A macro is assigned as a button or a ___________ shortcut.

Answers

Answer 1

Answer:

Quick access toolbar


Related Questions

The two types of Desktop Publisher (DTP) frames for entering information are ... and ...​

Answers

Answer:

digital pages and virtual paper pages

The two types of Desktop Publisher (DTP) frames for entering information are digital pages and virtual paper pages.

What do you mean by Desktop publishing?

Desktop publishing may be defined as the process of creating or manufacturing documents through the utilization of page layout software on a personal computer. It may be characterized as the utilization of personal computers in order to design books and booklets that are intended to be printed by inkjet or laser printers.

There are two types of pages that are used for the same intention of designing books, booklets, documents, etc. These pages are known as digital pages and virtual pages. Both these pages are used for specific functions in order to allow users, businesses, and other organizations, to self-publish a wide variety of content.

Therefore, digital pages and virtual pages are the two types of Desktop Publisher (DTP) frames that are used for entering information.

To learn more about Desktop publishing, refer to the link:

https://brainly.com/question/7221406

#SPJ2

help on my homework, on c++, I'm new to this what do I do.

help on my homework, on c++, I'm new to this what do I do.

Answers

The program based on the information is given below

#take amount in quarters, dimes, nickels and pennies as input and store it in variables

quarters = int(input())

dimes = int(input())

nickels = int(input())

pennies = int(input())

#calculate amount in cents

cents = (quarters*25 + dimes*10 + nickels*5 + pennies)

#convert cents to dollars

# 1 dollar = 100 cents

# n cents = n/100 dollars

dollars = cents / 100.00

#Print the amount in dollars upto two decimal places

print("Amount: $"+"{:.2f}".format(dollars))

What is the program about?

It should be noted that the following weekend as illustrated:

1 quarter = 25 cents

1 dime = 10 cents

1 nickel = 5 cents

1 penny = 1 cent

1 dollar = 100 cents

Using the above data, the code to convert the given amount to dollars is shown above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1


Match each command group under Picture Tools to the appropriate tasks.
Adjust
Crop and rotate an image,
Arrange
Position images on a slide,
Size
Modify the shape, border or outline of an
image
Picture Styles
Modify the color and brightness of an image

Answers

Answer:

look at the attachment for correct answers.

Match each command group under Picture Tools to the appropriate tasks.AdjustCrop and rotate an image,ArrangePosition

The match up of the command group under Picture Tools to the appropriate tasks is given in the image attached.

What are the picture tools?

Picture Tools are known to be tools that are often used to enhance an image. They includes:

BrightnessContrastCompress Pictures, etc.

Conclusively, the use of this tools will make your pictures to be better and attractive to behold.

Learn more about Picture Tools from

https://brainly.com/question/9566501

#SPJ2

Match each command group under Picture Tools to the appropriate tasks.AdjustCrop and rotate an image,ArrangePosition

Select the correct answer.
What type of depth of field did the photographer use for the image shown?
Ο Α.
a large depth of field
OB.
a small depth of field
O C.
a close depth of field
D.
a large as well as a small depth of field
OE.
no depth of field

Select the correct answer.What type of depth of field did the photographer use for the image shown? .a

Answers

Answer:

I think it's C. but not a 100%

Answer: It all ears to be a large depth of field

Explanation:

Elements in both the foreground and the background seem to be in focus, just as much as the bench. A small depth of field would have had the bench in sharp focus with the background and foreground out of focus.

what is the origin of cellular phones

Answers

Answer:

The first handheld mobile phone was demonstrated by Martin Cooper of Motorola in New York City in 1973, using a handset weighing c. 2 kilograms (4.4 lbs).[2] In 1979, Nippon Telegraph and Telephone (NTT) launched the world's first cellular network in Japan.

Explanation:

i hope help you :)

mark brainlist

what are reserved words with a programming language​

Answers

This is a syntactic definition, and a reserved word may have no user-defined meaning. Often found in programming languages and macros, reserved words are terms or phrases appropriated for special use that may not be utilized in the creation of variable names. For example "print" is a reserved word because it is a function in many languages to show text on the screen

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

if there was no technological advancement what would be our society like​

Answers

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.

Need help ASAP??? Pick the best answers

Need help ASAP??? Pick the best answers

Answers

Answer:

A and C are correct pick both

PLEASE HELP How have phones made us spoiled? How have phones made us unhappy?

Answers

phones have made us spoiled because we have everything at our fingertips. we get what we want when we see something online and we want to get it all we do is ask and most of us receive. phone have made us unhappy mentally and physically because we see how other people have it like richer for instance and we want that and we get sad about weird things because of what we see like other peoples body’s how skinny someone is and how fat someone is it makes us sad because we just want to be like them.

five real world objects with similar characteristics​

Answers

Our current scientific knowledge in areas such as human visual perception, attention, and memory, is founded almost exclusively on experiments that rely upon 2D image presentations. However, the human visuomotor system has largely evolved to perceive and interact with real objects and environments, not images (Gibson, 1979; Norman, 2002).

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

Read the following Python code:

pets = 2
binaryPets = bin(pets)
print(binaryPets)

Which of the following is the correct output? (5 points)

0b10
0d10
0p10
0x10

Answers

The correct output for the given Python code would be option A: 0b10.

What is the Python code?

The value 2 is assigned to the variable named "pets" in the provided Python code. Afterwards, the decimal value of pets (2) is transformed into binary format through the utilization of the bin() function. The function bin() produces a binary value in string form, and adds the prefix "0b" to indicate this.

Thus, the result displayed for binaryPets upon printing will be 0b10. Indicating that a value is in binary format is done by adding the prefix '0b'. In binary, the decimal value 2 is represented by 10.

Learn more about Python code from

https://brainly.com/question/26497128

#SPJ1

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

Alex, a webmaster, recently deployed a new web server. After checking external access to the new web server, he was unable to communicate on port 80. Alex verified that the host-based firewall's configuration had been changed and that the httpd service is running. What commands will most likely resolve the communication issue?

Answers

Answer:

systemctl restart firewalld

Explanation:

The command that will most likely resolve the communication issue being experienced by Alex ( i.e. his inability to communicate on port 80 ) is

systemctl restart firewalld  given that the host-based firewall's configuration has been changed

all of the following are good questions that can help determine if an underage person is using a borrowed id except:

Answers

all of the following are good questions that can help determine if an underage person is using a borrowed id except: Your response is untrue. What is the number to your home?

A minor is a person who is not a legal adult according to the law. This age is usually the so-called "age of majority." The majority age varies by jurisdiction and application but is typically 18 years old. The word "minor" can also be employed in situations that have nothing to do with the general age of majority. For instance, the legal drinking and smoking age in the United States is 21, and even though a person is at least 18, they may still be referred to as a juvenile under the terms of the tobacco and alcohol laws if they are under 21. Underage or minor can also refer to someone who is younger than other legal age restrictions, such as the age of consent, the marriageable age, the driving age, the voting age, etc. These age restrictions frequently differ from the age of majority. In most countries, the definition of a minor is ambiguous. The ages of criminal responsibility and consent, the end of mandatory school attendance, the beginning of legally enforceable contracts, and other milestones may differ from one another.

Learn more about underage person here

https://brainly.com/question/10789364

#SPJ4

Business Automation Experts (BAE) develop computer systems for
businesses. What would be the best reason for BAE to use teams instead of
individuals?
A. Salespeople working in teams would not have to be as self-
disciplined.
• B. Teams could bring together different skills for understanding and
meeting client needs.
C. Teams of salespeople would not require any training time or
expense.
D. Teams of salespeople could carry out their work without any
meetings.
SUBMIT

Answers

Business Automation Experts (BAE) develop computer systems for

businesses. The best reason for BAE to use teams instead of individuals is: "Teams could bring together different skills for understanding and meeting client needs." (Option B)

What are Business Automation Experts?

Business Automation Experts (BAE) are individuals or organizations that specialize in developing computer systems and technology solutions for businesses.

They help companies to automate various business processes, such as sales, marketing, customer service, and operations, in order to increase efficiency and productivity. BAE work closely with businesses to understand their specific needs and requirements, and then design and implement custom automation solutions that help businesses to streamline their operations and achieve their goals.

Note that BAE typically have extensive knowledge of technology and business processes, as well as strong project management and communication skills.

Learn more aobut Teams:
https://brainly.com/question/17860885
#SPJ1

Benefits of Encapsulation:
The fields of a class can be made read-only or write-only.
A class can have total control over what is stored in its fields.
The users of a class do not know how the class stores its data. A class can change the data type of a field and users of the class do not need to change any of their code.

Answers

Data concealing, increased flexibility, and ease of reuse are advantages of encapsulation programming.

What uses for encapsulation are there?

Preventing reactivity with other ingredients in food products, such as oxygen or water, is another objective of using encapsulation. Encapsulation can also be used to encapsulate cells or enzymes in food processing applications, such as the fermentation process and the synthesis of metabolites.

What Benefits Come with Encapsulation?

Encapsulation is the process of concealing complex, lower-level data by combining data and operations into a single abstracted entity. By using access modifiers, it can limit erroneous human changes, prohibit unauthorized access to sensitive data, and conceal information.

To know more about encapsulation visit:-

https://brainly.com/question/29762276

#SPJ4

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

Why is it important not to leave your personal information on a public computer?
A. Other people need a clean computer to use.
B. Someone can steal the information and hurt you.
C. It makes it hard for the next person to log in.
D. It's rude and someone else has to clean up after you

Answers

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

Complete the sentence.
A(n) ___ interface is one that supports as many people as possible by considering disabilities, screen sizes, languages, and many other factors.

1. web-safe
2. accessible
3. inclusive ​

Answers

The answer is number 2 accessible

..........................

Answers

Answer:

there is no question write the question for an answer

…………….? Hope this helps

Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. ​

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

Answers

To use the JOptionPane class in Java to request values from the user and initialize instance variables of Election objects and assign them to an array, you can follow the steps given in the image:

What is the JOptionPane class

The code uses JOptionPane. showInputDialog to show a message box and get information from the user. IntegerparseInt changes text into a number.

After completing a process, the elections list will have Election items, and each item will have the information given by the user.

Learn more about JOptionPane class from

brainly.com/question/30974617

#SPJ1

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

Write a function (getResults) that returns the Fahrenheit equivalents of Celsius temperatures. The function will have the Celsius as the parameter.
The formula for converting a temperature from Celsius to Fahrenheit is
F = 9C + 32
5
F
where F is the Fahrenheit temperature, and C is the Celsius temperature.
Your function returns the Fahrenheit equivalent. (Python)

Write a function (getResults) that returns the Fahrenheit equivalents of Celsius temperatures. The function

Answers

Here's a Python function that converts a temperature from Celsius to Fahrenheit using the formula F = 9/5 * C + 32:

The Python Code

def getResults(celsius):

   fahrenheit = (9/5 * celsius) + 32

   return fahrenheit

You can call this function with a Celsius temperature to get the Fahrenheit equivalent:

>>> getResults(0)

32.0

>>> getResults(100)

212.0

>>> getResults(-40)

-40.0

Note that the function assumes that the input temperature is in Celsius. If you pass in a temperature in Fahrenheit, the result will be incorrect.

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Answers

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc.

What is it called when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness?
A) Stranded energy
B) Explosive energy
C) Lost energy
D) Entrapped energy

Answers

B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.

Is the energy stored when released may cause serious accidents or physical damage?

Stored energy are known to be any form of mechanical, gravitational, hydraulic that is known to be  energy stored in machines as well as in  equipment.

Stored energy hazards if released accidentally can cause serious injury.

Therefore, B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.

Learn more about energy from

https://brainly.com/question/13881533

#SPJ1


The keyboard shortcut to open the Help window is:
O F1
O F2
O F4
O F8

Answers

Answer:

F1 is the correct answer

Write a program that reads a number in meters convert it to feet and displays the result in java.

Answers

Answer:

//import the Scanner class

import java.util.Scanner;

//Begin class definition

public class Converter {

   

   //Begin main method

   public static void main(String args[]) {

       //Create an object of the Scanner class

       //To allow for reading from standard inputs

       Scanner input = new Scanner(System.in);

       

       //Prompt the user to enter some number in meters

       System.out.println("Enter the number in meters: ");

       

       //Store the user's input in a variable of type double

       double meters = input.nextDouble();

       

       //Convert the user's input to feet

       //Since 1 meter = 3.28 feet

       double feet = meters * 3.28;

       

       //Display the result

       System.out.println("The number in feet is " + feet);

   

       

   } //End of main method

} // End of class definition

Sample Output

>> Enter the number in meters:

2

The number in feet is 6.56

Explanation:

The program above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments.

A sample output resulting from a run of the code has also been provided.

The snapshots of the program and the sample output have been attached to this response.

Write a program that reads a number in meters convert it to feet and displays the result in java.
Write a program that reads a number in meters convert it to feet and displays the result in java.

The reading element punctuation relates to the ability to

pause or stop while reading.

emphasize important words.

read quickly yet accurately.

understand word definitions.

Answers

Answer:

A

Explanation:

Punctations are a pause or halt in sentences. the first one is the answer so do not mind the explanation.

semi colons, colons, periods, exclamation points, and question Mark's halt the sentence

most commas act as a pause

Answer: (A) pause or stop while reading.

Explanation:

Other Questions
add and subtract within 1000, using concrete models or drawings and strategies based on place value, properties of operations, and/or the relationship between addition and subtraction; relate the strategy to a written method. understand that in adding or subtracting three-digit numbers, one adds or subtracts hundreds and hundreds, tens and tens, ones and ones; and sometimes it is necessary to compose or decompose tens or hundreds. Which detail from "The City Without Us" most clearly shows that nature iSmore powerful than it appears? Based on the situation (Pratt Street Riot and location of Maryland), wasLincoln right to suspend habeas corpus and limit civil rights inBaltimore during the Civil War? Why or why not? Where are the metals located on the periodic table? the nonmetals? who is he speaking in reference to or about? If we must die For this final project proposal, we need to specifyyour virtual companywhat the database is trackinga minimum of four tablesat least five fields in each tableAt least one field that has sensitive data and/or needs to be encryptedwe can choose to encrypt an entire tableor, choose to encrypt the entire databasespecify ten users and their duties at the firmspecify a preliminary look at what they need access to and what privileges they needThis should be two to three pages including tables. Note, we do not need to implement this to database management systems yet. In the tables, use document/excel to provide the data.Requirements:Describe the companyOutline the tables and show relationsSpecify the five fields with sensitive data, decide how you will encryptSpecify the ten users, duties and privilegesThe proposal should be two to three pages (feel free to have more pages) If Ponyboy, Soda, and Darry are made to live apart, will it be a positive or negative change, or both? the nurse is caring for a 3-month-old infant with history of congenital heart disease. the infant is brought to the emergency department with nausea and vomiting for 3 days. admission laboratory results confirm dehydration. the nurse realizes that the dehydrated infant is at risk for: I NEED HELP PLEASE !!!! A rectangle is 57+23 meters long and 67-33 meters wide.a. Find the perimeter of the rectangle in simplest form.b. Find the area of the rectangl in simplest form Consider the three possible structures of the thiocyanate ion (SCN). Structure A [C=N=S] Structure B [S=C=N] Structure C [C=S=N]What are the current formal charges for the atoms in structure A?a. S= -1, N = 1, C = -1b. S = -1, N = 1, C = -2c. S = 0, N = 1, C = -2What are the current formal charges for the atoms in structure B?a. S= -1, N = 1, C = -1b. S = -1, N = 1, C = -2c. S = 0, N = 1, C = -2What are the current formal charges on the atoms in structure B?a. S= -1, N = 1, C = -1b. S = -1, N = 1, C = -2c. S = 0, N = 1, C = -2Based on the formal charges above, choose the best structurea. structure Ab. structure Bc. structure A and B are equivalentd. Structure C need help with this worksheet asap S and S thester company wabts a 3-month moving average forecast. Ticket sales over the past 3 months have been 30,000 40,000 and 37,500.what is the 3-month average forcast using the moving average formula A large city has three major neighborhoods (A, B, and C). It is known that 10% of the homes in the neighborhood A are multi-family homes (condominiums or apartments), 22% of the homes in neighborhood B are multi-family homes and 33% of the homes in neighborhood C are multi-family homes. The city clerk sorts personal property tax payments by neighborhood for the city manager. In order to report these statistics and avoid releasing personal data, the type of home, the amount paid, and the neighborhood are recorded on the clerks' spreadsheet (without names and addresses). The assistant to the city clerk helped with the task by recording over 1000 payments. He recorded the type of home and amount paid but forgot to list the neighborhood. The clerk knows the payments given to the assistant were all from the same neighborhood. To determine which neighborhood these payments are from, the clerk selects a random sample of 85 payments from this list and determines that 14 of the payments are from multi-family homes. A) Construct and interpret a 95% confidence interval for the proportion of multi-family homes in this list. B) Does the interval constructed in part (A) allow the city clerk to clearly determine the neighborhood for the payments in this list? Explain. A continuous tape or marker shall be placed immediately above the buried pipeline enclosure and shall be identified by _____________. The blades of a windmill turn on an axis that is 35 feet above the ground. the blades are 10 feet long and complete two rotations every minute. which of the following equations can be used to model h, the height in feet of the end of one blade, as a function of time, t, in seconds? assume that the blade is pointing to the right, parallel to the ground at t = 0 seconds, and that the windmill turns counterclockwise at a constant rate. h = negative 10 sine (startfraction pi over 15 endfraction t) 35 h = negative 10 sine (pi t) 35 h = 10 sine (startfraction pi over 15 endfraction t) 35 h = 10 sine (pi t) 35 2.1 Distinguish between the following: (a) beam, diffuse, and total radiation. (b) extra-terrestrial and terrestrial solar radiation. (c) solar irradiance and solar irradiation. 2.2 Explain why it is Robert has 5 pizzas at his birthday party, and each pizza is cut into 5 slices. His guest take 2 pieces from each pizza what equation would represent the amount of pizza that is left? whats an equation equal to 10x-5 which two types of joints are illustrated in the image below? choose one: a. thermal joints and bedding joints b. vertical joints and exfoliation joints c. horizontal joints and exfoliation joints d. vertical joints and horizontal joints