The _______ feature shows the results that would occur in your document if you clicked the option to which you are pointing.

Answers

Answer 1

The feature referred to in the statement is known as "Live Preview." The Live Preview feature is designed to provide a real-time preview of the changes that would occur in a document if a specific option or action is applied.

It allows users to visualize the impact of their selections before actually applying them. When a user hovers over an option or action, the Live Preview feature dynamically displays the expected results in the document. This enables users to make informed decisions and adjust their choices based on the immediate visual feedback provided by the Live Preview. It enhances productivity and accuracy by reducing the need for trial-and-error iterations when making changes to a document.

To learn more about Preview feature click here : brainly.com/question/8042936

#SPJ11


Related Questions

alice sends a message to bob that is intercepted by trudy. which scenario describes an availability violation?

Answers

An availability violation scenario in the given context would be if Trudy intercepts Alice's message and prevents Bob from receiving it, causing a disruption in the communication between Alice and Bob.

Availability is one of the fundamental principles of information security that ensures timely and uninterrupted access to data and resources by authorized users. In the given scenario, if Trudy intercepts the message sent by Alice to Bob, it results in an availability violation because Bob is unable to receive and access the message as intended.

Availability violations can occur through various means, such as network disruptions, denial-of-service attacks, unauthorized access, or interception by malicious actors. In this case, Trudy's interception disrupts the availability of the communication channel between Alice and Bob. The message intended for Bob is no longer accessible, leading to a violation of the availability principle. To maintain availability, it is essential to protect the communication channels, ensure secure transmission, and implement measures to prevent unauthorized interception and disruptions.

Learn more about communication channels here:

https://brainly.com/question/25630633

#SPJ11

Select the correct answer.
Ben wants to keep similar items close to each other in the image he is working on. Which is the most effective technique for applying the gestalt
concept of proximity?
The BLANK technique is the most effective technique for applying the gestalt concept of proximity.

Answers

Gestalt Principles are principles/laws of human perception that describe how humans group similar elements, recognize patterns and simplify complex images when we perceive objects.

What are the Gestalt Principles?

The tendency to view items as belonging to the same grouping when they are close to one another is known as the gestalt principle of

proximity

. It claims that regardless of how different the forms and sizes are from one another, if shapes are close to one another, you will perceive them as groups. One of Gestalt's principles, the concept of closeness focuses on how each stimulus would be seen in its most basic form. The

Law of Simplicity

or the Law of Pragnanz are other names for it. It is founded on the idea that the sum of a thing is worth more than the sum of its components.

To learn more about Gestalt Principles refers to;

https://brainly.com/question/4734596

#SPJ1

You're given the output of an ls -l of a file in Linux. 123 ls -l books_file dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file Answer the following question: Who does the last trio of bits (r--) in the file permission and attributes refer to

Answers

The last trio of bits (r--) in the file permission and attributes refer to: others.

What is ls command?

The ls command is used to list and display information about files and directories in Unix and Linux. It is used to identify files, directories, links, and device nodes, as well as displaying their ownership and permissions.

What are the file permissions?

File permissions are a method of limiting access to files on a Unix-based operating system.

Every file or directory has three types of access restrictions: read, write, and execute. The file permissions determine who can access these files and what actions they can take on them.The file permissions consist of three sets of characters: User, Group, and Other.

What are file permissions in Unix/Linux?

In Unix and Linux, file permissions are a method of limiting access to files. Each file or directory has three types of access restrictions: read, write, and execute.

The file permissions determine who can access these files and what actions they can take on them. The permission can be represented in the form of characters or bits.

There are three different types of permissions: read (r), write (w), and execute (x). In this scenario, the last trio of bits (r--) in the file permission and attributes refer to others.

What is the command to check file permissions in Linux?

The ls -l command is used to check file permissions in Linux. The ls -l command produces a detailed list of the files in the specified directory. It provides information such as file ownership, access mode, and size. The file access mode is displayed in theleft most column of the ls -l output.

Learn more about Bits here,

https://brainly.com/question/19667078

#SPJ11

Brian discovered that a criminal has used his credit card details to steal money. To which area of concern in AI systems does this refer?

A.
cyber security
B.
social security
C.
ethics
D.
governance


Accidentally started test before lesson, need help. I will give brainliest for right answer.

Answers

Answer:

I believe it is B (social security) I'm not completely sure.

Explanation:

I'm sorry if it's wrong.

The area of concern in AI systems that refers to the situation described, where a criminal uses credit card details to steal money, is cyber security (option A). Cyber security focuses on protecting computer systems, networks, and data from unauthorized access, theft, or damage. In this scenario, the concern is related to the security of personal financial information and the prevention of fraudulent activities.

IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:

Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.

Answers

Answer:

My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.

Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.

Sincerely,

Tracy Johnston

Palomar College Mathematics Department

Answer:

The more sane thing that he should do is to research ways to quit smoking.

Explanation:

Smoking is not good for you, nor are e-cigs

Nicotine gum is just as addictive and is quite expensive

There really isn't much pollution in the air, mostly allergens

You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing

Write a program that will add up the series of numbers: 99,98, 97...3.2.1. The program should print the running total as well as the total at the end.
The program should use one for loop, the range() function and one print() command.
Sample Run
99
197
294
390
-
4940
4944
4947
4949
4950

Answers

Answer:

result = 0

for i in range(99, 0, -1):

   result += i

   print(result)

Explanation:

It gives back a series of numbers that begin at zero, increase by one by default, and end just before the specified number. There are three criteria total, and two of them are optional.

What range() function and one print() command?

For the range() method to produce the integers in reverse order, use a negative step value. For instance, the expression range(5, -,1, -1) will result in the integers 5, 4, 3, 2, and 1.

By setting the step argument of a range() function to -1, you may effectively reverse a loop. Reverse iteration of the for loop's iterations will result.

The range() function returns a series of numbers that, by default, starts at 0 and increments by 1 before stopping in a given number.

Therefore, Instead of being a physical hardware device, a software calculator is one that has been implemented as a computer program.

Learn more about function here:

https://brainly.com/question/18065955

#SPJ5

A computer monitor is a type of____________.

i. input device

ii. output device

iii. storage device

iii. software

iv. none of these

Answers

Answer:

output device, through which processed information are displayed in text or graphics.

A computer monitor is a type of output device. So the correct choice is :

option (ii) output device.

A computer monitor is an example of an output device because it is made to display visual data produced by the computer. The monitor receives signals and shows pictures, movies, text, and other visual content when it is attached to the graphics card of a computer. It acts as a user interface, enabling users to observe and engage with the output of the computer.

A monitor does not receive any input from the user, in contrast, to input devices, which send data or commands to the computer. Keyboards, mice, and scanners are examples of input devices that let users communicate with computers by entering data or issuing orders.

The monitor serves as an output device, for instance, when you play a video game and view the images on the screen, or when you open a document and read the text on the screen. It uses the output produced by the computer system and shows it to the user graphically.

To know more about monitors,

https://brainly.com/question/30619991

Consider the following code snippet that appears in a subclass: public void deposit(double amount) { transactionCount ++; deposit(amount); } Which of the following statements is true?
a) This method will call itself.
b) This method will call itself.
c) This method calls a public method in its subclass.
d) This method calls a public method in its subclass.
e) This method calls a private method in its superclass
f) This method calls a private method in its superclass
g) This method calls a public method in its superclass.

Answers

A is the answer I got a call back at the park today and then we walked in and got it to the park where the store got to

A doctor in progress sheet in a computer she did copy and paste of the previous progress sheet because nothing changed . But she
entered the same date .what type of error ? A. Systematic error B . Random error C. Missing error

Answers

Based on the information provided, the type of error that occurred when the doctor in progress sheet was copied and pasted with the same date is a missing error.

This is option C

This is because the doctor failed to update or change any information on the progress sheet, resulting in missing or incomplete data. It is important to regularly update and review information to ensure accuracy and prevent missing errors.

Missing errors refer to errors or mistakes that occur when something essential or necessary is not present or included. In the context of a document or a piece of writing, a missing error can occur when vital information, words, phrases, or punctuation marks are unintentionally omitted.

These errors can negatively impact the clarity and meaning of the text, leading to confusion or misinterpretation for the reader. It is important to carefully review and proofread any document to identify and correct any missing errors before finalizing it.

So, the correct answer is C

Learn more about missing error at

https://brainly.com/question/14382279

#SPJ11

PLEASE HURRY!!!! Look at the image below!

PLEASE HURRY!!!! Look at the image below!

Answers

Answer:

print()

The print() function prints the programs  message to the screen, or other standard output devices, I hope that this helps (◠‿◠)

Answer: i think it is input

Explanation:

because the word input means to put in something or  operate

Which of the arts, a/v technology, and communication career cluster pathways are involved with producing a product for an audience? check all that apply. Visual artsperforming artsaudio/visual technology and filmjournalism and broadcastingprinting technologytelecommunications.

Answers

The arts, a/v technology, and communication career cluster pathways involved with producing a product for an audience are audio/visual technology and film journalism, and broadcasting. The correct option is c.

What are arts, a/v technology?

Designing, creating, exhibiting, performing, writing, and publishing multimedia material, including visual and performing arts and design, journalism, and entertainment services, are the main goals of this Career Cluster.

Students take a one-year course in which they study the arts, audio/video technologies, and communications systems.

Therefore, the correct option is c, audio/visual technology and film journalism, and broadcasting.

To learn more about arts, a/v technology, refer to the link:

https://brainly.com/question/3870657

#SPJ1

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

What are components of the network effect in social media engagement? (choose every correct answer.) multiple select question. the exp

Answers

The components of the network effect in social media engagement are:

InformationNetworkDynamic

What is social media engagement?

The Definition of the term Social media engagement  is known to be a term that acts to measures all issues in regards to the public shares, the likes as well as the comments for any kind of online business as well as its social media efforts.

Note that the Engagement is one that is seen as a form of  historical common metric that is known to be used  for the examination of social media performance but it is one that do not  need to translate to sales.

Therefore, based on the above, one can say that The components of the network effect in social media engagement are:

InformationNetworkDynamic

Learn more about social media engagement  from

https://brainly.com/question/8360107

#SPJ1

Information

Network

Dynamic

Player

i need freinds.:(plz

Answers

Answer:

Explanation:

sure wassup

Answer:

i'll be your friend!

Explanation:

Last week I was able to go to see the new Dr. Strange movie. I thought it was pretty awesome. When I was looking at buying tickets I wanted to make sure I got as many discounts as I could get. By default a movie ticket is $15. If you go before 5pm, the ticket price is $12.50. If you plan on buying in bulk (5 or more tickets) you will receive a 10% discount. If you are a student, you get a 15% discount.
Write a program that asks the user if they are going to the movie before 5PM (1 for yes, 0 for no), how many tickets they are going to buy (an integer greater than 1), and if they are a student (1 for yes, 0 for no). Print out the total cost for the amount of tickets you would like to buy.
Sample Case 1:
Are you going to the movie before 5PM? (1 - Yes, 0 - No)
0
How many people are going?
2
Are you a student? (1 - Yes, 0 - No)
0
The group’s price is $30.00.

Answers

The program is an illustration of conditional statements.

Conditional statements can have single condition or multiple conditions

The complete program

The program written in Python is as follows:

price = 15

timeCheck = int(input("Are you going to the movie before 5PM? (1 - Yes, 0 - No)"))

if timeCheck == 1:

   price = 12.5

numPeople = int(input("How many people are going?"))

if numPeople>= 5:

   price = price * 0.90 * numPeople

else:

   price = price * numPeople

student = int(input("Are you a student? (1 - Yes, 0 - No)"))

if student == 1:

   price = price * 0.85

print("The group's price is",price)

Read more about Python programs at:

https://brainly.com/question/13246781

#SPJ1

Which block of addresses is defined for use with Automatic Private IP Addressing (APIPA)?

255.255.255.0,
192.168.1.1
192.168.1.254
169.254.0.0/16. 3.1.7

Answers

The block of addresses defined for use with Automatic Private IP Addressing (APIPA) is 169.254.0.0/16.

What is Automatic Private IP Addressing?

Automatic Private IP Addressing range of addresses is reserved by Internet Assigned Numbers Authority (IANA) for link-local addressing and is used by devices to assign themselves IP addresses automatically when a DHCP server is not available. The subnet mask for this range of addresses is 255.255.0.0, which means that the available addresses range from 169.254.0.1 to 169.254.255.254. The default gateway is not used with APIPA addresses, and the devices communicate with each other within the same network segment. The IP addresses 192.168.1.1 and 192.168.1.254 are part of the private IP address range used by routers and other networking devices in local area networks, but they are not used for APIPA addresses.

To know more about IP address visit:

https://brainly.com/question/30195639

#SPJ11

A ________ is two or more computers that share resources. A) computer network B) network resource C) peer-to-peer network D) client

Answers

Answer:

computer network

Explanation:

A computer network is two or more computers that share resources. All of the computers in a network are connected together and can share various resources depending on the scenario such as memory, space, computing power, graphical power, etc. The most common shared resource is connection to the internet.

the pair of braces that delineate the body of main and the portion of the program between these braces is called a

Answers

The pair of braces that delineate the body of main and the portion of the program between these braces is called a 'code block'.

A code block is a part of the source code in a computer program that specifies a sequence of statements, variables, or expressions in a specific context. A code block is surrounded by curly braces (`{}`), and it may be a part of the program's control flow and language constructs, such as functions, loops, and conditional statements. A code block can be a single statement or several statements that are grouped together. It may also contain additional code blocks that have their own braces. When code blocks are nested, the inner block is contained inside the outer block. For instance, a code block inside a loop is included inside the loop's braces.

A cross-platform, free and open-source IDE called Code::Blocks supports several compilers, including GCC, Clang, and Visual C++. It is created in C++ with the GUI toolkit wx Widgets. Its features and capabilities are specified by the offered plugins using a plugin architecture. Code::Blocks is now focused on C, C++, and Fortran. It contains an optional Make support feature and a bespoke build mechanism.

To know more about 'code block'.

https://brainly.com/question/27918524

#SPJ11

1. write a line by line explanation for each command. (40%) 2. explain what will be displayed on the screen and why? (20%) 3. write a detailed explanation of the algorithm of the program. (40%)

Answers

Overall, the program reads names and addresses from an input file, dynamically allocates memory for each name and address, sorts them based on zip codes, and writes the sorted names and addresses to an output file.

Line-by-line explanation for each command:

gcc -c sort.c: This command compiles the sort.c file and generates an object file (sort.o).

gcc main.c sort.o -o program: This command compiles the main.c file along with the sort.o object file and creates an executable file named program.

./program input.txt output: This command runs the executable file program with command line arguments input.txt and output, which represent the input and output file names, respectively.

Explanation of what will be displayed on the screen and why:

If there are any errors in opening the input or output file, an error message will be displayed.

If the command line arguments are not provided correctly, a usage message will be displayed, guiding the user on how to use the program.

If there is a failure in memory allocation during runtime, an error message will be displayed.

When prompted to enter the zip code for each name, the program will wait for user input. The zip codes will be displayed on the screen as the user enters them.

Detailed explanation of the algorithm of the program:

The program reads command line arguments to obtain the input and output file names.

It opens the input file for reading and the output file for writing.

Memory is dynamically allocated for an array of pointers to structures (names) to store the names and addresses read from the input file.

The program then reads the names and addresses from the input file, line by line, until it reaches the end of the file or the maximum number of names is exceeded.

For each name and address, a temporary structure is created, memory is allocated for it, and the data is stored in the structure.

The temporary structure is added to the names array.

Once all the names and addresses are read and stored, the program prompts the user to enter the zip code for each name.

The sortNamesByZip function is called to sort the names array based on the zip codes using the qsort function from the C standard library.

The sorted names and addresses are then written to the output file.

Finally, memory is freed, files are closed, and the program terminates.

To know more about Algorithm related question visit:

https://brainly.com/question/28724722

#SPJ11

the document head contains _________, which is content that describes the document or provides information about how the document should be processed by the browser.

Answers

The document head contains metadata, which is content that describes the document or provides information about how the document should be processed by the browser.

What is a document head?

A web page is divided into two parts: the head and the body. The head portion of a web page contains information about the page that isn't visible to the user. Meta descriptions, title tags, and other search engine optimization (SEO) elements are examples of metadata that you can include in the head. The head tag is one of the two main tags that every HTML document should have.

The head tag is where metadata and links to external files are stored. The metadata includes the document's title, author, character set, and other information that the browser requires to display the page correctly.

Learn more about search engine optimization here: https://brainly.com/question/28340578

#SPJ11

what type of application-layer payload or protocol message is being carried in this first udp segment in the trace?

Answers

The type of application-layer payload or protocol message being carried in the first UDP segment in the trace is: DNS.

The DNS provides a crucial service in the functioning of the internet because it is the main protocol that allows users to access websites and other internet resources by name rather than numerical IP addresses. A UDP packet is defined as a User Datagram Protocol data packet.

In comparison to TCP, it is a connectionless protocol. It implies that UDP datagrams can be transmitted and received by the receiver without establishing a connection.

Learn more about application-layer: https://brainly.com/question/29590732

#SPJ11

You must be connected to the Internet in order to work on a document on a shared document workspace.
a. True
b. False

Answers

The answer is actually True

_____styles are added sirectly to an html tag by using the style attributes with the tag

Answers

CSS styles are added directly to an HTML tag by using the style attribute with the tag.

The presentation of an HTML or XML document can be described using the style sheet language CSS (Cascading Style Sheets). HTML or XML documents can add visual styles and layout using CSS styles.

The following are some CSS style examples:

Color is used to change the background or text colour of an element.

The font is used to specify the text's style, size, and family.

To enclose an element in a border, use the border property.

Margin and padding are tools for enclosing an element.

Display - Used to set an element's display property.

Setting the location of an element is done using positioning.

Text: This element is used to set text properties like text-align, text-decoration, and text-transform.

For such more question on CSS styles:

https://brainly.com/question/29580875

#SPJ11

Why is special code needed for <?

Answers

The guy above is right!!!

Which function is used to add a range of cells?
A) =SUM
B) =AVERAGE
C) =MAX
D) =ADD

Answers

Answer:

Sum

Sum a range of cells -- SUM Function

The quickest way to sum a range of cells is to use the AutoSum button. It automatically enters a SUM function in the selected cell. The SUM function totals one or more numbers in a range of cells.

Explanation:

The answer is "Option A" because it is used for adding the range of the cell, and the further explanation can be defined as follows:

The AutoSum button was its fastest way to add up a range of cells in Excel. It automatically inserts a SUM function into the specified cell. The SUM function sums up one or more numbers inside a range of cells. SUM function combines numbers together. Numbers can be added individually, as well as numerical values and ranges.

The wrong solution can be defined as follows:

In option B, it is used to calculate the average of the value.In option C, it is used to calculate the maximum number in the among values.In option D, it is used to calculate the Autosum.

Therefore "Option A" is the correct choice.

Learn more:

Excel function: brainly.com/question/10307135

Which function is used to add a range of cells?A) =SUMB) =AVERAGEC) =MAXD) =ADD

Assume a file containing a series of integers is named numbers.txt and exists on the computers disk. Write a program that calculates the average of all the numbers stored on the file. Write this in Python

Answers

Answer:Here is one way to calculate the average of all the numbers stored in a file named "numbers.txt" in Python:

Explanation:

# Open the file for reading

with open("numbers.txt", "r") as file:

   # Read all the lines in the file

   lines = file.readlines()

   

   # Convert each line to an integer

   numbers = [int(line.strip()) for line in lines]

   

   # Calculate the sum of the numbers

   total = sum(numbers)

   

   # Calculate the average by dividing the total by the number of numbers

   average = total / len(numbers)

   

   # Print the result

   print("The average of the numbers is", average)

the volume of two similar solids are 1080cm and 1715cm .if the curved surface area of the smaller cone is 840cm .fond the curved surface area of the larger cone​

Answers

Answer:

\(A_{big} = 1143.33cm^2\)

Explanation:

The given parameters are:

\(V_{small} = 1080\)

\(V_{big} = 1715\)

\(C_{small} = 840\)

Required

Determine the curved surface area of the big cone

The volume of a cone is:

\(V = \frac{1}{3}\pi r^2h\)

For the big cone:

\(V_{big} = \frac{1}{3}\pi R^2H\)

Where

R = radius of the big cone and H = height of the big cone

For the small cone:

\(V_{small} = \frac{1}{3}\pi r^2h\)

Where

r = radius of the small cone and H = height of the small cone

Because both cones are similar, then:

\(\frac{H}{h} = \frac{R}{r}\)

and

\(\frac{V_{big}}{V_{small}} = \frac{\frac{1}{3}\pi R^2H}{\frac{1}{3}\pi r^2h}\)

\(\frac{V_{big}}{V_{small}} = \frac{R^2H}{r^2h}\)

Substitute values for Vbig and  Vsmall

\(\frac{1715}{1080} = \frac{R^2H}{r^2h}\)

Recall that:\(\frac{H}{h} = \frac{R}{r}\)

So, we have:

\(\frac{1715}{1080} = \frac{R^2*R}{r^2*r}\)

\(\frac{1715}{1080} = \frac{R^3}{r^3}\)

Take cube roots of both sides

\(\sqrt[3]{\frac{1715}{1080}} = \frac{R}{r}\)

Factorize

\(\sqrt[3]{\frac{343*5}{216*5}} = \frac{R}{r}\)

\(\sqrt[3]{\frac{343}{216}} = \frac{R}{r}\)

\(\frac{7}{6} = \frac{R}{r}\)

The curved surface area is calculated as:

\(Area = \pi rl\)

Where

\(l = slant\ height\)

For the big cone:

\(A_{big} = \pi RL\)

For the small cone

\(A_{small} = \pi rl\)

Because both cones are similar, then:

\(\frac{L}{l} = \frac{R}{r}\)

and

\(\frac{A_{big}}{A_{small}} = \frac{\pi RL}{\pi rl}\)

\(\frac{A_{big}}{A_{small}} = \frac{RL}{rl}\)

This gives:

\(\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{L}{l}\)

Recall that:

\(\frac{L}{l} = \frac{R}{r}\)

So, we have:

\(\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{R}{r}\)

\(\frac{A_{big}}{A_{small}} = (\frac{R}{r})^2\)

Make \(A_{big}\) the subject

\(A_{big} = (\frac{R}{r})^2 * A_{small}\)

Substitute values for \(\frac{R}{r}\) and \(A_{small}\)

\(A_{big} = (\frac{7}{6})^2 * 840\)

\(A_{big} = \frac{49}{36} * 840\)

\(A_{big} = \frac{49* 840}{36}\)

\(A_{big} = 1143.33cm^2\)

Hence, the curved surface area of the big cone is 1143.33cm^2

PLS HELP ASAP ILL GIVE BRAINLKEST THANKS ITS FOR TODAY

PLS HELP ASAP ILL GIVE BRAINLKEST THANKS ITS FOR TODAY

Answers

Do u have context for the question? Based off of my brain alone, I would eliminate good food as an answer. I’d assume the answer to the second question is code.

Please help me on this

Please help me on this

Answers

Answer:

Phishing

Explanation:

the other answers are just random stuff.

Answer:

It is Phishin

Explanation:

the act of seding out bait aka the fake emails and trying to get people to bite or aka get scammed.

Other Questions
Which of the following is an example of a stress question?a. What type of work do you enjoy the most?b. What is your greatest weakness?C.How would you describe yourself?d. Why are you interested in this position?Please select the best answer from the choices providedABCODk x-1 corp's total assets at the end of last year were $490,000 and its ebit was 52,500. what was its basic earning power (bep) ratio? A nutrition experimenter intends to compare the weight gain of newly weaned male rats fed Diet A with that of rats fed Diet B. To do this, she will feed each diet to 10 rats. She has available 10 rats from one litter and 10 rats from a second litter. Rats in the first litter appear to be slightly healthier. If the 10 rats from Litter 1 were fed Diet A, the effects of genetics and diet would be confounded, and the experiment would be biased. Explain this statement carefully. Which sensory receptors are involved in hearing? A mechanoreceptors B photoreceptors C chemoreceptorSD thermoreceptors?Please answer ASAP! Outside of social settings, the _____________ drug user abstains and thereby remains in control of his or her drug use. Consider the balanced chemical equation. H2O2(aq)+3I(aq)+2H+(aq)I3(aq)+2H2O(l) In the first 15.0 s of the reaction, the concentration of I drops from 1.000 M to 0.773 M. Exercise 3 Insert an adjective clause to modify the noun or pronoun in italics.Eli found a puppy________________________. According to the constitution, who elects the next president of the united states?. imagine if you had millions of followers on social media. what would be your experience? what content would you make and how would you use your influence. how would it compare to Charlie Damelio? at least 8 sentences What is the equation of the line that has a slope of 1/5 and a y-intercept of -1A y = 1/5x 23/5B y = 1/5x 1C y = 1/5x + 1D y = 1/5x + 23/5 I appreciate any help! Malcolm and Theo's families are both traveling to the same vacation resort.The equation d = 65t models the distance, d, that Malcolm's family travels after t hours.The graph below shows the relationship between the distance and the amount of time that Theo's family traveled. Summarize the causes of the French Revolution in 2-3 sentences. 57. At its profit-maximizing output, a pure nondiscriminating monopolist achieves:A.neither productive efficiency nor allocative efficiency.B.both productive efficiency and allocative efficiency.C.productive efficiency but not allocative efficiency.D.allocative efficiency but not productive efficiency. The System.out.printf method formats a string and displays it in the console window.A. TrueB. False if a bowling ball and a ping pong ball both move with the same kinetic energy, which has the greater speed? You want to use a tool to view network packets, including each packet's source and destination. Which tool should you use An investor has the following portfolio: Company Shares owned Beta Expected return 300 150 1.05 Price per share $52 $80 $42 $35 JNJ CAT GE IBM 1.1 7.20% 7.40% 5.96% 6.92% 320 0.74 400 0.98 What is the expected return of the portfolio? 6.9% 5.8% 8.3% 10.12% An investor has the following portfolio: Company Shares owned Beta Expected return 300 150 1.05 Price per share $52 $80 $42 $35 JNJ CAT GE IBM 1.1 7.20% 7.40% 5.96% 6.92% 320 0.74 400 0.98 What is the expected return of the portfolio? 6.9% 5.8% 8.3% 10.12% In the short run, a purely competitive firm can maximize its economic profit (or minimize its loss) by adjusting its the problems that people with schizophrenia have with memory and attention are most likely related to an increased tendency of having brain damage in the: