spell-check programs do not always flag all misspelled words in an essay. select one: true false

Answers

Answer 1

Whether spell-check programs do not always flag all misspelled words in an essay is: True. Therefore, it is important to proofread your work carefully in addition to using spell-check.

Correct answer is, True.

Spell-check programs are not foolproof and may miss misspelled words if they are homophones (words that sound the same but are spelled differently), have typos or are not in the program's dictionary. Therefore, it is important to proofread your work carefully in addition to using spell-check.

Spell-check programs can sometimes miss errors due to factors such as homonyms (words that sound alike but have different meanings), unusual words, or typographical errors that create another valid word. Therefore, it's important to also proofread your work manually in addition to using a spell-check program.

To know more about programs visit:

https://brainly.com/question/11023419

#SPJ11


Related Questions

Which built-in sorting options are available in the Navigation pane?
O by viewed date or by object type
O by object type or by modified date
O by object importance or by viewed date
O by created date or by object importance

Answers

Answer:

B

Explanation:

The built-in sorting options that are available in the navigation pane are by object type or by modified date.

What do you mean by navigation pane?

Navigation is found on the left side of the File Explorer window that includes all of the drives, history, desktop, and downloads.

The built-in sorting options are available in the navigation pane by object type or by modified date.

Therefore, B is the correct option.

Learn more about the Navigation pane here:

https://brainly.com/question/14966390

#SPJ2

What’s the answer to thisss!!!

Whats the answer to thisss!!!

Answers

Answer:

Explanation:

Not u going to flightline upper academy

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003
#include
#include
int GetMonthAsInt(char *monthString) {
int monthInt;
if (strcmp(monthString, "January") == 0) {
monthInt = 1;
}
else if (strcmp(monthString, "February") == 0) {
monthInt = 2;
}
else if (strcmp(monthString, "March") == 0) {
monthInt = 3;
}
else if (strcmp(monthString, "April") == 0) {
monthInt = 4;
}
else if (strcmp(monthString, "May") == 0) {
monthInt = 5;
}
else if (strcmp(monthString, "June") == 0) {
monthInt = 6;
}
else if (strcmp(monthString, "July") == 0) {
monthInt = 7;
}
else if (strcmp(monthString, "August") == 0) {
monthInt = 8;
}
else if (strcmp(monthString, "September") == 0) {
monthInt = 9;
}
else if (strcmp(monthString, "October") == 0) {
monthInt = 10;
}
else if (strcmp(monthString, "November") == 0) {
monthInt = 11;
}
else if (strcmp(monthString, "December") == 0) {
monthInt = 12;
}
else {
monthInt = 0;
}
return monthInt;
}
int main() {
// TODO: Read dates from input, parse the dates to find the ones
// in the correct format, and output in m/d/yyyy format
return 0;

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Complete main() to read dates from input, one date per line.

Writting the code:

import java.util.Scanner;

public class LabProgram {

   public static int get_month_as_int(String m){

       String months[] = new String[]{

               "January",

               "February",

               "March",

               "April",

               "May",

               "June",

               "July",

               "August",

               "September",

               "October",

               "November",

               "December"

       };

       for(int i = 0;i<months.length;i++){

           if(months[i].equalsIgnoreCase(m)){

               return i+1;

           }

       }

       return 0;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String userInput = scan.nextLine();

       while (!userInput.equals("-1")){

           try {

               String splits[] = userInput.split(" ");

               String month = splits[0];

               String day = splits[1];

               day = day.substring(0, day.length() - 1);

               String year = splits[2];

               int monthNumber = get_month_as_int(month);

               if(monthNumber!=0 && !day.equals("") && !year.equals(""))

                   System.out.println( monthNumber + "/" + day + "/" + year);

               userInput = scan.nextLine();

           }

           catch (Exception ex){

               userInput = scan.nextLine();

           }

       }

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March

Hardware and software for computers åe complements. a) Discuss the effects on the equilibrium price and quantity in the software market, when the price of computer hardware falls. (Please write down the discussion and also show the effects in diagrams.) 2. The market for DVDs has supply curve and demand curves given by P=2Q
S
and P=42−Q
D
, respectively. Calculate the equilibrium price and quantity (P

and Q

) of the DVD market.

Answers

In the software market, when the price of computer hardware falls, the equilibrium price and quantity will be affected. The demand for software is positively related to the demand for hardware, as they are complements. As hardware becomes cheaper, more people will be willing to purchase computers, leading to an increase in the demand for software.

When the price of computer hardware falls, it becomes more affordable for consumers to purchase computers. This reduction in hardware prices leads to an increase in the demand for computers. As a result, the demand for software, which complements the use of computers, also rises. This shift in demand will cause the demand curve for software to shift to the right, indicating an increase in demand at every price level.

In the diagram, the initial demand curve for software (D1) intersects with the supply curve (S) at the equilibrium point (E1), determining the initial equilibrium price (P1) and quantity (Q1) of software. When the price of computer hardware falls, the demand curve for software shifts to the right, from D1 to D2. The new equilibrium point (E2) is determined by the intersection of the new demand curve (D2) and the supply curve (S), resulting in a higher equilibrium price (P2) and quantity (Q2) of software.

Overall, when the price of computer hardware decreases, it stimulates the demand for software, leading to an increase in both the equilibrium price and quantity in the software market. The complementary relationship between hardware and software plays a crucial role in determining the effects of changes in hardware prices on the software market.

Learn more about software here:

https://brainly.com/question/20532745

#SPJ11

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

In a file called pp8d.cpp, write a function that has three parameters, all C-strings. The first parameter is a phrase with an asterisk in it such as "I * cats!". The second parameter is a word such as "love" that will be put in place if the asterisk. The third string will hold the new phrase, "I love cats!". Follow these steps:
- Initialize the third parameter to the empty string
- Find the index where the asterisk is in the first string
- Use either strncat or strncpy to create "I " in the third parameter. Recall that strncpy does NOT put the null character at the end of the string it creates.
- Use strcat to concatenate the word to the third parameter so it contains "I love"
- Use srtcat to concatenate the rest of the first parameter to the third so that it now contains "I love cats!"
- Write a main driver that asks the user for a phrase with an asterisk and a word. It calls the function then prints the new phrase.
) Execute your program and compare its output to the Expected Output column.

Answers

The function in pp8d.cpp takes three parameters, two C-strings and a phrase with an asterisk. It uses strcat to concatenate the word in the second parameter to the third parameter, replacing the asterisk in the phrase with the word, resulting in a new phrase. The main driver asks the user for input and calls the function to print the new phrase.

To explain further, the function uses the strcat function from the string.h library to concatenate the word to the third parameter, resulting in "I love cats!". The function then returns the new phrase. In the main driver, the user is prompted to enter a phrase with an asterisk and a word, which are passed as arguments to the function. The function is called and the new phrase is printed to the console. This program is a simple example of string manipulation and function calling in C++.

Know more about pp8d.cpp takes three parameters, here:

https://brainly.com/question/29094776

#SPJ11

in the function =sum(b2:b6), which part of the function is the argument?

Answers

In the function =sum(b2:b6), b2:b6 is the argument in the function.

What is an argument?

A way for you to give a function more information is with an argument. The data can then be used like a variable by the function while it executes. To put it another way, you can enter information as a parameter or argument when you build a function.

Arguments are variables that are only used in that particular function.When calling the function, you must specify the argument's value.Your applications can use more information by using function arguments.

To learn more about an argument, use the link given
https://brainly.com/question/12947158
#SPJ1

1. provide at least 3 properties and 3 methods of the object computer.

OBJECT COMPUTER ↙ ↘

PROPERTIES 1. 2. 3.

METHODS 1. 2. 3

2. provide at least 3 properties and 3 methods of the object computer.

OBJECT Car ↙ ↘

PROPERTIES
1. 2. 3.

METHODS
1. 2. 3

Need help maam/sir thanks in advance 5stars for good answer

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, it is required to provide 3 properties and methods of the object computer.

As you know that in programming the properties are the features of the object and methods are the behaviors or actions performed by the object.

So the properties of object computer are:

computerModelcomputerManufacturercomputerCaseColorcomputerScreenSize

and the methods of object computer are:

perfromCalculation()powerOnButton()chargeBattery()buttonClick()

.........................................................................................................

2.

The properties of the object car are given below

carModelcarManufacturerNamecarColor

The methods of the object car are given below:

applyBreak()startEngine()changeGear()

the choice between developing versus purchasing software often is called a ____ decision.

Answers

The choice between developing versus purchasing software often is called a "make-or-buy" decision. This decision-making process involves identifying whether it is more profitable or efficient to create a product in-house or purchase it from an external vendor.

A business that has a capable team of developers and a big budget might opt for developing the software in-house. This allows the company to customize the software to their specific needs and retain control over the product's development process.

On the other hand, purchasing software from an external vendor may be more cost-effective in some cases. This is especially true for small or medium-sized companies that may not have the resources to develop software in-house. Purchasing software from an external vendor may also reduce the development cycle time and improve the product's quality.

To conclude, whether to develop or purchase software is a crucial decision that should be made based on various factors. This decision can have significant implications for a company's profitability, competitiveness, and long-term growth. Therefore, it is essential to assess the situation and evaluate all possible options before making a decision.

Know more about the Purchasing software

https://brainly.com/question/14978715

#SPJ11

Give the usage and syntax of AVERAGE function.

Answers

The average function is used to calculate the statistical mean of selected data, and uses the syntax =AVERAGE (in excel I assume)

FILL THE BLANK.
network media helps carry data from one __________, or connection point, to another.

Answers

Network media helps carry data from one nodes , or connection point, to another.

.What is Network media?

A network media is any type of cable or wireless connection that transports data from one device to another in a network.

A network media is an essential component of any network that links multiple computers or other hardware devices together, allowing them to share data and resources.The media that are used in a network to transmit data are known as transmission media.

Some examples of network media are twisted-pair cables, coaxial cables, fiber optic cables, wireless connections, and so on. The type of transmission media used in a network is chosen based on the nature and range of the network, as well as the budget for the project.

Learn more about transmission media at

https://brainly.com/question/8986397

#SPJ11

about IPO cycle with a digram

Answers

Answer:

The IPO Cycle is termed as Input-Processing-Output cycle. A computer receives data as input, processes it, stores it and then produces output. ways. This manipulation is called processing.

about IPO cycle with a digram


​​​​​​​
is also a resource you should/must explore. finished flexagon. 3. Include some data on your two flexagons above, like their Tuckerman traverses, number of faces, degree of pats, etc.

Answers

For the assignment, you are required to complete three tasks related to flexagons. The first task involves exploring and creating  designs or messages on the faces of a tri-hexa or hexa-hexa flexagon.

The second task is to make an alternative flexagon, such as a tetraflexagon or one of your own invention, demonstrating creativity and avoiding a basic construction. The third task involves providing data on the flexagons, including information such as Tuckerman traverses, number of faces, and degree of pats.

1. For the first task, you can create visually appealing or meaningful designs on the faces of a tri-hexa or hexa-hexa flexagon. By understanding the patterns and connections formed by the triangles on the paper strip, you can strategically place images or messages that will be revealed when the flexagon is manipulated. This task encourages exploring the visual possibilities and utilizing the folding and unfolding mechanisms of the flexagon to showcase creativity.
2. The second task requires you to go beyond the basic construction and create an alternative flexagon. This could involve making a tetraflexagon (as seen in the Forgotten Flexagon video) or designing your own unique flexagon. The goal is to demonstrate innovation and originality in the construction and design of the flexagon, rather than simply replicating existing models.
3. In the third task, you are asked to provide data on the flexagons you have created. This includes information such as Tuckerman traverses (the number of times each face appears when the flexagon is fully flexed), the number of faces the flexagon has, and the degree of pats (the number of sides meeting at each vertex). This data provides quantitative insights into the structure and characteristics of the flexagons, allowing for a deeper understanding of their properties.
Overall, these tasks encourage exploration, creativity, and data analysis in the context of flexagon construction and design.



learn  more about interesting designs here

https://brainly.com/question/32329378



#SPJ11

 

The complete question  is:
Your two flexagons and response in question 3 should be handed in on Monday, as normal. You should also read the Gardner article, in the very least, which references many types of hexaflexagons. The Explorable Flexagons book is also a resource you should/must explore.
1. Do something interesting with the faces of a tri-hexa (or, better yet, a hexa-hexa). This could be a series of pictures, a secret message, etc. To do this you should explore how the triangles created on the strip of paper can be viewed on the finished flexagon.
2. Make an alternative flexagon, like a tetraflexagon (see the Forgotten Flexagon vid) or some other one you've invented or come across online. Point for doing something interesting and not just a "bare minimum" construction.
3. Include some data on your two flexagons above, like their Tuckerman traverses, number of faces, degree of pats, etc.

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

write a rainfall class that stores the total rainfall for each of 12 months into an array of doubles

Answers

Answer:

class Rainfall {

public:

   // Constructor

   Rainfall();

   // Accessor functions

   double getTotal() const;

   double getAverage() const;

   double getMonthlyTotal(int month) const;

   double getMostRainfall() const;

   double getLeastRainfall() const;

   void print() const;

   // Mutator functions

   void setMonthlyTotal(int month, double rainfall);

private:

   static const int MONTHS_IN_YEAR = 12;

   double monthlyRainfall[MONTHS_IN_YEAR];

};

HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
Which of the following is an example of a Boolean Operator?
A. HTML
B. SEO
C.
D. BUT

c is
TITLE

Answers

Answer:

HTML?

Explanation:

That looks like the best answer, correct me if I'm wrong ^^U

Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to control different elements on a screen?

Answers

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

Loops are very powerful concept in programming as they allow the performance of complex and repetitive task without having to repeat lines of code each time the task is to be performed. An example of an application which uses a loop to control elements on a screen is a shopping application.

Shopping applications are built to allow customers shop conveniently using their smart devices, pay and make decisions on retrieval of the selected items.

Using a for loop, all selected items can be appended to a list which is called cart. This displays the number of selected items which is the number of items in the customer's cart.

Using a loop, the cart is iterated and the total sum of the goods are displayed.

If bonuses are available or discount for a certain product or groups, a loop can be used to effect the discount on the shopper's fee.

Therefore, most applications require the use of loops in other to avoid writing bulky and efficient programs.

Learn more :https://brainly.com/question/15727806

Which two things are most essential for you to understand in order to communicate successfully?

a. your audience and your purpose

b. your collected documentation and the eight measures of excellence in tech communication

c. your proposal and your audience

d. your software and your hardware

Answers

The two most essential things to understand in order to communicate successfully are (a) your audience and your purpose. Understanding your audience is critical because it allows you to tailor your message to their needs, interests, and knowledge level.

By understanding your audience, you can use the appropriate language, tone, and style to convey your message effectively. Understanding your purpose is also essential because it enables you to communicate with a clear goal in mind. It helps you to stay focused and organized in your message delivery, and ensures that you are conveying the right message to the right audience.

While having accurate and up-to-date documentation and understanding the eight measures of excellence in tech communication may be helpful, they are not the most essential elements of successful communication. Similarly, while knowing your software and hardware is important, it is not the most critical factor in communication success. In the end, effective communication is all about understanding your audience and your purpose, and tailoring your message accordingly.

Learn more about audience here:

https://brainly.com/question/30435704

#SPJ11

At the end of a presentation it is important to:

Answers

Answer: We just no man, Don't ask us, just watch and learn.

Explanation: These are just facts, and you know it.

2. What changes, if any, could Lisa make to her income?
Ramsey classroom

Answers

Answer: what changed if any could lisa make to her income

Explanation:

If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to one decimal place

Answers

Answer:

22.5 s is the correct answer to the given question .

Explanation:

Given that

\(d=7.5km=7.5\times 10^3 m\)

For light:

We know that speed of light c

\(c=3\times 10^8 m/s\)

We know that

\(Distance = Speed \times timed=C\time tt=\dfrac{D}{t}t=\dfrac{7.5\times 10^3}{3\times 10^8}\ st=2.5\times 10^{-5}st=0.025 ms\)

For thunder :

Speed of sound ,v=332 m/s

\(Time\ taken\ by\ sound \\t\’=\dfrac{7500}{332}=22.59 s\)

Therefore the difference between time is given as follows

\(\Delta t= t' - \ t=22.59-2.5\times 10^{-5}=22.59 s\)

22.5 is the answer

Answer:

22.7

Explanation:

Nina is learning about clouds in her science class so she puts the phrase "types of clouds" in a search engine. In which step of a crawler-based search engine is this phrase most important?

A) indexing

B) crawling

C) ranking

D) retrieving

Answers

Answer: d. Retrieving

Explanation:

A crawler-based search engine is a type of search engines whereby a "crawler" or "spider' is used in searching the Internet. The function of the spider or the crawler is to help dig through the web pages, and then pull out the keywords relating to what the person typed in the search engine. Examples include Yahoo and Google.

Based on the information given in the question, the step of a crawler-based search engine that this phrase is most important is the retrieving stage. At that stage, the person is trying to get some information relating to what was typed in the search engine.

Which guideline should an employee use when taking notes for a report?

Answers

The guideline that  an employee should use when taking notes for a report is to write ideas briefly in your own words, and give the source.

What is the report about?

When taking notes for a report, an employee should use the following guideline: write ideas briefly in their own words and give the source. This means that the employee should summarize information in a concise and clear manner and clearly indicate where the information came from, such as by citing a book, article, or website.

Therefore, This ensures that the report is accurate and properly attributed, and also helps to prevent plagiarism.

Learn more about  report from

https://brainly.com/question/26177190

#SPJ1

CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called: a-Antivirus b-Firewall c-Antispyware d-Malware 2-A device designed to forward data packets between networks is called: Router 3-A computer network service that allows clients to make indirect network connections to other network services is called 4- Which of the following answers list the protocol and port number used by a spam filter

Answers

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

press the ____ key to delete a section break to the left of the insertion point.
a.
END
b.
BACKSPACE
c.
CTRL+HOME
d.
DELETE

Answers

The correct answer is: d. DELETE. When you press the DELETE key, it will delete the section break to the left of the insertion point.

This is because the DELETE key removes the character to the right of the insertion point, which in this case is the section break. It's important to note that this only works if the insertion point is directly to the left of the section break.

When you want to remove a section break that is to the left of your insertion point (the blinking cursor), you can simply press the BACKSPACE key on your keyboard. This will remove the section break and merge the formatting with the previous section.

To know more about DELETE visit:-

https://brainly.com/question/1544375

#SPJ11

What does it mean when the lottery machine says function suppressed after scanning a ticket

Answers

When a machine  says function suppressed after scanning a ticket, it implies that you have won some certain amount.

What is lottery  wins?

This term connote that a person has  a winning ticket in a lottery that is often owned by a government.

Note that  if a winning ticket is scanned, the terminal often shows a message just for you and that suppress function implies  that your the ticket has won something.

Learn more about lottery  from

https://brainly.com/question/9216200

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

How do I convert BCD to denary and denary to BCD? (For Both positive and Negative integer of denary)

Answers

Answer:

BCD is very similar to regular binary code. Decimal digits are represented as binary like so:

0 = 0000

1 = 0001

2 = 0010

3 = 0011

etc...

9 = 1001

However, in BCD the structure of decimal code is maintained, so e.g., the number 123 would be encoded digit-by-digit as:

0001 0010 0011

whereas in pure binary it would be encoded as

01111011

So you immediately see that BCD is not so efficient. That's why it is not used very often. Encoding and decoding is very easy as you take the same approach as with pure binary, but perform it per digit (ie., per group of 4 bits).

explain how information is obtained from the ICT tool (mobile phone​

explain how information is obtained from the ICT tool (mobile phone

Answers

ICT Tools:

ICT tools stand for Information Communication Technology tools. ICT tools mean digital infrastructures like computers, laptops, printers, scanners, software programs, data projectors, and interactive teaching boxes. The ICT devices are the latest tools, concepts, and techniques used in student-to-teacher, student-to-student interaction for example: - clicker devices, mobile applications, flipped classrooms) for information and communication technology.

How to Use ICT Tools in the Classroom?

To unlock the potential of technologies to use in the classroom, we need to do the following:

Establish a starting point for the ICT learning of each student and integrate formative evaluation into key learning areas like literacy and numeracy in a primary school.

Planning for progress in ICT learning progress in the learning curriculum of the Australian curriculum.

Evidence-based on ICT learning along with the subject learning.

Advantages of ICT Tools

There are various advantages of ICT Tools:

Cost-efficient

Provide the facility for easy student management

Direct classroom teaching

Improved modes of communication

Eco-friendly-Eliminate the usage of paper

Direct classroom teaching

Minimize cost and saves time

Improved data and information security

Web-based LMS tools link teachers, students, researchers, scholars, and education together.

Teachers are able to teach better with graphics, video, and graphics.

Teachers can create interesting, well-designed, and engaging classroom activities.

Provide better teaching and learning methods

To spread awareness about the social impact of technological change in education.

Promoting and improving the digital culture in universities, colleges, and schools.

Automated solutions to paper-based manual procedures and processes.

Learn more about ICT Tool: brainly.com/question/24087045

#SPJ1

Mark me as Brainliest i will give you 25 points please

Answers

Answer:

will try

Explanation:

:)

Other Questions
Birth rates, death rates, and migration rates are all part of measuring growth How is the technology of spinning the water mill developed? 2)Which statement BEST explains why World War I can be called a true "world" war?-)A)It was the first war fought on two continents.B)Every continent in the world became involved in WWI.Fighting took place on more than one front in Europe.D)Colonies of Imperial powers contributed men, supplies and sites ofdisputes.3) Perfect Present, please anybody help. What charts, tables, or drawings would clearly show what you have learned in this lab? Each chart, table, or drawing should have the following items a. An appropriate title b. Appropriate labels A(n) ________ is an attribute whose value can be computed from related attribute values.A) Derived attributeB) Composite attributeC) Required attributeD) Optional attribute Select the correct answer from each drop-down menu.The GCF of the numbers in the expression (55 + 44) is blank either 4,5,11,20 . The numbers left inside the parentheses after factoring out the GCF are blank either 5,11,44,55 and blank either 4,11,44,55. Please help me please Bob's Gift Shop sold 800 cards for Mother's Day. One salesman, Maya, sold 10% of the cards sold for Mother's Day. How many cards did Maya sell?Divide/scale down to solve for the missing percent. Historically, legal measures aimed at blocking discrimination based on race, religion, gender, age, or sexual orientation have been difficult to implement because Which two capabilities are considerations when marking a field as required in Object Manager? Choose 2 answers A. The field is not required to save records via the API on that object. B. The field is universally required to save a record on that object. C. The field is optional when saving records via web-to-lead and web-to-case. D. The field is added to every page layout on that object. What is the vertex of the parabola y=2(x-3)^2+5 NEED ANSWER NOWWW when migrating relational dbmss and other lan-based technologies into the client/server environment, issues such as compatibility of data types, query optimization, distributed databases, data administration of distributed data, case tool code generators, and cross operating system integration may arise. T/F Gluconeogenesis is essentially ___ providing a way of counteracting low levels of ____ There are 10 enzyme catalyzed steps in glycolysis and gluconeogenesis employs ____. _____ is a key enzyme in gluconeogenesis, serving to take pyruvate to ____. HELP ASAP FAST!!!!!!! A variable is something that _____.Question 2 options:is only used in mathchangesalways stays the same causes of desertification Part A:Question 1 a) Alice (A and Bob (B) want to secure their communication by using asymmetric encryption and nonce (nx. A nonce is an arbitrary number used only once in a cryptographic communication. It is often a pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks. Suppose a trusted server S that distributes public keys on behalf of A and B. Thus S holds Alice's public key KA and Bob's public key Ks.Note that S's public key,Ks,is well known.A and B initiate the secure communication by using the following protocol. Sender-Receiver: Message AS:A,B S-A:{KB,B}Ks AB:{nA,A}KB BS:B,A S B:{KA,A}Ks BA:{nA,ne}KA A-B:{ne}K [Description] [I'm A,and I'd like to get B's public key] [Here is B's public key signed by me] [l'm A, and I've sent you a nonce only you can read] [I'm B,and I'd like to get A's public key] [Here is A's public key signed by me] [Here is my nonce and yours,proving I decrypted it] [Here is your nonce proving I decrypted it] However,this protocol has subtle vulnerabilities.Discuss one of the vulnerabilities, and how to fix the problem by changing the lines in the protocol. if it takes 4.0 n to stretch a spring 6.0 cm and if the spring is then cut in half, what force does it take to stretch one of the halves 3.0 cm? a client says, 'the doctors lied about me. they said | murdered my mother. you killed her.i she died before | was born.' which psychotic feature is the client experiencing? quizlet