inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. true or false?​

Answers

Answer 1

Answer:

True.

Explanation:

A maintenance department refers to a section of an organization that comprises of employees who are saddled with the responsibility of providing timely and professional assistance in repair and servicing of equipments or machineries used by the core departments such as the production department.

This ultimately implies that, the maintenance department provides assistance such as repairs, error-preventive services, etc.

As a rule, end users or technicians should inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. This would help to preserve the tools and equipment and by extension, increasing their life span.


Related Questions

PLEASE HURRY I WILL GIVE BRANLIEST
Which of the following statements is true concerning cloud computing?


- provides storage and processing capabilities at the user’s location

- provides storage and processing capabilities using computers that are owned and maintained by the user

-reduces the cost of storage and processing, allowing smaller businesses to be more competitive

-can only be accessed during business hours

Answers

Answer:

provides storage and processing capabilities using computers that are owned and maintained by user

The statement which is true regarding cloud computing is Provides storage and processing capabilities using computers that are owned and maintained by user .

What is cloud computing?

The on-demand availability of computer system resources, in particular data storage (cloud storage) and processing power, without direct active supervision by the user, is known as cloud computing. Functions in large clouds are frequently dispersed over several sites, each of which is a data center.

Cloud computing often uses a "pay as you go" model, which can help reduce capital expenses but may also result in unanticipated running expenses for users.

Cloud computing depends on resource sharing to accomplish coherence. The on-demand, pay-as-you-go delivery of IT resources over the Internet is known as cloud computing.

Therefore, The statement which is true regarding cloud computing is Provides storage and processing capabilities using computers that are owned and maintained by user .

To learn more about cloud computing, refer to the link:

https://brainly.com/question/11973901

#SPJ2

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Which statement will result in a compile-time error?

A. System.out.println(2/0*0);
B. System.out.println(2/0);
C. System.out.println(2+5);
D. System.out.println(0/0);

Answers

Answer:

A. System. out. println(2/0*0);

hope it help

please mark as brainliest

I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!

2 things are required to make a loop: a. ______________ b. _____________

Answers

Answer:

(not quite sure what the question is asking seems you need, but bare minimum is)

an initial value and an increment or decrement

a condition where the loop stops

Explanation:

assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.

e.g. say you want to add up the numbers from 1 to 10, inclusive

sum = 0

for I is 1 to 10 incremented by 1

sum=sum+I

end of loop

Match the chief contributions of artificial intelligence in robotics with their definitions

Match the chief contributions of artificial intelligence in robotics with their definitions

Answers

Answer:

The chief contribution of philosophy to artificial intelligence is the knowledge of the connections between the two and the understanding of the shared concept.

Explanation

Philosophy and Artificial intelligence has a close scientific connection because they both share concepts such as action, consciousness, epistemology and free will. From the artificial intelligence perspective, theories in philosophy are important in AI as long as they provide the basis of the designs, reasons and plan. The concepts shared in AI con tribute to the realization of the philosophy of artificial intelligence.

Explanation:

Hope this helps:)

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?A. FirewallB. Unified threat management (UTM)C. RouterD. VPN concentrator

Answers

D. VPN concentrator. A VPN concentrator is a specialized device designed to handle the processing requirements of large-scale VPNs, making it the ideal choice for Bob's high-volume VPN.

A VPN concentrator is a device that handles the processing requirements of VPNs. It is designed to efficiently manage and optimize large-scale VPN connections by offloading the encryption and decryption processes from other network devices. This makes it the ideal choice for Bob's high-volume VPN, as it can handle the required processing power while ensuring reliable and secure connectivity. A firewall, UTM, or router may have VPN capabilities, but they are not specialized devices for VPNs and may not have the necessary processing power to handle large volumes of traffic. Therefore, a VPN concentrator is the best device to ensure reliable and secure VPN connections for Bob's network.

Learn more about VPN concentrator here:

https://brainly.com/question/12751054

#SPJ11

Exercise 3.6.9 24 vs “24”

Answers

Answer:

that's good exercise

Explanation:

where is the question ⁉️

Design an experimental method of your choice. 1. Choose a research question 2. Turn it into a hypothesis 3. Identify your dependent and independent variables 4. Name your population 5. Explain how you would choose your sample 6. Describe how you would use an experimental and a control group

Answers

The designed experiment is given below:

Research question: Does drinking green tea improve memory?Hypothesis: Drinking green tea improves memory performance.Independent variable: Drinking green teaDependent variable: Memory performancePopulation: Adults aged 18-65Sample: A random sample of 100 adults aged 18-65 would be selected from the population.What is the rationale for the above response?

Experimental and control groups: Participants would be randomly assigned to either the experimental group or the control group. The experimental group would drink three cups of green tea daily for 4 weeks, while the control group would drink a placebo tea with no active ingredients.

Both groups would take a memory test before and after the 4-week period. The memory test would consist of recalling a list of 20 words after 10 minutes. The mean number of words recalled by each group would be compared using a t-test to determine if there is a significant difference in memory performance between the two groups.

Learn more about experiments at:

https://brainly.com/question/30055326

#SPJ1

Where can i check on an acer chromebook to see what version of java is installed.

Answers

Based on the current situation, to check on an Acer Chromebook to see what version of java is installed, you must "input specific commands on the terminal window and press Enter key."

Java Installation on Chromebook.

Currently, Góogle or Chromebook do not allow Java installation on its operating system. This is due to the security threats that are associated with Java.

However, there are ways to bypass this situation and eventually install Java on your Chromebook if you so desire.

Nevertheless, if eventually, you installed Java successfully on your Chromebook, to check the version, you must "input specific commands on the terminal window and press Enter key."

Learn more about Java Program here: https://brainly.com/question/19485769

Which tab on the Ribbon contains the command to show the slide show from the current slide?

A.Home

B.Slide Show

C.File

D.View

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is B: Slide Show.

You can use the Slide Show tab on the ribbon that contains commands to show the slide show from the current slide. As you click on the Slide Show tab on the ribbon, you see a group of commands name "Start Slide Show", in these group of command, there is an option to start slide show From Current Slide. when you will click this option the slide show will start from your current slide.

Other options are not correct because:

The home tab on the ribbon contains commands related to slide, font, paragraph, editing, etc. File tab contains commands related to opening new or existing presentation documents and saving them, etc. While the View tab on the ribbon has a group of commands related to presentation view, master, zoom, etc. These tabs are used to show the slide show from the current slide.  

When creating a self-join query in Design view, what is the benefit of giving one of the tables an alias? An alias is necessary because the tables will be overwritten or deleted. An alias is necessary because the query will use two sets of primary keys. An alias is helpful because having two copies of the same table can be confusing. An alias is helpful because both tables will be deleted after the query is completed.

Answers

Answer:

An alias is helpful because having two copies of the same table can be confusing.

Explanation:

This is the correct answer yall

Answer:

c

Explanation:

what attack techniques are most likely used to achieve horizontal privilege escalation? (select two)

Answers

Two attack techniques most likely used to achieve horizontal privilege escalation are "password guessing" and "session hijacking."

Session hijacking is a type of cyber attack in which an attacker takes control of a legitimate user's session on a website or application. This can allow the attacker to perform unauthorized actions or access sensitive information as the user, without their knowledge or consent.

The attack typically starts with the attacker intercepting the communication between the user and the website, such as by eavesdropping on a wireless network or by using malware to sniff network traffic. The attacker then steals the session ID, which is a unique identifier that the website uses to keep track of the user's session.

Learn more about Session hijacking: https://brainly.com/question/14657373

#SPJ11

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

What kinds of useful tags might you use to help you organize and find the documents in the future?

Answers

Answer:

you can use color tags(blue for biology) or just simply word tags (biology for biology)

Explanation:

Hope this helps a little.

The useful tags might you use to help you organize and find the documents in the future insertion point.

What is the use insertion point?

If any user or person scrolls the following contents by using the keyboard from one position to another position in the document of the user then, the insertion point moves automatically without any implementation when the user presses any key they want. If the user clicks on the arrow keys then, it also works like that.

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

The PCR stands for 'Patient Care Report.' It is a legal document that needs to have all the procedures done to the patient. This document becomes part of the patients permanent medical record and is used in court in legal cases. It is also used to bill medical expenses.

Therefore, The useful tags might you use to help you organize and find the documents in the future insertion point.

Learn more about insertion point on:

https://brainly.com/question/14274782

#SPJ2

WILL MARK BRAINLIEST!!
What will be displayed after this code segment is run?

luckyNumbers + 15, 33, 25
INSERT lucky Numbers, 2, 13
APPEND lucky Numbers, 3
REMOVE lucky Numbers, 1
DISPLAY LENGTH luckyNumbers

Please explain!! :)

WILL MARK BRAINLIEST!!What will be displayed after this code segment is run?luckyNumbers + 15, 33, 25INSERT

Answers

Answer:

Output: 4

Explanation:

You start with [15,23,25]

You insert 13 at index 2 [15,13,33,25]

Append 3 [15,33,25,3]

Output length of array: 4

The output that will be displayed after the code segment is run is 3

The flow of the algorithm is as follows:

luckyNumbers <- 15, 33, 25:

This above line initializes a list

INSERT lucky Numbers, 2, 13:

The above line replaces the number in the 2nd index with 13.

So, the list becomes 15, 33, 13

APPEND lucky Numbers, 3

The above line appends 3 at the end of the list.

So, the list becomes 15, 33, 13, 3

REMOVE lucky Numbers, 1

The above line removes the number in the 1st index

So, the list becomes 15, 13, 3

DISPLAY LENGTH luckyNumbers

The above line prints the count of numbers in the list i.e. 3

Hence, the output that will be displayed after the code segment is run is 3

Read more about algorithms at:

https://brainly.com/question/24793921

One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios

1. to quickly combine multiple formulas from different cells into just one
2. to instantly compare results when data in numerous cells change to specified values
3. to conduct automatic complex statistical analysis on a range of cells
4. to constrain some cells to certain values so that the wrong data are rejected if entered​

Answers

Answer:

Option B, to instantly compare results when data in numerous cells change to specified values

Explanation:

Scenario setting with in the What If Analysis is used to compare various scenarios with in the same excel sheet. Scenarios has set of values that are saves and updated automatically as the values with in the cell changes. Also the scenarios can be switched.

Hence, option B is correct

thin client computers are a type of portable single-user computers. T/F?

Answers

False.

Thin client computers are not a type of portable single-user computers. In fact, they are quite different in nature.

Thin client computers are lightweight computing devices that rely heavily on network connectivity to access and utilize resources and applications hosted on a central server. They typically have limited processing power, storage capacity, and software capabilities. Thin clients are designed to offload most of the computational tasks to the server, functioning more as terminals to display the output and handle user input. These devices are often used in client-server computing environments, virtual desktop infrastructure (VDI), or cloud computing setups.

On the other hand, portable single-user computers, such as laptops or notebooks, are standalone devices capable of running applications and performing tasks locally. They have their own processing power, storage, and software capabilities, allowing users to work independently without relying heavily on network connectivity.

Therefore, thin client computers are not portable single-user computers but rather devices that depend on network connectivity and server resources for their functionality.

Learn more about single-user here:

https://brainly.com/question/30629886

#SPJ11

The polio virus can cause fever, paralysis, or even death in its human hosts. The relationship between the polio virus and humans is best described as g

Answers

The relationship between the polio virus and humans can be characterized as a harmful and potentially deadly one, as the virus can cause fever, paralysis, and even death in infected individuals.

The polio virus, also known as the poliovirus, belongs to the family of enteroviruses and primarily affects humans. When a person contracts the polio virus, it can lead to a range of symptoms, including fever, headache, sore throat, nausea, and fatigue. In more severe cases, the virus can invade the central nervous system, leading to muscle weakness, paralysis, and even death.

The virus is primarily transmitted through the fecal-oral route, often through contaminated food or water. It can also spread through close contact with an infected person's saliva or mucus. Although the development of polio vaccines, such as the inactivated polio vaccine (IPV) and the oral polio vaccine (OPV), has significantly reduced the incidence of polio worldwide, the virus still poses a threat in some regions where vaccination coverage is low.

Learn more about poliovirus here:

https://brainly.com/question/13945586

#SPJ11

which set of the following vital signs must be repeated after 5 minutes and reported to the provider (regardless of the repeat results) based on the dha dysuria algorithm?

Answers

The set of vital signs that must be repeated after 5 minutes and reported to the provider based on the DHA dysuria algorithm are the blood pressure and pulse.

DHA stands for Dubai Health Authority. The DHA Dysuria Algorithm is a standard treatment plan for urinary tract infections that outlines an evidence-based clinical approach to their diagnosis and management. It is the recommended method of diagnosis and treatment for urinary tract infections (UTIs) by the Dubai Health Authority (DHA). The four primary vital signs are body temperature, pulse rate, respiratory rate, and blood pressure, and they provide an overview of a person's basic physiological condition. Dysuria is defined as a burning sensation or discomfort while urinating. UTIs, as well as other medical issues, may cause dysuria. A urine test can usually confirm if dysuria is caused by a UTI or not. If the urinalysis is negative, more invasive tests may be required to determine the cause of the problem.

Learn more about vital signs visit:

https://brainly.com/question/30363802

#SPJ11

Write a PYTHON program to sort a list of numbers(get the list as input) using selection sort and bubble sort.

Selection sort (5 points)

Pseudo Code: (Each line of pseudo-code converts to one line of code)

Loop from the first element of the list to (n-1 )th element(i)

Store the minimum index as i

Loop from the second element to nth element (j)

Compare the min index element and the current loop element(j)

If the current element is less than the min index

Store this index as the min index

#At the end of this inner loop’s first run the min index will be holding the index value of the smallest item in the list

Swap the ith element with the min index element

Answers

Answer:

c = 1 # global variable

   

def add():

   c = c + 2 # increment c by 2

   print(c)

add()

Explanation:

Why do you think Beyonce's performance of the Negro National Anthem was so impactful at
Coachella?

Answers

Answer:

it showed a movement of black rights and brought awareness to it

What defines the behavior of an object in object-oriented programming ?
A. Class
B. Object by itself
C. Method
D. Device or platform on which the program runs

Answers

In object-oriented programming, the behavior of an object is defined by its methods. So the correct answer is C.

Object-oriented programming is a type of programming paradigm that is based on the concept of "objects." It is a programming paradigm that focuses on the creation of software programs through the use of objects, which are data structures that contain attributes and methods. These methods define the behavior of an object in object-oriented programming.

The programming language is defined by its classes, objects, and methods. Classes are the blueprints for objects that define their structure, properties, and behavior. An object is an instance of a class, with its own unique values for each property. Finally, methods define the behavior of an object by allowing it to perform actions or manipulate data. So, methods are responsible for defining the behavior of an object in object-oriented programming.Thus the correct answer is option-c.

For such  more questions on object-oriented programming:

brainly.com/question/28732193

#SPJ11

as federalism has evolved over the years, more power has gone to the federal government . in the modern era, new types of federalism has emerged.

Answers

Over time, power has shifted towards the federal government in federalism. New types of federalism have emerged in the modern era.

The statement is true. Over the years, there has been a trend of increasing power shifting towards the federal government in the United States. This can be observed through the evolution of federalism, which is the distribution of power between the federal government and the states. In the modern era, new types of federalism have emerged as a result of various factors such as changes in societal needs, legal interpretations, and political dynamics. One example of a modern type of federalism is cooperative federalism, which emphasizes collaboration and partnership between the federal government and the states in addressing complex policy issues. These new types of federalism often involve a greater degree of federal involvement and intervention in areas that were traditionally considered within the jurisdiction of the states. This can be seen as a response to the challenges and complexities of a rapidly changing society, as well as the need for a unified approach to address national issues.

learn more about federalism here:

https://brainly.com/question/8305583

#SPJ11

The fundamental rule for testing functions requires that every function be tested in an already fully tested and debugged program. How can this be accomplished? a. Impossible! The main function must have all the functions it calls attached to get it to compile and run properly. b. The main function is tested with stub functions replacing each function. c. Write drivers for the stub functions to test them. d. Add each non-stub function in turn for testing. e. Write drivers for the function implementations one at a time to test them independently.

Answers

Option c, write drivers for the stub functions to test them, is the most appropriate answer.

How can this be accomplished?

This approach is commonly known as unit testing and is a crucial step in ensuring that a program operates correctly. This involves creating a separate piece of code that calls and tests each function individually before integrating them into the main function. By doing so, any errors  can be identified and resolved before they affect the overall functionality of the program. Once each function has been thoroughly tested, they can be integrated into the main function and tested as a whole to ensure the program operates as intended. This method is a fundamental rule for testing functions and helps to ensure that a program is fully tested and debugged before being released to users.

Using this method of testing functions is a fundamental rule for ensuring that a program is fully tested and debugged before it is released to users. It is important to note that the testing process should be ongoing and should continue throughout the development process to ensure that any changes made to the program do not introduce new errors or issues. By following these testing principles, developers can create software that is reliable, efficient, and meets the needs of its users.

To know more about test functions visit:

https://brainly.com/question/13384053

#SPJ11

refer to the exhibit. what can be determined about the contents of the ite user home directory? the octal representation of the permissions for january is 755. the data files in this user directory contain no data. all users have read, write, and execute permissions to files within the directories. there are two data files and three directories contained in this user directory.

Answers

From the given exhibit, we can determine several things about the contents of the "ite" user home directory.Firstly, there are three directories present within the "ite" user home directory.

These directories are "Desktop", "Downloads", and "Documents". Additionally, there are two data files in this user directory, which are not specified by name or file type.

Secondly, the octal representation of the permissions for the "January" file is 755. This means that the owner of the file has full permissions, including read, write, and execute. The group associated with the file, as well as all other users, have read and execute permissions only.

Lastly, we are told that all users have read, write, and execute permissions to files within the directories. This indicates that the permissions for the directories within the "ite" user home directory are likely set to allow full access to all users.

Overall, we can infer that the "ite" user home directory contains several directories and files with relatively permissive access permissions. However, without additional information, we cannot determine the specific contents or purposes of the directories and files within the directory.

To know more about directory click this link -

https://brainly.com/question/30272812

#SPJ11

you need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. what's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Answers

You've certainly seen walkie-talkies in use several times, perhaps with the waitress at the restaurant where you most recently had supper or the manager of your local grocery.

What is radio?

Two-way radios have been utilized for communication over both small and very large distances over the past 20 years. However, what precisely is a walkie-talkie.

A radio, commonly referred to as a walkie-talkie, is used to connect persons who are separated by distance. Actually, it's a portable gadget that can be used.

A radio often comes with two rotary knobs. On the front of this, there are occasionally keys. The channel switch and the volume switch serve as the primary functions. Typically, the volume is set from 0 to 100 with the volume switch off first. Although most channel switches have 16 channels, some only have 3 to 6 channels programmed.

Therefore, You've certainly seen walkie-talkies in use several times, perhaps with the waitress at the restaurant where you most recently had supper or the manager of your local grocery.

To learn more about radio, refer to the link:

https://brainly.com/question/866150

#SPJ1

Why do people buy stock/invest in netflix and Amazon?
300+ words each please

Answers

The main reason why people buy stocks/invest in Netflix and Amazon is that they see the potential for significant returns on their investment in the future. These two companies have shown consistent growth and have become leaders in their respective industries. Therefore, investors believe that these companies will continue to generate significant profits in the future, which will translate into higher stock prices.

Netflix and Amazon have become some of the most popular and successful companies in the world. They both have developed a strong brand image and have been successful in creating innovative and popular products and services. For instance, Amazon is the world's largest online retailer, while Netflix has become a leading streaming platform for movies and TV shows. These two companies have developed a competitive advantage over their peers, which makes them a safe bet for investors.

Furthermore, investors have recognized that Netflix and Amazon are operating in markets that have significant growth potential. For instance, the streaming industry is growing rapidly as more people move away from traditional cable and satellite TV and move towards on-demand content. The same is true for online retail, as more people shop online instead of going to physical stores. As a result, investors believe that both companies have significant growth potential in the future, which makes them attractive investments.

Finally, both Netflix and Amazon have a strong track record of financial performance. They have consistently reported strong revenue growth and have demonstrated profitability over the years. This gives investors confidence that they are investing in companies that are financially stable and will continue to generate strong returns for their shareholders.

In conclusion, people buy stocks/invest in Netflix and Amazon because they see the potential for significant returns on their investment in the future. These two companies have developed a competitive advantage, operate in growing markets, and have a strong financial performance. Investors believe that these factors will translate into higher stock prices, making them a good investment opportunity.

Know more about stocks/invest in Netflix and Amazon, here:

https://brainly.com/question/29238524

#SPJ11

During which phase of the software development process are developers most likely to log bugs?

Answers

Answer:

During the Evaluation phase of software development process are developers most likely to log bugs.

Hope this helps! :)

Arrange the steps to create a database in the correct order.
Save the database.
Determine field names.
Access the relevant DBMS.
Analyze the tables you require.
Define data types for fields.
+
+

Arrange the steps to create a database in the correct order. Save the database.Determine field names.Access

Answers

Answer:

Analyze the the tables you require

Determine field names

Access the relevant DBMS

Define data types for fields

Save the database

For database first analyze the table required, determine field names, access the relevant DBMS, define data types for fields, and finally, save it.

What is a database?

A database is a well-organized collection of documents or data that is typically stored electronically in a computer system. A database management system is usually in charge of a database (DBMS).

Database software simplifies data management by allowing users to save data in a structured format and then access it.

It typically has a graphical interface to assist in the creation and management of data, and in some cases, users can build their own databases using database software.

A database system stores vital business data: the data, when analyzed, becomes valuable information about a company and aids in decision-making.

Analyze the required table, determine field names, access the relevant DBMS, define data types for fields, and save the database.

Thus, this is order for steps to create a database in the correct order.

For more details regarding database, visit:

https://brainly.com/question/6447559

#SPJ5

which statements describe OneDrive? Multiple choice


Possible Answers:


1. OneDrive is available to subscribers of office 365.


2. The Onedrive Browser allows access to Excel online.


3. Onedrive is a storage location on your personal computer.


4. New documents can be created and uploaded on OneDrive.


5. OneDrive ensures that changes in files are updated in the computer and the cloud.

Answers

Answer:

1, 2, 4, 5.

Explanation:

Believe me, it's true.

Other Questions
The Taliban believe girls should not be educated, or for that matter, even leave the house. In Swat they worked viciously to make sure residents obeyed.But this was not how Malala decided she would live. With the encouragement of her father, she began believing that she was stronger than the things that scared her."The Taliban have repeatedly targeted schools in Swat," she wrote in an extraordinary blog when she was empowered to share her voice with the world by the BBC. Pakistans Malala,Ashley FantzBased on the passage, which three effects did the setting have on Malala Yousafzai?The setting affected her decisions.The setting affected her relationship with her father.The setting affected her ability to get an education.The setting affected what she wrote in her blog.The setting affected her feelings about Swat. if an adult is chosen randomly from the town, what is the probability that they have a high school degree or some college, but have no college degree? round your answer to the nearest thousandth. which similarity statement best fits this picture what is the probability that a randomly selected group of 5 females have a mean shoe size bigger than 10.5 PLS HELP ANYTHING HELPS How could a model that you created previously in this course have been more efficientlyproduced as an assembly? mutation plays a large role in the microevolution of bacterial populations. why? Simon bought 5 boxes of cereal c and 2 gallons of nonfat milk m for $20.08. Terri bought 3 of the same boxes of cereal b and 3 gallons of nonfat milk m for $18.87. Based on this information, what is the cost of one gallon of milk?Answer Choices:$2.50$3.79$3.75$3.50 The energy that fuels food webs begins as light energy from the sun. True or False write y=-5x2+x+ 1 in vertex form Define Boolean logicplease detail this as much as you can Explain 3 dangers faced by mountain men Company value chain activities that ______ should generally not be outsourced.are located domesticallyare valued by its customersare critical to its competitive advantageare not significant cost drivers (THANKING AND LIKING FIRST CORRECT ANSWER)Use rounding to estimate 73x28Use rounding to estimate 58x32Use rounding to estimate 23x42Use rounding to estimate 94x56 Find the zeros of the functions h (x) = 4x squared +36 How many circles are drawn? Ms. Bridgewater is making tie dye shirts with her students. Each gallon of hot water needs 2/3 cup of tie dye. If Ms. Bridgewater has 7 1/4 cups of tie dye, how many batches of solution will she be able to make? Trapezoid W Z Y X has equal angle measures at angle X W Z and W Z Y. Sides X W and Y Z are equal. Which statements are true regarding the symmetry of the isosceles trapezoid? Check all that apply. which tests do the courts apply to determine when unequal treatment is legal? Assume that a division of MN Company has a 10% return on sales, income of $10,000, and an investment turnover of 4 times, divisional investment is O 1.$10,000 2. $25,000 3. $40,000 4.$100,000