I mark Brainliest! Games created in Scratch are based on instructions that create a program, but other game design platforms work without any programming.

1. True

2. False

Answers

Answer 1

Answer:

TrueTrue

TrueTrue

Explanation:

True

Answer 2

Answer:

the answer is 1. True

Explanation:

please mark me as brainliest


Related Questions

Where is the BIOS stored?

CPU
CMOS
RAM
Northbridge

Answers

Answer:

bios stored in CMOS ...

BIOS software is stored on a non-volatile RAM chip on the motherboard. In modern computer systems, the BIOS contents are stored on a flash memory chip so that contents can be rewritten without removing the chip from the motherboard.

Hope I helped ❤️
Plz mark me brainiest? :)

the primary disadvantage of centralized database systems is ________.

Answers

The primary disadvantage of centralized database systems is a single point of failure.

In a centralized database system, all the data is stored and managed in a single location or server. While there are several advantages to this approach, such as simplified administration and data consistency, it also has a significant disadvantage.

The main drawback of centralized database systems is that they present a single point of failure. If the central server or database experiences any technical issues, such as hardware failure, network problems, or software errors, it can lead to a complete loss of access to the data for all users and applications connected to the system.

The impact of a single point of failure can be severe, causing disruptions in business operations, loss of productivity, and potential data loss. It can also result in downtime and delays in accessing critical information, affecting decision-making processes and customer service.

To mitigate this risk, centralized database systems often employ various measures like backup and disaster recovery solutions, redundant hardware and networking components, and failover mechanisms. However, even with these precautions, the risk of a single point of failure remains a notable disadvantage of centralized database systems.

The primary disadvantage of centralized database systems is the existence of a single point of failure. Any issues with the central server or database can lead to a complete loss of access to data, resulting in business disruptions and potential data loss.

To know more about centralized database systems visit

https://brainly.com/question/17373547

#SPJ11

The primary disadvantage of centralized database systems is the single point of failure, where if the central server fails, the entire system becomes inaccessible.

centralized database systems have several disadvantages:

single point of failure: A centralized database system relies on a single server. If this server fails, the entire system becomes inaccessible. This can result in significant downtime and loss of data.Performance issues: As all data processing and storage is handled by a single server, centralized systems can experience performance issues. The server may become overwhelmed with requests, leading to slower response times and potential bottlenecks.Lack of scalability: Centralized systems may struggle to handle a large amount of data or a high number of concurrent users. As the system grows, it may become increasingly difficult to scale and accommodate the growing demands.Security vulnerabilities: Centralized systems can be more vulnerable to security breaches. If a single breach occurs, it can compromise the entire system and expose sensitive data.Learn more:

About disadvantage here:

https://brainly.com/question/29548862

#SPJ11

which type of nat maps a single inside local address to a single inside global address?

Answers

The type of NAT that maps a single inside local address to a single inside global address is known as static NAT.

Static NAT establishes a permanent mapping between a private (inside local) IP address and a public (inside global) IP address. This mapping remains constant, allowing incoming traffic to be directed to a specific internal host based on the configured translation.

Static NAT is commonly used in scenarios where a particular internal resource, such as a server or a device, needs to be accessible from the external network with a dedicated public IP address. By using static NAT, a one-to-one correspondence is maintained between the internal and external addresses, ensuring that each internal address is consistently translated to a specific external address.

Static NAT is beneficial for applications or services that require a fixed, publicly accessible IP address, as it enables direct communication without any translation or sharing of IP addresses.

To learn more about static NAT visit : https://brainly.com/question/30074661

#SPJ11

after marge turned on her computer, she saw a message indicating that some of her files were remotely encrypted, and she needs to provide a bitcoin payment for the de-encryption key, . what does this indicate?

Answers

The message indicates that the computer has been infected with ransomware, and the files have been encrypted. The attacker is demanding a payment in Bitcoin in order to provide the decryption key.

What is bitcoin?

Bitcoin is a peer-to-peer digital currency that may be transmitted via the bitcoin network. Bitcoin transactions are cryptographically verified by network nodes and recorded in a public distributed ledger known as a blockchain. The cryptocurrency was created in 2008 by an unknown individual or group of individuals using the alias Satoshi Nakamoto. On October 31, 2008, a white paper defining the name bitcoin was published. It's a mash-up of the phrases bit and coin.

To learn more about bitcoin
https://brainly.com/question/28032977

#SPJ4

The group of data that will be used in a chart or graph is called the
chart type.
data range.
data series.
chart elements.

Answers

Answer:

data series

Explanation:

just took the test

Answer:

C

Explanation:

Which of the following is not a main method for sending information from one computer to
another?
Electricity
Light
Molecules
Radio

Answers

Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.

There are the multiple method of sending information that using the radio waves most commonly used now a days. A Wireless method of sending information using radio waves.

A wireless router has receives the signal as well as decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. and sending information through radio waves involve two devices .One is receiver device and other is sending device.

Therefore, Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.

Learn more about radio on:

https://brainly.com/question/29787337

#SPJ1

A series of drawn pictures (like a comic) of key visual shots of planned production for video is a/an
A encoding
B.call sheet
C.shot list
D. storyboard o IN​

Answers

Answer:

The correct answer is D) Storyboard

Explanation:

A storyboard is used during the initial planning stage of filmmaking. You draw pictures to demonstrate the general idea of what shots you want to get before actually going out and filming on a set/studio.

You need to consider the underlined segment to establish whether it is accurate.
Black Duck can be used to make sure that all the open source libraries conform to your company's licensing criteria.
Select `No adjustment required` if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
A. No adjustment required.
B. Maven
C. Bamboo
D. CMAKE

Answers

The main service for storing, processing, and protecting data is provided by the Database Engine component of SQL Server. On a single computer, SQL Server enables running up to 50 instances of the Database Engine.

Every application request to perform work on the data in any of the databases that instance manages is handled by a copy of the sqlservr.exe executable running as an OS service known as an instance of the Database Engine. If the application and instance are located on different machines, the applications connect to the instance using a network connection. The SQL Server connection can function as either a network connection or an in-memory connection if the application and instance are both running on the same computer.

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4

Mercy Field Clinic Craig Manteo is the Quality of Care manager at Mercy Field Clinic located in Knoxville, Tennessee. Craig wants to use Excel to monitor daily clinic appointments, looking at how many patients a doctor sees per day and on how much time is spent with each patient. Craig is also interested in whether patients are experiencing long wait times within particular departments or with specific doctors. You've been given a worksheet containing the scheduled appointments from a typical day. Craig wants you to create a dashboard that can be used to summarize the appointments from that day. Complete the following.

Answers

As the Quality of Care manager at Mercy Field Clinic, Craig Manteo's goal is to ensure that patients receive high-quality care at the clinic.

One way to achieve this goal is to monitor daily clinic appointments using Excel. Craig wants to look at the number of patients a doctor sees per day and the amount of time spent with each patient. He is also interested in identifying whether patients are experiencing long wait times within specific departments or with certain doctors. To create a dashboard that can summarize the appointments from a typical day, Craig needs to use Excel's data visualization tools. He can create charts and graphs that show the number of patients seen by each doctor, the time spent with each patient, and the wait times for each department or doctor. By analyzing this data, Craig can identify areas where the clinic may need to improve its processes to provide better patient care.

One example of how Craig can use Excel to monitor clinic appointments is by creating a pivot table that summarizes the data by department or doctor. He can then create a pivot chart that shows the number of patients seen, the average time spent with each patient, and the wait times for each department or doctor. Craig can also use conditional formatting to highlight areas where wait times are longer than expected. In conclusion, by using Excel to monitor clinic appointments, Craig Manteo can ensure that patients receive high-quality care at Mercy Field Clinic. He can identify areas where improvements are needed and make data-driven decisions to improve patient outcomes.

Learn more about Excel here : https://brainly.com/question/31599682

#SPJ11

Under which design specification category for interfaces and dialogues does interface/dialogue name appear?

Answers

Interface and dialogue name appear under the "Identification and Naming" design specification category for interfaces and dialogues. This category ensures that each element in the interface and dialogue is appropriately named and identified.

Naming the elements correctly is essential to make the interface intuitive and easy to use for users. The identification and naming design specification category includes guidelines for naming user interface components, labels, buttons, fields, icons, and other elements. The aim of the identification and naming category is to create an interface that is intuitive to use, even for new users.
In summary, the interface and dialogue name appear under the identification and naming design specification category for interfaces and dialogues.

To know more about Interface visit:

https://brainly.com/question/28939355

#SPJ11

Juan created new video game for his coding course. What is one way he can explain his code in everyday language?
A. He can create a separate document to explain his code. B. He can include comments written in the code. C. He can write his notes using actual code. D He cannot include any notes in his code.

Answers

Answer:

B. He can include comments written in the code

Explanation:

One way he can achieve his aim is by including comments to his code.

He can include as many comments as he likes because comments are non executable part of the program. In other words, the translators omit comments during program translation.

Another reason why he should consider using comments is that comments are used by computer programmers to explain lines of code especially the difficult lines.

In fact programmers are advised to include comments in their programs because comments doesn't have to be structured and can be expressed in human language.

In Java, C++, C#, comments are identified by // and /*....*/

In python, comments are identified by #

Answer:

b

Explanation:

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Ana has just purchased a new smartphone with a pre-installed mobile operating system (OS). She enjoys all of the customizable features in the mobile OS. Which mobile OS is likely installed on Ana's new smartphone?

Answers

Answer:

Android has more customization than IOS since it is an open source platform. You can do things such as sideloading apps, which is not allowed on IOS.

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​

Answers

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

At what point of a project does a copy right take effect?
Creation
Publishing
Research
Brainstorming

Answers

The correct answer is B Publishing
The answer is publishing

This act creates a set of requirements that allow for insurance portability, significant provisions regarding "administrative simplification" and standards for "privacy and security."
a. Consumer Directed Health Plans
b. Health Insurance Portability Accountability Act
c. Healthcare Integrity and Protection Data Bank
d. Employee Retirement Income Security Act

Answers

The correct answer is: b. Health Insurance Portability Accountability Act (HIPAA).

HIPAA ensures that employees and their families who lose their job-based health insurance are able to continue their coverage through the Consolidated Omnibus Budget Reconciliation Act (COBRA). The act also introduced administrative simplification provisions to promote efficiency and cost savings in the healthcare system.

HIPAA creates a set of requirements that allow for insurance portability, includes significant provisions regarding "administrative simplification" and establishes standards for "privacy and security." The other options, such as Consumer Directed Health Plans, Healthcare Integrity and Protection Data Bank,

To know more about HIPAA visit:-

https://brainly.com/question/14308448

#SPJ11

The act that creates a set of requirements allowing for insurance portability, significant provisions regarding "administrative simplification," and standards for "privacy and security" is the Health Insurance Portability Accountability Act (HIPAA). HIPAA was signed into law in 1996 and aims to protect individuals' health information while also making it easier for them to switch health insurance plans and providers.

One significant provision of HIPAA is the establishment of national standards for electronic healthcare transactions and code sets, which aim to simplify the administrative process and reduce healthcare costs. Additionally, HIPAA created the Privacy and Security Rules, which require healthcare providers and insurance companies to protect patients' personal health information from unauthorized access and disclosure.

HIPAA also established the Healthcare Integrity and Protection Data Bank, which is a national database that tracks healthcare providers who have been convicted of fraud or abuse. Finally, while HIPAA is often associated with healthcare providers and insurers, it also has provisions that relate to employee benefits under the Employee Retirement Income Security Act (ERISA).

Overall, HIPAA is a complex law with far-reaching implications for the healthcare industry, patients, and employers.

To know more about Health Insurance Portability visit:

https://brainly.com/question/30677213

#SPJ11

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

What is a good general rule to follow when deciding whether to repair or replace a computer

Answers

Answer:

witch is most cheap and would benifit you use pros and cons

Explanation:

A parent process calling _____ system call will be suspended until children processes terminate.
a. wait
b. fork
c. exit
d. exec

Answers

A parent function calling wait system call will be stopped until the children's processes terminate.

What is process termination?Process termination happens when the process has terminated The exit() system call is used by most working systems for process termination. Some of the reasons for process termination are as shadows − A process may be removed after its performance is naturally achieved.Process termination is a process in which a process is terminated and released to the CPU after finishing the undertaking. Most OS use an exit system call to terminate a process. Process termination occurs when the last enclave in the process completes. Process termination deletes the system that kept track of the enclaves within the process, removes the process control block (PCB) and associated help, and returns control to the creator of the process.

To learn more about process termination, refer to:

https://brainly.com/question/13440453

#SPJ4

Using cell references enter a formula in B6 to calculate monthly payments for the loan described in this worksheet Omit the optional arguement use a negative value for pv

Answers

Answer:

= PMT(B4/B2, B2 * B3, B1)

Explanation:

The syntax to use is:

= PMT(Rate,NPER, PV)

To answer this question, the following assumptions will be made.

B1 = Present Value i.e. PV

B2 = Number of Payment Period i.e n

B3 = Duration (in years)

B4 = Rate

So, the formula to enter in B6 is:

= PMT(B4/B2, B2 * B3, B1)

The above formula will return the monthly payment in cell B6

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

Assume that true proportation of the people who support Obamacare is a quarter of the population. If you took a sample of 1,000 people living in the United States, what would be the variance of this estimator

Answers

The variance of this estimator would be (0.25 * 0.75) / 1000, which is 0.0001875.

In statistical terms, the variance measures the variability or spread of the estimator around the true population proportion. In this case, the estimator is the proportion of people who support Obamacare, assumed to be a quarter of the population. The formula for variance is (p * q) / n, where p is the proportion of interest (0.25), q is the complementary proportion (1 - p = 0.75), and n is the sample size (1,000). By plugging in these values, we get a variance of 0.0001875, indicating the expected spread or variability of the estimated proportion based on the given sample.

Learn more about estimator here:

https://brainly.com/question/30870295

#SPJ11

White lines
A.separate traffic lanes moving in opposite directions
B.separate traffic moving in the same direction
C.indicate a handicap parking space
the
D.indicate temporary parking

Answers

Answer:

Its B                                                                                                                                            

Explanation:

Answer: B

Explanation:

in addition to good design sense, what else do web designers need to be proficient in?

Answers

In addition to good design sense, web designers need to be proficient in front-end coding languages.

A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).

Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.

Some examples of front-end coding languages include:

CSSHTMLJavascriptReactJQuerryVue

Read more on web design here: https://brainly.com/question/8391970

The quick access toolbar is ____.

Question 1 options:

is not customizable

is located at the bottom of the screen


is the fastest way to access the most used features

Question 2 (1 point)
The ribbon is where you will find all of the options to make a spreadsheet.

Question 2 options:
True
False
Question 3 (1 point)
The Display Options allow you to... (select all that apply)

Question 3 options:

close Excel altogether


change how much of the ribbon is displayed


minimize, maximize or restore the screen

Question 4 (1 point)
The "Tell Me" box allows _____

Question 4 options:

allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.


shows which cell is currently selected.


Displays the name of the current file.

Question 5 (1 point)
Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.

Question 5 options:
True
False
Question 6 (1 point)
All the cells make up a _________

Question 6 options:

notebook


workbook


worksheet

Question 7 (1 point)
Multiple worksheets make up the________, or the file.

Question 7 options:

cells


workbook

Question 8 (3 points)
Microsoft Excel can be downloaded for free, just like Word and PowerPoint, as a student at Digital Academy of Florida. Click here for instructions to download.

Question 8 options:
True
False

Answers

Answer:

question 1 is a fast way of accessing used features

Answer:

Explanation:

Question 2 (1 point)

The ribbon is where you will find all of the options to make a spreadsheet.

True

Question 3 (1 point)

The Display Options allow you to... (select all that apply)

minimize, maximize or restore the screen

Question 4 (1 point)

The "Tell Me" box allows _____

allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.

Question 5 (1 point)

Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.

True

Question 6 (1 point)

All the cells make up a _________

worksheet

Question 7 (1 point)

Multiple worksheets make up the________, or the file.

workbook

array expander. write a function that accepts an int array and the array's size as arguments. the function should create a new awway that is twice the size of the argument array

Answers

An array expander is a function that accepts an int array and the array's size as arguments. The function should create a new array that is twice the size of the argument array. To create a new array that is twice the size of the argument array, follow these steps: Step 1: Define the function and declare the input parameters. Then, inside the function, declare a new array with twice the size of the argument array. The new array should have a size of two times the input array size. Step 2: Loop through the input array, copying each element to the new array. You can use a for loop to loop through the input array and assign each element to the new array. Step 3: Return the new array as output of the function. The new array, which is twice the size of the input array, should be returned as the output of the function.Here's the code in C++ language:```#include using namespace std; int* arrayExpander(int arr[], int size){ int* newArr = new int[size * 2]; for(int i = 0; i < size; i++){ newArr[i] = arr [i]; } return newArr; } int main(){ int size = 5; int arr[size] = {1, 2, 3, 4, 5}; int* result = array Expander(arr, size); cout << "Original array: "; for(int i = 0; i < size; i++){ cout << arr[i] << " "; } cout << endl; cout << "Expanded array: "; for(int i = 0; i < size * 2; i++){ cout << result[i] << " "; } cout << endl; delete[] result; return 0; }```In the main function, an array of size 5 is defined with the values 1, 2, 3, 4, and 5. Then, the arrayExpander function is called with the array and its size as arguments. The result is stored in a pointer variable, which is then used to print the original array and the expanded array. Finally, the memory allocated to the new array is released using the delete[] operator.

An array expander is a function that accepts an int array and the array's size as arguments. The function should create a new array that is twice the size of the argument array.

To create a new array that is twice the size of the argument array, follow these steps:

Step 1: Define the function and declare the input parameters. Then, inside the function, declare a new array with twice the size of the argument array. The new array should have a size of two times the input array size.

Step 2: Loop through the input array, copying each element to the new array. You can use a for loop to loop through the input array and assign each element to the new array.

Step 3: Return the new array as output of the function. The new array, which is twice the size of the input array, should be returned as the output of the function.Here's the code in C++ language:```#include using namespace std; int* arrayExpander(int arr[], int size){ int* newArr = new int[size * 2]; for(int i = 0; i < size; i++){ newArr[i] = arr [i]; } return newArr; } int main(){ int size = 5; int arr[size] = {1, 2, 3, 4, 5}; int* result = array Expander(arr, size); cout << "Original array: "; for(int i = 0; i < size; i++){ cout << arr[i] << " "; } cout << endl; cout << "Expanded array: "; for(int i = 0; i < size * 2; i++){ cout << result[i] << " "; } cout << endl; delete[] result; return 0; }```In the main function, an array of size 5 is defined with the values 1, 2, 3, 4, and 5.

Then, the array Expander function is called with the array and its size as arguments. The result is stored in a pointer variable, which is then used to print the original array and the expanded array. Finally, the memory allocated to the new array is released using the delete[] operator.

Learn more about array on:

https://brainly.com/question/13261246

#SPJ4

What are two examples of using Categories to group VMs? (Choose two.)
A) Protection Policies
B) Security Policies
C) Network Policies
D) Storage Policies

Answers

Two examples of using Categories to group VMs are:

A) Protection Policies

C) Network Policies

Virtual Machines (VMs) can be grouped into categories based on different criteria. Protection policies can be used to group VMs based on their backup, recovery, and disaster recovery needs.

Network policies can be used to group VMs based on their network connectivity requirements, such as those that require public IP addresses or specific firewall rules.

For example, VMs that require frequent backups and disaster recovery testing can be grouped under a "Critical Applications" category with specific protection policies, while VMs that require public-facing access can be grouped under a "Public-Facing" category with specific network policies.

These categories can help simplify management and improve security by ensuring that VMs are properly configured and secured according to their specific needs. So A and C are correct options.

For more questions like Network click the link below:

https://brainly.com/question/28590616

#SPJ11

why do arthitects prefer memory dump to be in base 16​

Answers

Answer:

Memory dump in  base 16​ is human friendly

Explanation:

Hexadecimal numbers are human friendly and hence it is very easy to express the binary number in a more human-friendly as compared to any other base number systems. It is also used to trace errors in the storage

hence, the Architects prefer memory dump to be in base 16​

One way for us to regain custody and control of our data is for?

Answers

One way for us to regain custody and control of our data is for individuals and organizations to prioritize data privacy and actively engage in data protection measures.

To regain custody and control of our data, it is crucial for individuals and organizations to prioritize data privacy. This involves understanding the value of personal data and the potential risks associated with its exposure. Implementing strong data protection measures is essential, such as using encryption techniques, secure storage systems, and robust access controls.

Furthermore, individuals should carefully review and manage their privacy settings on online platforms and avoid sharing excessive personal information. Being mindful of the permissions granted to applications and services can help limit the collection and dissemination of personal data.

Regaining custody and control of our data requires a collective effort. Individuals must be proactive in safeguarding their personal information, while organizations must adopt stringent data protection policies and practices. Additionally, governments can play a vital role by enacting and enforcing privacy laws that prioritize individual rights and data protection. By prioritizing data privacy and actively engaging in data protection measures, we can work towards regaining custody and control of our data, thereby promoting a more secure and privacy-respecting digital environment

To know more about data privacy ,visit:
https://brainly.com/question/30140616
#SPJ11

One way for us to regain custody and control of our data is for us to take full ownership and control of the data that we create, and to use privacy-enhancing technologies to secure our data against unauthorized access or use.

One of the primary ways that we can regain custody and control of our data is to take full ownership and control of the data that we create. This means that we need to be aware of how our data is being collected, stored, and used by the companies that we interact with online, and we need to take steps to protect our data from being accessed or used without our consent.
There are several privacy-enhancing technologies that we can use to secure our data against unauthorized access or use. These technologies include encryption, which can be used to encrypt our data both at rest and in transit, and virtual private networks (VPNs), which can be used to secure our internet connections and protect our data from being intercepted or monitored by third parties.

In addition to these technologies, we can also take steps to limit the amount of data that we share online, and to be more mindful of the privacy policies of the companies that we interact with online. By taking these steps, we can regain custody and control of our data, and ensure that our personal information is being protected against unauthorized access or use.

To know more about virtual private networks refer to:

https://brainly.com/question/29508818

#SPJ11

Other Questions
Please Help!!! I have no idea :( 1. During an experiment in which you are investigating the acceleration changes due to force changes, what value must stay constant during these trials? a. Force b. Velocity c. Acceleration d. Mass2. An animal is walking forward. There is an applied force from the animal of 25 N to the right, a frictional force of 18 N to the left, a force of gravity of 65 N down and the animal is being pushed up by the ground with 65 N. What best describes the motion of the animal? a. The animal will move to the left due to an unbalanced force on the left b. The animal will move to the right due to an unbalanced force on the right c. The animal will move down due to an unbalanced force down d. The animal will move up due to an unbalanced force upwards3. Two rockets are being tested. Both rockets have the same mass. One rocket accelerates at a higher rate than another rocket. What could be true about the difference between the rockets? a. One rocket has more fuel than the other b. One rocket is more streamlined than the other c. One rocket engine produces more force than the other d. One rocket is more badly designed than the other4. According to Newton's Third Law, if a sledgehammer hits a wall with a force of 1000 N, how much force does the wall hit the sledgehammer? a. 0 N b. 500 N c. 1000 N d. - 1000 N Find the rate, or percent, for each of the following items. Round your answers to the nearest 0.1%.Base 72; percentage 12Percentage 28; base 224Base 20; percentage 40Base 44; percentage 99Percentage 126; base 8400 Which scenario is an example of making inferences based on observations?OA. A scientist collects honeybee specimens from each part of the lifecycle and creates a display.OB. A scientist talks to various organizations about the importance ofpreserving habitats vital to the survival of bees.OC. A scientist publishes an article encouraging local farmers to plantwildflowers to benefit wild bee populations.D. A scientist analyzes the feeding patterns of honeybees anddetermines that honeybees prefer nectar over pollen. please help me find c and d, I have already got help finding a and b but I dont understand how to find c and d (02.03 MC)An electron moved from a lower energy level to a higher energy level. What mostlikely happened during the transition? (5 points)1) A random amount of light was released.2) A fixed amount of energy was absorbed.-3) A fixed amount of energy was released.14) A random amount of light was absorbed. Jane and Maria split 135 stickers in the ratio 8:7. How many stickers did each girl get? using the structure of oxazole, draw a mechanism to show protonation of the most basic site in the molecule using hcl as the proton source. draw the products of the proton transfer reaction, including all necessary lone pairs and nonzero formal charges. What's 2+2 adding 3+4+5 Will someone help me please?!?! Why did Jesus denounce the Pharisees more than he did any other group? A. They did not teach Scriptures other than the law of Moses. B. They were hypocrites who taught the law but did not keep it themselves. C. They did not believe in the coming of the Messiah and His kingdom. D. They were very proud and concerned only about appearances, not the heart. More than one answer!!! A man buys a car for rs.80000 and spends rs.20000 more for repairing. He sells it at rs.125000. Find his gain percent. Need additional math help 50 pts You are listening to a sound from a pipe organ that is closed at one end. The pipe is 2 meters long. What is the wavelength of the sound in the pipe? Look through any online paper you want (see examples below) and from the news, list 3 business ideas that you can see people might need! In your submission, for EACH idea: 1. Give the link to the online news article 2. Describe what the need is (1 or 2 sentences enough) 3. Briefly state a business opportunity that you can identify to service this need or issue the national center for health statistics has found that there is a 0.41% chance that an american citizen will die from falling. what is the probability that you will not die from a fall? (round to the nearest hundredth of a percent) At a shooting range, instructors can determine if a shooter is consistently missing the target because of the gun sight or because of the shooter's ability. If a gun's sight is off, the variance of the distances between the shots and the center of the shot pattern will be small (even if the shots are not in the center of the target). A student claims that it is the sight that is off, not his aim, and wants the instructor to confirm his claim. If a skilled shooter fires a gun at a target multiple times, the distances between the shots and the center of the shot pattern, measured in centimeters (cm), will have a variance of less than 0.32. After the student shoots 21 shots at the target, the instructor calculates that the distances between his shots and the center of the shot pattern, measured in cm, have a variance of 0.22. Does this evidence support the students claim that the guns sight is off? Use a 0.01 level of significance. Assume that the distances between the shots and the center of the shot pattern are normally distributed.Step 1 of 3 : State the null and alternative hypotheses for the test. Fill in the blank below.Ha: 2=0.32H0: 2 __?___ 0.32Step 2 of 3: Compute the value of the test statistic. Round your answer to two decimal places.Step 3 of 3: Draw a conclusion and interpret the decision. what the fact family for 4,6,10 I got b 10-6=4 10-4=6 4+6=10 6+4=10 what your answer Which of the following defines the wavelength of a wave? A. the distance between peaks of a wave B. the speed that a wave is passed from particle to particle C. the loudness of waves that travel through the air D. the height of a wave between peak and trough For slaves, spirituals became an act ofrebellion, In what ways were spiritualsused to rebel against the slave master?How were they used to better the slavesthemselves? Be specific. The nurse is caring for a client with allergic rhinitis who takes clemastine daily. what should the nurse teach the client about the action of the medication? Which of the following does not describe a rigid motion transformation?~A. reflecting a figure about a line~B. rotating a figure 270 degrees~C. dilating a figure by a scale factor of 1/2~D. translating a figure 3 units left