A(n) _____ is generated by a Web server and then stored on your computer to keep track of the pages you view at a site, the merchandise you select, and other profile information. Class - Computer Essentials

Answers

Answer 1

A cookie is generated by the server and resides on the visitors laptop and holds a modest amount of information specific to the client.

This information can then be accessed by the client or web server.


Related Questions

If u want to learn how to perform an action, which feature of Excel should u use?

Answers

Answer: Use help.

Explanation: Click on the "Help" Tab and then click on the left hand side icon which should say "Help", it has a question mark sign (?). After you click it, on the right hand side, a window should pop up, then type the search criteria.

which evaluation factor will be most important when choosing technology for the company

Answers

Answer:  They are a lot of them

Explanation:

Getting to know the people not to personally

Be a Listener and Know when to shout

Use Wisdom before speaking and Knowledge

Encourage people some times in a month or week  

Which of the following is not an advantage to using a web hosting provider?

Answers

Answer: D. It delivers more information about key terms to search engines to increase website marketability.

Explanation: In order for a website to be on a search engine your website has to be online and up and running for the Web Crawlers to find it. In addition if you host your own website on your own server you can put in the same keywords as you would do usually and get around the same result.

It delivers more information about key terms to search engines to increase website marketability. Option B

Who is a web hosting provider?

A web hosting provider is a company or service that offers the necessary infrastructure and resources to make websites accessible on the internet. They provide the technology and server space required to store website files and make them available to users worldwide.

The web hosting provider does not deliver more information about key terms to search engines to increase website marketability.

Learn more about web hosting provider:https://brainly.com/question/34238289

#SPJ2

The Print command is located in the _____ tab.

Answers

Answer: File (backstage)

Explanation: I earned it in Computers Applications l. :)

what does a equal3/2 a - 13 =5​

Answers

Answer:

(3/2)a =18

3a = 36

a = 12 is the solution

Find the error in the following pseudocode. Module main () Call raiseToPower (2, 1.5) End Module Module raiseToPower (Real value, Integer power) Declare Real result Set result=value^power Display result End Module

Answers

Answer:

Call raiseToPower (2, 1.5) '

or

raiseToPower (Real value, Integer power)

Explanation:

To solve this, first organize the pseudo code,

1) main ()

2) Call raiseToPower (2, 1.5)

3) End Module

4) Module

5) raiseToPower (Real value, Integer power)

6) Declare Real result

7) Set result=value^power

8) Display result

9) End Module

The first three lines in pseudo code are representing the main module. While lines 4-9 shows the definition of module that is being called in main function.  

If we look at the raiseToPower definition at line5, we can see that it is requiring any real value for the base number. However, for power, it defines only integers.

But, in the main function, 1.5 is placed as a power that is not an integer. Therefore, this is the error in pseudo code. It should be changed to any integer.

Alternatively, change the integer power to real power to avoid this error.

Final answer:

The error is that the 'raiseToPower' Module expects an Integer for the second parameter but receives a Real number (1.5) instead.

Explanation:

The error in the provided pseudocode lies in the datatype mismatch between the parameters accepted by the raiseToPower Module and the arguments passed to it from the main Module. The raiseToPower Module expects an Integer as the second parameter, but it is being called with a Real number (1.5) in the main Module. To fix this issue, the raiseToPower Module should be modified to accept a Real datatype for the power parameter, aligning with the type of the argument being passed.

Calculate: Remainder of 47 divided by 13.

Answers

Answer:

Remainder of 47 divided by 13 would be 8.

Explanation:

The reminder is simply defined as the remaining amount if a number is divided by the other number.

Let suppose, there are two numbers a and b. If you want to divide the number b by the number a, the remaining amount x would be known as remainder.

If the number b is exactly divisible by the number a, then the reminder would be zero.

In this case:

b = 47

a = 13

x = ?

Now, [tex]\frac{47}{13}[/tex]

if we multiply 13 by 4, we would get 52. That is greater then 47. Therefore, it should be 13 x 3 = 39.

Therefore, the remainder would be 47 - 39 = 8.  

 

When 47 is divided by 13, the remainder is 8.

To find the remainder of 47 divided by 13, you perform division to see how many times 13 fits into 47 without exceeding it. Thirteen goes into 47 three times (which equals to 39), and when you subtract 39 from 47, you get 8. Therefore, 8 is the remainder when 47 is divided by 13. Calculations like this are a fundamental aspect of number theory, a branch of pure mathematics dedicated to the study of the integers and integer-valued functions. In exams and tests, including BB 450/550, short answer sections require concise answers, and this question would be an example where a brief response, stating only the remainder, would be expected.


How is the development of SaaS related to cloud computing?

Answers

Final answer:

SaaS is a model where software is hosted by a third-party provider and accessed over the internet as part of cloud computing services. Cloud computing has fostered the growth of SaaS by providing scalable, accessible, and cost-effective software solutions with security measures such as in-transit encryption.

Explanation:

The development of SaaS, or Software as a Service, is intricately related to cloud computing. SaaS is a software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet. This is a core aspect of cloud computing which encapsulates the delivery of services over the web, enabling users to access and use software without having to worry about installation, updates, or maintenance. With the evolution of cloud computing, SaaS has become a preferred method for businesses and individuals to use applications, as it offers scalability, accessibility, and cost savings. The cloud provides a centralized location for data storage, and with the right security measures such as in-transit encryption, it ensures that data is protected from unauthorized access or compromise.

Final answer:

The development of SaaS is related to cloud computing as it involves delivering software applications over the Internet and leveraging the infrastructure and platform provided by the cloud.

Explanation:

The development of SaaS (Software as a Service) is closely related to cloud computing. SaaS delivers software applications over the Internet, allowing users to access and use the software remotely without needing installation or maintenance on their own devices. This cloud-based approach to software delivery aligns with the concept of cloud computing, which involves storing, managing, and accessing data and resources over the Internet through remote servers.

Cloud computing provides the infrastructure and platform for SaaS providers to offer their software applications to users. With cloud computing, SaaS companies can utilize the cloud's scalability, flexibility, and cost-effectiveness to deliver their applications to a wide range of users. The cloud provides the necessary resources, such as servers, storage, and network infrastructure, to host and run SaaS applications, ensuring reliable and secure access for users.

to create a formula in______, you would first click in one of the cells​

Answers

Answer:excel

Explanation:

Answer:

To create a formula in Excel  you would first click in one of the cells​

Explanation

Excel is basically calculator with advanced features. It allows the user to enter data in the form of rows and columns and enable to user to perform different kinds of calculation. It has built-in formulas and also certain conditional operation which makes the software to get the best out of it.

The user can also use the macro feature to write macro programs. Some of the common formula used are “Sum(Range), all the other basic operations like addition, multiplication, subtraction, etc.

analyzing computer systems to gather legal evidence is known as the field of?

Answers

Answer:

Analyzing computer systems to gather legal evidence is known as the field of Computer forensics.

Explanation:

Computer forensics is that the application of investigation and analysis techniques to assemble and preserve proof from a selected machine in an exceedingly means that's appropriate for presentation in a court of law. Computer forensics is a branch of forensic science (forensics for short). Forensics is the scientific analysis of individuals, places, and things to gather proof throughout crime investigations, that helps to prove innocence or guilt in court.

Computer forensics generally referred to as digital forensics, features a similar purpose. However, it focuses on the scientific analysis of pc communications and therefore, the knowledge on memory board devices, like disks and CD-ROMs.

Which statement below is not true of EFS

Answers

Statements that do not apply to EFS are statements that EFS cannot store files encrypted.

Further Explanation

Encrypting File System or EFS is a core technology (in Windows 2000, XP Professional, and Windows Server 2003) that allows encrypted file storage in a volume formatted using the NTFS file system.

Version of Windows that supports EFS

Windows 2000 Family: Windows 2000 Professional, Windows 2000 Server, Windows 2000 Datacenter Server, and Windows 2000 Advanced Server Windows XP Family: Windows XP Professional, Windows XP Professional 64-bit Edition, Windows XP Professional x64 Edition Windows Server 2003 Family: Windows Server 2003 Standard Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Datacenter Edition Windows Vista Family: Windows Vista Business Edition, Windows Vista Enterprise Edition, Windows Vista Ultimate Editon Codenamed Longhorn Windows Server family: Longhorn (all beta versions, as of April 2007, reaching Beta 3 version)

EFS uses several cryptographic algorithms, which are as follows:

Data Encryption Standard eXtended (DESX) Triple Data Encryption Standard (3DES) Advanced Encryption Standard (AES) Rivest, Shamir, Adleman (RSA)

Learn More

About Software brainly.com/question/11950006 Type of Data brainly.com/question/10762715

Details:

Grade: Middle School

Subject: Computers and Technology

Keyword: Software, Windows, Encryption, EFS

Which statement below is not true of EFS is EFS cannot store files encrypted.

Explanation:

The Encrypting File System (EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning

Encrypting File System (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.

EFS uses several cryptographic algorithms as follows:

Data Encryption Standard eXtended (DESX)Triple Data Encryption Standard (3DES)Advanced Encryption Standard (AES)Rivest, Shamir, Adleman (RSA)

A cryptographic algorithm is a set of well-defined but complex mathematical instructions used to encrypt or decrypt data. There are three main types of cryptographic algorithms:

(1) secret key(2) public key(3) hash functions

There are two basic types of cryptographic systems such as symmetric (private key) and asymmetric (public key).

Hope it helps!

Learn more about encrypting   brainly.com/question/12742104

#LearnWithBrainly

There are many different types of hardware devices, different manufacturers, and countless configuration possibilities. Explain why all these combinations of devices, manufacturers, and configurations are able to work together without requiring additional work on the part of technicians.

Answers

Because, they are all required to configure to it to be recognized by an operating system.

Explanation:

It is the Operating System Software that instructs the hardware and puts them together to work well. When the manufacturer does not configure the device to be recognized by an operating system, then it will not work with other components.

Example.

If an Apple machine's sound card is being put in an HP machine which uses Microsoft designed operating system, won't work due to the operating system that the sound card has been designed for.

Honesty and integrity, empathy and acceptance, and faith and confidence are examples of

Answers

Final answer:

The student's question about honesty, integrity, empathy, acceptance, faith, and confidence pertains to the broader concepts of personality traits, moral qualities, and academic integrity which are essential for fostering an environment of trust, understanding, and equity in educational settings.

Explanation:

Honesty and integrity, empathy and acceptance, and faith and confidence are examples that can relate to aspects of personality traits and moral qualities which are often discussed in the context of academic integrity and social values within educational settings. For instance, in the context of social studies and character education, these attributes align with the moral compass desired in students and are instrumental in creating a positive academic and social environment.

Academic integrity is central to the foundation of any educational institution, fostering an environment of trust, understanding, and equity. These qualities ensure that students engage in genuine learning and experience meaningful outcomes that are not only important during their academic journey but also throughout their life. When students, faculty, and administrators come together to uphold these standards, they help maintain a fair and positive experience for everyone involved.

Keith has to carry out a photo shoot to capture images of the ocean during the monsoons. What is a recommended practice when shooting in these conditions? A. place absorbent chemical packets in the camera cover B. keep the camera in direct sunlight C. place the camera next to the vent of an air conditioner D. avoid placing the camera in its case

Answers

Answer:

Answer is A: place absorbent chemical packets in the camera cover

Explanation:

Keith is required to carry adequate gear while going for a shoot. And in this case, he should carry anything that will protect his camera from the ocean and rainwater. By anything, I mean anything that Keith will use to stay dry. Using an air conditioner would be the worst idea. An air conditioner might blow the air towards your camera. Placing the camera in its case will ensure that it is dry and Keith will keep on shooting. Placing absorbent chemical packets in the camera cover will ensure that any water droplets that might fall on the cover of the camera will be absorbed. The point here is to keep dry.

Choose the correctly written sentence.
Being naturally shy, the prom was an occasion for Melissa to avoid.
Since Melissa was naturally shy, the prom was an occasion to avoid.
The prom was an occasion to avoid, being naturally shy.
None of the above

Answers

Answer:

i would say the first one

Explanation:

Answer:

Being naturally shy, the prom was an occasion for Melissa to avoid

Explanation:

Describing a person or thing before relating him/her to the reason for his or her action that is to be taken or will be taken in future is the best way to start a sentence that involves Action and reasons behind an action.

The first sentence is complete because it describes Esther talks about the occasion and talks about the action she should take. it is also a correctly written sentence. unlike other sentences that either lack completeness or is wrongly constructed.

how to find determinant of ​

Answers

Some proteins must be altered before they become functional.

To find the determinant of a 2x2 matrix [[a, b], [c, d]], you can use the following formula:

det = ad - bc

Simply multiply the elements on the main diagonal (top-left to bottom-right) and subtract the product of the elements on the other diagonal (top-right to bottom-left).

This straightforward formula applies specifically to 2x2 matrices and provides a quick method for determining their determinant.

The Complete Question

Explain how to find the determinant of a 2x2 matrix.

what does raster graphic mean

Answers

Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space. A raster is a grid of x and y coordinates on a display space. (And for three-dimensional images, a z coordinate.)

What does adding AND to a search query do

Answers

Answer:

Adding AND to a search query provides the search results based on conditions imposed on both side of AND.

Explanation:

AND is often used in search queries to filter the search results based on multiple conditions.

Let's illustrate the working of AND using following example.

Consider the student table shown below.

Now consider the following query is run on student table.

Select *

From Student

Where Marks > 50 AND Age >15;

Since here AND condition is used in Where clause. Therefore,  search result will include all those tuples in which the marks value is more than 50 and along with that the age value is more than 15.

Thus the result of above query will be as follows:

Answer:

Widens the search

According to many experts, how often should files be backed up?
Once a month
Once a year
Once a week
Daily

Answers

Answer:

If I am an expert (which I'm not) I would say once a month.

Explanation:

Well... I backup my computer once a year but that's cause I am lazy. I would recommend that people backup there computers once a month. It also seems to be reasonable.

Answer:

Daily

Explanation:

How many bits are required to store the text of the number "97" in ASCII?'

Answers

Answer:

You need x64 or x32 bits

Explanation:

I don't have a capture or a photo

Answer:

7 bit

Explanation:

On a scale, the basic java programming uses up to 7 bits of data. In other instances, the extended ASCII uses up to 8 bits to generate an additional 128 characters.

the part of the computer that provides acess to the internet is called?

Answers

Answer:

Modem is an hybrid device, which is responsible for modulating and demodulating information. It is a transmission medium and also it is a hardware tool used for connecting to internet.

Explanation:

What is modulation?, let us understand. The process of converting analog to digital signal is called modulation and demodulation is vice-versa. The computer connects internet classically using telephone wire.

The telephone wire understands only analog signal and a computer understands only digital signal. So Modem’s role is to take care of this aspect while connecting to the internet.

Who assesses the work quality produced by web, UI, and UX designers?
art director
design director
project manager
system administrator

Answers

Answer:

Hi, that would be the design director.

Explanation:

Final answer:

Assessment of work quality for web, UI, and UX designers is carried out by leadership roles within a company such as art directors, design directors, or project managers, who ensure the design aligns with user needs and project objectives.

Explanation:

The work quality produced by web, UI, and UX designers is often assessed by professionals holding leadership or managerial positions within the development team or the organization. Depending on the company structure and project complexity, this task can fall to various roles, including the art director, design director, or project manager. These individuals are responsible for evaluating the effectiveness of the design in fulfilling user needs, ensuring that the visual and interactive aspects adhere to the project's goals and standards, and align with the overall strategy.

Art directors are generally in charge of the overall visual style and how it communicates the brand's goals. Design directors specifically oversee the design team, focusing on strategy, process improvements and ensuring design quality meets company standards. Meanwhile, the project manager is typically responsible for the project's successful execution, including time management, budget, and quality, making sure the design aligns with the project's objectives.

It is essential for web and design projects to not only be visually appealing but to also perform their function efficiently, engaging users with thoughtful interaction design and an intuitive user experience. Tools and techniques such as site maps, wireframes, storyboarding, and UML can greatly assist in developing these effective designs.

All computer systems have

Answers

Answer:

they all have ram memory software

Answer:

All computer systems have all the hardware and software for proper functioning.

Explanation:

With the required software and hardware, a computer system will have the ability to receive input, process the information and store the data or display the output. The computer systems include Monitor, keyboard, CPU (Central processing Unit) and other optional components.

Data processing is done using various instructions known as programs that can be written in different computer languages. To perform different operations logically, the instructions are given as set of programs. Without proper instructions, computer would not know how to process the information with which the data will be discarded.  

HELP PLZ !!
In JavaScript, which operator returns the data type of the data it acts upon?
In JavaScript, the
operator returns the data type of the data it acts upon. If the operand is numeric, this operator returns 'Number.'

Answers

Answer:

typeof  operator returns the data type of the data it acts upon

Explanation:

“typeof” is a operator in javascript which “returns” the “data type” of the given data.

For eg:

<script>

document.write(typeof  “John” )

document.writeln(typeof new Date();

document.writeln(typeof 10+20);

document.writeln(typeof 20.4);

document.writeln(typeof function(){});

</script>

The above code is a sample javascript code to explain “typeof” operator. As per the program the first line returns “String”, second returns “date”, third line returns integer”, the next line returns “float” and the last line returns “function”. So, from this we can “conclude” that the “typeof” operator returns data type.

Answer:

typeof

Explanation:

trust me

A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Which operating system should the corporation choose?

Answers

The corporation have variety of choices based on requirement and the financial affordability to use the operating system.  

1. Microsoft windows: It is user-friendly and one of the widely used Operating system. This is GUI (Graphical user Interface) Operating System. But the corporation needs to pay for licence to the Microsoft company.  

2. Unix / Linux: This is once again GUI based and one of the widely used Operating System. This is a free ware. This is also an Open Source where the programmers keep updating the feature.  

3. MS-DOS: This is one of classical operating system which has Character User Interface. User needs to remember so many commands to work with it and it will not suit for the given situation

Answer:

gui

Explanation:

What color model is used by computer monitors

Answers

Answer:

rgb

Explanation:

i mean red, green, blue

DRIVER ED
Motorcyclists are easily hidden in large blind spots and the exposed rider is in constant danger.

A.true
B.false

Answers

This is true. Motorcycles are much smaller than cars and therefore more easily can slip into a blind spot. Motorcyclists also have less protection than other drivers and would likely suffer more injury in a collision.

Answer: True because motorcyclists can be not seen by a car that the bike is traveling up against unless the person is a GOOD driver and knows how to pay attention to their surroundings!

So its like a 50/50 True and False but most likely True

Invention I chose was radio.

1. What’s the made out of?

2. Describe it. (Details about the invention)

3. Has the need for this invention changed over the years?

4. Why was this invention so important and necessary?

5. Is there anything else that’s interesting about your invention?

Answers

Answer:

1. Today's radio consists of an antenna, printed circuit board, resistors, capacitors, coils and transformers, transistors, integrated circuits, and a speaker. All of these parts are housed in a plastic case. An internal antenna consists of small-diameter insulated copper wire wound around a ferrite core.

4 + 2. Whether it's hearing familiar songs, jamming out to today's latest hits, getting critical information during a disaster, the latest news, or learning about important events in the community, consumers trust their favorite radio stations and personalities to get them the information they need when they need it.

3. The Changes to Radios over the last 100 years. Radios have been one of the more important technological devices for more than a century. ... For this era, the radio technology was limited to communications with ships in case of an emergency. In 1907, the first commercial transatlantic radio service was created.

5. Guiglielmo Marconi sent the first ever radio transmission in 1896, so he's considered "the father of radio."

AM stands for Amplitude Modulation and FM stands for Frequency Modulation.

KDKA in Pittsburgh, Pennsylvania was the world's first commercial radio station.

Explanation:

Convert the following from binary format to hexadecimal.
Complete the following table to express 11011000.00011011.00111101.01110110 in
hexadecimal.
Please show all work and explain!

Answers

Answer:try is if this help

Please Help ASAP!!
Which ways can you access the controls for headers and footers? Check all that apply.
-in the Print menu
-in the Review tab
-in the Page Layout view
-in the Design contextual tab
-right-clicking on any cell

Answers

While a report is open, File > Page Setup gives you access to the document that manages all of your report headers and footers. Click Customize for the Header/Footer document located on the General menu after selecting File > Page Setup. Thus, option A, C, D is correct.

What ways you access the controls for headers and footers?

Typically, headers and footers include information about the document, such as the file name, author, creation date, page numbering, and so forth.

You can include photos, page numbers, dates, times, sheet names, file names and paths, and more when you modify your header or footer. See Headers and footers in Word for further information on headers and footers.

Therefore, The reader can quickly explore the document because this information is repeated on each page.

Learn more about headers here:

https://brainly.com/question/4637255

#SPJ3

Other Questions
Mary weighs n kg while her sister weighs 15 kg less. How many times is Mary heavier than her sister? PLEASE HELP!! The centers of two 15.0-kilogram spheres are separated by 3.00 meters. What is the magnitude of the gravitational force that one sphere exerts on the other?A1.11 10-10 NB3.34 10-10 NC1.67 10-9 ND5.00 10-9 N A 4-year old male intact Jack Russell is recovering post-operatively after a lung lobectomy following a coyote attack. The dog is very painful. Which of the following combinations of medications may be given as a constant rate infusion and is commonly used for pain control in the critical care setting?A)Morphine, lidocaine, ketamineB)Diazepam, ketamine, morphineC)Medetomidine, acepromazine, lidocaineD) Propofol, morphine, bupivacaine 25 000,000/10,000No calculator You have the phone number in digits but you need to text it in words, choose the appropriate phone number: 17-64-48-11-32 Seize, cinquante-quatre, douze, treize, vingt-deux Dix-sept, soixante-quatre, quarante-huit, onze, trente-deux Dixsept, trente-quatre, quarante-huit, onze, trente-deux Treize, soixante-quatre, trente-huit, onze, trente-deux In the voting for City Council Precinct 5, only 1/2 of all eligible voters cast votes. Shelley received 3/10 of the votes and Morgan received 5/8 of the votes. What fraction of all eligible voters voted for Shelly? Morgan? Who received the most votes? The given line passes through the points (0, ) and (2, 3). On a coordinate plane, a line goes through (0, negative 3) and (2, 3). A point is at (negative 1, negative 1). What is the equation, in point-slope form, of the line that is parallel to the given line and passes through the point ()? What type of attitude scale is depicted below? ""Marijuana should be legalized for medicinal uses."" ______ ______ _____ ______ ______ strongly moderately neutral/ moderately strongly disagree disagree no opinion agree agree Ms. BK is a self-employed architect who earns $205,000 annual taxable income. For the past several years, her tax rate on this income has been 35 percent. Because of recent tax law changes, Ms. BKs tax rate for next year will decrease to 25 percent. Based on a static forecast, how much less revenue will the government collect from Ms. BK next year? How much less revenue will the government collect from Ms. BK next year if she responds to the rate decrease by working more hours and earning $280,000 taxable income? How much less revenue will the government collect from Ms. BK next year if she responds to the rate decrease by working fewer hours and earning only $180,000 taxable income? Which was the type of colony that was developed to help trade with the local native populations.A~Trading PostB~PlantationC~SettlerD~Mercantilethis one, if you know.Which type of colony was developed for people who fled Europe seeking religious freedom and/or new economic opportunities in the New World?A~MonasteriesB~Trading PostC~SettlerD~PlantationLast one..Which empire(shown below) came to dominate the Americas for three hundred years?A~FrenchB~SpanishC~PortugueseD~Dutch What power of 10 can you multiply 0.02 by to get a product of 20? Highlight the run-on sentence in the passage below. Learning about the past is important because history teaches us lessons that we can apply to our lives today. We look at political documents, records, and historical agreements, they offer hints about life in the past. Life today is very different than it was in early America, and knowing the mistakes, successes, and events of the past is valuable. What is 6.02 nearest tenth According to Pericles, how is Athens different fromother Greek city-states?OAthens has an administration that favors the upperclasses.OAthens has laws that treat all people fairly,regardless of social class.Athens took the best laws of neighboring states andmade them even better.O Athens has a constitution, while other neighboringstates are lawless. How do you calculate the pH of a 1.6 M KOH solution? 5(9+4)+362 divided by 2 Irradiated food may be dangerous because it contains low levels of radioactive compounds.a. Trueb. False A bag contains 22 1/2 cups .A recipe for pancakes uses 1 1/4 cups of flour .how many batches of pancakes can be made with one bag of flour The main goal of science is to1)Collect facts and learn the truth2)Understand nature3)Do wild and crazy experiments4)Is to produce facts What is the solution for the equation 8X 12 = 4x?x= 48x= 30x=3X=1