is badlion safe and how ?

Answers

Answer 1

Answer:

Yes, badlion is safe. The further explanation is given below.

Explanation:

Badlion Client does not encompass any malicious programs, like viruses and sometimes malware.Badlion application is pretty much safe to be used on inequality in society because most expressly forbidden plugins like decided to post as well as schematics become unavailable on the client-side whenever you enter Hypixel, but that is not a confirmation and therefore should not be depended towards.


Related Questions

When you start your computer then which component works first?

Answers

Bios is normally the first software, which is used to initiate connections to the hardware and perform testing and configuration. Then the OS is detected and the whole kernel is handed off to load the OS itself.

3. Which of the following is called address operator?
a)*
b) &
c).
d) %

Answers

Answer:

The Ampersand Symbol (Option B)

Explanation:

A 'address of operator' specifies that a given value that is read needs to be stored at the address of 'x'.

The address operator is represented by the ampersand symbol. ( & )

Hope this helps.

which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b. functional c. nonprocedural. d. procedural​

Answers

Answer:

D) Procedural

Explanation:

Answer:

Object-Oriented Programming

Explanation:

Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a library system which is an interactive system providing access to a large document database and which allows the automated ordering and electronic delivery of documents to local and remote end-users. Some requirements for this system are: Req. 1 The user interface shall be html. Users shall access the system via standard web browsers such as Netscape and Internet Explorer. Req. 2 The system shall primarily an end-user system. Users shall use the system within the constraints of the permissions assigned by the administrator to identify, locate, order and receive documents. Req. 3 Users shall communicate with the system mainly via the html interface. Req. 4 User shall provide input to the system via the html interface. Req. 5 The system shall give output to the user via the html interface, email and print. The print output shall mainly be documents.

Answers

Answer:

Redundancy

Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1

Conflict and understandability

Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.

Completeness

Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?

Either remove mainly or clarify other print out.

What version of html or web browser is assumed in Req. 1 and Req. 3?

Explanation:

what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment

Answers

Answer:

Please refer to the below for answer.

Explanation:

Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.

Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.

One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.

Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.

Impact that emerging technology will have on;

• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.

• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.

• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.

what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.

The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.

What is Emerging technologies?

Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.

Learn more about Emerging technologies at:

https://brainly.com/question/25110079

what are 3 important reasons to reconcile bank and credit card accounts at set dates?

Answers

Answer:

To verify transactions have the correct date assigned to them.

To verify that an account balance is within its credit limit.

To verify that all transactions have been recorded for the period.

Explanation:

In which situation would it be appropriate to update the motherboard drivers to fix a problem with video?

Answers

Answer:

you may need to do this if you need to play video game that may need you to update drivers

it would be appropriate to update the motherboard drivers to fix a problem with video while playing video game.

What is motherboard?

A motherboard is called as the main printed circuit board (PCB) in a computer or laptop. The motherboard is the backbone of processing in PCs.

All components and external peripherals connect through the motherboard.

Thus, the situation in which it is needed to update the motherboard drivers to fix a problem is while playing video game.

Learn more about motherboard.

https://brainly.com/question/15058737

#SPJ2

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

what are three ways to add receipts to quick books on line receipt capture?

Answers

Answer:

1) Forward the receipt by email to a special receipt capture email

2) You can scan, or take a picture of the receipt and upload it using the QuickBooks mobile app.

3) You can also drag and drop the image, or upload it into QuickBooks Online receipt center.

Explanation:

1) Th first process is simply done using the email address

2) On the app, tap the Menu bar with icon ≡.  Next, tap Receipt snap., and then

tap on the Receipt Camera. Yo can then snap a photo of your receipt, and tap on 'Use this photo.' Tap on done.

3) This method can be done by simply navigating on the company's website.

What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices

Answers

Answer:

s_string = 1357

Explanation:

character: index

1: 0

3: 1

5: 2

7: 3

 : 4

C: 5

o: 6

u: 7

n: 8

t: 9

r: 10

y: 11

 : 12

L: 13

n: 14

. : 15

s_tring  = special[:4]

s_tring = special[0] + special[1] + special[2] + special[3]

s_string = 1357

GIVING BRANLIEST IFFF CORRECT James uses a database to track his school football team. Which feature in a database allows James to list only the players that didn't play in the last game? Title Filter Search Sort

Answers

Answer:

filter

Explanation:

the filter feature allows him to fetch data that only meets a certain criteria(those who didn't play in the last game)

The FILTER feature in a database allows James to list on the players that did not play in the game.

What is the filter feature in EXCEL?

The FILTER feature in Excel is used to clear out a number of statistics primarily based totally on the standards which you specify. The feature belongs to the class of Dynamic Arrays functions.

The end result is an array of values that mechanically spills into a number cells, beginning from the Cells wherein you input a formula.

Thus, The FILTER feature in a database allows James to list on the players that did not play in the game.

Learn more about FILTER feature here:

https://brainly.com/question/11866402

#SPJ2

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Answers

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc.

Gary frequently types his class assignment. His ring automatically types the letter O. What is Gary using when he types?

A.Keyboard shortcut
B.Home row
C.Muscle memory
D.Windows logo

Answers

the answer would be C
The answer is C. Muscle memory


Hope this answers your question

the part of the computer that contains the brain , or central processing unit , is also known the what ?

Answers

Answer:

system unit

Explanation:

A system unit is the part of a computer that contains the brain or central processing unit. The primary device such as central processing unit as contained in the system unit perform operations hence produces result for complex calculations.

The system unit also house other main components of a computer system like hard drive , CPU, motherboard and RAM. The major work that a computer is required to do or performed is carried out by the system unit. Other peripheral devices are the keyboard, monitor and mouse.

While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one: True False

Answers

Answer: True

Explanation: Because anyone can post something and it can be non reliable

_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.A) IaaSB) EAP peerC) CPD) SaaS

Answers

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud
b. hybrid cloud
c. public cloud
d. private cloud

Answers

[tex]\Huge{\fbox{\red{Answer:}}}[/tex]

A public cloud infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

[tex]<font color=orange>[/tex]

a. community cloud

b. hybrid cloud

c. public cloud

d. private cloud

Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)

Answers

Answer:

def case_convertfile( file_name):

    with open(" new_file","x") as file:

         file.close( )

    with open("file_name", "r") as txt_file:

     while True:

            word = txt_file.readline( )

            word_split= word.split(" ")

            for word in word_split:

                  upper_case = word.uppercase( )

                  file= open("new_file","w+")

                  file= open("new_file","a+")

                  file.write(upper_case)

     txt_file.close( )

     file.close( )

Explanation:

This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.

Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones

Answers

Answer:

Lack of tone of voice

Explanation:

Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.

A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.

A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.

Answers

Answer:

A) Number of bits for byte = 6 bits

B) number of bits for index = 17 bits

C) number of bits for tag = 15 bits

Explanation:

Given data :

cache size = 64 kB

block size = 32 -byte

block address = 32 -bit

number of blocks in cache memory  

cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset

A) Number of bits for byte

[tex]log _{2} (6)^2[/tex] = 6  bits

B) number of bits for index

block offset + byte number

= 11 + 6 = 17 bits

c ) number of bits for tag

= 32 - number of bits for index

= 32 - 17 = 15 bits

Each time we add another bit, what happens to the amount of numbers we can make?

Answers

Answer:

When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.

The amount of numbers that can be made is multiplied by two for each bit to be added.

The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.

The amount of numbers that can be gotten from n bits is given as 2ⁿ.

Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).

Find more about bit at: https://brainly.com/question/20802846

Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}

Answers

Answer:

Following are the code to this question:

In question 1:

tempReadings.push_back(newValue); //using array that store value in at 3 position

In question 2:

ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value

In question 3:

currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value

In question 4:

cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;

//using mpgTracker array with at method that prints last element value

Explanation:

please find the attachment of the questions output:

In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.

Thus,  It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

There are numerous types of gateways that can operate at various protocol layer depths.

Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.

Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.

Learn more about Gateway, refer to the link:

https://brainly.com/question/30167838

#SPJ6

Write an INSERT statement that adds this row to the Categories table:

CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.

Answers

Answer:

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Explanation:

The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database

Now the INSERT statement should be written as follows

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Declare a class named PatientData that contains two attributes named height_inches and weight_pounds. Sample output for the given program with inputs: 63 115 Patient data (before): 0 in, 0 lbs Patient data (after): 63 in, 115 lbs 1 Your solution goes here ' 2 1 test passed 4 patient PatientData () 5 print('Patient data (before):, end-' ') 6 print(patient.height_inches, 'in,, end=' ') 7 print(patient.weight_pounds, lbs') All tests passed 9 10 patient.height_inches = int(input()) 11 patient.weight_pounds = int(input()) 12 13 print('Patient data (after):', end-' ') 14 print (patient. height_inches, 'in,', end- ') 15 print(patient.weight_pounds, 'lbs') Run

Answers

Answer:

class PatientData():    #declaration of PatientData class

   height_inches=0  #attribute of class is declared and initialized to 0

   weight_pounds=0 #attribute of class is declared and initialized to 0

Explanation:

Here is the complete program:

#below is the class PatientData() that has two attributes height_inches and weight_pounds and both are initialized to 0

class PatientData():  

   height_inches=0

   weight_pounds=0  

patient = PatientData()  #patient object is created of class PatientData

#below are the print statements that will be displayed on output screen to show that patient data before

print('Patient data (before):', end=' ')

print(patient.height_inches, 'in,', end=' ')

print(patient.weight_pounds, 'lbs')

#below print  statement for taking the values height_inches and  weight_pounds as input from user

patient.height_inches = int(input())  

patient.weight_pounds = int(input())  

#below are the print statements that will be displayed on output screen to show that patient data after with the values of height_inches and weight_pounds input by the user

print('Patient data (after):', end=' ')

print(patient.height_inches, 'in,', end=' ')

print(patient.weight_pounds, 'lbs')      

Another way to write the solution is:

def __init__(self):

       self.height_inches = 0

       self.weight_pounds = 0

self keyword is the keyword which is used to easily access all the attributes i.e. height_inches and weight_pounds defined within a PatientData class.

__init__ is a constructor which is called when an instance is created from the PatientData, and access is required to initialize the attributes height_inches and weight_pounds of PatientData class.

The program along with its output is attached.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

class PatientData():  

  height_inches=0

  weight_pounds=0  

patient = PatientData()

print('Patient data (before):', end=' ')

print(patient.height_inches, 'in,', end=' ')

print(patient.weight_pounds, 'lbs')

patient.height_inches = int(input())  

patient.weight_pounds = int(input())  

print('Patient data (after):', end=' ')

print(patient.height_inches, 'in,', end=' ')

print(patient.weight_pounds, 'lbs')

See more about python at brainly.com/question/26104476

Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supported teaching on schools

Answers

Answer:

Life skills, learning skills, The literacy skills

Explanation:

There are different type of skills that are required in schools, educational societies, organizations. Now these students need more attention to focus on their carrier. There are different of skills such as:

There are another three skills like

The learning skillsThe literacy skillsThe life skills. CreativityCollaborationCommunicationMedia literacyLeadershipFlexibilityInitiativeSocial skillsProductivityCritical thinking.

These are some skills that help students that keep up the lightening -pace in todays modern society. All skills are unique and used differently by students.

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

a. True
b. False

Answers

Answer:

True

Explanation:

Please mark me as the brainiest

Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.

Answers

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.

Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the attacker to stay on the system long enough for administrators to respond. These are all benefits of what network appliance?

Answers

Answer:

Honeypot is the correct answer

Explanation:

A computer system that is meant to mimic the likely targets of cyber attacks is called honeypot. It is used to deflect the attackers from a legitimate target and detect attacks. It also helps to gain info about how the cyber criminals operate. They have been around for decades, it works on the philosophy that instead of searching for attackers, prepare something that would attract them. It is just like cheese-baited mousetraps. Cyber criminals get attracted towards honeypots by thinking that they are legitimate targets.

Why operating system is pivotal in teaching and learning

Answers

Answer:

Without it learning and teaching cannot take place.

Explanation:

It is worthy to note that an operating system enables a computer install and run (lunch) computer programs. In a teaching environment that involves the use of computers, sending lessons to students; would mean that they have software programs that can successfully open this lessons.

In summary, an operating system is indeed pivotal in teaching and learning.

What command would you use to place the cursor in row 10 and column 15 on the screen or in a terminal window

Answers

Answer:

tput cup 10 15

Explanation:

tput is a command for command line environments in Linux distributions. tput can be used to manipulate color, text color, move the cursor and generally make the command line environment alot more readable and appealing to humans. The tput cup 10 15 is used to move the cursor 10 rows down and 15 characters right in the terminal

Other Questions
Elizabeth Candy Stanton helped fight for which cause? Why did Charlotte the Duchess of Monako was described as the saddest bride ever ? Which equation is equivalent to StartRoot x EndRoot + 11 = 15? In his 1935 book, Harold Laswell described politics as "Who Gets What When How." The American concept of pluralism, or group politics, includes all of the following except _________________. A) placing others into decision-making positions. B) removing inefficient or ineffective representatives. C) casting one's ballot on Election Day. D) influencing decisions affecting one's life. Marlo wrote a narrative about a mechanic. Read the beginning of the story below: (1) Rick was crouched beside a motorcycle with a wrench in his hand. (2) The floor of the garage was covered in grease stains, and he was only adding to the mess. (3) A slick of coolant poured from the broken Harley. (4) Even though Rick was great with cars, he was out of his depth working on his dads motorcycle. Which sentence introduces the setting of the narrative? A. sentence 1 B. sentence 2 C. sentence 3 D. sentence 4 "a customer owns 1,000 shares of xyzz stock, purchased at $40 per share. the stock is now at $45, and the customer has become neutral on the stock, but believes that the stock still has good long term growth potential the client asks her representative for a "conservative recommendation" that will give her a positive portfolio return. the client should be told to:" Macbeth act 2 scene 1 What is the observed wavelength of the 656.3 nm (first Balmer) line of hydrogen emitted by a galaxy at a distance of 2.40 x 108 ly What is the magnitude of the applied electric field inside an aluminum wire of radius 1.4 mm that carries a 4.5-A current A simple pendulum takes 2.20 s to make one compete swing. If we now triple the length, how long will it take for one complete swing? There are four points on a line: A, B, C and D, so that AB=1, BC=2, CD=4. Find all the possibilities of the length of segment AD. Jamie has worked for ABC Printing for 5 years. During this period ABC Printing has contributed $25,000 to her non-contributory retirement plan. Assuming ABC uses graded schedule vesting, how much will Jamie be able to roll into an IRA if she left ABC Printing after 5 years? Under the principles of agency law, any sale of goods by a salesperson in a store to a customer can be binding on the owner of the store. True False Why avoid soda in an optional meal plan why was direct democracy not used in colonial america? 1. In a right triangle, the lengths of the legs are a and b. Find the length of a hypotenuse, if: a=1, b=1; 2. In a right triangle, the length of a hypotenuse is c and the length of one leg is a. Find the length of the other leg, if: c=5, a=3; the product of two consecutive positive integer is 306 A regression was run to determine if there is a relationship between hours of TV watched per day (x) and number of situps a person can do (y). The results of the regression were: 1. y=a+bx 2. b=-0.669 3. a=27.41 4. r2=0.760384 5. r=-0.872 Use this to predict the number of situps a person who watches 3.5 hours of TV can do. Round to one decimal place. The quotient of 3 and the cubeof y+2 Fifteen chaperones went on a field trip with 225 students. Which fraction represents the number of chaperones to students on the field trip