Write a program that asks the user to enter a number of seconds and then printsthe same amount of time in days, hours, minutes, and seconds.For example, 3667 seconds is equivalent to 0 days, 1 hour, 1 minute, and 7 seconds.Print out the result in the format:"0 day(s), 1 hour(s), 1 minute(s), and 7 second(s)."

Answers

Answer 1

Answer:3363 seconds

Explanation:3363 is equivalent to 0days 1 hour, 1 min, and 7 sec


Related Questions

If an application written for an earlier version of Windows doesn't run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed by: ______________.

a) Right-clicking the program icon and choosing "Restore previous versions" option from the menu
b) Right-clicking the program icon, clicking Properties, and then applying the required settings on the Compatibility tab
c) Right-clicking the program icon and selecting "Run program using recommended compatibility settings" option from the pop-up menu
d) Right-clicking the program icon and selecting "Run as administrator" option from the pop-up menu

Answers

Answer:

The answer is b) Right-clicking the program icon, clicking Properties, and then applying the required settings on the Compatibility tab.

Explanation:

If you have to run an application on a specific operating system, you have to configure the compatibility by accessing in its Properties, then Compatibility tab, and configure the operating system properly.

From which type of data storage does the CPU load information for processing during normal operation?

hard drive

RAM

SSD

ROM

Answers

Answer:

RAM

Explanation:

Computers use two kinds of storage: The primary and secondary storage. The CPU interacts with main memory, or the primary storage, or the RAM, by referring to it for instructions and data. Every time we load or open something on our computers, it is placed in RAM so that the CPU can access that temporary stored information more easily. It requests data or instructions from RAM, process it and then writes some new data back to the RAM in a continuous complete cycle.

A department manager would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Answers

Answer: Discretionary access control (DAC)

Explanation: Discretionary access control is the control system that is imposed over the information system. The information systems contains different objects and subjects that gets the permission to do the operations.

The operation which the components can do are sharing the data to other object or subjects, privilege providence, change in the rules for the access, security entities getting changed etc.

Given the integer variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another integer variable min.Assume that all the variables have already been declared and that x, y, and z have been assigned values).

Answers

Final answer:

To find the smallest value among three integers x, y, and z and assign it to another variable min, one can use a series of if-else statements to compare these variables and assign the smallest one to min.

Explanation:

The question involves writing a fragment of code that assigns the smallest value among three integer variables x, y, and z to another integer variable named min. This is a basic programming task commonly encountered in high school computer science courses.

To accomplish this task, one way is to use conditional statements (if-else statements) to compare the values of x, y, and z and then assign the smallest value to min. Below is an example of how this could be implemented in a typical programming language:

if (x < y && x < z) {
   min = x;
} else if (y < z) {
   min = y;
} else {
   min = z;
}

This code snippet first checks if x is smaller than both y and z. If this condition is true, x is the smallest number, and its value is assigned to min. If x is not the smallest, it then checks if y is smaller than z. If y is smaller, its value is assigned to min. If neither x nor y are the smallest, then z must be the smallest, and its value is assigned to min.

What Windows Server 2016 Standard and Datacenter feature provides the ability to move selected blocks of data to different storage locations, such as moving data from hard drive storage to solid state storage?

Answers

Answer:

Storage tiering

Explanation:

Storage tiering is the Windows Server 2016 Standard and Datacenter feature that provides the ability to move selected blocks of data to different storage locations, such as moving data from hard drive storage to solid state storage.

What kind of programming language allows you to use a vocabulary of reasonable terms such as "read," "write," or "add" instead of the sequence of on/off switches that perform these tasks?

Answers

Answer:

High level programming language

Explanation:

There are two groups of programming software:

1. High level programing: Here you can program using almost natural languaje and making complex instructions on a simpler way. The advantages is faster programming and the ability to do complex programs. In this example we can use languages like C/C++, visualbasic.

2. Low level programming: This type of programing is near to machine language (binary - '0' and '1'), and usually is used to obtain full performance of the processor. But requires a high level of expertise from the programmer and is complex to write simple task, like "store a variable". Example: Assembler languague.

You want to create a directory called ~/Documents/papers, but you’re not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn’t already exist?

a) mkdir -a ~/Documents/papers
c) mkdir --recursive ~/Documents/papers
c) mkdir -R ~/Documents/papers
d) mkdir -r ~/Documents/papers
e) mkdir -p ~/Documents/papers

Answers

Answer: e) mkdir -p ~/Documents/papers

Explanation:

As the question says we want to create a directory called ~/Documents/papers, but we are not sure whether it exist or not so we would type the command for making directory starting with mkdir.

Here mkdir means make directory. Followed by mkdir we will use -p. Here p is used to create all the directories for getting us the directory we want and its advantage is that it would ignore all the errors if the directory already exist.

Followed by the name of the directory that we want to create.

So the desired answer for the given condition would be mkdir -p ~/Documents/papers

Low-level languages allow programmers to concentrate on the tasks they want to perform with their program rather than the details of how the CPU will execute those programs. True False

Answers

Answer:

False.

Explanation:

The answer is the opposite, low level languagues are intended to allow the programmer full control of the cpu process, and perfomance.

But the disadvantages are: requires high level of expertise, its hard to program complex task.

High level languages allow programmers to concentrate in the task.

A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doC) The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?A) Your user inadvertently downloaded a macro virus using IM.B) Your user may have downloaded a rootkit.C) Your user may have accidently changed a setting on the system.D) The system is unstable due to the use of IM.

Answers

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

Crystal inc. is a multifaceted company that deals with the mining, cutting, and selling of diamonds. It gives distributors and suppliers access to its database to place orders or restock inventories electronically and automatically. Which of the following is the network implemented in the company?A) intranetB) chaosnetC) extranetD) ethernet

Answers

Answer:C)Extranet

Explanation: Extranet is the network on private basis for sharing of the organizational information with the vendors, employees, customers,suppliers etc. It uses the internet service for the distribution of the data outside of the company in extended form.Electronic data interchange is used for exchanging of large amount of information.

Other options are incorrect because intranet is the internet service which works within enterprise, chaosnet is protocol for transmission of data in full duplex form and ethernet is the communication with the help of protocol in traditional manner.

Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?

a) Bitcoin malware
b) Crypto malware
c) Blocking virus
d) Networked worm

Answers

Answer:

C) Blocking virus

Explanation:

It is true that  money it is currently asked  to be paid in cryptocurrencies like Bitcoin, but this malware existed before cryptos, so let's explain a little bit more about blocking viruses also known as ransomware.

A blocking virus restricts a part of the whole access to an operating system and also display the instructions to unlock it again, which is normally sending money to a specific account exaxtly as Astrid's case.

_____ refers to the use of a digital forum where multiple people can communicate with one another by sending text, images, and screenshots to everyone at once. Select one:
a. Wiki
b. Chat
c. Desktop sharing
d. Shared workspace

Answers

Answer:

b. Chat

Explanation:

Chat refers to the use of a digital forum where multiple people can communicate with one another by sending text, images, and screenshots to everyone at once. In particular where content is shared with multiple users simultaneously, it is referred to as group chat. There are several chatting applications available from software vendors which can be used for this purpose.

Given an integer variable count, write a statement that displays the value of count on the screen. Do not display anything else on the screen -- just the value of count.

Answers

Answer:

cout<<count;

Explanation:

The above statement is in c++ which display the value of count .The cout statement is used in c++ to print the value on console .

Following are the code in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main method

{

   int count=90; // count variable

   cout<<count; // display the value of count

   return 0;

}

Output:

90

In this program we have declared a count variable of integer type which is initialized by 90 and finally displays the value of count on the screen.

Developers often think of software quality in terms of faults and failures. Faults are problems (for example, loops that never terminate or misplaced commas in statements) that developers can see by looking at the code. Failures are problems, such as a system crash or the invocation of the wrong function, that are visible to the user. Thus, faults can exist in programs but never become failures, because the conditions under which a fault becomes a failure are never reached. How do software vulnerabilities fit into this scheme of faults and failures? Is every fault a vulnerability? Is every vulnerability a fault?

Answers

While developing application solutions, software developers are always advised to consider producing secure code that is not vulnerable to hacks. Vulnerabilities, in the simplest of terms, can be described as an error or a fault in code. These errors or bugs, as a result, can cause unexpected actions like system crashes or connectivity issues. Some can go as far as creating information leakage and allowing unauthorized system access. Therefore, it is almost always certain that some bugs will cause vulnerabilities on software that have those bugs in them. It is also fit to say that faults in software are part of a larger list of factors that can cause software vulnerabilities. However, note that not all vulnerabilities are faults.

Assuming that a program has the following string object definition, which statement correctly assigns the string literal "Jane" to the string object?
string name;
name = "Jane";
string name = {Jane};
name = 'Jane';
name = Jane;

Answers

Answer:

name="Jane";

Explanation:

In C++ assigning a value to a string object takes the following syntax:

String variable declaration prior to the assignment using:

string <variable-name>;

String variable assignment:

<variable-name> = "<variable-value>";

As per the question, the variable-name is 'name' and variable-value is 'Jane'. So the required assignment has the format:

string name;

name="Jane";

An operating system __________ is much like a variable in a Python script, except that an environmental variable is stored by the computer's operating system and can be accessed by every program running on the computer.

Answers

Answer:

Environmental Variable.

Explanation:

The environmental variable of operating system is like a variable in python script.There is one difference that is environmental variable is stored by the operating system of the computer and every running program on the computer can access it.The user can set the value of PYTHONPATH permanently through the control panel in windows or by using the terminal.

An operating system environment variable is a variable stored by the operating system and accessible by all programs. Shell variables, on the other hand, are specific to the shell and not accessible by other programs. They help control various aspects of the command-line environment.

An operating system environment variable is much like a variable in a Python script, except that an environmental variable is stored by the computer's operating system and can be accessed by every program running on the computer.

These variables store information about your login session and control many aspects of the command-line environment. For example, the variable $USER commonly holds the username of the logged-in user.There are also shell variables, which are similar to environment variables but are used only by the shell and conventionally have lowercase names. Unlike environment variables, they are set within the shell using commands like declare instead of export. Understanding these distinctions is crucial for proper configuration and troubleshooting in command-line interfaces.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
ACL
IPS
VPN
BYOD

Answers

Answer:

VPN

Explanation:

VPN or Virtual Private Network enables an employee to access the network of the organization remotely, in the safest possible way. The user is required to provide an authentication which enables creation of a secure link between employee computer and organization network. The data moving on the channel is encrypted to prevent eavesdropping or other security issues.

"The binary pattern 01000001 represents the number 65." Write a brief response explaining whether you believe this statement is always true. Explain your reasoning.

Answers

Answer:

Yes

Explanation:

Yes this statement is always true.

Starting from right the first digit represents 1 and second digit represents 2 and so forth.

Starting from right the sequence becomes

1,2,4,8,16,32,62,128 for 8 binary digits

If 1 is written then we count it else for 0 we don't count it

for example 01 means 1 and 10 means 2 and 11 means 3 as 2+1=3

for 01000001 only place that is filled is for 1 and 64 therefore complete decimal digit shall be 64+1=65 and it would always remain same.

In subscript of 2 we can write  [tex]2^{n}[/tex], where n=0,1,2,3,4,...

For first digit from right [tex]2^{n}[/tex] will be [tex]2^{0}[/tex] which is 1. For second digit from right [tex]2^{1}[/tex] which will be 2 so on and so forth.

For this question we have [tex]2^{0}[/tex] and [tex]2^{6}[/tex] which will be 1+64=65

Binary patterns are numbers in base 2, and they are called binary numbers.

The statement that the binary pattern 01000001 represents number 65 is true

The binary number is given as:

[tex]\mathbf{01000001_2}[/tex]

Convert the number to base 10, as follows:

[tex]\mathbf{01000001_2 = 0 \times 2^7 + 1 \times 2^6 + 0 + \times 2^5 + 0 \times 2^4 + 0 \times 2^3 + 0 \times 2^2 + 0 \times 2^1 + 1 \times 2^0}[/tex]

Evaluate the exponents

[tex]\mathbf{01000001_2 = 0 \times 128 + 1 \times 64 + 0 + \times 32 + 0 \times 16 + 0 \times 8+ 0 \times 4 + 0 \times 2 + 1 \times 1}[/tex]

Evaluate all products

[tex]\mathbf{01000001_2 = 0 + 64 + 0 + 0+ 0 + 0 + 0 + 0 + 1}[/tex]

Add all numbers

[tex]\mathbf{01000001_2 = 65}[/tex]

Rewrite as:

[tex]\mathbf{01000001_2 = 65_{10}}[/tex]

Hence, the statement is true

Read more about binary numbers at:

https://brainly.com/question/2599721

In the context of a manager's roles, a _____ is an informational role that involves seeking and receiving information, scanning the Web, periodicals, and reports, and maintaining personal contacts.

Answers

Answer: Monitor

Explanation: Monitor role is the role played by the person in the management that processes the information.The role has the responsibility of the seeking data and records of the organization.

Organizing or managing ,scanning the data that is seeked and accordingly changes are made is the function of the monitor. Monitors also examines the productivity and the processing in the management.

Jennifer, a customer, informs you that unexpected icons are appearing on her system's desktop. You identify the symptoms of the malware infection. Which of the following procedures will you perform next?A. Quarantine infected system
B. Schedule scans and run updates
C. Report the issue to the information security officer
D. Disable System Restore (in Windows)
E. Educate end user

Answers

Answer:

B. Schedule scans and run updates.

Explanation:

With a malware infection you have to scan the computer with an antivirus immediately. Then, you run possible updates to get the system stronger.

Jason is the local network administrator who has been tasked with securing the network from possible DoS attacks. Within the last few weeks, some traffic logs appear to have internal clients making requests from outside the internal LAN. Based on the traffic Jason has been seeing, what action should he take?

Answers

Answer: Implementing ingress filtering.

Explanation: Ingress filtering is the method that is deployed for checking whether the data packets arriving at the destination are actually coming from the claimed source or not.They helps in the prevention of the unwanted traffic in the network paths.

This techniques is used by internet service providers, enterprises and other organization for the protection from malicious traffic. This mechanism can also behave as the packet filtering device.Thus,Jason should use ingress filtering for maintaining security of the local network from any attack.

PLEASE GET THE RIGHT ANSWERS AND HELP MEEE
1. Parents often monitor their children______ to make sure that they're not accessing any threatening material and to help them learn how to become a model digital citizen.

online activity
online schedule
online planning
online life

2. When I am browsing the web, I constantly receive ads and recommendation about new items for sale on Trendy Finds, my favorite online shopping site, because________ is all over that site.

digital access
key pass access
digital footprint
platform identification

3. A person’s _____________ is closely related to their economic status, as technology
is one of many household expenses.
(1 point)
residence status
benefits package
educational outlook
digital access

4 Angelica accesses her online learning course through a _____________, which
organizes the course content, as well as her assignments, tests, and quizzes.
(1 point)
platform
application
program
laptop

5. Ryan read unit three of his online fashion course by logging onto his: (1 point)
Learning Management System.
online book.
tablet.
laptop.

6. Being actively involved online through social media accounts, gaming accounts, online
learning accounts, and shopping accounts makes you a(n):
(1 point
online addict.
digital citizen.
trend setter.
popular internet surfer.

7. Darryl is a(n) _________ of the United States, born and raised in Montana. (1 point)
inhabitant
citizen
nomad
digital citizen

8 Tram is a fan of ________ because she can study anywhere she wants, as long as she has an
outlet for her laptop and a Wi-Fi connection.
(1 point
computer learning
online learning
home schooling
independent studies

9. You need to make sure to check the ________ before your course starts, so you know your
exam schedule and project deadlines.
(1 poin
catalog
guidelines
calendar
syllabu

10. I wish I never would have posted that silly picture online, as it is now a ________ part of my
digital footprint!
permanent
irreplaceable
trending
famous

Answers

Final Answers:

1. Parents often monitor their children's online activity to make sure that they're not accessing any threatening material and to help them learn how to become a model digital citizen.

2. When I am browsing the web, I constantly receive ads and recommendations about new items for sale on Trendy Finds, my favorite online shopping site, because digital footprint is all over that site.

3. A person’s digital access is closely related to their economic status, as technology is one of many household expenses.

4. Angelica accesses her online learning course through a platform which organizes the course content, as well as her assignments, tests, and quizzes.

5. Ryan read unit three of his online fashion course by logging onto his tablet.

6. Being actively involved online through social media accounts, gaming accounts, online learning accounts, and shopping accounts makes you a digital citizen.

7. Darryl is a(n) citizen of the United States, born and raised in Montana.

8. Tram is a fan of online learning because she can study anywhere she wants, as long as she has an outlet for her laptop and a Wi-Fi connection.

9. You need to make sure to check the calendar before your course starts, so you know your exam schedule and project deadlines.

10. I wish I never would have posted that silly picture online, as it is now a permanent part of my digital footprint.

Explanation:

1. Monitoring **online activity** allows parents to ensure their children's safety and guide them in developing responsible online behavior, contributing to their digital citizenship.

2. The continuous receipt of ads on a favorite online shopping site is a result of the user's **digital footprint**, reflecting their browsing and shopping preferences.

3. A person's **digital access** refers to their ability to use and benefit from digital technology, and this is often influenced by economic factors.

4. Accessing an online learning course through a **platform** is common, providing organization and structure to course materials.

5. Ryan reads his online fashion course on his **tablet**, showcasing the flexibility of digital learning tools.

6. Being involved in various online activities characterizes someone as a **digital citizen**, actively participating in the digital community.

7. Darryl, born and raised in Montana, is a **citizen** of the United States, emphasizing his national affiliation.

8. Tram's preference for **online learning** highlights the convenience it offers, allowing her to study flexibly.

9. Checking the **calendar** is crucial for staying informed about course schedules and deadlines in online education.

10. The regret about a posted picture being a **permanent** part of the digital footprint underscores the lasting impact of online actions.

Universal Containers has a requirement to integrate Salesforce with an external system to control record access. What option should the Architect consider when designing a solution?A. Use the Metadata API to maintain the related SObject recordsB. Use the Security API to modify the role hierarchy in SalesforceC. Use the SOAP API to maintain the related SObject_share recordsD. Use the SOAP API to create new Criteria-Based Sharing Rules in Salesforce

Answers

Answer:

C. Use the SOAP API to maintain the related SObject_share records

________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.a. Confidentialityb. System Integrityc. Availabilityd. Data Integrity

Answers

Answer: b)System Integrity

Explanation: System integrity is the function that assure that with the change or alteration in the system , the functioning does not gets interrupted. It does not let the unauthorized access to happen which will effect the system function with insecurity .

Other options are incorrect because confidentiality is the maintaining the security , availability is the presence of the function or data and data integrity is no change in the data security while unauthorized access.Thus, the correct option is option(b).

Explain what the World Wide Web is, including several tasks that can be accomplished online. Include definitions of the following terms in your response: webpage, downloading, website, and web server.

Answers

Final answer:

The World Wide Web is a system of interconnected documents and resources accessed through the Internet. It includes webpages, downloading, websites, and web servers. Webpages are single documents on the web, downloading is transferring files, websites are collections of webpages, and web servers store and deliver website files.

Explanation:

The World Wide Web (WWW) is a system of interconnected documents and resources accessed through the Internet. It allows users to navigate between webpages and perform various tasks online. A webpage is a single document on the web that can contain text, images, videos, and other multimedia elements. When you download something, you are transferring a file from a remote server to your local device. A website is a collection of webpages that are related to each other and hosted on a web server. A web server is a computer that stores the files and data associated with a website and delivers them to users upon request.

Due to advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened. True or False?

Answers

Answer:

True

Explanation:

Latency is a more proper term to describe de the  time it takes for a client to send a request and recieve a response form the server. When the latency is too high when playing games online, the user will experience delays and even the game will freeze in the worst cases. This delay on online gaming is what we called lag and can be reduced thanks to the advances in communication networks. Higher bandwitdths are now possible due to  network technologies like optical fiber and the implementation of 5G mobile network will also boost  data speed for mobile games. It is also true there are other  ways to reduice lag that does not require a change to a faster network; sometimes  a better use of the network connection is good enough, but it is totally right that faster communication network have reduced information lag and allow users to have  access to games than  decades ago would have been imposible to play due to network limitations.

Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission from the clients to perform this testing as part of a paid contract. What type of person is Yuri?

a) Cracker
b) White-hat hacker
c) Black-hat hacker
d) Grey-hat hacker

Answers

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

Nmap scan results on a set of IP addresses returned one or more lines beginning with "cpe:/o:" followed by a company name, product name, and version. Which of the following would this string help an administrator to identify?A. Operating systemB. Running servicesC. Installed softwareD. Installed hardware

Answers

Answer: Operating system

Explanation:

N map stand for the network mapper and it is the network security tool in the open source. It is basically used to design the large network and also use to scan the particular single host in the network system.

The network mapper basically use the IP packets for detecting the particular host in the network. Then, the host provided various type of services in the operating system.

N-map basically used in the security audit by the various network administrators to identify the given string.

In an LAN domain, _______________ is similar to a hub but can filter traffic, a ______________ connects LANs, or a LAN and a WAN, and a ______________ is a software or hardware device that filters traffic in and out of a LAN.

Answers

Answer: Switch, router, firewall

Explanation:

The function of the switch is to distribute the network to different networks similar in functioning to that of the hub but it performs filtering of the traffic present in the network using various traffic filtering algorithms.

The router whose main function is to route packets across the network is also used to connect between LANs and between LAN and a WAN.

The firewall is typically installed on systems or in servers or in routers with it most important function to filtering the traffic and minimize the packet delivery delay in LANs.

Gateways: a. process all messages, even if the messages are not explicitly addressed to them b. can translate one network protocol into anotherc. are less complex than bridgesd. are most often used as the interface between two or more networks that have similar data link and network layer protocolse. cannot perform a routing function

Answers

Answer: B)can translate one network protocol into another

Explanation: Gateway is the element that acts between the two networks that persist protocols that are different from each other. It helps in the translation of one protocol into another protocol and thus it is known as protocol converter.

Other options are incorrect because they don't work on explicit messages, complexity is present in gateways as compared with bridges and is used between dissimilar protocols not data.Thus, the correct option is option(B).

Other Questions
In people with sickle-cell disease, red blood cells break down, clump, and clog blood vessels. Blood vessels and broken cells accumulate in the spleen. Among other symptoms, this leads to physical weakness, heart failure, pain, and brain damage. Such a suite of symptoms can be explained by _____ The author of this story uses first-person point of view.How does that affect the reader's understanding of other characters in the story?A.) The author uses point of view to show how well Ezra and his mom understand each other.B.) The point of view limits the reader's knowledge about what Ezra's mom will do or say.C.) The author uses point of view to keep the reader guessing about whether or not Juliana will go on a date with Ezra.D.) The point of view offers a deep understanding of everyone in Ezra's family, but a limited understanding of everyone in Juliana's family. Which of the following can contribute to infertility in a young male body builder taking anabolic steroids?a. suppression of LH release from the pituitaryb. decreased circulating levels of dihydrotestosterone (DHT)c. increased muscle massd. decreased testicular testosterone concentrationse. B and D Ivan and Tanya share 150 in the ratio 4:1 how much more Ivan has then tanya John is a resident of Iowa. While driving through California, he is in an accident involving Marisol, a California resident. Marisol files a lawsuit in a California state court. Over John, the California court has: How does eating influence high density lipoproteins (HDL) in the body? Just as you are recovering, your child falls ill. in your medication dosages, so you hurriedly scan the Internet to make sure that what the doctor is giving your child is safe. The doctor writes the order for the following: You know that there have been mistakes 150 mg of an antibiotic to be given every 6 hours Your child weighs 30 lb. Your research indicates that 20-40 mg/kg/day is the recommended dosage. Is this prescription safe for your child? Why or why not? Explain how the independent alignment of homologs, and also crossing-over during the first meiotic division, each contribute to the genetic diversity of gametes. If a point is on the bisector of an angle, then it is: HELP ASAPPPPP 20 POINTS !!!!! Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.Polygon ABCD is a parallelogram, and m2ABC = 127. The length of BC Is 10 units, and the length of AB is 5 units.The perimeter of the parallelogram is units, and mZBCD IS - degrees Financial markets improve economic welfare because: A. they allow consumers to time their purchases better B. they channel funds from savers to investors C. they eliminate the need for financial intermediaries D. both A and B are correct E. all of the above are correct 2r+8>16-2r and 7r+21 8. Find the value of the variable(s) in each figure.Explain your reasoning. In a certain city, 80 percent of the households have cable television and 60 percent of the households have videocassette recorders. If there are 150,000 households in the city, then the number of households that have both cable television and videocassette recorders could be any number from:A. 30,000 to 90,000 inclusiveB. 30,000 to 120,000 inclusiveC. 60,000 to 90,000 inclusiveD. 60,000 to 120,000 inclusiveE. 90,000 to 120,000 inclusive Write a statement that computes the square root of a variable called discriminantand stores the value in a variable called result. Janice went out to eat and bought a hamburger, a bag of chips,and a drink. The hamburger cost $2.57, and the chips cost $1.25.Janice gave the cashier $20.00 and received $14.39 in change.How much did the drink cost? Suppose that you drive the 10.0 km from your university to home in 20.0 min. What is your average speed in kilometers per hour? A charge of 3.77 C is located at the origin, and a charge of 4.92 C is located along the y axis at 2.86176 m. At what point along the y-axis is the electric field zero? The value of the Coulomb constant is 8.99 109 N m2 /C 2 . All protozoa are also pathogens. True False Which of the following is true of good generalizations? a)They are grounded in ones childhood experiences. b)They are similar to stereotypes. c)They are based on social scientific research. d)They are constructed from traditional authority.