Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

Answer 1
The answer is yes becuase no one method is capable one becuase I took the test on edge

Related Questions

How did NAT help resolve the shortage of IPV4 addresses after the increase in SOHO, Small Office Home Office, sites requiring connections to the Internet?

Answers

Question Completion:

Choose the best answer below:

A. It provides a migration path to IPV6.

B. It permits routing the private IPV4 subnet 10.0.0.0 over the Internet.

C. NAT adds one more bit to the IP address, thus providing more IP addresses to use on the Internet.

D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.

Answer:

NAT helped resolve the shortage of IPV$ addresses after the increase in SOHO, Small Office Home Office sites requiring connections to the internet by:

D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.

Explanation:

Network Address Translation (NAT) gives a router the ability to translate a public IP address to a private IP address and vice versa.  With the added security that it provides to the network, it keeps the private IP addresses hidden (private) from the outside world.  By so doing, NAT permits routers (single devices) to act as agents between the Internet (public networks) and local (private) networks.  With this facilitation, a single unique IP address is required to represent an entire group of computers to anything outside their networks.

Which interpersonal skill is the most important for a telecom technician to develop?
teamwork
active listening
conflict resolution
social awareness

Answers

Answer: Interpersonal communication is the process of face-to-face exchange of thoughts, ideas, feelings and emotions between two or more people. This includes both verbal and nonverbal elements of personal interaction.

Explanation:

i think plz dont be mad

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True
b. False

Answers

Answer:

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True

Explanation:

Yes.  It is in the best interest to choose option A which dominates choice B.  A Multiple Attribute Utility involves evaluating the values of alternatives in order to make preference decisions over the available alternatives.  Multiple Attribute Utility decisions are basically characterized by multiple and conflicting attributes.  To solve the decision problem, weights are assigned to each attribute.  These weights are then used to determine the option that should be prioritized.

What is the missing line of code?

>>> phrase = "You are amazing!"
>>> _____
'u a'

phrase[3:6]

phrase[2:6]

phrase[3:5]

phrase[2:5]

Answers

Answer:

phrase[2:5]

Explanation:

Given:

The above code segment

Required

Which instruction returns 'u a'

First, we need to get the index of u in the phrase:

u is at the third position but in programming, index starts at 0.

So, u is at index 2

Next, we need to get the index of a in the phrase:

a is at index 4

One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]

Where:

[tex]start = 2[/tex] ----- index of u

[tex]stop = 4[/tex]  ----- index of a

phrase ---- The string variable

So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]

Where 5 = 4 + 1

Answer:

phrase[2:5]

Explanation: got it right on edgen

Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are necessary?

Answers

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

Create a function copy() that reads one file line by line and copies each line to another file. You should use try-except statements and use either open and close file statements or a with file statement.>>>def copy(filename1, filename2) :

Answers

Answer:

See attachment for answer

Explanation:

I could not add the answer; So, I made use of an attachment

The program is written on 9 lines and the line by line explanation is as follows:

Line 1:

This defines the function

Line 2:

This begins a try except exception that returns an exception if an error is encountered

Line 3:

This open the source file using open and with statement

Line 4:

This open the destination file using open and with statement and also makes it writable

Line 5:

This iterates through the content of the source file; line by line

Line 6:

This writes the content to the destination file

Line 7 & 8:

This is returned if an error is encountered

Line 9:

This prints that the file has been successfully copied        

To call the function from main; use

copy(filename1, filename2)

Where filename1 and filename2 are names of source and destination files.

Take for instance:

filename1 = "test1.txt"

filename1 = "test2.txt"

copy(filename1, filename2)

The above will copy from test1.txt to test2.txt

The function copies text from one file to another. The program written in python 3 goes thus

def copy(filename1, filename2):

#initialize a function names copy and takes two arguments which are two files

try:

#initiate exception to prevent program throwing an error

with open(filename1, "r") as file1 :

#open file1 in the read mode with an alias

with open(filename2, "w") as file2:

#open file 2 in write mode with an alias

for line in file1:

#loop through each line in file 1

file2.write(line)

#copy / write the line in file2

except:

print("Error copying file")

#display if an error is encountered

print("File Copied")

#if no error, display file copied

Learn more : https://brainly.com/question/22392664

HELPPP
44 What text will be output by the program?
A- less than 10
B- less than 20
C- less than 30
D- 30 or more

Answers

Answer:

D. 30 or more

Explanation:

All other ones are canceled out ad the score adds 10.

The correct text for the output of the program is, ''30 or more''. So, option (D) is true.

A program is a set of instructions that a computer can run.

Programs are clear, ordered, and in a language that computers can follow.

Given that,

A program for the score is shown in the image.

Now, From the given program;

The last line will appear with the,

 console,log (''30 or more'')

Hence, The correct text for the output of the program is, ''30 or more''.

Therefore, the correct option is,

D) 30 or more

Read more about Python programs at:

brainly.com/question/26497128

#SPJ6

Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%

Answers

Answer:

1) 40%

Explanation:

Given the data size = 60 byte

data traversed through TSP then IP

Header size of TCP = 20 bytes to 60 bytes

Header size of IP = 20 bytes to 60 bytes

Calculating overhead:

By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes

Hence, the correct answer is option 1 = 40%

Write a SELECT statement that returns these columns from the Customers table:
Customer last name customer_last name column
City customer_city column
Zip code customer_zip Column
Return only the rows with customer_state equal to IL .
Sort the results in Descending order of customer last name
SCHEMA:
CREATE TABLE customers
(
customer_id INT NOT NULL,
customer_last_name VARCHAR(30),
customer_first_name VARCHAR(30),
customer_address VARCHAR(60),
customer_city VARCHAR(15),
customer_state VARCHAR(15),
customer_zip VARCHAR(10),
customer_phone VARCHAR(24)
);
INSERT INTO customers VALUES
(1, 'Anders', 'Maria', '345 Winchell Pl', 'Anderson', 'IN', '46014', '(765) 555-7878'),
(2, 'Trujillo', 'Ana', '1298 E Smathers St', 'Benton', 'AR', '72018', '(501) 555-7733'),
(3, 'Moreno', 'Antonio', '6925 N Parkland Ave', 'Puyallup', 'WA', '98373', '(253) 555-8332'),
(4, 'Hardy', 'Thomas', '83 d''Urberville Ln', 'Casterbridge', 'GA', '31209', '(478) 555-1139'),
(5, 'Berglund', 'Christina', '22717 E 73rd Ave', 'Dubuque', 'IA', '52004', '(319) 555-1139'),
(6, 'Moos', 'Hanna', '1778 N Bovine Ave', 'Peoria', 'IL', '61638', '(309) 555-8755'),
(7, 'Citeaux', 'Fred', '1234 Main St', 'Normal', 'IL', '61761', '(309) 555-1914'),
(8, 'Summer', 'Martin', '1877 Ete Ct', 'Frogtown', 'LA', '70563', '(337) 555-9441'),
(9, 'Lebihan', 'Laurence', '717 E Michigan Ave', 'Chicago', 'IL', '60611', '(312) 555-9441'),
(10, 'Lincoln', 'Elizabeth', '4562 Rt 78 E', 'Vancouver', 'WA', '98684', '(360) 555-2680');

Answers

Answer:

SELECT customer_last_name, customer_city, customer_zip FROM customers WHERE customer_state = 'IL' ORDER BY customer_last_name DESC;

Explanation:

Here, we are given a SCHEMA with the table name customers.

It's creation command and commands to insert values are also given.

We have to print the customer last name, city and zip code of all the customers who have their state as IL in the decreasing order of their last names.

Let us learn a few concepts first.

1. To print only a specified number of columns:

We can write the column names to be printed after the SELECT command.

2. To print results as per a condition:

We can use WHERE clause for this purpose.

3. To print in descending order:

We can use ORDER BY clause with the option DESC to fulfill the purpose.

Therefore, the answer to our problem is:

SELECT customer_last_name, customer_city, customer_zip FROM customers WHERE customer_state = 'IL' ORDER BY customer_last_name DESC;

Output of the command is also attached as screenshot in the answer area.

What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';char* studentPointer;

Answers

Answer:

char* studentPointer = &userStudent;

Explanation:

Pointers in C are variables used to point to the location of another variable. To declare pointer, the data type must be specified (same as the variable it is pointing to), followed by an asterisk and then the name of the pointer. The reference of the target variable is also assigned to the pointer to allow direct changes from the pointer variable.

Write a method called classSplit that accepts a file scanner as input. The data in the file represents a series of names and graduation years. You can assume that the graduation years are from 2021 to 2024.Sample input file:Hannah 2021 Cara 2022 Sarah2022Nate 2023 Bob 2022 Josef 2021 Emma 2022Your method should count the number of names per graduation year and print out a report like this --- watch the rounding!:students in class of 2021: 28.57%students in class of 2022: 57.14%students in class of 2023: 14.29%students in class of 2024: 00.00%You must match the output exactly.You may not use any arrays, arrayLists, or other datastructures in solving this problem. You may not use contains(), startsWith(), endsWith(), split() or related functions. Token-based processing, please.There is no return value.

Answers

Answer:

public static void classSplit(Scanner file){

   int studentsOf21 = 0, studentsOf22 = 0,studentsOf23 = 0, studentsOf24 = 0;

   while (file.hasNext() == true){

       String studentName = file.next();

       int year = file.nextInt();

       switch (year){

           case 2021:

               studentsOf21++;

               break;

           case 2022:

               studentsOf22++;

               break;

           case 2023:

               studentsOf23++;

               break;

           case 2024:

               studentsOf24++;

               break;

       }

   }

   int totalGraduate = studentsOf21+studentsOf22+studentsOf23+studentsOf24;

   System.out.printf("students in class of 2021: %.2f%n", students2021*100.0/totalGraduate);

   System.out.printf("students in class of 2022: %.2f%n", students2022*100.0/totalGraduate);

   System.out.printf("students in class of 2023: %.2f%n", students2023*100.0/totalGraduate);  

   System.out.printf("students in class of 2024: %.2f%n", students2024*100.0/totalGraduate);

}

Explanation:

The classSplit method of the java class accepts a scanner object, split the object by iterating over it to get the text (for names of students) and integer numbers (for graduation year). It does not need a return statement to ask it prints out the percentage of graduates from 2021 to 2024.

Write a script that inputs a line of encrypted text and a distance value and outputs plaintext using a Caesar cipher. The script should work for any printable characters.An example of the program input and output is shown below:Enter the coded text: Lipps${svph% Enter the distance value: 4 Hello world!# Request the inputscodedText = input("Enter the coded text: ")distanceValue = int(input("Enter the distance value: "))# Calculate the decryptionplainText = ""for cr in code:ordvalue = ord(ch)cipherValue = ordvalue - distanceif cipherValue < ord('a'):cipherValue = ord('z') - \ (distance - (ord('a') - ordvalue - 1))plainText += chr(cipherValue)print(plainText)

Answers

Answer:

# Request the inputs

codedText = input("Enter the coded text: ")

distance = int(input("Enter the distance value: "))

# Calculate the decryption

# see comment for the rest. Brainly won't let me save an answer which contains code.

Explanation:

Above is your program fixed, but it is unclear on how to deal with unprintable characters, i.e., characters that originally were near the highest printable character ('~')

Write a method that draws a circle and a square that is centered in a DrawingPanel. The method will take in the width and height (they are the same for both the circle and square) and a Graphics object as parameters
IN java
current code: turn it into a method along with the main method
import java.awt.*;
public class Graphics {
static final int WIDTH = 300;
static final int HEIGHT = 200;
public static void drawGraphics () {
}
public static void main(String []args) {
DrawingPanel2 draw = new DrawingPanel2(WIDTH,HEIGHT); // Make a DrawginPanel2 of size 300 by 200.
Graphics2D g = draw.getGraphics(); // gets graphics from DrawingPanel so you can draw
g.setColor(Color.RED);
g.fillRect(45, 30, 200, 150);
g.setColor(Color.BLUE);
g.fillOval(70, 30, 150, 150);
}
}

Answers

Answer:

public static void drawGraphics (Graphics g, int width, int height) {

   int r = Math.round(width/2);

   int x = 45;

   int y = 30;

     g.setColor(Color.RED);

   g.fillRect(x, y, width, height);

   g.setColor(Color.BLUE);

   g.fillOval(Math.round(x/2), Math.round(y/2), r, r);

}

Explanation:

The Java method "drawGraphics" of the Graphics class accepts draws a square with the "fillRect()" method of the Graphics class object and at its center, a circular path is drawn as well.

A series of gentle often open-ended inquiries that allow the client to progressively examine the assumptions and interpretations here she is made about the victimization experience is called:_____.

Answers

Answer:

Trauma Narrative

Explanation:

Given that Trauma narrative is a form of narrative or carefully designed strategy often used by psychologists to assists the survivors of trauma to understand the meaning or realization of their experiences. It is at the same time serves as a form of openness to recollections or memories considered to be painful.

Hence, A series of gentle often open-ended inquiries that allow the client to progressively examine the assumptions and interpretations he or she is made about the victimization experience is called TRAUMA NARRATIVE

Which of the following are downlink transport channels?
a. BCH.
b. PCH.
C. RACH.
d. UL-SCH.
e. DL-SCH.

Answers

I think it’s a or b

A substring of some character string is a contiguous sequence of characters in that string (which is different than a subsequence, of course). Suppose you are given two character strings, X and Y , with respective lengths n and m. Describe an efficient algorithm for finding a longest common substring of X and Y .For each algorithm:i. Explain the main idea and approach.Write appropriate pseudo-code.Trace it on at least three different examples, including at least a canonical case and two corner cases.
iv. Give a proof of correctness.v. Give a worst-case asymptotic running time analysis.

Answers

Answer:

create a 2-dimensional array, let both rows represent the strings X and Y.

check for the common characters within a string and compare them with the other string value.

If there is a match, append it to the array rows.

After iterating over both strings for the substring, get the longest common substring for both strings and print.

Explanation:

The algorithm should create an array that holds the substrings, then use the max function to get the largest or longest substring in the array.

Any one know??please let me know

Answers

Answer:

B

Explanation:

Answer:

The answer is B.

Explanation:

Also I see your using schoology, I use it too.

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

Select the correct answer from each drop-down menu.
Complete the sentence listing the basic parts of a computer.
All computers have these four basic parts: an input device, a

Answers

Answer:

all computers have an input device, storage, proccesing,and output

hope it helped

Explanation:

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120


Which heading function is the biggest?
1. h1
2. h2
3. h3

Answers

Answer:

h3

Explanation:

sub to Thicc Panda on YT

The answer for this question is number 1

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

Pointers are addresses and have a numerical value. You can print out the value of a pointer as cout << (unsigned)(p). Write a program to compare p, p + 1, q, and q + 1, where p is an int* and q is a double*. Explain the results.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

  int i = 2;

  double j = 3;

 

  int *p = &i;

  double *q = &j;

 

  cout << "p = " << p << ", p+1 = " << p+1 << endl;

  cout << "q = " << q << ", q+1 = " << q+1 << endl;

  return 0;

}

Explanation:

In C++, pointers are variables or data types that hold the location of another variable in memory. It is denoted by asterisks in between the data type and pointer name during declaration.

The C++ source code above defines two pointers, "p" which is an integer pointer and "q", a double. The reference of the variables i and j are assigned to p and q respectively and the out of the pointers are the location of the i and j values in memory.

How do you overload a C2677 error code in c++ for '-'?

Answers

The answer is the c++ one I know becuase I took the test

You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a frame.
What ribbon tab would you click to find the tool to add the rectangle?
Animations
Insert
Design
Home

Answers

I choose Home and it’s a good thing to have

Which formatting option(s) can be set for conditional formatting rules?

Answers

Answer:

D

Explanation:

Any of these formatting options as well as number, border, shading, and font formatting can be set.

3. Write a function named sum_of_squares_until that takes one integer as its argument. I will call the argument no_more_than. The function will add up the squares of consecutive integers starting with 1 and stopping when adding one more would make the total go over the no_more_than number provided. The function will RETURN the sum of the squares of those first n integers so long as that sum is less than the limit given by the argument

Answers

Answer:

Following are the program to this question:

def sum_of_squares(no_more_than):#defining a method sum_of_squares that accepts a variable

   i = 1#defining integer variable  

   t = 0#defining integer variable

   while(t+i**2 <= no_more_than):#defining a while loop that checks t+i square value less than equal to parameter value  

       t= t+ i**2#use t variable to add value

       i += 1#increment the value of i by 1

   return t#return t variable value

print(sum_of_squares(12))#defining print method to call sum_of_squares method and print its return value

Output:

5

Explanation:

In the program code, a method "sum_of_squares" is declared, which accepts an integer variable "no_more_than" in its parameter, inside the method, two integer variable "i and t" are declared, in which "i" hold a value 1, and "t" hold a value that is 0.

In the next step, a while loop has defined, that square and add integer value and check its value less than equal to the parameter value, in the loop it checks the value and returns t variable value.

A video game character can face one of four directions

Answers

Really
I didn’t know that:)
Other Questions
what is 16 - 2t = t + 9 +4t CaO + H2O -> Ca(OH)23.50g of Ca(OH)2 was made from 4.20g of CaO? What is the % yield of Ca(OH)2? Plis help me plis! I need help with this is there a transformation that maps shape I onto shape II? explain your answer Volcanoes sometimes form at hot spots far away from tectonic plate boundaries. Examples include the Hawaiian Islands and Yellowstone Caldera in North America. These hots spots form where what is the image point of ( -8,-1 ) after a transition left 3 units and up 4 units What force would need to be added downwards to have this 2kg object accelerate at5 m/s/s downward and 1.5 m/s/s to the left? Need ASAP!! An object lies motionless on a rough inclined surface . Which event sparked the protest movement known as the Arab Spring?A) Free speech was declared illegal in Iran.B) Ayatollah Khomeini became the ruler of Iran.C) A young man tragically killed himself in Tunisia.D)The six states of the Arabian peninsula united. While you're livin' in your mansion, drivin' big carsThere's another on the street, cold sleepin' on the groundAnd when you walk by, yo, don't act cold-blooded'Cause it just ain't fair to kick a man when he's down.Which line from the song best supports the author's message in these lines?A)That I am somebodyB)We're all created equal, we live and we dieC)If you feel you're somebody, be proud, and show itD)We all got a purpose in life to achieve bf Cassie was unhappy in her relationship with Richard. There wasn't anything wrong with him. He did cut her off occasionally while she was trying to speak, but he was generally a good guy. She just wanted something different. She decided that tonight she would break up with Richard. When he arrived at her house, she wanted to talk with him about it, but he rushed her out the door. "No time to talk now, Babe," he said. "We're late for our dinner reservations." She figured that she would tell him at the restaurant, near the end of the meal. She would even offer to pay. So they enjoyed a delicious meal together. Then, right before dessert, Cassie opened her mouth to let out the fatal words. "Richard..." she began, but Richard broke in. "Oh, Babe, I got a surprise for you." He pulled a small white envelope from his pocket. "Two front row tickets to see your favorite band. The Mountain Boys!" Cassie's mouth dropped. She loved the Mountain Boys. Richard backpedaled, "I'm sorry that I cut you off again. What was it that you wanted to tell me?" Cassie looked down at the piece of cake in front of her and replied, "Oh, I forgot. Nothing important."What does this dramatic irony reveal about cassie?A.She is going to break up with Richard at the concert.B.She is going to get engaged at the concert.C.She truly loves Richard.D.She is actually Richard for the thing her gives her. How do I calculate how many meters are in 7.2 light years?The exact question is:Calculate in meters the distance between a galaxy and the Earth if the distance is equal to 7.2 light years. Please solve Ill gift brainliest to the First correct answer HELP ASAP !!!The Founding Fathers of the United States knew that having a direct democracy in a large nation with millions of people spread over large distances would be difficult.For this reason, the instead choose abookOligarchyRepresnetative DemocracyTyrannyCommunism In slope-intercept form, write the equation of the line passing through the points (-4,1) and (-3,2). Select all ratios equivalent to 3:2.2:12 18:14 27:18 Outsiders Chapter 5-8 Please do right away:Which force seems to have more control over Pony the influence of friends and family or the inner desire to be himself? Give examples to support your answer. Which forces do you think should be the main influence in his life? Why? Please help me on this history please Im begging also its number one not number 2 What is the difference between chemical and physical weathering? Can someone help me I need help quickly!!!