Something you want to learn in Computer Science for Innovators and Makers is…

Answers

Answer 1

Answer:

that is classified information

Explanation:

that is a weird question

Answer 2
Nothing, I would like to quit school.

LOL

Related Questions

The pre-built JavaScript function that provides the date and time is called:

A.
Now.

B.
Date.

C.
Time.

D.
DateTime.

Answers

Answer: The answer is B.

Explanation: Acording to the JS documentation that's the class where you can get that information as well as invoke other methods such as `now()` and `getTime()` on.

b is the answer date

How do the text feature help on the text?

Answers

Answer:

Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.

Explanation:

Here is your answer
How do the text feature help on the text?

Which are challenges for study groups? Check all that apply.

a) lack of focus during meetings
b) too many new perspectives
c) problems with communication
d) lack of commitment to duties
e) overly motivated participants

Answers

A and c are the best choices

Answer:

a,b,d should be correct

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number without a decimal?

float()
int()
print()
string()

Answers

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

B is the answer lol yeah I had that some answer

If you want the words “My puppy is a poodle” to appear in the interpreter. What code should you use?

A.
create "My puppy is a poodle"

B.
execute ("My puppy is a poodle")

C.
print("My puppy is a poodle")

D.
print "My puppy is a poodle"

Answers

Answer: Probably C


(also, C and D say the same thing)

I think It’s probably c :)

When using correct ergonomic technique be sure to _____.

(A.)Position your wrists so they are angle up while typing.
(B.)Keep your arms comfortable at your side forming a 90° angle with your upper arms.
(C.)Position the keyboard three feet in front of you so that you stretch for the keys.
(D.)Adjust the keyboard height so that your shoulders are stiff and your arms are away from your sides.

Answers

Answer: The answer is C

Answer:

I think The answer is c

Explanation:

Its the most comfertable way to use ergonomic technique

As of right now, I’m working on a blender model for my programming class. However, I still cannot figure out how to add a leather texture to the glove model I made

Answers

just do it duh its not that hard dummy
Believe in yourself and go to hobby lobby and get leather and cut and paste lol hope this helps!!!

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:

a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:

Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age

Date: [Insert Date]

Byline: [Your Name]

[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.

The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.

In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.

One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.

According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.

During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.

On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.

After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.

The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.

As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.

In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.

I hope this helps. Cheers! ^^

Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST

Answers

send it through the mail

Answer:  Be prepared to provide the following information:

1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)

2.Name of restaurant

3.Location/address of the restaurant

4.Date of incident

5.Nature of complaint

If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.

Explanation

Giving 20 points cause its a large question.Help Me with my Coding Work: You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.
What are the four main components of programming languages, and why is each one needed?
Give your own examples for how list and dictionary data structures could keep track of some common information you might need. Your examples should be different from the ones in the unit.
Why would a programmer use a software artifact, such as a flowchart?
Finish identifying the data types of each of the following pieces of data:
TABLE Identify data types
Data Data Type
“Hermione”

String

13.5

-6

“18 Mingle Lane”

False

-20.4

“Bonjour”

12345

Answers

Answer:In python, when we declare a float or an integer, we declare like below:

a=2 for int

b=2.0 for float

And when we do this operation in c++, we write

int a;

float b;

And when we write this in Pascal, we use:

a: integer

b: float

and we assign value like:

a:=2

b:=2.0

And you should know that if you will not follow the syntax, then the compiler or the interpreter will throw syntax error, and you will not be able to run your program. The syntax is very important.

Explanation:

the answer is your tens js

THE FIRST PERSON THAT ANSWER THIS QUESTION GETS 18 POINTS AND BRAINLY!!!!!

You are creating an online form for a streaming music service. Users will need to enter at what point they want their contract to end. Which data type should you use?

Boolean

char

date

string

Answers

Answer:

data

Explanation:

How prepared are you to lead a Internet-based project? Check all that apply.
I have used an online chat application.
I enjoy solving problems or starting new activities.
I have met with other students online using a web-based conferencing service.
I am comfortable navigating my way around the Internet.
I am an excellent communicator.
I know how to create and use slide-based presentation software.

Answers

Answer:

I have used an online chat application.

I enjoy solving problems or starting new activities.

I have met with other students online using a web-based conferencing service.

I am comfortable navigating my way around the Internet.

I am an excellent communicator.

I know how to create and use slide-based presentation software.

Explanation:

Answer:

I have used an online chat application.

I enjoy solving problems or starting new activities.

I have met with other students online using a web-based conferencing service.

I am comfortable navigating my way around the Internet.

I am an excellent communicator.

I know how to create and use slide-based presentation software.

Explanation:

Which is a primary principle of the Rapid Application Development methodology?

One of the primary principles of the Rapid Application Development methodology is early prototyping of the [ BLANK, WRITE ANSWER HERE ] in the development cycle.

Answers

Early prototyping of releases & iterations in the development cycle .

In late 2021 and early 2022, why were computer science experts telling everyone using Java-based applications to update log4j?

A new release of log4j had incredible features that would help every Java application.
Every time log4j was updated, the experts received a commission.
Log4j was discovered to have a serious security vulnerability.
The vendor of log4j wanted to find out how many copies were in use.

Answers

Answer:

Computer science experts were advising everyone using Java-based applications to update log4j because it was discovered to have a serious security vulnerability, which could be exploited by attackers to take control of affected systems. This vulnerability, known as CVE-2021-44228 or Log4Shell, allowed attackers to remotely execute code on a targeted system by sending a specially crafted request to the application. Updating to the latest version of log4j with the patch for this vulnerability was therefore crucial for ensuring the security of Java-based applications.

Explanation:

Computer science experts were advising everyone using Java-based applications to update log4j because it was discovered to have a serious security vulnerability, which could be exploited by attackers to take control of affected systems.

What is Classpath ?

Log4j2 is an open source logging system for Java applications. It is a successor to Log4j 1.x and provides improved performance and reliability. In order to use Log4j2, it needs to be configured properly.

When Log4j2 is not configured properly, it will display the error message "error statuslogger log4j2 could not find a logging implementation. please add log4j-core to the classpath. using simplelogger to log to the console...". This error occurs when Log4j2 cannot find its logging implementation. This means that the necessary libraries, such as log4j-core, have not been added to the classpath.

Therefore, Computer science experts were advising everyone using Java-based applications to update log4j because it was discovered to have a serious security vulnerability.

Learn more about Computer science on:

https://brainly.com/question/20837448

#SPJ2

The image shows a line graph.

A line graph shows a line along an x and y axis.

Which scientist is most likely to use this visual aid in a presentation about ocean temperatures?

one who wants to show the process of taking ocean temperatures
one who wants to show the locations of where ocean temperatures were taken
one who wants to show an image of where certain temperatures are found in an ocean
one who wants to show measurements of ocean temperatures in one spot over time

The image shows a line graph.A line graph shows a line along an x and y axis.Which scientist is most

Answers

Answer:

its d did the test

Explanation:

Answer:

D) one who wants to show measurements of ocean temperatures in one spot over time

Explanation:

Hope this helps! :)

Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your own words. Also, try the exercise to expand your understanding.

Answers

Answer:

We don't know what you leaned.

But, I'll do it anyway.

1. Getting id's from html content.

2. Getting classes from html content.

3. changing text fonts.

4. animation.

5. Getting all of one element type from html content.

Explanation:

Start from here.

Answer:

dude, please do it yourself. you are technally cheating, sorry

Explanation:

REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER

REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER

Answers

I’m not sure what you’re asking, what about a presentation? Reply back to this and lmk so I can figure it out for ya!!
Answer:
2-Photographs allow people to see visual evidence of events, view nature in artistic ways, and tell stories with little to no words.
3-Successful photojournalists need to understand that the point of photography is to tell a story in an interesting way that will entertain and draw viewers in.
4-Photography connects people all around the world. A large group of people could view the same photo, and evaluate it in a number of different ways. These people can converse and tell each other about what they can take from the photo, and how their perspectives change the meaning of the photo.

The two that I didn't answer were up to your own opinion, so I'll let you try to figure them out yourself with the information that I gave you. :)

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

Iman manages a database for a website that reviews movies. If a new movie is going to be added to the database, what else will need to be added?

a PDF

a table

a file

a record

Answers

The answer would be “a record.”
Correct it is a record

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

Name three computer company's.

Answers

Microsoft company, acer company, and lenovo company
Dell, HP, and Microsoft

what word means an unexpected event that has undesirable results.

Answers

Answer:

An accident is an unexpected event that has undesirable results

Answer:

An accident????

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

ANSWER ASAP PLEASE! I'M TIMED <3
Which of the following are forms of repetitive strain injury? Choose 3 options.

neck spasms

concussion

overexertion

back issues

carpal tunnel syndrome

Answers

please give brainliest

Answer:

The three options that are forms of repetitive strain injury are:

Neck spasms: Repetitive movements or sustained poor posture can strain the neck muscles, leading to spasms and discomfort.

Overexertion: Overexertion refers to excessive or repetitive use of certain muscles or body parts, which can result in strain and injury over time.

Carpal tunnel syndrome: Carpal tunnel syndrome is a specific repetitive strain injury that affects the hands and wrists. It occurs when the median nerve, which runs through the carpal tunnel in the wrist, becomes compressed or irritated due to repetitive hand and wrist movements.

Answer: neck spasms, carpal tunnel syndrome, overexertion

Explanation:

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

Hey, how do we get our warnings removed?

Answers

Answer:

post good answers

Explanation:

There is warnings?????

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

Other Questions
Transcribe the directions lantanoprost 0.005% ophthalmic solution sig. Ii drops o.u. daily h.s. Which sentence is the best example of foreshadowing?OA. Carmen woke up with a headache and decided to call in sick towork.OB. Even though it looked like rain, Carmen didn't take her umbrella towork.C. Carmen looked forward to going to her challenging job every day.OD. Carmen got ready for work and left on time to catch the train.SUBMIT Which of the following is true about Preamble mcq?It is not enforceable is a court of lawThe Supreme Court has recently ruled that it is not a part of the ConstitutionIt has been amended twiceAll the above are correct The least squares regression equation for the data below is y = 13.61x + 150. 87. Fat (g) 6 7 10 19 20 27 36 Calories 276 260||220||388 430 550|633 Using the equation, calculate the residual value for 10 grams of fat. 0-66.97 66.97 286.8 -285.8 Is 1, 15/3, 17/, a Pythagorean triple? Explain. What is humaneness and why does Confucius consider it to be so important? Which phrase best describes communism? A. Some economic freedom for businesses B. Less government ownership of businesses C. More economic freedom for businesses D. More government ownership of businesses a certain superconducting magnet in the form of a solenoid of length 0.64 m can generate a magnetic field of 4.5 t in its core when its coils carry a current of 80 a. the windings, made of a niobium-titanium alloy, must be cooled to 4.2 k. find the number of turns in the solenoid.80871 over the last 10 years, angelica has become more agreeable, conscientious, and emotionally stable. what principle best describes angelicas development? group of answer choices En qu lugar del mundo se form u origin el idioma espaol In the figure below, m angle1= 5x and m2=(x-18).Find the angle measures. How is cognitive therapy different from rational-emotive therapy?. Which factor could be part of the function so that the function is increasing on the left and decreasing on the right? Select all that apply. f(x)=(x+4)(x5)Select all that apply:0.83x(x+5)(2x+1)(3x2+5) in gymnosperms, megaspores develop into __________.View Available Hint(s)for Part Apollen grainsovulate conesfemale gametophytesmale gametophytesfemale sporophytes Calculate the value of this expression by writing the decimal factors as fractions, then writing their product as a decimal. Show your reasoning. (0.01)(0.02) this is 6th grade math NEED HELP ASAP!!!!!!!!!!!!Part A. In his Fourth of July speech, Douglass imagines someone in the audience who believes he should argue and persuade more and criticize less in order to serve his cause more effectively. Which answer choice best summarizes Douglasss response to this individual?1PointsA He claims that the Declaration of Independence and the Bible present the best arguments against slavery.B He claims that the reasons to oppose slavery are so obvious that no argument is needed.C He states that slaveholders are too stubborn to be persuaded by his arguments.Part B. Which passage from the speech best supports the answer to Part A?1PointsA " and yet not one word shall escape me that any man who is not at heart a slaveholder, shall not confess to be right and just."B "To drag a man in fetters into the grand illuminated temple of liberty were inhuman mockery."C "But, I submit, where all is plain, there is nothing to be argued." Write the polynomial as a product: 15x^3z+30x^218yz9xyz^2Pls help Mrs. Lodge is having new floor tiles installed in her kitchen. She is paying the flooring company $170.25 for the tiles and an installation fee of $3.78 per square foot. She receives a total bill of $586.05 for the job. Which equation could be used to find the number of square feet (x) of tile Mrs. Lodge is having installed? what fraction of 4000 is 800? Compute the expected return given these three economic states, their likelihoods, and the potential returns: (Round your answer to 2 decimal places.) Economic State Fast growth Slow growth Recession Probability Return 0.19 0.42 0.39 37% 20 -13 Expected return 1%