Please help fast! Thank you if you can do this.

Please Help Fast! Thank You If You Can Do This.

Answers

Answer 1
I’m sorry I would have helped but I don’t know I’m really sorry

Related Questions

what is full form off computer

Answers

Answer:

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. ... Some people say that COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research.

HeLp PleASeeee
Lyla is using a computer repair simulator. This program can help her

determine the best brand of computer
find the fastest processor
identify the best operating system
learn the different types of hardware

Answers

Answer:   A

Explanation:   Determine the best brand of computer find the fastest processor

Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your
file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network
folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
Documents
Ways to Organize Text - Student Guide
Creation and Management of Lists - Student Guide
Insertion of Symbols Special Characters, and Images - Student Guide
File Upload
Accepted file types: .ppt, .pptx, xls, xlsx, doc, .docx, zip, pdf, .accdb, msg
Add Files
*
Delete All

Answers

answer:


explanation:
whats the question?

Select the correct answer.
What is the coding process commonly also called?
A. testing
B. development
C. debugging
D. refining

Answers

Answer:

B.

Explanation:

Answer:

development

is the correct answer

Will Give Brainiest 75pts

Read the following excerpt from "Did You R e a l l y Just Post That Photo?" by Kristin Lewis: There is no way to know for sure if the photos you posted on F a c e b o o k (you know, the ones that got you grounded) are the reason you were denied [college admission]. But you'll always be h a u n t e d by the possibility that the college found them. The fact is, an increasing number of colleges are looking up applicants on social-media sites like F a c e b o o k and Y o u T u b e. If they don't like what they find out about you, you could miss out on a scholarship or even get rejected. Colleges aren't the only ones scouring the Internet for your name either. Potential employers are looking too. An i n a p p r o p r i a t e photo can cost you a job, whether it's the babysitting gig you're hoping to land next week or the internship you will apply for five years from now. Which of the following is a paraphrase of the bolded lines that could be used for note-taking purposes? Applicants use social media to research potential colleges and jobs. Potential employers are looking up applicants online to help make hiring decisions. Social media can negatively impact a user's college and job prospects. "The fact is, an increasing number of colleges are looking up applicants on social-media sites like F a c e b o o k and Y o u T u b e."

Answers

Answer:

it's not C. Social media can negatively impact a user's college and job prospects. I answered that and I got it wrong. I think it might be B, im like 80% sure, so sorry if I'm wrong

hope this helps!

The option that paraphrase  the bolded lines is Potential employers are looking up applicants online to help make hiring decisions.

Is it right for a potential employer to use the Internet in this way?

The use of social media for any kind of monitoring, investigation, and job decision making by the employer is one that is advisable to all.

Conclusively, It is moral to use information that will help one in terms of job performance and if the employer uses the internet in line with their policies and practices, then there is no issue with it.

Learn more about employers from

https://brainly.com/question/26355886

A large amount of data is stored in secondary storage is it true

Answers

Since it’s more cost efficient, it’s better to store more data in the secondary storage. Yes true!

A large amount of data is stored in secondary storage is true

(50 points) The discipline of computer science focuses on software programming. It includes learning how to develop application software, expert systems, artificial intelligence (AI), websites, embedded coding, and robotics.

A. True
B. False

Answers

False. Soft programming is a one part of Computer science only

Which of the following actions is most likely to raise legal or ethical concerns?
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
Sut
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
с
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license
Q

Answers

Answer:

C. A musician creates a song using samples of a work and then uses a Creative Commons license to publish the song.

Explanation:

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. The copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).

Furthermore, an intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence.

In this scenario, a musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. This is an action that is most likely to raise legal or ethical concerns because he didn't get a license from the other musicians who he used their work.

A Creative Commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.

Write a pseudocode algorithm that uses the For Each loop to display all of the
values in the following array:
Constant Integer SIZE = 10
Declare Integer values[SIZE] = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

Answers

so i’m not sure it’s making me answer a question

Here is a pseudocode algorithm that uses the For Each loop to display all of the values in the given array:

```

declare a constant integer named SIZE and set its value to 10

declare an integer array named values with SIZE elements and initialize it with the values 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10

for each integer value in values do

display the value

end for

```

This algorithm first declares a constant integer `SIZE` and an integer array `values` with `SIZE` elements, initialized with the given values. It then uses a For Each loop to iterate through each value in the `values` array and display it. The loop will execute 10 times, once for each element in the `values` array.

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus

Answers

There are different kinds of virus. The  issue with the client’s computer is Computer virus.

What is computer virus?

A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.

The Examples of computer viruses are:

Worms Trojans , etc.

The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.

Learn more about Computer virus from

https://brainly.com/question/20407534

I need help please.
.

I need help please..

Answers

Answer:

yes

Explanation:

157 > 145

Answer:yes

Explanation:12

True or false: most devices are purely a server or a client.

Answers

Most devices are purely a server or a client is false.

What is the device about?

Most devices can act as both a server and a client. The distinction between a server and a client is often fluid and can change depending on the context.

In a networked environment, a server is a device that provides resources or services to other devices, while a client is a device that requests resources or services from a server. For example, a web server provides web pages to clients (web browsers), while a client computer requests those pages from the server.

However, many devices can act as both a server and a client depending on the situation. For instance, a printer may act as a server when it provides printing services to client computers on a network, but it may act as a client when it receives print jobs from another device such as a computer or mobile device.

Learn more about server from

https://brainly.com/question/30042674

#SPJ1


Meera has created a small program in Python. She wants to store elements of the same data type in an organized
data structure using the Numpy library. To do this Meera should use the Numpy ............... function.

Answers

Answer:

NumPy contains a large number of various mathematical operations.

...

Numpy | Mathematical Function.

Function Description

expm1() Calculate exp(x) – 1 for all elements in the array.

exp2() Calculate 2**p for all p in the input array.

log10() Return the base 10 logarithm of the input array, element-wise.

log2() Base-2 logarithm of x.

what is the full form of PDP​

Answers

Answer:

Plasma display panel (PDP)

Explanation:

Plasma display panel (PDP) is a type of flat panel display that uses small cells containing electrically charged ionized gases or plasmas, to produce an image. PDP consists of millions of tiny gas-filled compartments, or cells, between two panels of glass with parallel electrodes deposited on their surfaces.

What parts of the computer does it not need to function?​

Answers

Fancy lights, mouse, keyboard, you can do fan but the computer will eventually overheat, it need coolant for it to run for a long while

Which of these is correct about data mining?
a. It is a procedure in which knowledge is mined from data.
b. It involves processes like Data Transformation, Data Integration, Data Cleaning.
c. It is a procedure using which one can extract information out of huge sets of data.
d. All of the above

Answers

Answer:

 D. All of the above

All of the following steps, EXCEPT are part of data staging. Data can be transformed, mined, stored in a warehouse, or extracted, among other options. Thus, option A is correct.

What is discovery of test?

To make a discovery, test a theory, or show a well-known truth requires an experiment. Additionally, it is the act of carrying out a scientific experiment, particularly in a lab, in order to make a determination. A set of research study participants who are exposed to a specific manipulation of the independent variable can be included in an experiment.

A particular treatment or treatment level). The replies of the experimental group are also contrasted with those of a control group, other experimental groups, or both. The remaining choices, such as average data, quantitative data, and qualitative data, are not covered by the scientific record.

Therefore, All of the following steps, EXCEPT are part of data staging. Data can be transformed, mined, stored in a warehouse, or extracted, among other options. Thus, option A is correct.

Learn more about Experiment here:

brainly.com/question/11351604

#SPJ2

HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
Directions
In this assignment, you'll use a word processor to create a newsletter.

Choose from one of the following topics for your newsletter:

Science project
Science report
State report
Country report
Biography
Your newsletter should meet these requirements:

Fill one page.
Include the following:
two or three columns
a title
at least three graphics, but not more than six
When you've finished creating your newsletter, remember to spell check and proofread. Then save your newsletter and upload it.

Question # 1
File Upload
Submit your newsletter that includes the following:

two or three columns
a title
at least three graphics, but not more than six

Answers

Column One: Who was Henry Ford?

            Henry Ford was the founder of Ford Motor Company and also the mass producer of the automobile. Henry Ford was born in 1863. At the age of 16, he worked as a machinist apprentice. Later, Henry began to work the family farm while still working on creating steam engines. Henry had a big interest in steam engines, which would later contribute to him building his first working automobile.

Column Two: How did Henry Ford contribute to our society?

           After marrying in 1888, Ford was hired to work for Edison Illuminating Company. His position was an engineer, and Ford began to accelerate his position in the company quickly. After a while, Ford created his first operating vehicle. This was called the "Quadricycle." Ford wanted to improve on his models, so he founded the Company Ford with others. Ford then began to develop methods of mass-producing automobiles to sell to the public. After success in business, he bought the whole company and owned it all by himself. Ford began to mass-produce automobiles. It is said that " The mass production techniques Henry Ford championed eventually allowed Ford Motor Company to turn out one Model T every 24 seconds." Ford passed away in 1945. He decided to give ownership to his son Edsel Ford before he died, but Edsel sadly died before Henry Ford. The Ford company's ownership was given to Ford's grandson, Henry Ford II.

Please re-word so it isn't plagerized

What are some real-life situations where multi-dimensional arrays might be useful?

Answers

If you think, there are many game application where you can use a Multi-dimensional array. If we talk about a game then chess is the first game where rows and columns are used. The Second is the tic-tac-toe game and other board games are there too.

write a program that reads the contents of two text files and compares them in the following ways: it should display a list of all the unique words contained in both files. it should display a list of the words that appear in both files. it should display a list of the words that appear in the first file but not the second. it should display a list of the words that appear in the second file but not the first. it should display a list of the words that appear in either the first or second file, but not both. hint: use set operations to perform these analyses.

Answers

The programme reads two text files and shows terms that are unique in both, in one file but not the other, in both files but not the first, and in either file. set operations are used.

The programme examines the contents of two input text files, creates a collection of unique words by converting each file's words. The desired outputs are then computed using set operations: The list of all unique words in both files can be obtained by combining the two sets of unique words, by intersecting the two sets to obtain the list of words that appear in both files but not the second, and by comparing the second set to the first set to obtain the list of words that appear in the second file but not the first. The list of words that exist in either file but not both is provided by the symmetric difference of the two sets.

learn more about programme here:

https://brainly.com/question/20464919

#SPJ4

Li is trying to locate a PDF file on a thumb drive with a lot of other files on it. What does Li need to look for to find the file? a web browser the file extension the file abbreviation the file derivative

Answers

Answer:

the file extension

Explanation:

Answer:

File Extension is your answer (~^-^)~

Explanation:

the rule governing exponents is that an exponent in the denominator is the same as a

Answers

So, when you have a base with an exponent in the denominator, it is equivalent to having the same base with a negative exponent in the numerator.

The rule states that an exponent in the denominator is the same as a negative exponent in the numerator. Mathematically, this is expressed as:

1 / a^b = a^(-b)

To explain this step-by-step:

1. Identify the exponent in the denominator (b in this case).
2. Move the base (a) to the numerator.
3. Change the sign of the exponent from positive (b) to negative (-b).

Know more about governing exponents here:

https://brainly.com/question/20342290

#SPJ11

Hi, can someone please help me with this? I've been having a lot of trouble with it.

The assignment

Your job in this assignment is to write a program that takes a message as a string and reduces the number of characters it uses in two different set ways. The first thing your program will do is ask the user to type a message which will be stored as a String. The String entered should be immediately converted to lowercase as this will make processing much easier. You will then apply two different algorithms to shorten the data contained within the String.

Algorithm 1

This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".

After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Algorithm 2

This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".

After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Sample Run 1
Type the message to be shortened
This message could be a little shorter

Algorithm 1
Vowels removed: 11
Repeats removed: 2
Algorithm 1 message: ths msg cld b a ltl shrtr
Algorithm 1 characters saved: 13

Algorithm 2
Unique characters found: 15
Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2r
Algorithm 2 characters saved: 8
Sample Run 2
Type the message to be shortened
I will arrive in Mississippi really soon

Algorithm 1
Vowels removed: 11
Repeats removed: 6
Algorithm 1 message: i wl arv in mssp rly sn
Algorithm 1 characters saved: 17

Algorithm 2
Unique characters found: 13
Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2o
Algorithm 2 characters saved: 14
Milestones
As you work on this assignment, you can use the milestones below to inform your development process:

Milestone 1: Set up a program that takes a string input and converts all the letters to lowercase. Start implementing algorithm 1: create a counter variable and iterate through the characters of the String, incrementing this each time a vowel is encountered which is not preceded by a space or is at the start of the String. So at the end of the loop this counts the number of vowels that are not at the start of a word.

Milestone 2: Add further conditions (using else if) in your loop to count any non-vowel characters which appear immediately after the same character. Make a new empty String to hold the shortened message at the start of the code, then add a final else condition in the loop to add all characters which were not vowels or repeated letters to this String. Then print the statements for algorithm 1 using your counts and shortened message.

Milestone 3: Start implementing algorithm 2 by writing code that iterates through the String and checks that each character is not a space and has not already appeared in the word before that point. You will need to use nested loops - an outer loop to iterate through the String characters and an inner loop that looks through the previous characters up to that point - and a flag variable to record if a letter was found in the inner loop. Use a counter variable to count all such "unique" characters in the String.

Milestone 4: Add a second inner loop inside the outer loop from the previous which counts all appearances of a character that passes the tests from milestone 3. Add the character and the number of times it appears to another shortened message String (which should start as blank String). Finally, print the statements for algorithm 2 using your unique character count and shortened message.

Answers

Answer:

Scanner scan = new Scanner(System.in);

System.out.println("Type the message to be shortened");

String msg = scan.nextLine();

System.out.println();

msg = msg.toLowerCase();

String newStr = "";

System.out.println("Algorithm 1");

int vowels = 0;

int repeats = 0;

for(int i = 0; i < msg.length(); i++)

{

if((msg.substring(i, i +1).equals("a") || msg.substring(i, i+1).equals("e") || msg.substring(i, i +1).equals("i") || msg.substring(i, i+1).equals("o") || msg.substring(i, i +1).equals("u")))

{

if(i != 0 && !msg.substring(i -1, i).equals(" "))

{

vowels++;

}

else

newStr += msg.substring(i, i +1);

}

else if(i != 0 && msg.substring(i, i +1).equals(msg.substring(i -1, i)))

{

repeats++;

}

else

{

newStr += msg.substring(i, i +1);

}

}

System.out.println("\nAlgorithm 1");

System.out.println("Vowels removed: " + vowels);

System.out.println("Repeats removed: " + repeats);

System.out.println("Algorithm 1 message: " + newStr);

System.out.println("Algorithm 1 characters saved: " + (vowels + repeats));

algorithm2(msg);

}

public static void algorithm2(String msg)

{

String alg2Msg = "";

int uniqueLetters = 0;

// Iterate through each letter in msg

for(int i=0; i < msg.length(); i++)

{

String ltr = msg.substring(i,i+1);

// Only process if this character is not a space

if(!ltr.equals(" "))

{

/* Check whether this character has already appeared by

* iterating through characters from start up to the current

* letter and using a boolean flag variable.

*/

boolean alreadyUsed = false;

for(int j=0; j<i; j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

alreadyUsed = true;

}

}

/* If this character hasn't already appeared,

* iterate through the rest of the characters

* and count how many times it appears.

*/

if(!alreadyUsed)

{

uniqueLetters++;

int count = 0;

for(int j=i; j<msg.length(); j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

count++;

}

}

alg2Msg += count + ltr;

}

}

} //end for loop

System.out.println("\nAlgorithm 2");

System.out.println("Unique characters found: " + uniqueLetters);

System.out.println("Algorithm 2 message: " + alg2Msg);

System.out.println("Algorithm 2 characters saved: " + (msg.length() - alg2Msg.length()));

} //end algorithm2

}

Explanation:

Here you go!

Pepsi or Coke B)
Or other

Answers

Answer:

Out of Pepsi or Coke, I gotta go with Coke, but in general any soda I would choose Orange Fanta.

Answer:

I prefer cream soda dr. pepper. But out of Pepsi and Coke, I'd choose Coke but I don't really like either.

Explanation:

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

Which are characteristics of interpreters? Select
all that apply.
translate high-level programming language
into binary computer machine language
offer a program run-time that is faster than
when a compiler is used for the translation
make it possible to change the source
program while the program is running
offer a program run-time that is slower than
when a compiler is used for the translation

Answers

Answer:

translation is used for interpretation

Chaîne d’énergie télévision

Answers

energy television channel

What is output by the following code? Select all that apply.

c = 0




while (c < 11):

c = c + 6

print (c)
Group of answer choices

0

2

4

8

10

6

14

16

1

3

12

Answers

Answer:

6
12

Explanation:

c starts with value zero. When the while loop starts 6 is added to the value, so 0 + 6 = 6. then the value is printed on the screen. The while checks if 6 is less than 11, since it's true then the the loop executes again and more 6 is added to the previous value, so now the value is 12. The value is again printed. Then the while checks again if 12 is less than 11, since it's not, then the loop breaks there, and nothing more is printed. So  if there is no line break, the printing should look like:

612
if there is a line break, then its:

6
12

Explain media streaming and buffering process (Include the buffering diagram)​

Answers

Media streaming is the process of delivering multimedia content, such as audio or video, over the internet. Buffering is the process of preloading a certain amount of data to prevent interruptions during playback. When you start streaming a video, the player will begin downloading the data and storing it in a temporary location, known as the buffer. Once enough data has been downloaded, the video will begin to play. The buffer will continue to fill up as the video plays, ensuring that there is always enough data available to prevent buffering. The buffering diagram shows the buffer level over time. When the buffer level drops to zero, buffering occurs.

When you are done reviewing in Print Preview, you have the option to save your document as a new file type. Which file type can be created using Print?

.edu
.exe
.pdf
.ppt

Answers

i believe the answer is .pdf

Answer:

the answer is pdf

Explanation:

It is because the reweing of the print

Computer engineering is a career that......

Answers

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

Other Questions
What is divisional structure in organization? The AID Parcel Service wants to build a new distribution center in Charlotte. The center needs to be in the vicinity of Inerstate-77 and Intersatate-85 interchanges, and the Charlotte International Airport. The coordinates of these three sites and the number of weekly packages that flow to each are as follows:I-77 I-85 AirportX=16 X=35 X=40Y=28 Y=10 Y=18W=26,000 W=12,000 W=10,000Determine the best site location using the center-of-gravity techniqueSubject - Logistics management Which of the following is the correct way to punctuate this statement?A. At age six, Nancy knew she wanted to ice skate; at age sixteen, she was competing in the Olympics.B. At age six, Nancy knew she wanted to ice skate at age sixteen, she was competing in the Olympics.C. At age six, Nancy knew she wanted to ice skate, at age sixteen, she was competing in the Olympics.D. At age six, Nancy knew she wanted to ice skate: at age sixteen, she was competing in the Olympics. what other healthcare firms also face to risks due to changes in government policy A Cu/Cu2+ concentration cell has a voltage of 0.24 V at 25 C. The concentration of Cu2+ in one of the half-cells is 1.4103 M .What is the concentration of Cu2+ in the other half-cell? (Assume the concentration in the unknown cell to be thelower of the two concentrations.) 2 sigfigs. How much energy does it take to raise the temperature of 80g of aluminium 15 degree Celsius What were the factor(s), levels, and treatments for this experiment? Of the following field which would be the most appropriate for the primary key in a customer information table?A: Customer Name B: Customer Number C: Phone Number D: Customer Address The synthesis of structure X occurred in the...A) cytoplasmB) lysosomeC) ribosomeD) nucleus MARKING AS BRAINLIST!!!!! Read the following passage, which contains a shift in tone: I am writing to request a letter of recommendation for an academic scholarship I am currently applying for. As my ex-boss, you're in the perfect spot to talk about how skilled and responsible I am, and it would be awesome if you could fire off a note backing me for this scholarship Which of the following revisions best corrects the shift in tone and maintains a formal style throughout?A- I am writing to request a letter of recommendation for an academic scholarship I am currently applying for. As my former employer you're in a unique position to speak to my skills and responsibility level, and I would be very grateful if you could write a short letter endorsing me for this scholarship.B-I am writing to request a letter of recommendation for an academic scholarship I am currently applying for. As my former employer, you'd be awesome at taking about how skilled and responsible I can be, and it would be Ases if you could endorse me for this important scholarship C-I am writing to request a letter of recommendation for an academic scholarship I'm currently applying for. As my ex-boss you're in a unique position to speak to my math skills in responsibility level, and I would be very grateful if you could write a letter endorsing me for this scholarship D-I am writing to get you to throw together recommendation for an academic scholarship that looks pretty sweet. As my former employer, your in a unique position to speak to my skills and responsibilities that will, and I would be very grateful if you could write a short letter endorsing me for the scholarship Which table represents a linear function? my notes ask your teacher a generator supplies 120 v to the primary coil of a transformer of 55 turns. if the secondary coil has 600 turns, what is the secondary voltage? v Based on the graph, which set shows the solution to log(2x+7)>-2/3x+2? On considre 'expression F = (2x +1)^2 -4.1) Dvelopper et rduire l'expression F.2) Factoriser l'expression F. Which type of epithelial are most concerned with absorption secretion and filtration?A. CuboidalB. Columnar C. SimpleD. All of the above The Cohen family uses up a 1/2 -gallon jug of milk every 3 days. At what rate do they drink milk? **The lines are PARALLEL** 1. Identify a pair of corresponding angles. 2. Identify a pair of alternate interior angles. 3. Identify a pair of alternate exterior angles. 4. Identify a pair of vertical angles. 5. If the measure of angle 2 is 35, what is the measure of angle 6? 6. If the measure of angle 2 is 35, what is the measure of angle 8 a rate constant is 1.78 10 4 dm 3 mol 1 s 1 at 19c and1.38 10 3 dm 3 mol 1 s 1 at 37c. evaluate the arrheniusparameters o the reaction Speed 65 kph; Time 4.5 hours; Distance ? ___ km =If f(x) = x + 1, and g(x) = 2x,thenf(g(x)) = [ ? ]x + [ ]=