as with other popular mobile operating systems, android is designed for _______ processors. group of answer choices intel arm rfc amd

Answers

Answer 1

Android is designed for both ARM and x86 processors. Therefore, the correct answer is "intel" and "arm."

Android, as a mobile operating system, is designed to support a wide range of processors. Among the given options, Android is compatible with both Intel and ARM processors.

ARM processors are widely used in mobile devices, including smartphones and tablets. They are known for their energy efficiency and are the most common processors found in Android devices.

On the other hand, Intel processors, specifically x86 and x86-64 architectures, are also supported by Android. In the past, Intel made efforts to enter the mobile market and developed processors specifically designed for Android devices.

By supporting both ARM and Intel processors, Android allows for a diverse ecosystem of devices, ensuring compatibility across various hardware platforms. This flexibility enables Android to be used on a wide range of devices, including smartphones, tablets, smartwatches, and other smart devices, providing a consistent user experience across different hardware configurations.

Learn more about ARM processors here:

https://brainly.com/question/31321609

#SPJ11


Related Questions

the ____ control allows you to retrieve date information.

Answers

The Datepicker control allows you to retrieve date information. The "date control" is a feature or component that enables users to access and retrieve information related to dates, such as the current date or specific date values.

The Datepicker control is a user interface element that enables users to select a specific date from a calendar. It provides a visual representation of dates and allows users to interactively choose a date. Once a date is selected, the Datepicker control captures and stores the chosen date information. The Datepicker control is commonly used in web and software applications that require date input, such as booking systems, event management tools, and scheduling applications. It provides a user-friendly way to select dates, ensuring accuracy and reducing input errors. The selected date can be used for various purposes, such as setting reminders, calculating durations, or scheduling tasks.

Learn more about Datepicker control here:

https://brainly.com/question/31379176

#SPJ11.

The moment the frame information is stripped away from an ip packet, we move out of:___.

Answers

The moment the frame information is stripped away from an IP packet, we move out of: A. The link layer and into the Internet Layer.

What is the OSI model?

OSI model is an abbreviation for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)

The layers of the OSI model.

Basically, there are seven (7) layers in the open systems interconnection (OSI) model and these include the following in sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

In Computer networking, immediately the frame information is stripped away from an internet protocol (IP) packet, we transition out of the data link layer and into the Network Layer (Internet Layer) in accordance with the OSI model.

Read more on OSI model here: brainly.com/question/26177113

#SPJ1

Complete Question:

The moment the frame information is stripped away from an IP packet, we move out of:_____

The link layer and into the Internet Layer.

The link layer and into the Transport Layer.

The Transport layer and into the Session Layer.

The Physical Layer and Transport Layer

Suppose you are looking for an image online to use in your physics lab write-up. You have found several possible options, but only one option will allow you to use it right away without getting clearance from the author or having to pay a fee. Which one do you choose?

Answers

Answer:

Image with a PD license

Explanation:

What is the output of the following code snippet when the user enters 75 as the grade? grade = int(input("Enter student grade: ")) if grade >= 90 : letterGrade = "A" if grade >= 80: letterGrade - "B" if grade >= 70: letterGrade = "C" if grade >= 60: letterGrade = "D" else:
letterGrade - "E" print(letterGrade) Select one: 1. B 2. D 3. C 4. А

Answers

The output of the given code snippet, when the user enters 75 as the grade, will be "D."

The code snippet takes user input for a student's grade and assigns it to the variable "grade" after converting it to an integer. It then uses a series of if-else statements to determine the corresponding letter grade based on the numeric grade entered.

In this case, the entered grade is 75. The first if statement checks if the grade is greater than or equal to 90, which is false. Therefore, it moves to the next if statement. The second if statement checks if the grade is greater than or equal to 80, which is false as well. It proceeds to the next if statement.

The third if statement checks if the grade is greater than or equal to 70, which is true in this case (75 is greater than 70). Consequently, the variable "letterGrade" is assigned the value "C". Since there are no further conditions to evaluate, the code does not reach the next if statement or the else statement.

Finally, the code prints the value of the "letterGrade" variable, which is "C". However, it's worth noting that there is a typo in the code. Instead of assigning the value "B" to "letterGrade," it incorrectly assigns it to "letterGrade - "B" ". Assuming this typo is corrected to "letterGrade = "B"", the correct output for the given code would be "C" as explained above.

learn more about  code snippet here:

https://brainly.com/question/30471072

#SPJ11

cual es la
importancia de la netiqueta cuando nos comunicamos con el internet

Answers

Netiquette is important when communicating on the internet because it helps to show respect and convey meaning on a platform which lacks many common and necessary cues we rely on in real-life communication. Without body language, tone, and other similar cues, we rely on specific wording to convey messages online; because of this netiquette becomes incredibly important in online communication. Certain things are acceptable while others are not, when speaking— these rules change when moving online, and netiquette is important in realizing this change.

Proof-reading helps to avoid miscommunication; precise and exact language helps to better convey tone and avoid accidental rudeness; using proper grammar, for example, not using all caps, can help to avoid conflicts; and presenting yourself carefully can give an accurate and positive impression of yourself online.

Truck repair shops tend to use dot matrix printers to produce their invoices. Identify two advantages of using a dot matrix printer rather than a laser printer in this environment

Answers

Answer:

Explanation:

The Dot matrix printers are cheaper and even more easily available in the market when compared to the laser printers.

Also, the Dot printers can make carbon copies of the print-out, the non-impact printers can't do this.

Worthy of mention is that the printing costs of Dot printers are comparably lower when compared to other printers like Laser printers

Cannot Update App. iMovie cannot be updated because it was refunded or purchased with a different Apple ID.
First, notice that all your purchases are tied to your Apple ID and cannot be transferred to another Apple ID. If you make purchases on an iPhone, iPad, or another Mac, always sign in with the same Apple ID on that Mac to view all store purchases and download any available updates.
To solve this "different Apple ID" problem while updating iMovie, try dragging your iMovie app from the Applications folder into the Trash, but do not empty the trash. Then sign in to the App Store and go to the Purchased tab. You will see your purchased apps displayed, including iMovie. Update iMovie from there. If not successful, drag your iMovie app back to the Applications folder, and try to remove and reinstall iMovie on your Mac using the methods introduces as below:
How to delete apps on your Mac?
Install and reinstall apps purchased from the App Store on Mac
If the problem persists, You can always get official support from Apple.

Answers

In essence, once an app has been downloaded or paid using a Apple ID, it cannot be updated using an other Apple ID. The original Apple ID and the app are intimately connected. You'll need to remove it and then redownload/purchase it using a different Apple ID.

What does the most recent update mean?

An enhanced or more recent version of anything, especially one that is frequently modified: Every piece of software has a sequence number. update on something The most recent version of the application is a vastly enhanced upgrade to the original.

Is there a new information?

Either press the kit context menu in the notification panel or use the app icon to launch the Settings app. You may access the System menu by scrolling well all way to the bottom. System Updates can be tapped. To see whether there are any updates, choose Check for Updates.

To know more about Update visit :

https://brainly.com/question/24126178

#SPJ1

A ball is at rest on top of a roof of a car.

Answers

Answer:

When it is in frictional force or in the action of movement varies the speed and if it will stop

Explanation:

If a object is in action a out side force is needed to make it start or stop

View displays a single slide and allows the user to insert clip, change the backgrounds, edit transitions, effects, and add animations.

Master View


Slide View


Sorter


Backstage

Answers

Answer: Slide View

I took a quiz

Answer:

slide view

Explanation:

i just took the test

The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i

Answers

The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:

f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.

Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.

To know more about Uniform distribution visit:

brainly.com/question/13941002

#SPJ11

The most common types of chart are pie, column, bar, line, and area

true or false​

Answers

Answer:

true

Explanation:

i think its true

You are writing a paper and find some information you want to use in a journal article: Original text: Among students with incorrect answers at pre- and posttest, the largest percentage had trouble recognizing an example of patchwork plagiarism. Apparently, many did not understand that cutting and pasting is plagiarism. Source: Fenster, Judy. "Teaching Note—Evaluation of an Avoiding Plagiarism Workshop for Social Work Students." Journal of Social Work Education, vol. 52, no. 2, Apr-Jun 2016, pp. 242-248. Academic Search Complete, doi:10.1080/10437797.2016.1151278 Entry in your paper: Among students with incorrect answers, most couldn't recognize patchwork plagiarism and did not understand that cutting and pasting is plagiarism. What is your judgment- is this plagiarism?

Answers

Answer:

The answer is "True".

Explanation:

The term Plagiarism is a word, that implies as a form of cheating, which includes the usage, of all or part, of its thoughts, words, designs, arts, the music of anyone else without any of the author's recognition or permission.

In the question, it is already defined that students copy and paste the data, which is lying in the criteria of plagiarism, that's why the given statement is "true".

P34. What is the relationship between the variable SendBase in Section 3. 5. 4 and the variable LastByteRcvd in Section 3. 5. 5?

Answers

The network layer offers the next service. The transport layer sends a segment with a maximum size of 1,200 bytes and a destination host address to the network layer in the source host.

Thus, The transport layer at the destination host will then get the segment as promised by the network layer. Let's say the destination host is home to numerous active network application processes.

Design the simplest transport-layer protocol you can to get application data to the target host's desired process.

Assume that each active application process on the target host has a 4-byte port number given by the operating system. Modify this protocol to give the destination process a "return address". Does the transport layer "have to" comply with your protocols.

Thus, The network layer offers the next service. The transport layer sends a segment with a maximum size of 1,200 bytes and a destination host address to the network layer in the source host.

Learn more about Network layer, refer to the link:

https://brainly.com/question/29110765

#SPJ1

1. Give one reason why data is represented in binary in a computer

Answers

Answer:

The circuits in a computer's processor are made up of billions of transistors . A transistor is a tiny switch that is activated by the electronic signals it receives. The digits 1 and 0 used in binary reflect the on and off states of a transistor.

Explanation:

i learned this last year

a technician has been troubleshooting a network problem, has determined the likely cause of the issue, and implemented a solution. what is the next step they should perform according to the comptia troubleshooting methodology?

Answers

According to the CompTIA troubleshooting methodology, the next step the technician should perform after implementing a solution to a network problem is to verify full system functionality and if necessary, implement preventive measures.

The technician should test the system to ensure that the issue has been completely resolved and there are no other related problems.

They should also consider implementing measures to prevent the same problem from occurring again in the future.

This could involve implementing new security protocols, updating software or hardware, or providing additional training to users to prevent user error. The goal of this step is to ensure that the system is fully functional and that the problem does not occur again in the future.

Learn more about troubleshooting at

https://brainly.com/question/29736842

#SPJ11

______ is a type of specialized expansion bus used to connect audio and video equipment to the computer.

Answers

answer: firewire

explanation: it is used to connect audio to computers and other electronic devices like video equitment

The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process? The client sends a request to the DNS server. The DNS server translates the IP address back to the URL. The process starts over at the beginning. The web server sends the information back to the web browser.

Answers

Answer:

The web server sends the information back to the web browser.

Explanation:

The DNS look up is the process that happens when we type a URL into the browser gets converted into an IP address that's used to locate the website's servers. Then when this query reaches a final server, it is returned back to the computer with the data that we need.

So the final step in the DNS process is the web server sends the information back to the browser.

I hope this answer helps.

Your employer is opening a new location, and the it director has assigned you the task of calculating the subnet numbers for the new lan. you’ve determined that you need 3 subnets for the class c network beginning with the network id 192.168.1.0. 1. how many host bits will you need to use (borrow) for network information in the new subnets? (2 point) after the subnetting is complete,how many unused subnets will be waiting on hold for future expansion (2 point)how many possible hosts can each subnet contain? (2 point) how many usable hosts? (2 pts) 3. what is the new subnet mask? (2 point)what is the new cidr notation? (2 point)

Answers

To subnet the class C network with the network ID 192.168.1.0 into 3 subnets, we will need to borrow 2 host bits for network information. After subnetting, there will be 6 unused subnets available for future expansion. Each subnet can accommodate 62 possible hosts, with 62 usable hosts per subnet. The new subnet mask will be 255.255.255.192, and the CIDR notation will be /26.

To create 3 subnets from the class C network 192.168.1.0, we need to determine how many host bits we must borrow for network information. Since we need 3 subnets, we can represent this number as 2^2, which means we need to borrow 2 host bits. By borrowing these bits, we create 4 subnets, but we only need 3, leaving 1 unused subnet.

After subnetting, we have 6 unused subnets waiting for future expansion. This is because we borrowed 2 host bits, which gave us 4 subnets in total, but we only needed 3. Therefore, 6 subnets (2^2 - 3) remain unused.

Each subnet can accommodate 62 possible hosts. This is calculated by subtracting 2 from the total number of host addresses in each subnet. The remaining 2 addresses are reserved for network ID and broadcast address.

Out of the 62 possible hosts, we can use 62 - 2 = 60 hosts in each subnet. Two hosts are subtracted for network ID and broadcast address, leaving 60 usable hosts.

The new subnet mask is 255.255.255.192. By borrowing 2 host bits, we have 6 subnet bits in the subnet mask, represented as 11111111.11111111.11111111.11000000 in binary. This translates to 255.255.255.192 in decimal notation.

The CIDR notation represents the subnet mask in a concise format. Since we have borrowed 2 host bits, the CIDR notation for the new subnet mask is /26. The "/26" indicates that the first 26 bits of the subnet mask are set to 1, while the remaining 6 bits are set to 0.

learn more about  class C network here:
https://brainly.com/question/30640903

#SPJ11

in software efficiency analysis, resource usage directly depends on the data structures and memory management. true or false

Answers

The given statement "In software efficiency analysis, resource usage directly depends on the data structures and memory management." is true.

Data structures and memory management play a vital role in the efficiency and effectiveness of software execution, as they have a direct effect on the speed of memory access and the level of resource utilization. For example, the use of an inefficient data structure to store information can lead to high levels of unnecessary memory usage while maintaining complex data or caching can increase resource efficiency. Similarly, the use of poor memory management techniques can lead to a lack of efficiency when it comes to memory allocation and reallocation. This can lead to increased memory consumption and longer program execution times.

Therefore, the given statement is true.

Learn more about the data structures here:

https://brainly.com/question/32132541.

#SPJ4

In the TV special ' How the Grinch Stole Christmas,' what three words best describe the Grinch?

Answers

Answer:

Stink, Stank, Stunk!

Explanation:

A matrix M[-6. 10,4. 15] is stored in the memory with each element requiring 4 bytes of storage. If the base address is1025, find the address of M[4][8] when the matrix is stored in Column Major Wise

Answers

The answer is 1089. In column-major order, the elements of each column of the matrix are stored together in contiguous memory locations.

The matrix M is a 2 x 2 matrix, so each dimension has 2 elements. Therefore, the size of each dimension is 2 x 4 bytes (since each element requires 4 bytes of storage), or 8 bytes.

To find the address of M[4][8], we need to determine the memory location of the element at row 4, column 8 in the matrix.

Since the matrix is stored in column-major order, we need to calculate the address of the first element in column 8, and then add the offset for row 4.

The address of the first element in column 8 is:

1025 + (8 * 2 * 4) = 1057

Note that we multiply 8 (the column number) by 2 (the number of elements in each row) and by 4 (the number of bytes per element).

To find the address of M[4][8], we add the offset for row 4:

1057 + (4 * 2 * 4) = 1089

Therefore, the address of M[4][8] is 1089 when the matrix is stored in column-major order.

To know more about column-major order click here:

brainly.com/question/30835030

#SPJ4

In cell C5, enter a formula using the IFS function that returns a value of P1 if cell B5 is greater than 50,000, a value of P2 if cell B5 is greater than 25,000, and a value of P3 for all other results.

Answers

The IFS function to return a value of P1 if cell B5 is greater than 50,000, a value of P2 if cell B5 is greater than 25,000, and a value of P3 for all other results, you would need to enter the following formula into cell C5:

=IFS(B5>50000,"P1",B5>25000,"P2",TRUE,"P3")
This formula uses the IFS function to evaluate three different conditions. If the value in cell B5 is greater than 50,000, it will return the value "P1". If the value in cell B5 is greater than 25,000 (but less than or equal to 50,000), it will return the value "P2". And if the value in cell B5 is less than or equal to 25,000, it will return the value "P3".

Note that the IFS function requires you to specify each condition and result separately, so you need to use multiple "B5>" comparisons to cover all the possible scenarios.

To know more about IFS visit:-

https://brainly.com/question/27948852

#SPJ11

How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data on secondary storage. Users can only read and write data on primary storage. The CPU can only read and write data on primary storage. Users can only read and write data on secondary storage.​

Answers

Answer:

i don't know but you can get Socratic  it scan questions and tell answers

Explanation:

Answer:

The CPU can only read and write data on primary storage.

 Users can only read and write data on secondary storage

Explanation:

i got it correct

The copy mouse pointer looks like a
white plus sign
O white arrow
white arrow with a small plus sign
black cross

Answers

I’m confused?????????

windows cannot complete the extraction the destination file cannot be created

Answers

By resolving the "Filename(s) would be too long for the destination" problem, Windows is able to finish the extraction.

What is Windows?

This only indicates that the target file could not be created due to the length of the file name.

Try extracting the file again after renaming it with a shorter name. If the file name is too long for the destination in your situation, then this ought to solve the problem.

After fixing zip files, Stellar File Repair also extracts them, including those that have password protection. Stellar Repair will thereby repair faulty zip files caused by mistakes, malware attacks, incomplete downloads, defective sectors, unsuitable compression, etc.

Therefore, By resolving the "Filename(s) would be too long for the destination" problem, Windows is able to finish the extraction.

To learn more about Destination, refer to the link:

https://brainly.com/question/12873475

#SPJ1

An instance of ________ describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors. RuntimeException Exception Error Throwable NumberFormatException

Answers

An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.  

What is a runtime exception?

The Runtime Exception is known to be the parent class that is often seen  in all exceptions of the Java programming language that are known to crash or break down the program or application when they happen.

Therefore, An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.

Learn more about Runtime Exception from

https://brainly.com/question/3620278

#SPJ1

what is MICR used for​

Answers

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:

what is operating system? group of answer choices d) all of the mentioned a) collection of programs that manages hardware resources c) link to interface the hardware and application programs b) system service provider to the application programs

Answers

Operating System (OS) is a collection of programs that controls and manages hardware resources. The operating system serves as a connection between the computer's hardware and application software. The correct option is A) a collection of programs that manages hardware resources.

The Operating System is system software that manages hardware and software resources and provides frequent services to the user. The operating system acts as a connection between computer software and hardware by allocating the system's hardware resources to the user software.

Features of the Operating System are:

Process ManagementMemory ManagementFile ManagementDevice ManagementSecurityControl of network connectivityResource ManagementMulti-TaskingMulti-User

The operating system allocates the resources and performs necessary tasks. It also enables users to use the computer efficiently.

You can learn more about Operating Systems at: brainly.com/question/6689423

#SPJ11

What options are available for storing backups, physically?
O On-site only
O Off-site only
O Both on-site and off-site
O There's no need to store physical backups anymore

Answers

C. Both on-site and off-site is can be used for storing backups. Storing backups both on-site and off-site is considered a best practice for data backup and disaster recovery.

Storing backups both on-site and off-site is considered a best practice for data backup and disaster recovery. On-site backup involves storing backup copies of data on the same location or premises as the original data. This allows for quick and easy access to the backup data in case of an emergency. Examples of on-site backup include storing backup copies on a local hard drive, tape drive or an on-premises backup server. Off-site backup, on the other hand, involves storing backup copies of data at a separate location, such as a remote data center or cloud-based service. This ensures that the backup data is protected from physical disasters that may occur at the primary location.

Learn more about backup, here https://brainly.com/question/29590057

#SPJ4

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

Other Questions
Explain what it means to have a positive change, give an example. Use of the internet has acquired its own rules and conventions for interaction known as Netiquette. In your GU100 Student Success course you were introduced to the Netiquette rules for Grantham University. There are also rules for general use of the internet. What are regulative rules over the internet? What are constitutive rules? references please Name two things that affect the rate of weathering and why this happens ASAP Solve the percent equations 45% of 26= who would benefit the most from investing in a roth ira rather than another type of retirement account? Genetic markers used for forensic analysis are usually A.recessive, where an individual is positive if they are homozygous B.codominant, where only the recessive allele can be detected C.codominant, where each allele can be detected separately D.dominant, so the presence of one of the two alleles is obvious E.codominant, where only the dominant allele can be detected Which band is the smallest within the electromagnetic spectrum?A) x-raysB) microwavesC) radio wavesD) visible light How many ways are there to fill either the pitcher or catcher field position (but not both) from among the 25 players (leaving the other field positions empty) Write 78,000,000 in scientific notation Read the paragraph.School administrators should be encouraged to increase funding for music education. Many feel that school music programs are expensive and time-consuming. However, participating in band, orchestra, or chorus has been shown to improve student learning. Studies show that children who participate in school music programs achieve higher grades than students who do not. They also perform better on standardized tests.What counterclaim is presented in the paragraph?School music programs are expensive and time-consuming.Participating in music programs has been shown to improve student learning.Studies show children who participate in music achieve high grades.Children who participate in music also perform better on standardized tests Answer my recent unanswered pre-algebra questions for brainliest! The Alvarezes are trying to decide which of two catering companies to hire for their anniversary party. Marvelous Meals charges $700 plus $35 per person. Posh Parties charges $425 plus $50 per person. Both companies are known for their good food and excellent service, so the Alvarezes want to choose the caterer that will cost less. Write the equation to represent Marvelous Meals. * Rubbing alcohol evaporates from your arm quickly, leaving a cooling effect on your skin. How do the molecules of gas compare to the molecules as a liquid? The gas particles move faster, have the same molecular composition, and have weaker attractions between them than the liquid particles. The gas particles move faster than the liquid particles, and the bonds of the molecules are broken during evaporation to allow gas atoms to spread apart. The gas particles move slower but have the same molecular structure and the same attraction between them as the liquid particles. The gas and liquid particles move at the same speed, but the bonds of the molecules are broken during evaporation to allow the gas atoms to spread apart. . write a formula to estimate the amount of material required to cover firm 1's structure, not including the floor. explain your reasoning. (2 points: 1 point for the formula, 1 point for the explanation Cole went to the store and bought pants and shirts. He bought a total of 12 items and paid $234. If Pants cost $22 and Shirts cost $16, how many of each did he buy? Select two equations that could be used to determine the number of pants (p) and shirts (s) Cole purchased Experiencing a "jump scare" in a frightening movie most immediately activates your:. How many times larger is a magnitude 4 than a magnitude 1 earthquake on the Richter scale? If a manager warned an employee not to be late for work again or they would be released, the manager was using: Solve for x. Round to the nearest hundredth.1718 Xwhat trigonometric function would you use to find x?O CosineSineTangentO SecantO Cosecant Narrative Writing Purpose What things did Leah's class do one day? Leah wrote to tell about the activities her class did. She used action verbs to give readers a clear picture of the events. Leah changed had to an action verb that is more exact.