Darius needs to include contact information in an email that he is sending to a colleague. Which option should he choose from the ribbon?


Attach File

Attach Item

Attach Policy

Attach Signature

Answers

Answer 1

Attach a Signature should he choose from the ribbon that he is sending to a colleague. Thus, option D is correct.

Who is a colleague?

A colleague is a companion or collaborator, usually of the same position or standing, who works in a profession, government or religious office, or both.

The alternative to Attach Signatures lets users add a previously made signing including your personal details at the conclusion of the communication. Darius wants to have included an email address, thus he will pick the tie is attach signature option.

Therefore, option D is the correct option.

Learn more about colleague here:

https://brainly.com/question/14138829

#SPJ1


Related Questions

Select the four functions that a database management system can perform on data in a database?.

Answers

The four functions that database management systems perform on data residing in a database are: create data, serach data, update data, and delete data.

Database management systems are software systems that allow the creation and management of a massive amount of data. Database management systems offer various functions. Out of all the four basic functions include:

Create data: This function of the database management system permits the storage of large amounts of data in a single system; every data item has a unique identity.Search data: This function of the database management system helps to find any specific record or data item within a second from the database.Update data: Data in a database requires updates regularly or occassionly. This function of the database management system allows to update the data with the latest information, whenever needed.Delete data: If it seems that data is no longer in use; the delete function of the database management system makes it easier to delete the specified data.

You can learn more about database management system at

https://brainly.com/question/28560725

#SPJ4

The process of repeatedly increasing a value by some amount is known as
O a. adding
O b. containing
O C. checking
O d. accumulating

Answers

It’s b because it is the contain of all













1. If you were making a sports game, should you include a mode where the computer can play against itself? If so, why? If not, why not?

Answers

Answer:

I say not

Explanation:

because it's pretty not smart to have the computer going against itself

write a cross-reference generator, which is a program that reads a text file, extracting word-like tokens (containing only letters, hyphens, and apostrophes; no numerals; must begin with a letter),

Answers

So here is the implementation, I first kept each line in a data vector of strings.

then, in order to record every token, I declared map mp, which logs the line number and word frequency for each word.

initially, each line was divided into words, and the frequency of each word was recorded on a map cur.

then every word in cur stored in mp with {line number and frequency of word in line}

i used some conditions just for printing which are not necessary but format is important.

What is Data vector?

Geographical data that is kept as a collection of points, lines, or polygons coupled with attribute data is known as vector data. At its most basic, vector data consists of a set of discrete points represented as coordinate pairs, each of which corresponds to a physical location in the outside world.

Code for the text file:

#include<bits/stdc++.h>

using namespace std;

int main(){

   string line,s,temp,word,del=" ";

   cin>>s;

   ifstream fin;

     vector<string>data;

   fin.open(s);

   while (fin){

       getline(fin, line);  

       data.push_back(line);

   }

   fin.close();

   map<string,vector<pair<int,int> > >mp;

   for(int i=0;i<data.size();i++){

       vector<string>out;

       istringstream ss(data[i]);  

       do {  

       ss >> word;

       out.push_back(word);

       } while (ss);

       map<string,int>cur;

       for(int i=0;i<out.size();i++){

           if(cur.find(out[i])==cur.end()){

               cur[out[i]]=1;

           }else{

               cur[out[i]]+=1;

           }

       }

       for(auto w:cur){

           mp[w.first].push_back({i+1,w.second});

       }  

   }

   for(auto w:mp){

       cout<<w.first<<":";

       int n=w.second.size();

       for(int i=0;i<n;i++){

           cout<<w.second[i].first<<":"<<w.second[i].second;

           if(i+1<n){

               cout<<",";

           }

           if(i!=0&&i%8==0){

               cout<<endl;

           }

       }

       cout<<endl;

   }

}

Learn more about C++ program click here:

https://brainly.com/question/20339175

#SPJ4

electronic components) that can be used as a switch, which is triggered electronically (i.e., the switch is electronically controlled by arduino rather than manually controlled like push button). explain how each device works.

Answers

Serial port is used by Arduino to communicate orders to the computer (USB).Python, which is currently running on the computer, will then read this data, and based on the read data, an action will be taken.

What can be controlled with Arduino?An electronic switch is a component or device used in electronics that can switch an electrical circuit, interrupting it or rerouting it to another conductor.Because they can be either on or off, electronic switches are regarded as binary devices. When there is a power outage, an automatic transfer switch is the mechanism that automatically turns on the generator and connects it to the installation.The mains supply must be totally isolated from the installation when the generator is attached.The Changeover Switching needs to be mechanically connected. Electrical switches are electromechanical devices that are used in electrical circuits to control power, detect when systems are outside of their operating ranges, alert controllers to the location of machine parts and workpieces, offer a method for manual control of machine and process functions, control lighting, and other functions.

To learn more about Arduino refer

https://brainly.com/question/28420980

#SPJ4

Let's say you wanted to make an American Football game. What is an example of a legal issue you'd have to watch out for?

Answers

Answer:

Personal injury.

Explanation:

With a bunch of people running around on a field with a goal of slamming into each other, bodily injury becomes a relevant liability.

identify the core of an rg-6 coaxial cable. question 8 options: a) 20 awg b) 22 awg c) 28 awg d) 18 awg

Answers

The core of an RG-6 Coaxial Cable is 18awg. (Option D).

A coaxial cable is a form of copper cable that is particularly designed with a metal shield and other elements to prevent signal interference. Cable TV providers typically utilize it to link their satellite antenna installations to consumer homes and businesses.

What is a Coaxial Cable used for?

A coaxial cable is a form of transmission line that is used to transport high-frequency electrical signals with little loss.

Telephone trunk lines, broadband internet networking cables, high-speed computerized data buses, cable television transmissions, and linking radio transmitters and receivers to their antennas are all examples of where it is utilized.

Learn more about Coaxial Cable:
https://brainly.com/question/13013836
#SPJ1

which routing protocol does an edge router use to collect data to build its routing tables for paths across the internet?

Answers

Border Gateway Protocol (BGP) is a routing protocol does an edge router use to collect data to build its routing tables for paths across the internet.

What is Routing protocol ?

In any network, routing is the process of choosing a path. The many machines, known as nodes, and the pathways or links that connect them make up a computer network. In a network of interconnected nodes, there are numerous ways to communicate between two nodes.

What is BGP?

The protocol that powers the internet's global routing system is called BGP (Border Gateway Protocol). It controls how packets are forwarded from one network to another by having edge routers communicate routing and reachability data.

BGP is made to allow independent systems on the Internet to share reachability and routing data. A "peer" is a BGP speaker who communicates with other peers by exchanging routing information in the form of network prefix announcements.

Learn more abou BGP click here:

https://brainly.com/question/22311165

#SPJ4

which of the following environments utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? a. production b. test c. staging

Answers

The environments that utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build is option b. test.

Why is a test environment necessary?

Before delivering the program to the user, the testing teams examine its effectiveness and quality in the test environment. It can test a particular section of an application using various data setups and configurations. It is a crucial component of the agile development process.

In a QA environment, intended users can test the finished Waveset application while your upgrade procedure is tested against data, hardware, and software that closely resembles the Production environment.

Therefore, The testing teams evaluate the application's or program's quality in a test environment. This enables computer programmers to find and correct any issues that might affect how well the application functions or the user experience.

Learn more about test environments from

https://brainly.com/question/21902774
#SPJ1

bilmain manufactures has recruited you as a network administrator to handle the organization's network operations. you want to set up a class a ip address. what will be the subnet mask for this class a address?

Answers

Since Bilmain manufactures has recruited you as a network administrator to handle the organization's network operations, the subnet mask for this class A address is 255.0.0.0.

Why is a subnet mask of 255 usually used?

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. You ought to be able to assign IP addresses to 254 hosts at this point.

A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Hence, The subnet mask for a class C network would be 255.255.255.0, which indicates that 24 bits are being used for the network. This is shown in CIDR notation by adding a /24 after the IP address.

Learn more about subnet mask from

https://brainly.com/question/28256854
#SPJ1

What are some ways to access the Excel Help window? Check all that apply.

clicking and dragging the zoom slider on the status bar
double-clicking the title bar
clicking the question mark in the upper-right corner of the interface
pressing the F1 key on the keyboard
correct answer is c and d

Answers

The ways to access the Excel Help windows is option C and D:

Clicking the question mark in the upper-right corner of the interface.Pressing the F1 key on the keyboard.How fast can I learn Excel?

Excel's interface and fundamental operations can be understood in its entirety in a matter of hours, but mastering its more advanced features may take more time and effort. Most users of Excel need 18 to 20 hours to completely understand this spreadsheet program.

Note that The File menu also has a Help option. Click File in any Office application, then select the recognizable? button in the top right corner. To open the Help Viewer window for the Office application you are using, press the F1 function key at any time.

Learn more about Excel from

https://brainly.com/question/24749457
#SPJ1

Which is an example of a report a company might create using a relational database?

a. a toy manufacturer joining data tables of restaurant locations, customer names, and amount of toys ordered
b. a clothing retailer joining data tables of pant designers, available styles, and herbal teas
c. a hospital joining data tables of surgical equipment, best-selling novels, and types of surgery
d . a college bookstore joining data tables of professor names, classes they teach, and books they require

Answers

The correct answer is c

Define a car class that is derived from the vehicle class given in question 2. definea class called sportscar that is derived fromcar class. be creative in choosing member variables and functions. write a driver program to test the car and sportscar classes.

Answers

A driver program to test the car and sportscar classes.

class Sportscar: public Car {
private:
 int topSpeed;
 string color;
public:
 Sportscar(int, string);
 int getTopSpeed();
 string getColor();
};

Sportscar::Sportscar(int speed, string col): Car(speed) {
 topSpeed = speed;
 color = col;
}

int Sportscar::getTopSpeed() {
 return topSpeed;
}

string Sportscar::getColor() {
 return color;
}

int main() {
 Sportscar car1(200, "red");
 cout << "Top speed: " << car1.getTopSpeed() << "mph" << endl;
 cout << "Color: " << car1.getColor() << endl;
 return 0;
}

What is driver?
A device driver in computing is a computer software that manages or regulates a specific kind of device that is connected to a computer other automaton. A driver offers a software interface to hardware devices so that operating systems and other computer programmes can access hardware operations without having to be aware of the exact specifications of the hardware being utilised.

Through the computer bus and communications subsystem that the hardware links to, a driver communicates with the device. When a calling software calls a driver routine, the driver sends instructions to the device (drives it). The driver may call functions in the original calling application once the device transmits data back to it.

To learn more about driver
https://brainly.com/question/26084890
#SPJ4

What is the single most important component of a computer?

Responses

DIP
DIP

Motherboard
Motherboard

Central Processing Unit
Central Processing Unit

Chipset

Answers

Answer:

I'd say the motherboard

Explanation:

Computers cannot run without their motherboard. All components of a computer are connected to the motherboard, and the motherboard processes data. If the computer had no motherboard, there would be no DIP or Central Processing Unit.

you are the network administrator of a medium-sized company. your company requires a fair degree of security, and you have been tasked with defining and implementing a security policy. you have configured password policies so that users must change their passwords every 30 days. which password policy would you implement if you want to prevent users from reusing passwords they have used recently?

Answers

The password policy that would you implement if you want to prevent users from reusing passwords they have used recently is Account-Lockout  Policy.

Describes the Account Lockout Policy settings and provides links to details for each setting. Someone trying to access your system with more than a few unsuccessful password tries might be a malevolent person trying to guess an account password by trial and error. Windows domain controllers monitor logon attempts, and they can be set to disable the account for a predetermined amount of time in response to this kind of possible assault. The threshold for this response and the subsequent actions are controlled by the Account Lockout Policy settings. The Group Policy Management Console's Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Account Lockout Policy section is where Account Lockout Policy settings can be changed.

To know more about Account Lockout Policy click here:

https://brainly.com/question/28149104

#SPJ4

you suspect that there are a number of deleted files that can still be salvaged in the unallocated space of a drive image. during which phase of the investigation would you use a data carving utility?

Answers

The correct answer is examination (file carving ).

The process is known as file carving and can be done manually or with the help of a tool. As you might imagine, tools can greatly speed up the process. Files are identified in the unallocated space by certain unique characteristics. File headers and footers are common examples of these characteristics or signatures.File carving is a process used in computer forensics to extract data from a disk drive or other storage device without the assistance of the file system that originality created the file.

To learn more about file carving click the link below:

brainly.com/question/14893201

#SPJ4

must eat is a company that allows online food delivery. must eat rolls out updates every month for better user interface. recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. on inspection, the team notices that there has been no breach of sensitive data. what kind of cybersecurity exploitation was attempted by the hackers in this scenario?

Answers

Since must eat is a company that allows online food delivery, the kind of cybersecurity exploitation was attempted by the hackers in this scenario is  A zero-day attack.

What is meant by zero day attack?

Since the seller or developer has only become aware of the flaw, they have "zero days" to remedy it, hence the term "zero-day." When hackers take advantage of the vulnerability before developers have a chance to fix it, it is known as a zero-day assault.

This harmful computer worm targeted machines in Iran, India, and Indonesia that were utilized for manufacturing. Iran's uranium enrichment facilities were the main target in an effort to thwart the nation's nuclear program.

Therefore, Since there are currently no antivirus signatures or updates for zero-day threats, they are by definition challenging to identify. There are a variety of zero-day vulnerability detection techniques that can be used to locate previously unknown software vulnerabilities.

Learn more about A zero-day attack from

https://brainly.com/question/27715022
#SPJ1

See full question below

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario?

1. It could have been an evil twin exploit.

2. It could have been an attempted hack by a white hat hacker

3. A zero-day attack might have been the cause

4. It could have been an attempted hack by a gray hat hacker

write a function called convertstrtoint that inputs four strings that represent integers, converts the strings to integers, sums the values and prints the total of the four values.

Answers

A group of components of the same data types are held together in an array..

What is string and array?A group of components of the same data types are held together in an array, which is a linear data structure.An object that defines a string of characters is called a string.It is both one-dimensional and two-dimensional.String has only ever two dimensions.

#include <stdio.h>

#include <stdlib.h>

int main(void)

{

 char x[10];

 char y[10];

 char z[10];

  char t[10];

  int sum=0;

  puts("Enter 4 strings to be summed");

 scanf(" %s %s %s %s", x, y, z, t);

 printf("\nSum is=%d", atoi(x)+atoi(y)+atoi(z)+atoi(t));

}

To learn more about string refer,

https://brainly.com/question/12978443

#SPJ4

viruses that load from usb drives left connected to computers when computers are turned on are known as (1 point) polymorphic viruses. encryption viruses. boot-sector viruses. script viruses.

Answers

Viruses that load from usb drives left connected to computers when computers are turned on are known as encryption viruses.

If they are found, encrypting viruses, a type of computer virus, can pose serious issues. Computer systems are essential to everyday life around the world. One of the most dangerous viruses is an encryption virus because, once it has infected your computer or laptop, it may start encrypting all of the important and private documents and files you have stored there, rendering them useless and unreadable. It may also be deleted, causing data loss, or it may trigger an automatic factory reset, which may erase all of your accounts and other crucial data.

Cybercriminals use encrypted Ransomware, which has grown to be the most common type, because it is challenging to decrypt it and get rid of the infection.

To know more about encryption virus click here:

https://brainly.com/question/13340185

#SPJ4

pl enter the output ​

Answers

The output of the program is as follows:

Day name is SundayDay name is MondayDay name is TuesdayDay name is WednesdayDay name is ThursdayDay name is FridayDay name is SaturdayPlease enter correctPlease enter correctPlease enter correct

How to determine the output of the program?

The complete program is given as an attachment

In this attachment, we can see that:

The program makes use of conditional statements

These conditional statements are such that:

if the input takes any value between 1 and 7 (inclusive), the program prints the corresponding day (from Sunday to Saturday)

Other inputs outside this range (i.e. from 8 to 10), the program prints "Please enter correct" without the string

Hence, the outputs of the program are the correct day for valid input, and "Please enter correct" for invalid inputs

Read more about programs at

https://brainly.com/question/16397886

#SPJ1

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called?.

Answers

Antivirus software prevents infection by recording key attributes about the files and checking to see whether they change over time in a process called inoculation.

Antivirus software are programs that protects computer systems and removes viruses that can damage data or computers. There are many types of antivirus software that use different processes to prevent files and data from damage that may cause by viruses. Inoculation is one such process that is used by antivirus software programs.

Inoculation refers to a process used by an antivirus software utility program that compares old and current versions of files to check to see if there occur any changes. In this way, inoculation detects malicious activities that otherwise can badly damage important data.

You can leanr more about  Antivirus Software at

https://brainly.com/question/17209742

#SPJ4

write a function max magnitude() with three integer parameters that returns the largest magnitude value. use the function in the main program that takes three integer inputs and outputs the largest magnitude value.

Answers

The function is def max_magnitude.The absolute value of a number is its magnitude, whether positive or negative.

The absolute value of a number is its magnitude, whether positive or negative.

Significant Points

The absolute value is also returned by the math.fabs() function, although it does so as a floating-point number.

The absolute integer or float value return is what we get when we feed an integer or float value to abs().

Abs(), on the other hand, returns the magnitude of a complex number when given one.

To know more about function click here:

https://brainly.com/question/21252547

#SPJ4

In a nested loop, the inner loop goes through all of its iterations for each iteration of the outer loop. True or false?.

Answers

True

To get the total number of iterations in a nested loop, add the number of iterations in the inner loop to the number in the outer loop.


You can learn more about at :
brainly.com/question/14003857#SPJ4

each end of the vpn represents an extension of your organizational network to a new location; you are creating a(n) .

Answers

Extranet represents an extension of your organizational network to a new location.

What is VPN?

A VPN, in its simplest form, offers an encrypted server and conceals your IP address from businesses, authorities, and would-be hackers. When using shared or public Wi-Fi, a VPN secures your identity and keeps your data hidden from snooping online eyes.

What is Extranet?

In contrast to an intranet, an extranet is a private network that is accessible to third parties such as suppliers, key customers, and business partners. An extranet's primary function is to enable user data and application exchange as well as information sharing.

In 2022, a VPN will be a valuable and important tool. Your private and personal information is fully protected, and it is kept out of the hands of anyone who might use it against you in the future.

Learn more about Extranet click here :

https://brainly.com/question/15420829

#SPJ4

an application programming interface (api) for a website tells you how to group of answer choices use ajax to get data from the site use jsonp to get data from the site download data from the site navigate the site

Answers

An application programming interface (api) for a website tells you how to  navigate the site

What is Application Programming Interface?Using a set of definitions and protocols, Application Programming Interface are techniques that let two software components communicate with one another. For instance, the software system of the weather bureau contains daily weather information. Your phone's weather app "talks" to this system via Application Programming Interface  to provide you with daily weather updates.The term "API" stands for application programming interface and has been used by software for a long time to access data, server software, and other applications. APIs are incredibly adaptable and can be utilized with hardware, operating systems, databases, and web-based applications.

To learn more about application programming interfaces refer to:

https://brainly.com/question/12987441

#SPJ4

kirby visited a sweepstakes website and agreed to download a new program. later, when he tried to use a word processing program, his document files became corrupted. how can kirby try to remove the offending program and prevent future attacks? kirby should install a biometric reader. kirby should run an antivirus program. kirby should use wpa network encryption. kirby should change the password on his computer

Answers

Kirby should run an antivirus program in order to remove the offending program and prevent attacks in the future. Therefore, option B 'Kirby should run an antivirus program' is the correct answer.  

Antivirus software is a program that provides computer devices protection from offending and malicious programs that can otherwise damage the data and files. Antivirus programs can remove malicious programs from computers as well as provide prevention in the future too.

As per the context of the given scenario where Kirby downloaded new software from a website and after that, she faced a problem when using a word-processing document. Because the downloaded program was malicious and made her word-processing document files corrupted. She can remove the malicious program from her computer device using antivirus software. The antivirus software will not only remove the offending program but also provide prevention from such attacks in the future.

You can learn more about Antivirus Software at

https://brainly.com/question/17209742

#SPJ4

bruce frequently works with a large number of files. he notices that the larger the files get, the longer it takes to access them. he suspects that this problem of time consumption in accessing those files is related to the files being spread over the disk. he needs to store the files contiguously on the disk. which utility should he use to achieve this task?

Answers

Disk defragmenter  utility should he use to achieve this task.

What is disk defragmenter?

Defragmentation is a procedure that lowers the level of fragmentation in file systems maintenance. It accomplishes this by dividing the mass storage device's file storage contents into the fewest possible continuous sections (fragments, extents).

In an effort to prevent fragmentation from returning, it also makes use of compaction to expand the areas of open space. Because they are frequently accessed in succession, several defragmentation tools attempt to keep smaller files within a single directory together.

The benefits of defragmentation and how it applies to file systems on mechanical disk drives (hard disk drives, floppy disk drives and optical disk media). When accessing fragmented files, the read/write heads of the hard drive move more slowly over the disk than when accessing the entire contents of a non-fragmented file sequentially without moving the heads to look for additional fragments.

Learn more about Defragmentation click here:

https://brainly.com/question/14254444

#SPJ4

maria is a new network engineer for a company that was established more than 30 years ago. she is examining the it infrastructure and discovers that the virtual private network (vpn) solution employs an older encryption protocol for backward compatibility. this protocol has largely been replaced, but it used to be popular in early vpn solutions. what is this protocol?

Answers

Answer:

SSL was the old protocol, which has been replaced by the TLS protocol.

Explanation:

what is the method by which an os stores, organizes, and manages access to files on a storage device?

Answers

File system is the method by which an OS stores, organizes, and manages access to files on a storage device.

A file system in a computer is the method by which files are named and organised logically for storage and retrieval. Without a file system, data would not be isolated into distinct files and be challenging to locate and retrieve. The organisation and accessibility of individual files are becoming even more crucial for data storage as data capacities rise.

Using the same logic-based method of document storage and retrieval, digital file systems and files are named after and modelled after paper-based filing systems.

Operating systems (OS) like Microsoft Windows, macOS, and Linux-based systems can have different file systems. Some file systems are created for particular uses.

An index of all the data on a storage device can be thought of as a file system, which stores and organises data. Hard drives, optical drives, and flash drives are some examples of these gadgets.

The maximum number of characters that can be used in a name, the permitted characters, and, in some systems, the length of the file name suffix are all specified by file system conventions. File names are frequently not case sensitive in file systems.

To learn more about File system click here:

brainly.com/question/15170339

#SPJ4

which is not true about the using keyword? group of answer choices it can be used with inner or outer joins the join must be an equijoin, meaning the equals operator is used to compare the two columns you code a using clause in addition to the on clause you use it to simplify the syntax for joining tables

Answers

When you wish to combine multiple tables and the tables have the same column name and you want to compare the data from these tables using the same column name, use the Using keyword rather than the On keyword.

How to Using keyword in PHP?To learn more about PHP's "inner" and "outer" joins. I'll now explain how to join tables using the "Using" keyword in this article. The "On" keyword is substituted with the term "Using".The designation table has two columns, but the emp table has four columns (id, fname, lname, and salary) (id and role). Now you can see that both tables contain a "id" field.It is typical for columns that are being compared to have the same name when you code a "equi join."The "Using" keyword can be used to make the query simpler for joins like these. The following example demonstrates the use of the "Using" keyword in place of the "On" keyword. Using their IDs, we connected two tables in the sample below. And the emp role will be returned from the designation database based on the name of the id column.If you want to combine multiple tables with the same column names and compare the data from these tables using the same column names, you can use the "Using" keyword rather than the "On" keyword, according to the explanation that came before. The keyword "Using" is usable.

To Learn more About Using keyword Refer to:

https://brainly.com/question/26355510

#SPJ4

Other Questions
How many words does the u. S. Constitution contain; not including the signatures and all 27 amendments?. which of the following is a drawback of the survey method in sociological research? a.) it captures how people behave but not what they think and believe. b.) it captures what people think and believe but not how they behave in real life. c.) it is dependent on previous sociological information. d.) it does not yield quantifiable data that can be charted. 1.Reptiles first appeared at the end of the _____ era.Cenozoic EraArchean eraMesozoic EraPaleozoic Era The fraction is equivalent to which of the following decimal numbers?0.20.16160.1660.1 6 you're trying to determine whether or not to expand your business by building a new manufacturing plant. the plant has an installation cost of $12.5 million, which will be depreciated straight-line to zero over its four-year life. if the plant has projected net income of $1,368,000, $1,935,000, $1,738,000, and $1,310,000 over these four years, what is the project's average accounting return (aar)? ammonia burns in the presence of a copper catalyst to form nitrogen gas. what is the enthalpy change to burn g of ammonia? 11. Why is it likely that Captain Bligh did not feel serene as he watched the Bountysall away? Triangles geometry . I neeed help pls assurance services differ from consulting services because group of answer choices assurance services focus on improving information and generally do not involve situations in which one party wants to monitor another. assurance services usually involve situations in which one party wants to monitor another and focus on improving information. assurance services focus on providing advice and involve two-party arrangements. assurance services focus on providing advice and usually involve situations in which one party wants to monitor another. HELP PLEASE I WILL MARK BRAINLIEST 50PTS Use your completed Reading Guide for this lesson to answer the following questionFromto the English Channel (From #3; enter one word.) during meiosis, if the parent cell starts with six chromosomes, how many chromosomes will be found in the cell at metaphase i and anaphase i? how many in metaphase ii and anaphase ii? "I have a dream"What is most closely the central idea of the passage below (paragraph 7)? It would be fatal for the nation to overlook the urgency of the moment. This sweltering summer of the Negros legitimate discontent will not pass until there is an invigorating autumn of freedom and equality. Nineteen sixty-three is not an end, but a beginning. And those who hope that the Negro needed to blow off steam and will now be content will have a rude awakening if the nation returns to business as usual. And there will be neither rest nor tranquility in America until the Negro is granted his citizenship rights. The whirlwinds of revolt will continue to shake the foundations of our nation until the bright day of justice emerges.Answer choices for the above questionA. The nation is in a very urgent moment.B. Most people hope that this collective anger will end soon.C. African Americans will continue to revolt until they are granted their rights.D. The bright day of justice is about to arrive. A new gaming chair costs $239.87. You have already saved $118.37 and earn $40.50 each week babysitting. Write and solve an equation to determine how many weeks, w, you must babysit to earn enough money to buy the new gaming chair. 40.5w + 118.37 = 239.87; w = 3 40.5w 118.37 = 239.87; w = 9 40.5w 239.87 = 118.37; w = 9 40.5 + 118.37w = 239.87; w = 3 Compared to human cells, there are about _______ bacterial and archaeal cells inhabiting our bodies. at a certain clothing store, the clothes are displayed on racks. the clothes on each rack have similar prices, but the prices among the racks are very different. to estimate the typical price of a single piece of clothing, a consumer will randomly select four pieces of clothing from each rack. what type of sample is the consumer selecting? responses a census a census a cluster sample a cluster sample a simple random sample a simple random sample it is easier to incriminate a young person for infringing on copyright rules under the dmca than to incriminate an older person. Please help will mark brainiest!!!1.) Rowan graphs the function f (x) = 7x + 1 and then transforms the function by horizontally translating it 5 units to the right. What is the newly transformed function, g (x)? in a market, the reduction in total utility that is created when the amount of trade is reduced by some legal or artificial interference with equilibrium is called In tomato plants, having yellow fruit and dwarf vines is the recessive condition. Having red fruit and long vines is the dominant condition. A cross was done between two plants that were heterozygous for both traits.What is the probability the offspring will have yellow fruit and dwarf vines? How many of the following costs related to a refrigerator would be considered a capital expenditure? replace broken shelf install new water filter replace power cord replace door seals.