16. (PPT) You can use features on the Video Tools Playback tab to adjust how and when the video plays during the slide
show.
a. True
b. False

Answers

Answer 1

Answer:

a. True

Explanation:


Related Questions

what two types of modems are popular for highspeed internet connections

Answers

A broadband modem is a type of computer modem that is used in conjunction with high-speed internet services. Cable, DSL (digital subscriber line), and wireless are the three most common types of broadband modems.

What are modems and what are their varieties and speeds?MODEM is an abbreviation for Modulator and Demodulator. It is a device that modulates signals in order to encode digital data for transmission and demodulates signals in order to decode the transmitted data. A modem transmits data at a rate of bits per second (bps). It is required for communication between digital and analog devices. Cable modems, DSL modems, and dial-up modems are the three types of modems. Although cable modem technology has the potential to support speeds of up to 30 Mbps, most providers only offer services at speeds ranging from 1 Mbps to 6 Mbps. Upload and download bandwidth ranging from 128 Kbps to 768 Kbps

To learn more about modems. refer to:

https://brainly.com/question/23625215

#SPJ1

give me at least five main characteristic of irrigation equipment​

Answers

Answer:

flow control devices

filters

fertigation equipment

water emitters

automation equipment

operation equipment

water-lifting devices.

a customer needs to look up tips for proper machine use in the user guide for their product. they do not know where to find the user guide. where should you tell them to look?

Answers

A task-oriented document is a user manual or guide. It includes operating and maintenance instructions as well as technical descriptions, drawings, flowcharts, and diagrams.

Even though instructions on how to use or repair a product are documented, it might not always suit the intended purpose. A user handbook, often referred to as a user guide, is designed to help users use a specific good, service, or application. Typically, a technician, a product developer, or a member of the company's customer support team will write it. Because of this, nonvolatile memory—which retains its data even if a computer's power is switched off or a storage device is unplugged from a power source—is frequently employed in conjunction with RAM. Additionally, unlike some volatile memory, nonvolatile memory does not require periodic content refreshment.

Learn more about memory here-

https://brainly.com/question/28754403

#SPJ4

a user tells you that microsoft word gives errors when saving a file. what should you do first? cis 213

Answers

If a user tells you that Microsoft Word gives errors when saving a file, CIS 213In the event that a user reports that Microsoft Word is experiencing errors while saving a file, the following steps should be taken to fix the problem:

Try saving the file with a new name before attempting to save the file again. Archive the document by saving it in RTF or HTML format before closing it. Open a new file and copy the contents of the archive file into it. Try saving the file in a different location on the hard drive or on a removable device such as a flash drive or external hard drive.

Close the file and try reopening it. After reopening, save it in a new location on the hard drive or on a removable device such as a flash drive or external hard drive.

To know more about Microsoft Word visit:

https://brainly.com/question/26695071

#SPJ11

Eliza has a document with plain text. She wants to format only the second paragraph of the fifth page to have two columns. What sequence of buttons will Eliza click to set up the correct type of section break for this?

Page Layout, Breaks, Page
Page Layout, Breaks, Continuous
Insert, Page Break
Insert, Continuous

Answers

Page layout breaker and page

Mark works at a Media Production company that uses MacOS. He lends his Hard drive to his colleague Kinsey to share a large 200 GBs movie. Kinsey is using a Windows Machine. Explain why she wasn't able to use Mark's Hard drive.

Answers

Hard drives that are from different machines that operate with different systems aren't compatible.

to view the ip address(es) assigned to the local system, which command should you use?

Answers

To view the IP address(es) assigned to the local system, you can use the "ipconfig" command. This command will display network configuration information for all network adapters installed on the system.

The output will include the IP address, subnet mask, default gateway, and other relevant information. Additionally, the "ipconfig" command can be used with various parameters to display specific information, such as the IPv4 or IPv6 address, DHCP lease information, or DNS server configuration.

Overall, using the "ipconfig" command is a quick and easy way to obtain network information on a Windows system. In summary, to view the IP address(es) assigned to your local system, use the "ipconfig" command for Windows or "ifconfig" for Linux and macOS. These commands provide the necessary information regarding your network configuration and assigned IP addresses.

To know more about command visit:-

https://brainly.com/question/3632568

#SPJ11

what is the term for the era created by the digital revolution?

Answers

Answer:

The Digital Revolution also marks the beginning of the Information Era. The Digital Revolution is sometimes also called the Third Industrial Revolution.

Explanation:

Hope this Helps.

When working with text, which two options could lesson the readability of the design project?

Answers

When working with text, there are several options that could lessen the readability of a design project. Two of these options include using a font that is difficult to read and overcrowding the page with too much text. Using a font that is difficult to read can cause strain on the eyes of the reader and make it difficult for them to engage with the text.

This could result in the reader losing interest in the content and not retaining the information that was presented. Fonts that are too small, too fancy or too bold can also make it challenging to read the text and could hinder the effectiveness of the design project. Overcrowding the page with too much text can also make it difficult for the reader to engage with the content. A design project that contains long paragraphs or a lot of text in a small space can be overwhelming for the reader and may cause them to lose interest. This could also make it difficult for the reader to navigate the content and find the information that is relevant to them. In order to ensure that a design project is easily readable, it is important to use a font that is clear and easy to read and to ensure that there is enough white space on the page to break up the text. By doing so, the reader will be able to engage with the content and retain the information that was presented.

Learn more about design project here-

https://brainly.com/question/14928064

#SPJ11

Which activity is the best example of a negative habit that may result from
heavy computer and Internet usage?
A. Playing web-based games instead using social media
B. Shopping online in order to find a gift for a friend
c. Using apps for driving directions instead of using a paper map
O D. Avoiding local friends in order to play online games
SUBMIT

Answers

Answer:

D

Explanation:

Any of these is an example, but the most drastic would be D, Avoiding local friends in order to play online games

A feedback loop is not closed until _____.

the project is complete

action is taken to address the feedback

the feedback is entered into an analysis tool

the feedback is analyzed and archived

Answers

Answer: action is taken to address the feedback

Explanation:

Answer: action is taken to address the feedback

Explanation:

PLEASE HELP, True or False: When coding an image you must use an href attribute

Answers

Your answer should be True

Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.

Answers

Answer:1. Advanced house framing

Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.

2. Cool roofs

Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.

3. The right exterior doors

Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.

4. Skylights

Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.

5. Window treatments

Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.

Explanation:

What type of email communication reaches out to former clients and older prospects and encourages a reply? Strategic email Onboarding email Reengagement email Promotional email

Answers

A type of email communication that reaches out to former clients and older prospects and encourages a reply is: C. reengagement email.

What is an e-mail?

An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.

In Computer Networking, a reengagement email is a type of email communication that is designed and developed to reach out to former clients and older prospects, and it encourages a reply.

Read more on e-mail here: brainly.com/question/15291965

#SPJ1

A cookie is stored on your device's memory or disk in what file format? 1.)video file

2.) audio file

3.)image file

4.) text file

Answers

Answer:

text file format

4 this is the answer

7.2 code practice edhesive

Answers

Answer:

Explanation:

got a 100

7.2 code practice edhesive

The python program method code and its description can be defined as follows:

Python code:

def ilovepython():#defining the method ilovepython

   for i in range(0,3):#defining a loop that prints value 3 times

       print ("I love Python")#print message

ilovepython()#calling the method

Output:

Please find the attached file.

Code Explanation:

Defining the method "ilovepython".Inside the method, a for loop is declared that uses the range method in which it prints the value 3 times. Inside the loop, a print method is used that prints the message value that is "I love Python".Outside the method, method "ilovepython" is called that prints the given message value 3 times.

Find out more about the loop here:

7.2 code practice edhesive
7.2 code practice edhesive

what is the focus of the list of responsibilities for database administrators? (1 point) dbms support and proper security measures design development and dbms support proper security measures and design development performance tuning and design development

Answers

The focus of the list of responsibilities for database administrators is DBMS support and proper security measures. This includes ensuring the database management system (DBMS) functions efficiently and implementing security measures to protect the integrity and confidentiality of the data.

The focus of the list of responsibilities for database administrators typically includes proper security measures, design development, and DBMS (Database Management System) support.DBAs (Database Administrators) are responsible for ensuring the security and integrity of the database, designing and developing the database system, and providing support for the DBMS software and related tools. They may also be responsible for data backup and recovery, performance tuning, and monitoring and optimizing database performance.

Learn more about efficiently about

https://brainly.com/question/30861596

#SPJ11

Write a statement that toggles the value of onoffswitch. That is, if onoffswitch is false, its value is changed to true; if onoffswitch is true, its value is changed to false.

Answers

Answer:

import java.io.*;

public class OnOffSwitch

{

public static void main(String[] args)

{

boolean onoffswitch = false;

String value = "false";

if (onoffswitch)

 {

   value = "true";

   onoffswitch = true;

 }

else

{

  value = "false";

   onoffswitch = false;

}

//

System.out.println(value);

}

}

Explanation:

Basically, the simple java program looks through the boolean state and checks, if the boolean value is true, then change the value, otherwise retain the value as default.

The straightforward Java application scans the boolean state and determines whether the value should be changed if it is true, or left alone if it is false.

To toggle the value of the onoffswitch variable, you can use a simple assignment statement along with the logical negation operator (!).

Here's the statement:

onoffswitch = !onoffswitch;

In this statement, the value of onoffswitch is negated using the ! operator. If onoffswitch is currently false, applying the logical negation will change it to true.

On the other hand, if onoffswitch is currently true, the negation will change it to false.

This way, the value of onoffswitch is toggled between true and false based on its current state.

By assigning the negated value back to onoffswitch, you effectively update its value to the toggled state.

Learn more about Coding click;

https://brainly.com/question/17204194

#SPJ6

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

Call-by-reference can achieve the security of call-by-value when: O A The value being passed is small OB. A large argument is passed in order to improve performance OCA pointer to the argument is used OD. The const qualifier is used

Answers

When passing arguments to functions, there are two ways of doing it: call by value and call by reference.

When passing arguments to functions, there are two ways of doing it: call by value and call by reference. Call by value creates a copy of the argument being passed, while call by reference passes the address of the argument.
In terms of security, call by value is often preferred because it prevents any unintended changes to the original variable outside of the function. However, call by reference can also achieve the security of call by value by using a const qualifier.
When a const qualifier is used, it ensures that the argument being passed cannot be modified within the function. This is because any attempt to modify the value will result in a compiler error.
On the other hand, passing a pointer to the argument or a large argument to improve performance can increase the risk of unintended modifications to the original variable outside of the function. Therefore, it is important to weigh the benefits and risks of different argument passing methods based on the specific use case.
In summary, call by reference can achieve the security of call by value when a const qualifier is used.

To know more about call by reference visit: https://brainly.com/question/31958404

#SPJ11

If one wishes to raise 4 to the 13th power, using regular exponentiation will take O A. 12 multiplications OB. 13 multiplications OC.4 multiplications OD.5 multiplications

Answers

If one wishes to raise 4 to the 13th power, using regular exponentiation will take 13 multiplications. The correct option is B, 13 multiplications.

To raise 4 to the 13th power using regular exponentiation, we need to multiply 4 by itself 13 times. Each multiplication represents one step in the process. So, to obtain the final result of 4 to the power of 13, we would perform 13 multiplications in total. This is because the exponent of 13 indicates that the base, which is 4 in this case, needs to be multiplied by itself 13 times. Therefore, the correct option is B, 13 multiplications.

You can learn more about multiplications at

https://brainly.com/question/1135170

#SPJ11

What is a search engine ​

Answers

Answer:

A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.

Explanation:

Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find.

Discuss why mtv initially had a difficulty securing enough ads

Answers

The reason why MTV   initially had a difficulty securing enough ads was due to the focus on the wrong target audience.

Why is target audience important?

Identifying your audience enables your company to target marketing efforts and resources on the groups most likely to purchase from you. This way, you may generate company leads in an efficient and cost-effective manner.

A thorough grasp of your target audience may also aid in the improvement of your website's SEO ranking. Because you already know what your followers are interested in, you can conduct related keyword research and leverage the top search phrases to generate relevant content.

Learn more about target audience;
https://brainly.com/question/31192753
#SPJ4

Please complete the following questions. It is important that you use complete sentences and present the questions and answers when you submit your work.

1.Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.

2.Consider this program:
Cost1 = input("Please enter the first expense: ")

Cost2 = input("Please enter the second expense: ")

print("Your total for both expenses was", Cost1 + Cost2)

3.If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line when this program is run? If this result in not what the programmer intended, how would you explain what went wrong?

4.You are writing a line of code that should ask the user to input the balance of their bank account in dollars and cents. The program will then perform a multiplication problem to tell the user how much interest they can earn. Identify three errors in your line of input code and explain why they are incorrect. Include the corrected line of code in your answer. Here is the code:
1num = input(What is your balance?)

5.What are some kinds of comments that might be useful for a programmer to include in a program?
If you were planning how to write a program, at what point would a flowchart be helpful? At what point would pseudocode be helpful? Explain your reasoning.

Answers

Answer:

ndnxnndjdjsnnznnzbzbbdbdhdhhdbdbdbbdhdjidieiei

Explanation:

bxbzbxncnxbbcnfnnfnfndndnndndnndndnndndndnndndndndnnddnndndndnhrjjsjdudjjdjd

what would be a candidate key for the session table, besides the current key field of sessionnum? the design of the session table is session (sessionnum, sessiondate, patientnum, lengthofsession, therapistid, therapycode). a.sessiondate b.patientnum and therapistid (compound key) c.therapycode and patientnum (compound key) d.sessionnum is the only appropriate key field.

Answers

a.sessiondate, b.patientnum and therapistid (compound key), c.therapycode and patientnum (compound key) are all potential candidate keys for the session function table, in addition to the current key field of sessionnum.

The session table has the fields sessionnum, sessiondate, patientnum, lengthofsession, therapistid, and therapycode. The current key field of sessionnum is a unique identifier for each row in the session table; however, it is also possible to use other fields as candidate keys in order to uniquely identify each row. A candidate key is a field or combination of fields that can be used to uniquely identify each row in the table. In this case, sessiondate, patientnum and therapistid (compound key), and therapycode and patientnum (compound key) could all be used as candidate keys. Sessiondate would be a single field candidate key, while patientnum and therapistid, and therapycode and patientnum would be compound keys that are composed of two fields. Compound keys are composed of two or more fields that together can be used to uniquely identify each row.

Learn more about functions here-

brainly.com/question/28939774

#SPJ4

what are the main features cyber law of Nepal​

Answers

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

New Perspectives Microsoft Office 365 & Access 2019 Comprehensive [1 ed.] 035702575X, 9780357025758. Develop the Microsoft Office 365 and Access 2019 skills ...

Answers

To develop Microsoft Office 365 and Access 2019 skills, you can use the comprehensive textbook titled New Perspectives Microsoft Office 365 & Access 2019 Comprehensive 1 ed authored by Mark Shellman and Sasha Vodnik.

This textbook covers a range of topics related to Microsoft Office 365 and Access 2019, including creating databases, designing tables and forms, working with queries and reports, and integrating data with other Office applications. The book also includes hands-on exercises and case studies to help you apply your knowledge in real world scenarios.

Additionally, you can also access online resources such as Microsoft official training courses and tutorials, as well as online communities and forums where you can connect with other users and experts for support and advice. Practicing regularly with these resources can help you develop your skills and become proficient in using Microsoft Office 365 and Access 2019.

To know more about Microsoft Office visit:

https://brainly.com/question/14984556

#SPJ11

I need help asap
Classify the examples as per their planning phase.

I need help asap Classify the examples as per their planning phase.
I need help asap Classify the examples as per their planning phase.

Answers

Answer: the Answer is c

Explanation: the

Note that the classifications for each example according to their planning phase.

What is the explanation for the above response?

1) Wireframe - This example belongs to the early planning phase. Wireframes are skeletal outlines or blueprints that represent the basic structure and layout of a website or application. They serve as a guide for developers to create the final product.

2) Page description diagram - This example also belongs to the early planning phase. A page description diagram (PDD) is a visual representation of the content and layout of a website or application. It shows how the pages will be structured and what content will be included on each page.

3) Browsing functionality - This example belongs to the mid-phase of planning. Browsing functionality refers to the features and capabilities of a website or application that enable users to navigate and browse through content. This includes search bars, filters, sorting options, and other tools that make it easier for users to find what they are looking for.

4) Design elements - This example belongs to the late planning phase. Design elements include the visual components of a website or application, such as color schemes, typography, icons, and images. They are typically created after the wireframes and PDDs have been developed and serve to enhance the user experience and make the product visually appealing.

Learn more about planning phase. at:

https://brainly.com/question/30579252

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Classify the examples as per their planning phase.

wireframe

page description diagram

browsing functionality

design elements

TACACS cs RADIUS (Central Authentication Server) and define AAA protocol

Answers

TACACS and RADIUS are both protocols used in network security to provide centralized authentication and authorization services.

TACACS stands for Terminal Access Controller Access Control System, while RADIUS stands for Remote Authentication Dial-In User Service. The key difference between TACACS and RADIUS is that TACACS is a Cisco proprietary protocol, while RADIUS is an industry-standard protocol that can be used across different vendors' equipment. RADIUS is used in a variety of networking scenarios, including wireless and VPN connections.

Both TACACS and RADIUS fall under the umbrella of AAA (authentication, authorization, and accounting) protocols. AAA protocols are used to ensure that only authorized users can access a network or system, and that their actions can be tracked and audited. Authentication refers to the process of verifying a user's identity, authorization refers to the process of granting access to specific resources, and accounting refers to the process of logging and tracking user activity. In summary, TACACS and RADIUS are both protocols used for centralized authentication and authorization services in network security, and they both fall under the AAA protocol umbrella. While TACACS is a proprietary Cisco protocol, RADIUS is an industry-standard protocol that can be used across different vendors' equipment.

Learn more about network here: https://brainly.com/question/13102717

#SPJ11

address on the internet ​

Answers

A device on the internet or a local network can be identified by its IP address, which is a special address.The rules defining the format of data delivered over the internet or a local network are known as "Internet Protocol," or IP.

Which two kinds of Internet addresses are there?

picture of an address found online Internet Protocol (IP) addresses are used to connect your network with the Internet.IP addresses come in two varieties: static and dynamic.In order to help you choose between static and dynamic IP addresses, this article compares their main characteristics. Using one of the several IP lookup programs that are readily available online is the quickest approach to start learning someone's IP address.There are tools available to enter an IP address and search for its free public registry results on websites A network address and a host (or local) address are the components of an internet address.With this two-part address, a sender can identify both the network and a particular host on the network.Each network that connects to another Internet network receives a distinct, official network address. While IP addresses do identify your whereabouts, they do not provide as much detail as a home address.Additionally, IP addresses will never disclose your name, phone number, or any other specific personal details. "Internet protocol" is referred to as IP.For any device connected to your network, your router IP serves as an identification number.For the router to recognize it and send data packets to it, a device (such as a computer or smartphone) needs to have an IP address.Your internet is what it is because of the data packets.

       To learn more about IP address refer

        https://brainly.com/question/21864346

        #SPJ1

Other Questions
A collection of coins consists of nickels dimes and quarters. There are 4 fewer coins quarters than nickels and 3 fewer dimes than quarters. How many of each kind of coin are in the collection if the total value of the collection is $6. 5 (a) residents of a city have monthly incomes (in dollars) that are distributed around an unknown mean, with a standard deviation of 500 dollars. the incomes are recorded for a random sample of 36 residents. an average value of 1500 dollars is obtained. what is the 90%-confidence interval for the population mean estimate? what refers to the field of inquiry that combines recent advances in neuroscience with principles of cultural psychology and population genetics to understand associations among culture, behavior, mind, brain, and genes? A certain type of bacteria doubles in population every 6 hours. There were approximately 100 bacteria at the beginning of the day.How many bacteria will there be at the end of one day? What are chemical sedimentary rocks formed from? T/F: The time it takes a principal P to be doubled if it is invested at an annual rate of 12% and interest is compounded quarterly is 5.86 which number below is irrational?a)4/9 b) 20 c)121Why is the number you chose irrational? In a ___ organization, project managers are in charge of teams made up of members from several departments. Journalize the following transactions for Miller Company using the gross method of accounting for sales discounts. Assume a perpetual inventory system. Also, assume a constant gross profit ratio for all items sold. Make sure to enter the day for each separate transaction. December 6 Sold goods costing $3,000 to Patterson Company on account, $5,000, terms 2/10, n/30. December 12 Patterson Company was granted an allowance of $300 for returned merchandise that was previously purchased on account. The returned goods are in perfect condition. December 17 Received the amount due from Patterson Company. Buy a truck to sell goods, purchase price is 330 million dong which includes 10% VAT paid by bank deposit refurbishing cost is 5 million VAT 10% is to be paid in cash. This property was developed by the investment fund Given a variable named plist that contains a list, wri te a statement that adds another element, 5 to the end of the list. Can you help me solve this? Could you solve number and the rate of change and start value and relation CigarettesHeroinBeerIbuprofen????Pharmaceuticalcompanies spend millionsadvertising this drug.This drug can lead toalcoholism and causeinjuries through DUIaccidents.The government regulateswhere this drug can beused.This drug can lead toaddiction; possession is acrime punishable by law What is the most compelling argument the author makes for lifetime judicial appointments in Federalist 78? What is a micro aggression definition? Decide if the following sentence is grammatically CORRECT or INCORRECT.Wir schwimmen neben die Boot.O correctincorrect prove the identity ((secy-tany) (secy+ tan y))/secy= COS U 3. Which of the following is true of executive orders? *O A. Executive orders are the same as laws.O B. Executive orders are permanent and cannot be changed or rescinded.O C. Executive orders are subject to judicial review.O D. Executive orders have no basis in the Constitution. hotel restaurants present a challenge to food and beverage directors because_____.