​

Answers

History

Early systems

Public administration has ancient origins. In antiquity the Egyptians and Greeks organized public affairs by office, and the principal officeholders were regarded as being principally responsible for administering justice, maintaining law and order, and providing plenty. The Romans developed a more sophisticated system under their empire, creating distinct administrative hierarchies for justice, military affairs, finance and taxation, foreign affairs, and internal affairs, each with its own principal officers of state. An elaborate administrative structure, later imitated by the Roman Catholic Church, covered the entire empire, with a hierarchy of officers reporting back through their superiors to the emperor. This sophisticated structure disappeared after the fall of the Western Roman Empire in the 5th century, but many of its practices continued in the Byzantine Empire in the east, where civil service rule was reflected in the pejorative use of the word Byzantinism.

the first fully automatic computer was​

Answers

Answer:

Z3

Explanation:

The Z3 was a German electromechanical computer designed by Konrad Zuse in 1935, and completed in 1941. It was the world's first working programmable, fully automatic digital computer.

Websites can send __________ to your computer that stay on your hard drive and can track your web movements. Multiple Choice freeware cookies viruses pop ups

Answers

Answer:

Cookies

Explanation:

Cookies are pieces of information stored as text strings on your computer.

A web server sends you a cookie and a web browser stores it. The browser then returns the cookie to the server the next time the page is referenced. One of the most common uses of cookies is to store user ID. For example, the cookie might contain the following ID = 456894.

An example of a website that uses a cookie is an e-commerce website. When you visit the site and fill out a form, the website assigns you a user ID, stores your information with this user ID in the database on the web server and then returns this ID to your browser as a cookie.

The next time you visit the page, the browser sends this ID to the server. The server looks up this ID and then customizes the page it sends back to you. For example, you might see on the page, "Welcome back, David!"

You are developing a site for travel. From the homepage, a visitor wants to view packages for a trip to Japan. Based on the attached file structure and your knowledge of the Internet, write the code for links to the following:

Answers

Answer:

Explanation:

After finding the structure online that is mentioned in the question I was able to write out the necessary HTML code. The following code uses <a> tags which are the required tags for links. Inside these tags you will find the href attribute which tells the browser where to take the user when the user clicks on one of these links. Each link has the name of the link, for example, the first link will say "Visit Japan".

<a href="japan.html">Visit Japan</a>

<a href="family.html">Family Friendly Tours</a>

<a href="cycling.html">Cycling Enthusiast Tours</a>

<a href="culinary.html">Culinary Based Excursions</a>

The function of while loop is
a. Repeata chunk of code a given number of times.
b. Repeat a chunk of code until a condition is true.
c. Repeata chunk of code until a condition is false.
d. Repeata chunk of code indefinitely.​

Answers

Answer:

B repeat a chunk of code until the condition is true im 88% sure

Explain about the Graphics mode Initialization and various in build graphics functions in C library.

Answers

Answer:

La biblioteca estándar de C (también conocida como libc) es una recopilación de archivos de cabecera y bibliotecas con rutinas, estandarizadas por un comité de la Organización Internacional para la Estandarización (ISO), que implementan operaciones comunes, tales como las de entrada y salida o el manejo de cadenas. A diferencia de otros lenguajes como COBOL, Fortran, o PL/1, C no incluye palabras clave para estas tareas, por lo que prácticamente todo programa implementado en C se basa en la biblioteca estándar para funcionar.

Explanation:


2) List three (3) negative impact of Technology on society

Answers

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

Other Questions
I need help with all 4 For # 31 - 34, solve the equation for the unknown variable. Check for a lot of points my others questions! like this verbo formado con estas letras cerrienquer find the value of x in 81^x=1/3? Please help me on this question. Solve 5 (2x + 1 ) + 4 = 6 ( 3x + 2) - 7 How do I graph x+3y12? El hipoclorito de sodio (NaClO), es vendido en una solucin clara de ligero color verde-amarillento y un olor caracterstico que se conoce con el nombre genrico Lmpido, con una concentracin del 6%. Pero para la desinfeccin de superficies el Lmpido, debe ser diluido al 0,5%. Cunto Lmpido debemos sacar del recipiente para obtener 200 ml de una solucin al 0,5%. For 32 = 5X + 2, what is the first step in solving for X? 10. Both x and y vary inversely with each other. When x is 10, y is 6,which of the following is not a possible pair of corresponding values of x and y? (A) 12 and 5 (B) 15 and 4 (C) 25 and 2.4 (D) 45 and 1.2expain me mods plz answer Karen is having a party. She'll have 4 tables for every 12 guests. Complete the table below showing the number of tables and the number of guests. My sister supports me into passive voice What is Nat turner and John browns slave revolts? Video news releases are ______. Group of answer choices None of the above options is correct produced by PR agencies and companies for use in TV newscasts aired by TV stations as part of their requirement to serve the public interest public service announcements (PSAs) eagerly accepted by TV news departments, especially in large markets Help please! Also please show the steps of how you got the answer!30% of 40% of 15 In the figure, ABCD and m2=55.What is m8?Enter your answer in the box.Line a b parallel to line c d is cut by a transversal forming 8 angles. The angles formed when the transversal intersects with line A B clockwise starting from top left are angle 1, 2, 3, and 4. The angles formed where the transversal intersects line c d clockwise from top left are angle 5, 6, 7, and 8. measure of angle E is 2 x degrees. Sodium acetate is produced by the reaction of baking soda and vinegar. The resultant solution is then heated until it becomes saturated and allowed to cool. As a result, the solution has become supercooled. Upon addition of a small seed crystal, the solution temperature increases as sodium acetate trihydrate crystallizes. Its molar enthalpy of fusion is 35.9 kJ/mol. How much thermal energy would be released by 276.0 g of sodium acetate trihydrate (molar mass What is the predicative adjective in this sentence: the small, quaint town of New Fairfield has a modern public library. the majority of problems Best Buy was facing have been brought about by _________________force. The fields of antebellum (pre-Civil War) political history and womens history use separate sources and focus on separate issues. Political historians, examining sources such as voting records, newspapers, and politicians writings, focus on the emergence in the 1840s of a new "American political nation," and since women were neither voters nor politicians, they receive little discussion. Womens historians, meanwhile, have shown little interest in the subject of party politics, instead drawing on personal papers, legal records such as wills, and records of female associations to illuminate womens domestic lives, their moral reform activities, and the emergence of the womans rights movement.However, most historians have underestimated the extent and significance of womens political allegiance in the antebellum period. For example, in the presidential election campaigns of the 1840s, the Virginia Whig party strove to win the allegiance of Virginias women by inviting them to rallies and speeches. According to Whig propaganda, women who turned out at the partys rallies gathered information that enabled them to mold party-loyal families, reminded men of moral values that transcended party loyalty, and conferred moral standing on the party. Virginia Democrats, in response, began to make similar appeals to women as well. By the mid-1850s the inclusion of women in the rituals of party politics had become commonplace and the ideology that justified such inclusion had been assimilated by the Democrats.The primary purpose of the passage as a whole is toA. examine the tactics of antebellum political parties with regard to womenB. trace the effect of politics on the emergence of the womans rights movementC. point out a deficiency in the study of a particular historical periodD. discuss the ideologies of opposing antebellum political partiesE. contrast the methodologies in two differing fields of historical inquiry