Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet. It refers to the language used to create and format Web pages. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. It refers to the broadband service provided via light-transmitting fiber-optic cables.

Answers

Answer 1

Answer:

Your answer is B. It refers to the language used to create and format Web pages.

Explanation:

HTML stands for "Hyper Text Markup Language", which is a specification used on any webpage, ever. It was created by Sir Tim Berners-Lee in late 1991 and was officially released in 1995. This language is actually what is sent to your browser, which then interprets it and allows you to see the pretty pictures of Brainly.com! As of right now, HTML is at it's 5th revision, also known as HTML5, which is another term you'll see around.

Thanks, let me know if this helped!

Answer 2

Answer:

b

Explanation:


Related Questions

Pamela is asked to use a data visualization tool and show the relative frequency of the 50​ most-used terms in survey responses. this information is to be posted on the company website. for this pamela should use​ __________.



a. tag clouds



b. clustering



c. lists



d. linkage maps



e. calendar motifs

Answers

Answer:

a. tag clouds

Explanation:

Tag clouds or word cloud is a form of data visualization that shows the most occurring word or words in an edited text input.

Clustering is a technique in data analytics that categorizes data based on data types, separating them into clusters.

List  is a data types in data analysis programming languages

What is the name of the small square in the bottom right-hand corner of a selected cell or range called?

grab bar
Autofill
fill handle
Flash Fill bar

Answers

Answer:

Fill Handle

Explanation:

because google told me

Fill handle ik because i looked it up lol

Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam. The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.

Answers

Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam.

Explanation:

The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.

import java.util.*;

class DriverExam{

char[] answer = new char[]{ 'B','D','A','A','C','A','B','A','C','D','B','C','D','A','D','C','C','B','D','A'};

int correct=0,inCorrect=0;

int[] missed = new int[20];

boolean passed(){

if(this.correct >= 15){

return true;

}

return false;

}

int totalCorrect(){

return this.correct;  

}

int totalIncorrect(){

return this.inCorrect;

}

int[] questionsMissed(){

return this.missed;

}

}

public class Main

{

  public static void main(String[] args) {

  Scanner in = new Scanner(System.in);

      System.out.println("Input : A,B,C,D");

System.out.println("Note : Any other inputs will result in skipping that question");

      DriverExam exam = new DriverExam();

      int i,missedIndex=0;

      for(i=0;i<20;i++){

      System.out.print("Answer "+(i+1)+" : ");

      char check = in.next().charAt(0);

      if(exam.answer[i]==check){

      (exam.correct)++;

      }

Boolean operators (AND, OR, NOT) affect your search results. If you do a search in Quick SearchLinks to an external site. for books using the search phrase graffiti AND Los Angeles, you'll retrieve about 10 records for books. If you re-do that search as graffiti OR Los Angeles, you will broaden your search results (retrieve more records). Why is this so?

Answers

Answer

Search engines use operators to more heavily define your search

Explanation:

In this instance, when using the boolean AND, the engine is searching for a book that talks about BOTH graffiti and Los Angeles or Graffiti in Los Angles. When you use OR you get more results because it is searching for books that are either about graffiti OR Los Angles. When using OR the criteria is not as strict and therefore returns more results.

Object-oriented systems have three general types of cohesion: _____, _____, and _____. A. method, class, inheritance B. method, generalization/specialization, inheritance C. generalization/specialization, class, object D. method, class, generalization/specialization E. functional, sequential, procedural

Answers

Answer:

D. method, class, generalization/specialization

Explanation:

The Cohesion is said to be the level to what an element of a module is related to others. Generally, the cohesion can be understood as an internal adhesive that holds together the modules. If the software is good then it is going to have high cohesion. Method and class are type of cohesion, as they hold the modules together. And generalization/specialization also is a general type of cohesion as generalization tracks the common features among the class, and binds them into one superclass. However, the specialization means creating subclasses out of the classes, and which is the meaning of the specialization. In an ideal situation, there should be high cohesion or single responsibility. However, in the case of inheritance, there can be multiple responsibilities. And hence composition like a generalization, specialization, association, aggregation are used to make use of the composition for reuse rather than inheritance. Have you seen language supporting multiple inheritances. You will never see it though there is some way. And its never allowed to ensure high cohesion. And hence three general types of cohesion are method, class and generalization/specialization. And this is option D.

Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________. A) spam B) adware C) phishing mail D) a worm E) a Trojan horse

Answers

Answer:

The correct answer to the following question will be Option D (a worm).

Explanation:

A PC worm seems to be a form of harmful, self-replicating software that often infects other machines while remaining onto corrupted devices.

Worms may often go overlooked before their excessive propagation cycle utilizes machine resources, stopping the encrypted file as well as slowing it down.The virus is quickly spreading inside the company's servers leading the server or computer to fail.

The other three options are not related to the given scenario. So that Option D is the right answer.

True or false: You buy a new game for your smartphone, and instead of going through the tutorial, you learn how the game works just through trial and error, without any prior knowledge or expectation. This is an example of bottom-up processing.

Answers

Answer: i think it is true because i have  heard of that saying before with my friends i am a pc expert i know lots about them

Explanation: i heard the saying before

Disrupting a business's ability to conduct electronic commerce is cönsidered an act of

Answers

Answer:

Digital Restrictions

Explanation:

This is the process that arises as a result of not meeting specific ethical standards and procedures for operating an online business on the form of electronic commerce. Such situation could be as a result of important factors like:

1. Unduly registered or incorporated businesses

2. Lack of patent or trademark to shown authenticity of product or services

3. Inability to provide certified prove of ownership to avoid fraudulent acts and others.

Is a psychrometer more likely used at a beach or a desert in California

Answers

Answer:

the desert

Explanation:

hope this helped

Which sort algorithm starts with an initial sequence of size 1, which is assumed to be sorted, and increases the size of the sorted sequence in the array in each iteration? insertion sort selection sort merge sort quicksort

Answers

Answer:

The correct answer is "Insertion Sort".

Explanation:

Insertion sort seems to be a specific sorting or ordering algorithm which creates one element at the same time, the ultimate sorted list. This sorting sophistication seems to be O(n) for the best scenario and O(n2) for the worst category.

Sort of insertion throughout java has always been a decent option for limited array sizes and even when you recognize the elements or items are mostly ordered.Kind of insertion requires a nested loop like upper as well as lower loop.

Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
a. sarcasm; difficult
b. exaggeration; simple
c. sarcasm; simple
d. exaggeration; difficult

Answers

Answer:

sarcasm , difficult

Explanation:

Sarcasm make it difficult to classify online content as positive ,negative or neutral because sarcasm content had many meaning and it involve some humor also which make it difficult weather to classify as positive or negative or neutral.

Which of the following is considered a part of due diligence? a. The scope of the Plan-Do-Check-Act (PDCA) model b. Metrics and best practices of information technology (IT) related processes c. A written and tested business continuity plan d. Information security management e. None of the other answers is correct

Answers

Answer:

C

Explanation:

A written and tested business continuity plan is considered as a part of due diligence.

Cheers

_____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup Language (SGML) Hypertext Markup Language (HTML) Hypermedia/Time-based Structuring Language (HyTime) Extensible Markup Language (XML)

Answers

Extensible Markup Language (XML) is a markup language designed to transport and store data on the Web.

Explanation:

Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readableExtensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.Markup means that XML's primary task is to give definition to text and symbols. It is a textual data format with strong support, Unicode for different human languages.Extensible Markup Language (XML) is used to describe data.The design goals of XML emphasize simplicity, generality, and usability across the Internet. It is a text-based markup language derived from Standard Generalized Markup Language (SGML).

1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in a group header; the Social Security number, name, and telephone number of each current student in the detail section; and the student count in group footer. 2. Create a switchboard design with control buttons that lead to students, instructors, courses, course schedules, and course rosters. Allow a user to add, update, or delete records in each area. Jesse wants to see storyboards that show the proposed screens. 3. Suggest data validation checks for data entry screens. 4. Create a source document for an SCR mail-in registration form. Also need a design for a Web-based course registration form.

Answers

Answer:The interface is the means by which a user communicates with a system, whether to get it to perform some function or computation directly (e.g., compute a trajectory, change a word in a text file, display a video); to find and deliver information (e.g., getting a paper from the Web or information from a database); or to provide ways of interacting with other people (e.g., participate in a chat group, send e-mail, jointly edit a document). As a communications vehicle, interfaces can be assessed and compared in terms of three key dimensions: (1) the language(s) they use, (2) the ways in which they allow users to say things in the language(s), and (3) the surface(s) or device(s) used to produce output (or register input) expressions of the language. The design and implementation of an interface entail choosing (or designing) the language for communication, specifying the ways in which users may express ''statements" of that language (e.g., by typing words or by pointing at icons), and selecting device(s) that allow communication to be realized-the input/output devices.

Box 3.1 gives some examples of choices at each of these levels. Although the selection and integration of input/output devices will generally involve hardware concerns (e.g., choices among keyboard, mouse, drawing surfaces, sensor-equipped apparel), decisions about the language definition and means of expression affect interpretation processes that are largely treated in software. The rest of this section briefly describes each of the dimensions and then examines how they can be used

Explanation:

how do you code on code.org?

Answers

Answer:

You can ask the person that introduced you to code.org or search up online tutorials to help you code and build programs/apps.

To code on Code.org, create an account, select an appropriate course, and follow the interactive tutorials. Beginners can use block-based coding, while advanced users can switch to text-based coding. Practice regularly to improve your skills.

How to Code on Code.org :

Coding on Code.org is a great way to learn programming basics in a fun and interactive way. Follow these steps to get started:

Create an Account: First, create an account on Code.org by visiting the website and signing up using your email or a Go ogle account.Select a Course: Code.org offers a variety of courses based on your age and skill level. Choose a course that matches your experience and interests.Start Learning: Once you've selected a course, follow the step-by-step tutorials. Each lesson includes easy-to-understand instructions and interactive coding puzzles.Use Blocks or Text-Based Coding: Code.org allows beginners to use a block-based coding approach. If you are more advanced, you can switch to text-based coding to practice writing actual code.Practice Regularly: Consistent practice is key to becoming proficient. Spend some time each day working on coding puzzles and projects.

If coding seems difficult at first, don't be discouraged. With time and patience, you will find it easier to understand, and you'll enjoy solving more complex problems. For more advanced learners, understanding loops, conditional statements, and functions will greatly enhance your coding experience.

CottonPlus, a sportswear company, is releasing a new casual sportswear line. The company approaches a basketball star to endorse the new line and hosts a 10-kilometer run where the star is spotted wearing the new clothes. Which element of a program plan does this scenario illustrate?

Answers

Answer: Tactics

Explanation:

  According to the given question, the tactics is one of the type of element of the given program planning that helps in illustrating the given scenario as by using the various types of tactics marketing approach we can easily promote the products in the market.

The tactics is one of the legal or authorized element which deals with the new products in the market.In the given scenario, the Cotton Plus is one of the sportswear organization and the main strategy of the company is to approach the basketballs stars for promoting their latest collection.

 Therefore, Tactics is the correct answer.

COGNITIVE ASSESSMENT What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions? Group of answer choices an operating system a file utility a system utility application software

Answers

Answer:

An operating system

Hope this helps! :)

Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and associates that value with total. Thus your code should associate 1*1 2*2 3*3 ... 49*49 50*50 with total. Use no variables other than k and total.

Answers

Answer:

total=0

def calcsumnumsquare(k,total):

   while k>=1:

       total+=int(k)*int(k)

       k-=1

   return total

print(calcsumnumsquare(4,0))

Explanation:

The program required is written above. It uses only two variables k and total as mentioned in the question. And the total is initially set to 9, and then its value is incremented by the square of each k during each loop established by while loop. And finally, when k=1, the output is returned. And we have printed the return value using print.

The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain

Answers

Answer:

both MAC and IPv4 addresses of the DHCP server

FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server

FF-FF-FF-FF-FF-FF and 255.255.255.255

MAC address of the DHCP server and 255.255.255.255

Explanation:

When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

At the expiration of the assigned IPV4 address, the work station will send a DHCPDISCOVER message so as to initiate the process of getting an authentic IP address. This is because the workstation cannot identify the DHCP serves address.

The second layer address broadcast FF-FF-FF-FF-FF-FF is adopted on the ethernet frame and is assumed to be broadcasted on all equipment.

255.255.255.255 is the 3rd layer address used to label the exact same host.

The Electronic Communications Privacy Act requires different legal processes to obtain specific __________ information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
a. transactionalb. basic subscriberc. contentd. real-time access

Answers

The Electronic Communications Privacy Act requires different legal processes to obtain specific TRANSACTIONAL information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.

Explanation:

Transactional information is all the information contained within a business unit. The primary purpose of transactional information is to support day-to-day operations of the unitExamples of transactional information include: sales receipt, packing slip, purchase confirmation, etc.Databases that can handle transactions are known as transactional databases. The main purpose of a database is to ensure accuracy and integrity of information. Transaction data is data describing an event  and is usually described with verbs. Transaction data always has a time dimension, a numerical value and refers to one or more objects Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work that is treated as a unit for the purposes of satisfying a request.

IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition, business units have tools for their particular units that individuals can use to report on and analyze collected data. This IT governance approach is best described as: ________.

Answers

Answer:

Federalism

Explanation:

IT companies apply different governance approaches like Distributed Control, Decentralized, Federalism, joint-Control, and Centralized control but in above mentioned scenario it is federalism which is best fitted in this case.

Answer:

Federalism

Explanation:

Federalism is a type of government in which the power is divided between the national government and other governmental units. It contrasts with a unitary government, in which a central authority holds the power, and a confederation, in which states, for example, are clearly dominant. Federalism is a system of government that divides power between a political unit and a central authority. Power is spread between a minimum of two units with powers divided between the parts. ... Some examples of Federalism include the United States, Canada, and the European Union.

Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how a client, such as a browser, finds an address on the Internet without having to know the IP address.Which of the following is the recommended and secure version of that service?Domain Name System Security Extensions (DNSSEC) Remote access Secure/Multipurpose Internet Mail Extensions (S/MIME)

Answers

Answer:

Domain Name System Security Extensions (DNSSEC)

Explanation:

Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the computer showed the error message, OS not found. Terry called the help desk and explained the computer issue. The help desk technician asked Terry to open the computer. As a help desk technician, what would you have Terry check on his computer with the case cover removed?
A. SATA cable connection
B. Properly seated RAM
C. CMOS battery
D. P1 Power connection

Answers

el cable SATA porque sirve para la transferencia de datos entre la placa base y algunos dispositivos de almacenamiento como la unidad de disco duro (donde generalmente se instala el sistema operativo)

what other apps are associated with google forms.

Answers

Answer:

Explanation:

There are google classroom

can you help me with a layout for a cafe?​

Answers

I linked an image below, I feel like I know what you're doing... you can use this image for reference. Change a few things now and there to make it your perfect cafe layout!

Ch. 6 Agile Modeling & Prototyping SDLC vs. Prototyping "I’ve got the idea of the century!" proclaims Bea Kwicke, a new systems analyst with your systems group. "Let’s skip all this SDLC garbage and just prototype everything. Our projects will go a lot more quickly, we’ll save time and money, and all the users will feel as if we’re paying attention to them instead of going away for months on end and not talking to them." A) List the reasons and conditions , you, as a member of the same team as Bea, would give her to utilize an SDLC and not just prototype every project. That is, tell Bea when you would use an SDLC. B) Bea is pretty disappointed with what you have said. To encourage her, use a paragraph to explain the situations you think would lend themselves to prototyping.

Answers

Answer:

Refer below.

Explanation:

A.The SDLC ought not be rejected for each venture since certain frameworks might be rashly molded before the issue or opportunity being tended to is altogether comprehended. Additionally, utilizing prototype as an option may bring about utilizing a framework that is acknowledged by explicit gathering of clients yet which is insufficient for in general framework needs. In numerous framework prototyping can be effectively incorporated with SDLC approach. For surely knew frameworks, a straight SDLC approach has demonstrated its value.

B.In epic or complex circumstance, prototyping is a perfect mechansim for better understanding client prerequisites, and for getting client input for improving framework viability. What's more, prototyping has demonstrated valuable when fused into SDLC. This combination is especially helpful in better learning client needs.

Which of the following factors is needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators, especially when the online channel is primarily text-based?A) directness of messages B) increased amount of social information conveyed C) extended time D) personalization of message content

Answers

Answer:

Option C

Extended time

Explanation:

Josepth Walther proposed the social information processing theory, where he said that given sufficient time, Computer-Mediated Communication (CMC) can adapt and still develop interpersonal relationships.

Joseph emphasised the place of extended time as a crucial variable in CMC.

This is because CMC takes at least four times as long to process messages, and it also requires that messages be sent more often. It also needs the use of anticipate future interactions and chronemic cues to establish a good relationship between the two communicators.

Extended time is a key factor needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators

Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field properties to provide additional context to the field that is not displayed (Last Name).

A) captionB) detailsC) formatD) index

Answers

Answer:

Option A Caption

Explanation:

Caption is a direct and short description about the field that provide more contextual info about the field. For example, if a target field is expected to store a last name value, we can just put the string "Last Name" in the caption field to offer a more descriptive info about the field. This is a useful feature to enable database designer to stick with the naming convention of the database field names and on another hand does't compromise the descriptive level of each field.  

Ophelia is entering a Get Fit! sporting goods store in a shopping mall when her heel gets caught in a heating grate at the threshold between the mall and the store. She falls, is injured, and sues the store. After the accident, Get Fit! installs signs just inside the threshold, warning customers to watch their step. A few months later, the mall installs new thresholds with the heating grates on the ceiling instead of the floor. At trial, the manager of Get Fit! testifies that he had no control over the location of the heating grates on the threshold since the threshold was owned by the mall. On rebuttal, the plaintiff wants to bring in evidence of both the sign installation and the re-design of the grate.
a. Preclude both the sign installation and the re- design of the threshold as inadmissible under Rule 407.
b. Preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control.
c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.
d. Allow evidence of both the re-design of the threshold and the sign installation.

Answers

Answer:

The correct answer is c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.

Explanation:

It is possible that Get Fit! will carry out the installation of the signs taking into account that he was going to be sued by Ofelia. What is shown in the statement is that this company anticipated the facts, and for this reason, at the time of the trial, it has adequate signage that may affect the judge's verdict. For this reason, Ofelia is left with no choice but to make a rebuttal based on reliable evidence that the sign was not found when she fell on the heating grid, for which she must attach photographic records or collect testimonies from people who were in that place when the accident happened.

Final answer:

Evidence regarding the sign installation may be permitted to suggest Get Fit! had b. control over the area of Ophelia's fall, while evidence of the threshold re-design is likely to be precluded under Rule 407 as a subsequent remedial measure.

Explanation:

The correct answer to the question of what evidence should be precluded or allowed in Ophelia's lawsuit against Get Fit! is the preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control. Under Rule 407 of the Federal Rules of Evidence, subsequent remedial measures are generally not admissible to prove negligence, culpable conduct, or a need for a warning.

However, they can be allowed to prove ownership, control, or feasibility of precautionary measures, if contested. The sign installation could potentially show Get Fit!'s acknowledgment of an issue and suggest control over the area where the injury occurred, while the re-design of the threshold by the mall is a subsequent measure taken to improve safety, not an admission of liability.

In addition to paying $100 per month for health insurance, sam is responsible for paying her first $500 of medical bills every year before her insurance covers and cost. The $500 sam must pay is called the:

Answers

Answer:

Deductible

Explanation:

Deductible is the amount you must pay for a health care service before your health insurance begin to cover your remaining costs. Deductibles are not compulsory for all health care services therefore before registering to any insurance company, you should ask the company for list of covered service so that you  can prevent unwanted billing surprises. After you pay your deductible, you usually pay only a copayment or coinsurance for covered services

Other Questions
Which rectangular prism has a surface area of 56 square units? [Note: Art is not drawn to scale.]A rectangular prism with a length of 5, width of 3, and height of 1.A rectangular prism with a length of 2, width of 2, and height of 6.A rectangular prism with a length of 5, width of 3, and height of 2.A rectangular prism with a length of 6, width of 2, and height of 4. Need Help With This QuestionExplain your Reasoning Plz!!!! 5. Which of the following identifies an element?|a. protonC. electronb. neutrond. antineutrino Mrs. Fryer visits her nephrologist for an erythropoietin (EPO) injection for her anemia. She has Stage 3 chronic kidney disease, which is the cause of the anemia. Applying the coding concept from ICD-10-CM guideline I.A.13., what ICD-10-CM code(s) should be reported for the EPO injection write a food chain in which the hawk is a tertiary 3rd consumer: Which statement best summarizes John Rosss response to the treaty of new Echtoa and American Indian removal Your nephew is standing on his deck, which is 4 feet off the ground. He tosses his toy up into the air at an initial velocity of 7 feet per second. The equation h = -2t^(2) + 7t + 4 models the toy's height h in feet from the ground at t seconds after he threw it. a) How high is the toy after 0-4 seconds? David bought a 5-gallon container of paint to paint his house. After he finished painting, he had 2 quarts of paint left over. How many quarts of paint did David use? Alice and Claire go apple picking. When they are done, Claire has 3 times as many apples in her basket as Alice has in hers. All of the apples are whole. What are the three different possibilities for numbers of apples that could be in the baskets? When the driver applies the brakes of a small-size truck traveling 10 mph, it skids 5 ft before stopping. How far will the truck skid if it is traveling 55 mph when the brakes are applied A state or local government has the following funds Special revenue fund Pension (and other employee benefit) Enterprise fund Permanent fund Internal service fund Private purpose trust fund Custodial fund How many governmental funds does this entity have? please help asap ! What is the area of a circle with a radius of 6 inches?9.7 in. ?12 x in 236 in 281 in 2 The screening process for detecting a rare disease is not perfect. Researchers have developed a blood test that is considered fairly reliable. It gives a positive reaction in 94.5% of the people who have that disease. However, it erroneously gives a positive reaction in 1.5% of the people who do not have the disease. Consider the null hypothesis "the individual does not have the disease" to answer the following questions. a. What is the probability of a Type I error? b. What is the probability of a Type II error? Below are a number of transactions that took place in Willie Corporation during the past year:Indicate how each of them would be classified on a statement of cash flow by selecting the appropriate option from the dropdown provided under Activity and Cash inflow/Outflow. (If no option is suitable, select option "None".)Options for Activity: Financing, Investing, None, or OperatingOptions for Cash Inflow / Outflow: Cash Inflow, Cash Outflow, or None ACTIVITY CASH INFLOW/OUTFLOWA.) Common stock was sold for cash:B. Equipment was sold for cashC. A long term loan was made to a subsidiaryD. Interest was received on loan to subsidiaryE. Interest Payable, a curren liability, was reducedF. A stock dividend was declared and issued on common stockG. A building was acquired by issuing shares of common stockH. Accrued Income Taxes, a current liability account, was reducedI. Long term investments were soldJ. Cash dividends were declared and paid.K. Preferred stock was sold for cashL. Bonds were retiredM. Dividends were received on an investmentN. Equipment was purchased by giving a long term note to the seller n monitoring lead in the air after the explosion at the battery factory, it is found that the amounts of lead over a 6 day period had a standard error of 1.91. Find the margin of error that corresponds to a 95% confidence interval. (Round to 2 decimal places) What is the value of n that makes the expression (-5y + 4) + (7y - 9) equivalent to ny 5? g Write a user-defined MATLAB function for the following math function: y ( x )=(.2 x 3 +7 x 2 )e .3x The input to the function is x and the output is y. Write the function such that x can be a vector (use element-by-element operations). a) Use the function to calculate y(-1.5) and y(5) b) Use the function to make a plot of the function y(x) for -2x6 Animals have recently been genetically modified to produce leaner meat or offer healthier nutritional content with these benefits, what effects of biotechnology do consumers need to be awareof? What was the science of classification and naming organisms based on the different characteristics called? GeometryAn angle is formed by: