Which of the following is true of data collection:_________. a. Data collection is of secondary importance to computer security. b. Data collection should not be attempted until there’s a plan in place to analyze and protect the data. c. Data collection should emulate the very effective national collection process. d. None of the above

Answers

Answer 1

Answer:

B). Data collection should not be attempted until there’s a plan in place to analyze and protect the data.

Explanation:

Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.

Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived. The type of research data you collect may affect the way you manage that data.

The goal of a cyber-operator(computer security) is to collect data from a variety of sources to find, track and exploit potential targets.

Answer 2

b) Data collection should not start without a plan for analysis and protection, and ensuring data relevance to the research question is essential. Secondary data analysis has its benefits but may have limitations regarding the original data collection context.

The correct answer to the student's question on data collection is option b: Data collection should not be attempted until there's a plan in place to analyze and protect the data. It is crucial to have a clear plan for how the data will be used, analyzed, and secured before beginning the data collection process. Without proper planning, there is a significant risk of collecting data that is irrelevant or not useful for the research objectives. Therefore, adequate planning ensures that the data collected is pertinent to the research questions, and care is taken to minimize biases and errors.

In the realm of research design, it's essential to decide on the data collection method and timing well in advance. This process includes considerations for both primary and secondary data collection, where the latter involves analyzing data that another party has already gathered.

Secondary data analysis has its strengths and limitations, and it's important to evaluate the procedures used to collect the secondary data before using it. Although secondary data analysis can save time and resources, it may lack the necessary detail or context required for the research project, which can be a constraint.


Related Questions

can you help me with a layout for a cafe?​

Answers

I linked an image below, I feel like I know what you're doing... you can use this image for reference. Change a few things now and there to make it your perfect cafe layout!

The Electronic Communications Privacy Act requires different legal processes to obtain specific __________ information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
a. transactionalb. basic subscriberc. contentd. real-time access

Answers

The Electronic Communications Privacy Act requires different legal processes to obtain specific TRANSACTIONAL information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.

Explanation:

Transactional information is all the information contained within a business unit. The primary purpose of transactional information is to support day-to-day operations of the unitExamples of transactional information include: sales receipt, packing slip, purchase confirmation, etc.Databases that can handle transactions are known as transactional databases. The main purpose of a database is to ensure accuracy and integrity of information. Transaction data is data describing an event  and is usually described with verbs. Transaction data always has a time dimension, a numerical value and refers to one or more objects Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work that is treated as a unit for the purposes of satisfying a request.

Ch. 6 Agile Modeling & Prototyping SDLC vs. Prototyping "I’ve got the idea of the century!" proclaims Bea Kwicke, a new systems analyst with your systems group. "Let’s skip all this SDLC garbage and just prototype everything. Our projects will go a lot more quickly, we’ll save time and money, and all the users will feel as if we’re paying attention to them instead of going away for months on end and not talking to them." A) List the reasons and conditions , you, as a member of the same team as Bea, would give her to utilize an SDLC and not just prototype every project. That is, tell Bea when you would use an SDLC. B) Bea is pretty disappointed with what you have said. To encourage her, use a paragraph to explain the situations you think would lend themselves to prototyping.

Answers

Answer:

Refer below.

Explanation:

A.The SDLC ought not be rejected for each venture since certain frameworks might be rashly molded before the issue or opportunity being tended to is altogether comprehended. Additionally, utilizing prototype as an option may bring about utilizing a framework that is acknowledged by explicit gathering of clients yet which is insufficient for in general framework needs. In numerous framework prototyping can be effectively incorporated with SDLC approach. For surely knew frameworks, a straight SDLC approach has demonstrated its value.

B.In epic or complex circumstance, prototyping is a perfect mechansim for better understanding client prerequisites, and for getting client input for improving framework viability. What's more, prototyping has demonstrated valuable when fused into SDLC. This combination is especially helpful in better learning client needs.

Which of the following factors is needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators, especially when the online channel is primarily text-based?A) directness of messages B) increased amount of social information conveyed C) extended time D) personalization of message content

Answers

Answer:

Option C

Extended time

Explanation:

Josepth Walther proposed the social information processing theory, where he said that given sufficient time, Computer-Mediated Communication (CMC) can adapt and still develop interpersonal relationships.

Joseph emphasised the place of extended time as a crucial variable in CMC.

This is because CMC takes at least four times as long to process messages, and it also requires that messages be sent more often. It also needs the use of anticipate future interactions and chronemic cues to establish a good relationship between the two communicators.

Extended time is a key factor needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators

Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field properties to provide additional context to the field that is not displayed (Last Name).

A) captionB) detailsC) formatD) index

Answers

Answer:

Option A Caption

Explanation:

Caption is a direct and short description about the field that provide more contextual info about the field. For example, if a target field is expected to store a last name value, we can just put the string "Last Name" in the caption field to offer a more descriptive info about the field. This is a useful feature to enable database designer to stick with the naming convention of the database field names and on another hand does't compromise the descriptive level of each field.  

_____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup Language (SGML) Hypertext Markup Language (HTML) Hypermedia/Time-based Structuring Language (HyTime) Extensible Markup Language (XML)

Answers

Extensible Markup Language (XML) is a markup language designed to transport and store data on the Web.

Explanation:

Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readableExtensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.Markup means that XML's primary task is to give definition to text and symbols. It is a textual data format with strong support, Unicode for different human languages.Extensible Markup Language (XML) is used to describe data.The design goals of XML emphasize simplicity, generality, and usability across the Internet. It is a text-based markup language derived from Standard Generalized Markup Language (SGML).

In addition to paying $100 per month for health insurance, sam is responsible for paying her first $500 of medical bills every year before her insurance covers and cost. The $500 sam must pay is called the:

Answers

Answer:

Deductible

Explanation:

Deductible is the amount you must pay for a health care service before your health insurance begin to cover your remaining costs. Deductibles are not compulsory for all health care services therefore before registering to any insurance company, you should ask the company for list of covered service so that you  can prevent unwanted billing surprises. After you pay your deductible, you usually pay only a copayment or coinsurance for covered services

Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and associates that value with total. Thus your code should associate 1*1 2*2 3*3 ... 49*49 50*50 with total. Use no variables other than k and total.

Answers

Answer:

total=0

def calcsumnumsquare(k,total):

   while k>=1:

       total+=int(k)*int(k)

       k-=1

   return total

print(calcsumnumsquare(4,0))

Explanation:

The program required is written above. It uses only two variables k and total as mentioned in the question. And the total is initially set to 9, and then its value is incremented by the square of each k during each loop established by while loop. And finally, when k=1, the output is returned. And we have printed the return value using print.

Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet. It refers to the language used to create and format Web pages. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. It refers to the broadband service provided via light-transmitting fiber-optic cables.

Answers

Answer:

Your answer is B. It refers to the language used to create and format Web pages.

Explanation:

HTML stands for "Hyper Text Markup Language", which is a specification used on any webpage, ever. It was created by Sir Tim Berners-Lee in late 1991 and was officially released in 1995. This language is actually what is sent to your browser, which then interprets it and allows you to see the pretty pictures of Brainly.com! As of right now, HTML is at it's 5th revision, also known as HTML5, which is another term you'll see around.

Thanks, let me know if this helped!

Answer:

b

Explanation:

Which of the following is considered a part of due diligence? a. The scope of the Plan-Do-Check-Act (PDCA) model b. Metrics and best practices of information technology (IT) related processes c. A written and tested business continuity plan d. Information security management e. None of the other answers is correct

Answers

Answer:

C

Explanation:

A written and tested business continuity plan is considered as a part of due diligence.

Cheers

Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam. The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.

Answers

Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam.

Explanation:

The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.

import java.util.*;

class DriverExam{

char[] answer = new char[]{ 'B','D','A','A','C','A','B','A','C','D','B','C','D','A','D','C','C','B','D','A'};

int correct=0,inCorrect=0;

int[] missed = new int[20];

boolean passed(){

if(this.correct >= 15){

return true;

}

return false;

}

int totalCorrect(){

return this.correct;  

}

int totalIncorrect(){

return this.inCorrect;

}

int[] questionsMissed(){

return this.missed;

}

}

public class Main

{

  public static void main(String[] args) {

  Scanner in = new Scanner(System.in);

      System.out.println("Input : A,B,C,D");

System.out.println("Note : Any other inputs will result in skipping that question");

      DriverExam exam = new DriverExam();

      int i,missedIndex=0;

      for(i=0;i<20;i++){

      System.out.print("Answer "+(i+1)+" : ");

      char check = in.next().charAt(0);

      if(exam.answer[i]==check){

      (exam.correct)++;

      }

Boolean operators (AND, OR, NOT) affect your search results. If you do a search in Quick SearchLinks to an external site. for books using the search phrase graffiti AND Los Angeles, you'll retrieve about 10 records for books. If you re-do that search as graffiti OR Los Angeles, you will broaden your search results (retrieve more records). Why is this so?

Answers

Answer

Search engines use operators to more heavily define your search

Explanation:

In this instance, when using the boolean AND, the engine is searching for a book that talks about BOTH graffiti and Los Angeles or Graffiti in Los Angles. When you use OR you get more results because it is searching for books that are either about graffiti OR Los Angles. When using OR the criteria is not as strict and therefore returns more results.

Which sort algorithm starts with an initial sequence of size 1, which is assumed to be sorted, and increases the size of the sorted sequence in the array in each iteration? insertion sort selection sort merge sort quicksort

Answers

Answer:

The correct answer is "Insertion Sort".

Explanation:

Insertion sort seems to be a specific sorting or ordering algorithm which creates one element at the same time, the ultimate sorted list. This sorting sophistication seems to be O(n) for the best scenario and O(n2) for the worst category.

Sort of insertion throughout java has always been a decent option for limited array sizes and even when you recognize the elements or items are mostly ordered.Kind of insertion requires a nested loop like upper as well as lower loop.

Pamela is asked to use a data visualization tool and show the relative frequency of the 50​ most-used terms in survey responses. this information is to be posted on the company website. for this pamela should use​ __________.



a. tag clouds



b. clustering



c. lists



d. linkage maps



e. calendar motifs

Answers

Answer:

a. tag clouds

Explanation:

Tag clouds or word cloud is a form of data visualization that shows the most occurring word or words in an edited text input.

Clustering is a technique in data analytics that categorizes data based on data types, separating them into clusters.

List  is a data types in data analysis programming languages

Describe the parliamentary meeting procedure and its purpose.
I NEED HELP PLZ?!?

Answers

Answer:

Explanation:

Parliamentary procedure is a bunch of "proven rules" that were designed to move business along during a meeting. This would all occur while maintaining order and controlling communication.

The purpose of these rules is simple; help groups accomplish tasks through the "orderly" democratic process.

Answer:

The parliamentary meeting procedure begins when a meeting is called to order. After the meeting is called to order, any past business is discussed. Afterwards, any member can raise a motion. Motions are discussed and can be voted on. Once all business has been discussed, a meeting is adjourned, or ended. The purpose of parliamentary meeting procedure is to ensure all members of the meeting are treated fairly and the meeting is efficient.

Explanation:

Right on Edge

1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in a group header; the Social Security number, name, and telephone number of each current student in the detail section; and the student count in group footer. 2. Create a switchboard design with control buttons that lead to students, instructors, courses, course schedules, and course rosters. Allow a user to add, update, or delete records in each area. Jesse wants to see storyboards that show the proposed screens. 3. Suggest data validation checks for data entry screens. 4. Create a source document for an SCR mail-in registration form. Also need a design for a Web-based course registration form.

Answers

Answer:The interface is the means by which a user communicates with a system, whether to get it to perform some function or computation directly (e.g., compute a trajectory, change a word in a text file, display a video); to find and deliver information (e.g., getting a paper from the Web or information from a database); or to provide ways of interacting with other people (e.g., participate in a chat group, send e-mail, jointly edit a document). As a communications vehicle, interfaces can be assessed and compared in terms of three key dimensions: (1) the language(s) they use, (2) the ways in which they allow users to say things in the language(s), and (3) the surface(s) or device(s) used to produce output (or register input) expressions of the language. The design and implementation of an interface entail choosing (or designing) the language for communication, specifying the ways in which users may express ''statements" of that language (e.g., by typing words or by pointing at icons), and selecting device(s) that allow communication to be realized-the input/output devices.

Box 3.1 gives some examples of choices at each of these levels. Although the selection and integration of input/output devices will generally involve hardware concerns (e.g., choices among keyboard, mouse, drawing surfaces, sensor-equipped apparel), decisions about the language definition and means of expression affect interpretation processes that are largely treated in software. The rest of this section briefly describes each of the dimensions and then examines how they can be used

Explanation:

CottonPlus, a sportswear company, is releasing a new casual sportswear line. The company approaches a basketball star to endorse the new line and hosts a 10-kilometer run where the star is spotted wearing the new clothes. Which element of a program plan does this scenario illustrate?

Answers

Answer: Tactics

Explanation:

  According to the given question, the tactics is one of the type of element of the given program planning that helps in illustrating the given scenario as by using the various types of tactics marketing approach we can easily promote the products in the market.

The tactics is one of the legal or authorized element which deals with the new products in the market.In the given scenario, the Cotton Plus is one of the sportswear organization and the main strategy of the company is to approach the basketballs stars for promoting their latest collection.

 Therefore, Tactics is the correct answer.

Is a psychrometer more likely used at a beach or a desert in California

Answers

Answer:

the desert

Explanation:

hope this helped

IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition, business units have tools for their particular units that individuals can use to report on and analyze collected data. This IT governance approach is best described as: ________.

Answers

Answer:

Federalism

Explanation:

IT companies apply different governance approaches like Distributed Control, Decentralized, Federalism, joint-Control, and Centralized control but in above mentioned scenario it is federalism which is best fitted in this case.

Answer:

Federalism

Explanation:

Federalism is a type of government in which the power is divided between the national government and other governmental units. It contrasts with a unitary government, in which a central authority holds the power, and a confederation, in which states, for example, are clearly dominant. Federalism is a system of government that divides power between a political unit and a central authority. Power is spread between a minimum of two units with powers divided between the parts. ... Some examples of Federalism include the United States, Canada, and the European Union.

Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________. A) spam B) adware C) phishing mail D) a worm E) a Trojan horse

Answers

Answer:

The correct answer to the following question will be Option D (a worm).

Explanation:

A PC worm seems to be a form of harmful, self-replicating software that often infects other machines while remaining onto corrupted devices.

Worms may often go overlooked before their excessive propagation cycle utilizes machine resources, stopping the encrypted file as well as slowing it down.The virus is quickly spreading inside the company's servers leading the server or computer to fail.

The other three options are not related to the given scenario. So that Option D is the right answer.

The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain

Answers

Answer:

both MAC and IPv4 addresses of the DHCP server

FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server

FF-FF-FF-FF-FF-FF and 255.255.255.255

MAC address of the DHCP server and 255.255.255.255

Explanation:

When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

At the expiration of the assigned IPV4 address, the work station will send a DHCPDISCOVER message so as to initiate the process of getting an authentic IP address. This is because the workstation cannot identify the DHCP serves address.

The second layer address broadcast FF-FF-FF-FF-FF-FF is adopted on the ethernet frame and is assumed to be broadcasted on all equipment.

255.255.255.255 is the 3rd layer address used to label the exact same host.

Object-oriented systems have three general types of cohesion: _____, _____, and _____. A. method, class, inheritance B. method, generalization/specialization, inheritance C. generalization/specialization, class, object D. method, class, generalization/specialization E. functional, sequential, procedural

Answers

Answer:

D. method, class, generalization/specialization

Explanation:

The Cohesion is said to be the level to what an element of a module is related to others. Generally, the cohesion can be understood as an internal adhesive that holds together the modules. If the software is good then it is going to have high cohesion. Method and class are type of cohesion, as they hold the modules together. And generalization/specialization also is a general type of cohesion as generalization tracks the common features among the class, and binds them into one superclass. However, the specialization means creating subclasses out of the classes, and which is the meaning of the specialization. In an ideal situation, there should be high cohesion or single responsibility. However, in the case of inheritance, there can be multiple responsibilities. And hence composition like a generalization, specialization, association, aggregation are used to make use of the composition for reuse rather than inheritance. Have you seen language supporting multiple inheritances. You will never see it though there is some way. And its never allowed to ensure high cohesion. And hence three general types of cohesion are method, class and generalization/specialization. And this is option D.

Ophelia is entering a Get Fit! sporting goods store in a shopping mall when her heel gets caught in a heating grate at the threshold between the mall and the store. She falls, is injured, and sues the store. After the accident, Get Fit! installs signs just inside the threshold, warning customers to watch their step. A few months later, the mall installs new thresholds with the heating grates on the ceiling instead of the floor. At trial, the manager of Get Fit! testifies that he had no control over the location of the heating grates on the threshold since the threshold was owned by the mall. On rebuttal, the plaintiff wants to bring in evidence of both the sign installation and the re-design of the grate.
a. Preclude both the sign installation and the re- design of the threshold as inadmissible under Rule 407.
b. Preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control.
c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.
d. Allow evidence of both the re-design of the threshold and the sign installation.

Answers

Answer:

The correct answer is c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.

Explanation:

It is possible that Get Fit! will carry out the installation of the signs taking into account that he was going to be sued by Ofelia. What is shown in the statement is that this company anticipated the facts, and for this reason, at the time of the trial, it has adequate signage that may affect the judge's verdict. For this reason, Ofelia is left with no choice but to make a rebuttal based on reliable evidence that the sign was not found when she fell on the heating grid, for which she must attach photographic records or collect testimonies from people who were in that place when the accident happened.

Final answer:

Evidence regarding the sign installation may be permitted to suggest Get Fit! had b. control over the area of Ophelia's fall, while evidence of the threshold re-design is likely to be precluded under Rule 407 as a subsequent remedial measure.

Explanation:

The correct answer to the question of what evidence should be precluded or allowed in Ophelia's lawsuit against Get Fit! is the preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control. Under Rule 407 of the Federal Rules of Evidence, subsequent remedial measures are generally not admissible to prove negligence, culpable conduct, or a need for a warning.

However, they can be allowed to prove ownership, control, or feasibility of precautionary measures, if contested. The sign installation could potentially show Get Fit!'s acknowledgment of an issue and suggest control over the area where the injury occurred, while the re-design of the threshold by the mall is a subsequent measure taken to improve safety, not an admission of liability.

Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how a client, such as a browser, finds an address on the Internet without having to know the IP address.Which of the following is the recommended and secure version of that service?Domain Name System Security Extensions (DNSSEC) Remote access Secure/Multipurpose Internet Mail Extensions (S/MIME)

Answers

Answer:

Domain Name System Security Extensions (DNSSEC)

Explanation:

True or false: You buy a new game for your smartphone, and instead of going through the tutorial, you learn how the game works just through trial and error, without any prior knowledge or expectation. This is an example of bottom-up processing.

Answers

Answer: i think it is true because i have  heard of that saying before with my friends i am a pc expert i know lots about them

Explanation: i heard the saying before

Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
a. sarcasm; difficult
b. exaggeration; simple
c. sarcasm; simple
d. exaggeration; difficult

Answers

Answer:

sarcasm , difficult

Explanation:

Sarcasm make it difficult to classify online content as positive ,negative or neutral because sarcasm content had many meaning and it involve some humor also which make it difficult weather to classify as positive or negative or neutral.

how do you code on code.org?

Answers

Answer:

You can ask the person that introduced you to code.org or search up online tutorials to help you code and build programs/apps.

To code on Code.org, create an account, select an appropriate course, and follow the interactive tutorials. Beginners can use block-based coding, while advanced users can switch to text-based coding. Practice regularly to improve your skills.

How to Code on Code.org :

Coding on Code.org is a great way to learn programming basics in a fun and interactive way. Follow these steps to get started:

Create an Account: First, create an account on Code.org by visiting the website and signing up using your email or a Go ogle account.Select a Course: Code.org offers a variety of courses based on your age and skill level. Choose a course that matches your experience and interests.Start Learning: Once you've selected a course, follow the step-by-step tutorials. Each lesson includes easy-to-understand instructions and interactive coding puzzles.Use Blocks or Text-Based Coding: Code.org allows beginners to use a block-based coding approach. If you are more advanced, you can switch to text-based coding to practice writing actual code.Practice Regularly: Consistent practice is key to becoming proficient. Spend some time each day working on coding puzzles and projects.

If coding seems difficult at first, don't be discouraged. With time and patience, you will find it easier to understand, and you'll enjoy solving more complex problems. For more advanced learners, understanding loops, conditional statements, and functions will greatly enhance your coding experience.

What is the name of the small square in the bottom right-hand corner of a selected cell or range called?

grab bar
Autofill
fill handle
Flash Fill bar

Answers

Answer:

Fill Handle

Explanation:

because google told me

Fill handle ik because i looked it up lol

COGNITIVE ASSESSMENT What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions? Group of answer choices an operating system a file utility a system utility application software

Answers

Answer:

An operating system

Hope this helps! :)

what other apps are associated with google forms.

Answers

Answer:

Explanation:

There are google classroom

Other Questions
what had originally been used to bleach clothing before the industrial revolution?why did this change? A triangular prism was sliced parallel to its base. What is the shape of the cross section shown in the figure? Distribute 5000 among three friends in ratio of 1:2:3.What will be the greatest share? 8/10 divided by 1/2=?show how you got the answer which technology was orginally predicted by a science fiction A car is traveling at a speed of 120 kilometers per hour. What is the car's speed in miles per hour? How many miles will the car travel in 4 hours? At the end of the chapter, Ponyboy states, I had taken the long way around, but I was finally home. To stay. (pg. 99) What does this quote tell us about Ponyboy?The Outsiders ch6 I need help please !!!!!!!! List four levels of party organization. What caused a "hot war to break out in Korea? Identify the verbal phrase in the sentence and determine its type.The man mowing our grass is our neighbor.Verbal phrase: Type: 1. Which person from Vietnams history can accurately be compared to Chinas Mao Tse Dong? Explain why. 2. How did what happened in Vietnam remind you of what happened in Korea? Give 2 similarities: A. B. 3. What type of government does Vietnam have now? _________________________________4. Do you think what happened in SE Asia with Vietnam proves or disproves Americas belief in the Domino Theory? Explain your answer. A bag has 24 marbles: 6 green, 6 red, and 12 blue. Lucy reaches in the bag and picks out 1 marble. Answer the following:What is the total number of marbles?What is half the total number of marbles? Name an event that is impossible: Name an event that is certain:Name an event that is as likely as not:Name an event that is more likely than not: Name an event that is unlikely: In a box the number of blue counters and the number green counters are in the ratio 7:4. The number of green counters and the number of red counters are in the ratio 3:1. The total number of counters in the bag is 444. How many green counters are in the bag? Now, suppose that all the English and the whole English army were to leave India, taking with them all their cannon and their splendid weapons and everything, then who would be rulers of India? Is it possible that under these circumstances two nationsthe Muslims and the Hinduscould sit on the same throne and remain equal in power? Most certainly not.The aims and objects of the Indian National Congress are based upon an ignorance of history and present-day realities; they do not take into consideration that India is inhabited by different nationalities; they presuppose that the various religions, castes, and ethnic groups of India can all be treated alike and all of them belong to the same nation. For the successful running of a democratic government, it is essential that the majority should have the ability to govern not only themselves but also unwilling minorities. I consider the experiment that the Indian National Congress wants to make fraught with dangers and suffering for all the nationalities of India, but especially for the Muslims. The Congress cannot rationally prove its claim to represent the opinions, ideals, and aspirations of the Muslims.Syed Ahmad Khan, Indian Muslim educator and political reformer, speech given before the Muslim community of Meerut in northern India, 1888a) Explain ONE way that the passage illustrates a response to European colonialism.b) Explain ONE way in which the circumstances of the speech might have affected the author's argument in the passage.c) Explain ONE way in which the authors point of view is significant for illustrating how European ideologies influenced the development of Indian society in the nineteenth century. A rectangular container 100cm long,60cm wide and 80cm high is filled with water up to the level of 50cm.What is the volume of the empty spaceA.480,000cmB.180,000cmC.300,000cmD.240,000cm Find the volume of a pyramid with a square base, where the side length of the base is 18.5 in18.5 in and the height of the pyramid is 10.9 in10.9 in. Round your answer to the nearest tenth of a cubic inch. Two young sumo wrestlers decided to go on a special diet to gain weight rapidly. They each gained weight at a constant rate.The weight (in kilograms) of the first wrestler as a function of time (in months) is given by the following table of values:Time\text{Time}Timestart text, T, i, m, e, end text (months)Weight\text{Weight}Weightstart text, W, e, i, g, h, t, end text (kilograms)3333959595954.54.54.54, point, 5101.75101.75101.75101, point, 756666108.5108.5108.5108, point, 5The graph of the weight (in kilograms) of the second wrestler as a function of time (in months) is shown below.Which wrestler weighed more at the beginning of the diet?Choose 1 answer:Choose 1 answer:(Choice A)AThe first wrestler(Choice B)BThe second wrestler(Choice C)CThey weighed the sameWhich wrestler gained weight faster?Choose 1 answer:Choose 1 answer:(Choice A)AThe first wrestler(Choice B)BThe second wrestler(Choice C)CThey both gained weight at the same rate1\small{1}12\small{2}23\small{3}34\small{4}45\small{5}56\small{6}67\small{7}78\small{8}89\small{9}910\small{10}1020\small{20}2030\small{30}3040\small{40}4050\small{50}5060\small{60}6070\small{70}7080\small{80}8090\small{90}90100\small{100}100110\small{110}110120\small{120}120Time (months)Weight (kilograms) which table represents an exponential decay function Any policy aimed at lowering the natural rate of unemployment must either ______ the rate of job separation or ______ the rate of job finding. Group of answer choices reduce; increase increase; reduce reduce; reduce increase; increase