Caroline has very little work experience because she has just recently graduated from high school. She wants to create a resume that focuses on her skills and interests instead of her small amount of work experience. What should Caroline do to create the BEST resume for her situation?

A.
She should begin with her work experience.

B.
She should use a chronological format.

C.
She should use a functional format.

D.
She should leave out her educational information.

Answers

Answer 1

Caroline do to create the BEST resume for her situation ,She should use a functional format.

Which resume format is ideal for young grads who have little to no work experience?A functional or hybrid resume can be appropriate for you if you're a recent college or high school graduate with little to no work experience. If you have been unemployed for a protracted period of time, a functional resume structure may be helpful.Most frequently, those who are changing jobs or who have gaps in their employment history utilise functional resumes. Additionally, it might be helpful for those who are just entering the workforce, have little to no job experience, or have had a break in their career.

To learn more about resume refer to:

https://brainly.com/question/14218463

#SPJ1


Related Questions

a user from your organization is saying he was supposed to receive an email from an external person (removed849c94b974f71f0396b3d90d4373cbc435930d77d57e29882a5eae6eca06a87cremoved), but he can't find the message in his mailbox. what would you do, as an administrator, to find out what happened to the message?

Answers

Ask the user to run basic tests
1, check junk and spam
2, restart email app
3, restart computer
4, check WiFi connection
5, check that any messages sent first to the external person actually sent via sent box
6, allow a wait period in case the message has been held up by human error
7, if no message has been received after a set wait period, email external asking for confirmation of (message)

a company is moving to microsoft azure. some applications cannot be moved. you need to identify which applications will remain in a hybrid environment after the migration. which applications will remain in a hybrid environment?

Answers

Applications that are not able to be moved to Azure, but must remain in the current environment, should remain in a hybrid environment.

What is hybrid environment?

A hybrid environment is an IT system that combines both on-premises and cloud-based infrastructure and services. It is a combination of public cloud services, private cloud services, and traditional, on-premise IT infrastructure and applications. Hybrid environments enable organizations to leverage the strengths of both on-premises and cloud-based services in order to achieve their desired business outcomes. Benefits of a hybrid environment include increased scalability, enhanced performance, cost savings, and improved security. Additionally, hybrid environments allow organizations to take advantage of the agility, scalability, and cost-effectiveness of the cloud while still being able to maintain control of their on-premises IT infrastructure.

To learn more about hybrid environment

https://brainly.com/question/29099208

#SPJ4

What organization creates national standards for foodservice equipment?

Answers

The Organization that creating national standards for foodservice equipment is The EPA.

Organization can be described as a collection of people, that involved in pursuing defined objectives. It can be understandable as a social system which comprises all formal human relationships. The organization encompasses division of work among alignment and employees of tasks for instance the ultimate goal of the company.

The Organization can also be defined as the second most main managerial purposes, that coordinates the work of procures resources, employees,  and combines the two, in pursuance of company’s aim.

Here you can learn more about organization in the link brainly.com/question/12825206

#SPJ4

what is the correct syntax to count how many donations of $100 or greater appear in column o (contributions 2018)?

Answers

The correct syntax to count how many donations of $100 or greater appear in Column O is =SUMIF(O2:O210,”>=100″). 1 / 1 point.

What is syntax?

The study of syntax in linguistics focuses on how words or morphemes come together to produce longer language constructs like phrases and sentences. Word order, grammatical relationships, hierarchical sentence construction (constituency), agreement, and nature of cross-linguistic variation, as well as the relationship between meaning and form are among the primary issues of syntax (semantics). There are many different approaches to syntax, each with a unique set of underlying premises and objectives. A syntactic theory is frequently created to address a variety of problems that fall under the rubric of syntax. Different theories approach the relationship between the themes differently, while some of them might not even be thought of as separate but rather as derivations of one another.

To know more about syntax visit:

https://brainly.com/question/3022752

#SPJ4

Your system administrator does not allow the use of saved credentials to log on to the remote computer

Answers

Go to Control Panel -> Credential Manager on the local computer you are trying to connect from.

You will see three sections:

Windows CredentialsCertificate-Based CredentialsGeneric Credentials

Remove the credentials from Windows Credentials and add it to Generic Credentials.

A computer can be described as an electronic device that manipulates information, or data. It has the ability to retrieve, store, and process data. You may already know that you can use a computer to send email, play games, type documents, and browse the Web. You can also use it to edit or create presentations, spreadsheets,  and even videos.

Here you can learn more about computer in the link brainly.com/question/21080395

#SPJ4

Which keyboard shortcut brings up the Save As dialog box?

Answers

Answer:

To use the Excel save as a shortcut, simply press the "Ctrl" and "S" keys at the same time. This shortcut will bring up the "Save As" dialog box, which will allow you to choose where you want to save your workbook. You can also use this shortcut to save your workbook to a different file format.

Explanation:

When two vessels are operating in the same general area, who is responsible for avoiding collision?
a. the operators of both vessels
b. the operator of the stand-on vessel
c. the operator of the give-way vessel
d. the operator of the smaller vessel

Answers

The operators of both vessels is responsible for avoiding collision,When two vessels are operating in the same general area.

According to the International Regulations for Preventing Collisions at Sea (COLREGS), the operators of both vessels are responsible for avoiding collision. Both the operator of the stand-on vessel and the operator of the give-way vessel have a responsibility to take appropriate action to avoid collision. The operator of the stand-on vessel is responsible for maintaining its course and speed while the operator of the give-way vessel is responsible for taking action to avoid collision, such as altering its course or speed. The operator of the smaller vessel is not responsible for avoiding collision. It is worth noting that the stand-on vessel and give-way vessel are terms used to indicate which vessel has the right of way under specific circumstances, but both operators have the responsibility to avoid collision.

Learn more about avoid collision here:

https://brainly.com/question/29784265

#SPJ4

1. the security awareness and training policy is implemented for which nist functions and sub-categories?

Answers

The security awareness and training policy is typically implemented for the NIST function of "Identify" and the sub-category of "Awareness and Training" within that function.

What number of NIST security controls exist?

Over 1000 controls make up the five iterations of NIST SP 800-53. This list of security measures enables federal government agencies to implement the privacy and security measures that are suggested for federal information systems and organizations to safeguard against security threats and cyberattacks.

What main purposes does security awareness training serve?

Training in security awareness helps to reduce risk, preventing the loss of PII, intellectual property, money, or brand reputation. An efficient cybersecurity awareness program covers the errors that staff members may commit when utilizing email, the internet, and the real world, such tailgating or incorrect document disposal.

To know more about NIST visit:

https://brainly.com/question/13507296

#SPJ4

true or false: every host on a network is assigned a unique character-based name called the fully qualified domain name.

Answers

True

The properly qualified host name (FQDN), sometimes known as the full-qualified domain name (FQDN), is a character-based identifier that is given to each host on a network.

What is network?

A network that is contained inside a very limited region is known as a local area network (LAN). It is typically constrained to a certain location, such a writing lab, building, or school. Servers and workstations are the two primary categories of computers that are networked. In most cases, servers are not directly used by people; instead, they run continually to offer "services" to other computers on the network and their human users. Printing and faxing, hosting of software, file sharing and storage, messaging, data retrieval and storage full access control (security) for network resources, and many other services can be given. Workstations are so named because normally a human user uses them to communicate with the network.

To know more  about network visit:

https://brainly.com/question/13105401

#SPJ4

True or False : the value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.

Answers

The following statement of excel that displays for a cell is always the precise value is false.

What is excel?

Excel is a powerful spreadsheet program developed by Microsoft for Windows, Mac, Android and iOS. It is a versatile application used for a variety of tasks such as data analysis, data visualization, organizing and managing data, creating charts and graphs, and much more. Excel can be used for both personal and business purposes to help organize and analyze data. It is a powerful tool for organizing and tracking data, creating formulas, and performing calculations. Excel can also be used to create forms, and to keep track of business expenses, income, and other financial information. Excel is a great tool for data analysis and data visualization, allowing users to quickly and easily visualize and analyze data.

To learn more about excel
https://brainly.com/question/9799650

#SPJ4

when using inferential statistics, what is the default position on the difference between two measurements?

Answers

The default position on the difference between two measurements when using inferential statistics is that there is no difference.

What is inferential statistics?

Inferential statistics is a branch of statistics that uses sample data to make inferences, or generalizations, about a population. It involves making predictions, drawing conclusions, and testing hypotheses based on sample data. It is used to draw conclusions from a smaller sample size to the larger population. Inferential statistics can help researchers gain insight into a population by analyzing sample data to draw meaningful conclusions about that population. It can be used to identify trends and relationships between variables, to make predictions, and to test hypotheses. It is an important tool for making decisions based on data.


To learn more about inferential statistics
https://brainly.com/question/14568632
#SPJ1

i fr just asked a question.. about math how did i do something?? please someone help me out here

Answers

I doubt ur account will get deleted I’ve had many questions and answers deleted on my multiple accounts but never have I been deleted only suspended for 24 or 48 hours at a time

allow chrome to access the network in your firewall or antivirus settings

Answers

The Control Panel app's "System and Security" area contains the default firewall for Windows.

What is antivirus software and what varieties are there?

A sort of program called antivirus software was created to safeguard computers against malware including virus, computer worms, spyware, malware attacks, rootkits, keyloggers, and other threats. Antivirus software works to scan for, find, and get rid of viruses off your computer.

What functions does antiviral serve?

A type of software called antivirus is used to stop, scan for, find, and remove malware from a computer. Most antivirus programs automatically execute in the background after installation to offer added security against virus attacks.

To know more about antivirus visit:

https://brainly.com/question/14313403

#SPJ4

what flag can be used in linux with the passwd command to force a user to change their password on the next logon?

Answers

Answer:

passwd -e <username>

The user will be forced to change the password during the next login attempt.

Explanation:

Which of the following functions returns the smallest number from a range of cells?
1 point
A. AVERAGE
B. MAX
C. MIN
D. SUM

Answers

Answer:

C. MIN

Explanation:

which method in java could be used by itself to assign the value of 123 to each and every location of an array

Answers

Java's fill() function can be used to give the value 123 each and every place in an array on its own.

What is Java, exactly?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the object-oriented programming and software platform known as Java. Java's syntax and principles are derived from the languages C and C++ language.

With the fill() method, we repeatedly loop through an empty array, inserting the same object at each location. Programmers frequently utilize this as it makes it easier to place their specific value at each point.

The java.util.Arrays class contains the fill() function.

Arrays.fill(array name, value); is the syntax.

Regarding alternative approaches:

Pushing elements into a stack, array, linked list, etc. is done with the push() method. The Java.util method can be used to add an element toward the stack. Stack. It will added to the peak if you push (E el).

.We utilize put().

Put a key-value pair into a Map with put(key, value).

Attach the provided string to that other phrase at the end using the append() method. String name.append(string to be appended) is the code for this.

To know more about Java visit:

https://brainly.com/question/29897053

#SPJ4

a data analyst wants to convert their r markdown file into another format. what are their options? select all that apply. 1 point html, pdf, and word dashboard slide presentation jpeg, png, and gif

Answers

The data analyst can convert their R Markdown file into HTML, PDF, Word, Dashboard Slide Presentation formats.

Options: HTML, PDF, Word, Dashboard Slide Presentation

The data analyst can convert their R Markdown file into multiple formats such as HTML, PDF, Word, Dashboard Slide Presentation, as well as image formats like JPEG, PNG, and GIF. This allows them to easily share their data analysis in the format that best fits the needs of their audience.

Furthermore, the R Markdown file can also be used to embed HTML and JavaScript code, allowing the data analyst to create interactive visuals that can be used to further explain their data analysis.

Learn more about data analysis: https://brainly.com/question/14724376

#SPJ4

write a program that asks the user for a sentence in english and then translates that sentence to pirate

Answers

The program that ask the user to write a sentence in english is mentioned below.

What is code for english to pirate translation?

This program uses a dictionary to map English words to their Pirate equivalents. It then takes in a sentence from the user and splits it into words. For each word, it checks if the word is in the dictionary and, if it is, it replaces the word with its Pirate equivalent. If the word is not in the dictionary, it leaves the word unchanged. The program then rejoins the words and prints out the sentence in Pirate.

import random

english_to_pirate = {

   "hello" : "ahoy",

   "friend" : "mate",

   "sir" : "me hearty",

   "officer" : "fella",

   "my" : "me",

   "is" : "be",

   "you" : "ye",

   "I" : "me",

   "a" : "a",

   "the" : "th'"

}

def translate_to_pirate(sentence):

   words = sentence.split()

   pirate_words = []

   for word in words:

       if word in english_to_pirate:

           pirate_words.append(english_to_pirate[word])

       else:

           pirate_words.append(word)

   return " ".join(pirate_words)

user_sentence = input("Enter a sentence in English: ")

print("In Pirate: " + translate_to_pirate(user_sentence))

To know more about program visit:

https://brainly.com/question/14588541

#SPJ4

the input is not a valid base-64 string as it contains a non-base 64 character, more than two padding characters, or an illegal character among the padding characters.

Answers

This error message is indicating that the input being used is not a properly formatted base-64 string.

Base-64 is a way of encoding binary data, such as images or files, into ASCII text so that they can be transmitted or stored more easily.

The error message is telling you that the input being used is not a valid base-64 string because it contains one or more of the following issues:

A non-base 64 character: Base-64 uses a set of 64 characters (A-Z, a-z, 0-9, +, /) to represent the binary data. Any other characters that are present in the input are not valid for base-64 encoding and will cause this error.

More than two padding characters: Base-64 uses the "=" character as padding to make sure the encoded string has the correct number of characters. If there are more than two "=" characters present in the input, it is an indication that the input is not a valid base-64 string.

Illegal character among the padding characters: The only valid padding character in base-64 is "=". If any other character is used as padding, it will cause this error.

It is likely that the input string was not properly encoded, or it was encoded with a different method and is not a base64 string. It can also occur if there is a problem with the input string.

Learn more about error here:

https://brainly.com/question/9111443

#SPJ4

which organization is responsible for allocating public ip addresses?

Answers

IANA allocates IP addresses to the five Regional Internet Registries (RIRs), which are responsible for allocating IP addresses to organizations within their respective regions. These RIRs are:

The American Registry for Internet Numbers (ARIN) for North AmericaThe Réseaux IP Européens Network Coordination Centre (RIPE NCC) for Europe, the Middle East, and Central AsiaThe Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and the CaribbeanThe Asia-Pacific Network Information Centre (APNIC) for the Asia-Pacific regionThe African Network Information Centre (AFRINIC) for Africa

These RIRs then allocate IP addresses to Internet Service Providers (ISPs), who in turn allocate IP addresses to individual organizations and households. This hierarchical system ensures that IP addresses are allocated efficiently and fairly, and allows for the growth and expansion of the Internet. The Internet Assigned Numbers Authority (IANA) is responsible for allocating public IP addresses. IANA is a department of the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit organization that coordinates the maintenance and methods of several databases related to the namespaces of the Internet, ensuring the network's stable and secure operation.

Learn more about ip addresses: https://brainly.com/question/16011753

#SPJ4

. question 3 in the analyze stage of the data life cycle, what might a data analyst do? select all that apply. 1 point use spreadsheets to aggregate data choose the format of spreadsheet headings create a report from the data use a formula to perform calculations

Answers

A data analyst can do: use spreadsheets to aggregate data, choose the format of spreadsheet headings, create a report from the data, use a formula to perform calculations.

What is data analyst?

A data analyst is a professional responsible for collecting, organizing, analyzing, and interpreting data to identify patterns and trends. Data analysts use statistical techniques, data mining, and predictive analytics to identify meaningful information from large data sets. They use this data to inform business decisions and drive the development of new products and services. Data analysts are also responsible for developing, managing, and maintaining databases, as well as designing and implementing data collection systems.

To learn more about data analyst

https://brainly.com/question/29824383

#SPJ4

Which of these KPIs demonstrate engagement? Choose all that apply.
a. Direct sales revenue from social media.
b. Mentions.
c. Sharing and retweets. d. Likes or Favorites. e. Customer satisfaction.

Answers

One of the most frequent and possibly the most aggravating problems with social media is coming up with new content ideas.

Key Performance Indicators (KPI) must be reviewed and adjusted for the business process once every 18 months. KPIs must be regularly monitored and maintained in order to continue operating at their peak. accentuate the mistake of the rival, letting your fans know, "See this? We wouldn't do this at all. Continue to be helpful and feel sympathy for the company's errors. When appropriate, respond to posts with consideration and empathy. Cyberbullying, image-based abuse, and other typical social media issues are all well-explained by the Office of the eSafety Commissioner.

Learn more about performance here-

https://brainly.com/question/14617992

#SPJ4

What is the value for a network or security administrator to perform password cracking on wireless passwords on their own network? What is the biggest challenge in performing password cracking on pre-shared keys and getting results that are worthwhile

Answers

By guessing or breaking the passwords used to safeguard a computer system or network, password cracking is the process of attempting to obtain unauthorized access to it. Numerous techniques, such as brute-force attacks, dictionary attacks, and rainbow table attacks, can be used to do this.

What is the value for a network or security administrator to perform password cracking on wireless passwords on their own network and the biggest challenge in performing password cracking on pre-shared keys and getting results that are worthwhile?

Performing password cracking on one's own wireless network allows a network or security administrator to evaluate the security of the passwords being used and spot any weaknesses. By discovering and fixing weak passwords that could be used by malevolent actors, this contributes to enhancing network security.

Pre-shared key password cracking can be time- and resource-consuming, requiring a lot of computer power and specialized software. This is the main problem. Pre-shared keys are frequently encrypted as well, making it more challenging to guess the password. Making the procedure even more difficult, the effectiveness of password cracking also depends on the length and complexity of the password.

To know more about password cracking visit:

https://brainly.com/question/13056066

#SPJ4

a search engine that combines internet technology with traditional library methods of cataloguing and assessing data is known

Answers

A search engine that combines internet technology with traditional library methods of cataloguing and assessing data is known as a metasearch engine.

What is search engine?

A search engine is a computer program that searches documents, such as web pages, for specified keywords and returns a list of the documents where the keywords were found. Search engines allow users to quickly and easily find information online by entering search terms into a search box. The results are usually presented in a list and are commonly known as hits. Search engines use complex algorithms to determine the relevance of the hits to the search terms. They all work by crawling the web and indexing web pages to create an index of contents that can be searched.

To learn more about search engine

https://brainly.com/question/512733

#SPJ4

//write js code to prompt() the user to input a value and capture that value in a variable. display the value of that variable as well //as its data type to the console. refresh the page and type in a number and observe the data type. refresh the page and //type in your name and observe the data type, repeat this process and simply click ok without typing anything, then one more //time and click cancel. what were the data types and why?

Answers

The js code by using prompt(), the user to input a value and capture that value in a variable. display the value of that variable as well //as its data type to the console. refresh the page and type in a number and observe the data type. The code is mentioned below.

What is the use prompt() in this js code?

When the user inputs a number and clicks OK, the data type will be "string" because the prompt() function always returns a string.

When the user inputs their name and clicks OK, the data type will still be "string".

When the user simply clicks OK without typing anything, the value of the variable will be an empty string and the data type will still be "string"

When the user clicks cancel the variable will be assigned "null" value and the data type will be "object"

This is because the prompt() function always returns a string, even if the user inputs a number or a name. JavaScript does not have a separate data type for strings and numbers, so the user input will always be a string.

And when the user click cancel, the prompt function will return "null" and null is considered as an object by javascript.

let userInput = prompt("Please enter a value:");

console.log("Value:", userInput);

console.log("Data type:", typeof userInput);

To know more about prompt() visit:

https://brainly.com/question/30085583

#SPJ4

for a list of 500 numbers, at most how many guesses would it take using binary search to guess the secret number if after each guess you were told whether your guess was too high or too low or just right?

Answers

At most, it would take 9 guesses to find the secret number using binary search.

What do you mean by Binary search? Explain.

Binary search is an efficient algorithm for searching for an element in a sorted list. In each step of the algorithm, the middle element of the current search range is selected and compared to the target element. If the middle element is equal to the target element, the Binary search is successful. If the middle element is greater than the target element, the search continues in the lower half of the current range, and if it is less, the search continues in the upper half.

With a list of 500 numbers, the first guess would be the middle number of the list (250), if the secret number is higher, next guess would be the middle of the upper half (375), and so on. With each guess, the search range is halved, so the number of steps required to find the secret number is at most log2(500) = 9.

To know more about Binary search, visit:

brainly.com/question/13152677

#SPJ4

what happens if your computer attempts to telnet to an inactive ip address on your network segment? does your computer send out a tcp [syn] packet?

Answers

Yes, when a computer attempts to establish a Telnet connection to an inactive IP address on its network segment, it will send out a TCP [SYN] packet. If there is no response from the inactive IP address, the computer will eventually timeout and no connection will be established.

What is Telnet connection?

A network protocol called Telnet is used to connect to computers remotely through the Internet. Users can log in to a remote host using this method and provide commands as if they were actually at the host.

When a user installs Telnet client software on their computer, the client initiates a Telnet connection by sending a TCP [SYN] packet to the server (the remote host). The client confirms receipt of the packet with a [ACK] packet after the server answers with a [SYN, ACK] packet. The client is now able to transmit Telnet commands to the server because a full-duplex connection has been established between the client and the server.

Telnet is an insecure protocol since no encryption is used during data transmission between the client and server. The implication of this is that all data delivered through a Telnet connection, including passwords, is susceptible to interception and reading by unauthorized persons. As a result, other, more secure protocols, such Secure Shell (SSH), have replaced Telnet as the preferred method of remote access.

To know more about Telnet connection visit:

https://brainly.com/question/16268685

#SPJ4

the mit database gives a t-test value of 2.581, which correspond to a p-value of 0.01 for your null hypothesis. according to the hypothetico-deductive approach, what is the next step you should take?

Answers

The t-test results from the mit database are 2.581. The next thing you should do, in accordance with the hypothetico-deductive method, is to reject your null hypothesis.

Describe a database.

A database is an accumulation of information that has been set up to be easily updated and managed. Statistics records or files comprising information, such as sales data, client data, financial records, and product descriptions, are frequently combined and kept in a plethora of databases.

Why we need databases?

They simplify and reliably update accurate data thanks to their assistance. They offer security measures that help us prevent duplication by limiting access to information. All of the equipment, helpers, and facilities used in SQL databases are collectively referred to as database tools.

To know more about database visit:

https://brainly.com/question/6447559

#SPJ4

james, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. what layer of the osi model should he inspect to understand the issue relating to the router?

Answers

James, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. The layer of the osi model that james should inspect to understand the issue relating to the router is The Network Layer

Technicians can be described as a man that skilled professionals who primarily work with technology in different industries. They are knowledgeable about the technical aspects of the many items they work with. They are usually working with electricity or with technological advancements. Technicians may be assigned to do the construction of equipment or materials related to their field of study. They may also be assigned to conduct other maintenance activities and diagnostics to ensure that the equipment works accurately. Technicians may also be required to conduct basic repairs in case of problems. It is esential that technicians have decision-making skills and good analytical skills.

Here you can learn more about technician in the link brainly.com/question/14290207

#SPJ4

can only use .dt accessor with datetimelike values

Answers

Your problem here is that to_datetime silently failed so the ditype remained as str/object, if you set param errors='coerce' then if the conversion fails for any particular string then those rows are set to NaT.

What is Attribute Error?

When an attribute reference or assignment fails, Attribute Error is raised as an error. For instance, the value 10 is given to the variable x. Let's say we wish to add a new value to that variable during this operation. It isn't feasible. Using a try-except block, the Attribute Error may be fixed. The try block should include the lines of code that potentially throw the Attribute Error, and the except block can catch and handle the problem.

For that Object, there isn't an attribute with the name you requested. This indicates that the error occurred because the method you were calling was not present in the "module." Your problem here is that to_datetime silently failed so the ditype remained as str/object, if you set PARAM errors='coerce' then if the conversion fails for any particular string then those rows are set to NaT.

df['Date'] = pd.to_datetime(df['Date'], errors='coerce')

Here I attached the completed question

Learn more about Attribute Error refer to ;

brainly.com/question/29903954

#SPJ1

Other Questions
bold and beautiful spoilers celebrity dirty laundry what else did the watt steam engine make possible? Score 2The man is moving a heavy trolley, stopping and starting as he goes. If the mass of the trolley is 19 kg and the speedchanges from 0 to 1. 2 m/s, the change in kinetic energy in the trolley is What is the equation of the line inslope-intercept form?1y = x+23y =138y = 2x +y = 2x1-3 from simbio q 2.2 how would you describe the variation in simploid disease rates among lawns in idyllic? only one answer is correct. the value is a because a . b. the value is a because a . c. the value is a because a . d. the value is a because a . n football gambling, when you bet an nfl tease and get an additional 6 points how often does that cover? Are antibodies powerful white blood cells in the immune system? the credentials supplied are not sufficient to access this printer A______ is a genetic characteristic that allows an organism to survive and reproduce.a. Adaptaionb. Adaptationc. Fatd. Organism Where is the church of pilgrimage? Please answer I need help An 84 cm wire is cut into three pieces the second piece is 4 cm long the first piece and the third piece is twice as long as a second piece find the length of the shortest piece What is a triangle with 3 60 degree angles? Given JAM and segment PB such that PB JM, what is the missing justification proof in the proof that JP/PA = MB/BA? J.D. Power and Associates surveys new automobile owners to learn about the quality of recently purchased vehicles. The following questions were asked in the J.D. Power Initial Quality Survey, May 2012.a. Did you purchase or lease the vehicle?b. What price did you pay?c. What is the overall attractiveness of your vehicles exterior? (Unacceptable, Average, Outstanding, or Truly Exceptional)d. What is your average miles-per-gallon? What is the relationship between production possibility and opportunity cost? What does Snowball see for the animals as a result of building the windmill? A group of people were asked whether they owned a dog. The number of people that owned a dog was 103, and 431 responded that they didn't own a dog. Find the probability that if a person is chosen at random, he/she own a dog. Round your answer to two decimal places. What is the biggest problem for adoption of electric vehicle?