describe the two types of files that the linker works with in order to create an executable file. in your own words describe what happens when a user attempts to run the executable file

Answers

Answer 1

The two types of files that the linker works with to create an executable file are object files and library files. When a user attempts to run the executable file, the operating system loads it into memory, resolves any remaining external references, and starts executing the program from its entry point.
1. Object files: These are generated by the compiler after translating the source code into machine code. They contain the compiled code, data, and information about external references that need to be resolved.
2. Library files: These are collections of precompiled code that can be shared among multiple programs. They provide reusable functionality and help reduce the overall size of the executable.

When a user attempts to run an executable file:
1. The operating system loads the executable file into memory.
2. The operating system resolves any remaining external references (e.g., function calls or variables) in the executable file by looking up their addresses in the library files.
3. Once all external references are resolved, the operating system starts executing the program from its entry point (usually the "main" function).
4. The program runs and performs its intended tasks until it exits, either successfully or with an error.

Learn more about machine code here:

https://brainly.com/question/17041216

#SPJ11


Related Questions

Why does a computer needs RAM

Answers

Answer:

The more RAM your CPU has access to, the easier its job becomes, which enables a faster computer. If you do not have a sufficient amount of RAM than your CPU has to work much, much harder to transfer data, which severally damages the computer's performance. Random access memory also helps your system support software.

Answer:

The more RAM your CPU has access to, the easier its job becomes, which enables a faster computer. If you do not have a sufficient amount of RAM than your CPU has to work much, much harder to transfer data, which severally damages the computer's performance. Random access memory also helps your system support software

which cyber protection condition establishes a protection priority focus on critical and essential functions only

Answers

INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.

INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.

There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.

In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.

Learn more about cyber protection here: https://brainly.com/question/25157787?referrer=searchResults

 

which formula should be entered to calculate the total budget?

which formula should be entered to calculate the total budget?

Answers

Answer:

SUM(A$1:A$3),

Explanation:

A formula is an expression telling the computer what mathematical operation to perform upon a specific value. When referring to computer software, formulas are most often used in spreadsheet programs, such as Microsoft Excel. Using formulas in spreadsheets can allow you to quickly make calculations and get totals of multiple cells, rows, or columns in a spreadsheet.

In the picture below is an example of a Microsoft Excel formula =SUM(A$1:A$3), which adds the total of cells A1, A2, and A3. In this formula, SUM is the function of the formula.

Formula in Microsoft Excel

Tip

Press the shortcut key Shift+F3 to open the Excel Formula or Insert Function window.

Note

A formula is not be seen unless the cell is selected.

which formula should be entered to calculate the total budget?

AI is not embraced everywhere in every industry because _______.

Answers

Answer:

See below:

Explanation:

AI is not embraced in every industry because of the type of industry and what it requires. In some situations, a human is needed since an AI cannot determine what to do and can sometimes even cause death.

AI isn't embraced everywhere because for some things we need a person, lets say for example, we need an AI to respond to 911 calls, that simply won't work due to the many situations and training the bot too will be a nightmare. For example, if a caller says a word that normal humans can understand, or a "code word" that every human knows but they haven't bothered to tell the bot, that will be the end of the line for them.

There are mutliple reasons to not use AI depending on the situation whether its life and death or just plain impractical.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

help pls I will mark brainliest the top answer i need it rn
Nonsense = REPORT
Answer the question 3-5 sentences.
"Why is recycling very important and beneficial to you and your community?"​

help pls I will mark brainliest the top answer i need it rnNonsense = REPORT Answer the question 3-5

Answers

Answer:

to reduce outbreak of diseases

Explanation:

materials recycled, funds earned from it are used developmental projects in my community

write a q basic program to find the sum of all the even numbers from 1 to 50​

Answers

Answer:

CLS

M=2

SUM=0

DO WHILE M<=50

SUM=SUM+M

M=M+2

LOOP

PRINT " The sum of all even numbers between 1 and 50 is"; sum

what are some examples of physical security measures you can implement to protect your network?

Answers

There are several physical security measures that can be implemented to protect a network. Some examples include:


1. Access controls: Limiting access to the physical space where the network equipment is located can prevent unauthorized individuals from tampering with the network.
2. Surveillance cameras: Installing surveillance cameras can help monitor the physical space where the network equipment is located, and can serve as a deterrent to potential intruders.
3. Alarms: Setting up an alarm system can alert security personnel if there is an unauthorized attempt to access the network equipment.
4. Secure storage: Keeping network equipment in a locked cabinet or room can prevent unauthorized individuals from accessing the equipment.
5. Environmental controls: Ensuring that the physical space where the network equipment is located is properly cooled and ventilated can prevent overheating and other environmental damage.


By implementing these physical security measures, organizations can help protect their network from physical threats and ensure the integrity and availability of their data.

To know more about Surveillance cameras, click here:

https://brainly.com/question/12419047

#SPJ11

what are three sections in a work sheet accounting

Answers

Answer:

-The heading of the WorkSheet consists of three parts:-

The name of the business.

-The title

-The period of time (accounting period) for which the worksheet is prepared.

Body

-The body of the WorkSheet contains a big column for the name of accounts and ten money columns or five pairs of money columns, each pair consisting of debit and credit columns.

Explanation:

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Answers

Answer:

Trojan horses

Explanation:

Develop the IPO chart to calculate the area of a Triangle

Answers

The IPO chart to calculate the area of a Triangle is given below:

The Formula

at=area of triangle

b=Bredth ,h=height.

Formula=0.5×b×h.

Algorithm:

-Step 1:-Start.

Step 2:-Declare at,b,has float.

Step 3:-Initialize value of b and h.

Step 4:-Calculate at 0.5×b×h.

Step 5:-print area of triangle .

Step 6:-End.

Read more about algorithms here:

https://brainly.com/question/13800096

#SPJ1

What are the components that make a computer work?

Answers

Answer: Plastic, metal, rubber, wiring, electricity, technology, wifi,  

Explanation: You need  PLASTIC to make a frame for the computer. METAL

to make an exoskeleton under the plastic frame. RUBBER to hold those loose wires and to make sure the electricity doesn't escape and shock you. ELECTRICITY to charge and make the computer runs.  Technology is used for you to log in and out of your computer and WIFI to make sure it doesn't lag.

3. What is an example of a Digital Age Invention?

Answers

3D printing of body parts , fly vehicles

You are working on a team of testers that is performing system testing to evaluate your company's product prior to delivery. The product is software that supports typical banking services in a face-to-face setting: opening, closing, and maintenance of checking, savings, time deposits (CD's and IRA's). You may assume that ancillary services are also supported. Fortunately, your company has a testing lab that perfectly mirrors a typical branch. List and briefly describe at least 5 functional requirements and 5 non-functional requirements that you team might be evaluating during your testing. Please number your answers and clearly indicate the with a subheading the category (functional or non-functional)

Answers

The software should allow customers to open various types of accounts, such as checking, savings, CDs, and IRAs. It should validate customer information, perform necessary checks, and generate account numbers.

Functional Requirements:

1. Account Opening: Software allows customers to open various accounts, validates information, and generates account numbers.

2. Fund Transfer: Enables customers to transfer funds accurately between accounts.

3. Transaction History: Maintains detailed transaction records and provides access to customers.

4. Account Closure: Allows customers to close accounts securely.

5. Statement Generation: Generates accurate and timely account statements.

Non-Functional Requirements:

1. Performance: Software handles concurrent users and transactions efficiently.

2. Security: Implements robust security measures to protect customer data.

3. Reliability: Ensures data integrity and has mechanisms for backups and recovery.

4. Usability: User-friendly interface with clear instructions and intuitive workflows.

5. Scalability: Can handle future growth and increased usage without performance degradation.

Learn more about software here:

https://brainly.com/question/985406

#SPJ11

A company is monitoring the number of cars in a parking lot each hour. each hour they save the number of cars currently in the lot into an array of integers, numcars. the company would like to query numcars such that given a starting hour hj denoting the index in numcars, they know how many times the parking lot reached peak capacity by the end of the data collection. the peak capacity is defined as the maximum number of cars that parked in the lot from hj to the end of data collection, inclusively

Answers

For this question i used JAVA.

import java.time.Duration;

import java.util.Arrays;;

class chegg1{

 public static int getRandom (int min, int max){

       

       return (int)(Math.random()*((max-min)+1))+min;

   }

public static void display(int[] array){

    for(int j=0; j< array.length; j++){

     System.out.print("   " + array[j]);}

     System.out.println("----TIME SLOT----");

}

public static void main(String[] args){

   int[] parkingSlots= new int[]{ -1, -1, -1, -1, -1 };

   

   display(parkingSlots);

   for (int i = 1; i <= 5; i++) {

     

     for(int ij=0; ij< parkingSlots.length; ij++){

       if(parkingSlots[ij] >= 0){

           parkingSlots[ij] -= 1;

       }

       

       else if(parkingSlots[ij]< 0){

           parkingSlots[ij] = getRandom(2, 8);

       }

       

       

       }

      display(parkingSlots);

   

    // System.out.println('\n');

     try {

       Thread.sleep(2000);

     } catch (InterruptedException e) {

       e.printStackTrace();

     }

   }

   }

}

output:

-1   -1   -1   -1   -1----TIME SLOT----

  8   6   4   6   2----TIME SLOT----

  7   5   3   5   1----TIME SLOT----

  6   4   2   4   0----TIME SLOT----

  5   3   1   3   -1----TIME SLOT----

  4   2   0   2   4----TIME SLOT----

You can learn more through link below:

https://brainly.com/question/26803644#SPJ4

What is the function of cache memory

Answers

Answer:

is below

Explanation:

cache memory, also called cache, supplementary memory system that temporarily stores frequently used instructions and data for quicker processing by the central processing unit (CPU) of a computer. The cache augments, and is an extension of, a computer’s main memory.

that is what i found mixed with what ik so hope that helps

what is the technology that allows these devices to work?

Answers

The technology that allows these devices to work is a combination of hardware and software.

The hardware includes components such as sensors, processors, and memory, which allow the device to collect and process data. The software includes the operating system, drivers, and applications, which enable the device to perform specific functions and communicate with other devices. In addition, many of these devices rely on wireless communication technologies such as Wi-Fi, Bluetooth, or cellular networks to connect to the internet and other devices.

These technologies allow the devices to communicate with each other and with remote servers or cloud-based services that provide additional functionality or storage. Overall, the combination of hardware, software, and wireless communication technologies enables these devices to perform a wide range of tasks and provide users with new levels of convenience and productivity.

Learn more about technology: https://brainly.com/question/7788080

#SPJ11

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

Select the steps to use the Document Inspector.
1. Make sure you have saved your document.
2. Go to the
v tab on the ribbon.
3. Select
v in the Inspect Document section of the Backstage view.
4. From the drop-down menu, select
5. Check the boxes you want inspected and click OK.
6. If the Document Inspector finds issues, it will

Answers

Answer:

2. File

3. Check for issues

4. Inspect document

6.open a dialogue box with options

Explanation:

Answer on edge 2020

Answer:

the other guy is right!

Explanation:

4. (10 points) Suppose that we have a linear block cipher E that encrypts 128-bit blocks of plaintext into 128-bit blocks of ciphertext. Let Ek(m) denote the ciphertest of a 128-bit message m under a key k. Thus, for messages m1 and m2, we have

Answers

A linear block cipher is not secure. If an adversary has access to 128 chosen ciphertexts, they can decrypt any ciphertext without knowledge of the secret key.

A linear block cipher is a type of block cipher that is not secure against chosen plaintext attacks. A block cipher is a cryptographic algorithm that encrypts data in blocks of a fixed size. A linear block cipher is a block cipher that can be expressed as a linear combination of other block ciphers.

A chosen plaintext attack is an attack on a cryptographic system where the attacker can choose the plaintext that is encrypted. In the case of a linear block cipher, an adversary can choose 128 plaintexts and observe the corresponding ciphertexts. By analyzing the ciphertexts, the adversary can deduce the secret key.

For example, suppose we have a linear block cipher E that encrypts 128-bit blocks of plaintext into 128-bit blocks of ciphertext. Let Ek(m) denote the ciphertext of a 128-bit message m under a key k.

If the adversary chooses the plaintext messages m1 = 0000...0000 and m2 = 1111...1111, then the ciphertexts will be c1 = Ek(m1) and c2 = Ek(m2).

The adversary can then observe that c1 and c2 are related by a linear equation. For example, c1 + c2 = 0. By knowing this linear equation, the adversary can deduce the secret key k.

Once the adversary knows the secret key, they can decrypt any ciphertext. Therefore, a linear block cipher is not secure.

To know more about data click here

brainly.com/question/11941925

#SPJ11

Calculate the ERA

A pitcher’s ERA (earned runs average) is calculated by multiplying the number of runs (scores) times total innings in the game (usually 9) and then dividing by the total innings that the pitcher pitched.

Write a function that assumes that there were 9 innings in the game and takes in two numbers that represent the earned runs and the innings pitched. The function should return the ERA.

Answers

Answer:

In Python:

def returnERA(runs,total):

   ERA = runs *9/total

   return ERA

Explanation:

This defines the function. It receives the number of runs and the total runs as its parameters

def returnERA(runs,total):

This calculates the ERA

   ERA = runs *9/total

This returns the ERA

   return ERA

which of the following is considered a threat caused by human error?group of answer choicesa tsunami floods a data center causing total data lossan employee inadvertently installing an old database on top of the current onea virus and worm writer infecting computer systemsa hacker breaking into a system to steal for financial gainan employee intentionally destroying data and system components

Answers

The option that is considered a threat caused by human error is b: "an employee inadvertently installing an old database on top of the current one."

Human error can often lead to security incidents or data breaches within an organization. In this specific scenario, the action of an employee accidentally installing an old database on top of the current one can result in significant data loss and operational disruptions. This type of mistake can overwrite or corrupt critical data, leading to the loss of valuable information and potentially impacting business operations.

It is essential for organizations to implement proper training, procedures, and safeguards to minimize the risk of human error and mitigate the potential consequences that can arise from such mistakes.

Option b is answer.

You can learn more about human error at

https://brainly.com/question/30126261

#SPJ11

Your supervisor has asked you to configure a new system using existing configurations. He said to use either an ARM template or a blueprint. What would you suggest and why? When do you think it is appropriate to use an ARM template and when is it not?

Answers

If precise control over infrastructure configuration is needed, use an ARM template. If enforcing standards and ensuring consistency is the priority, opt for Azure Blueprints.

When considering whether to use an ARM template or a blueprint for configuring a new system using existing configurations, the choice depends on the specific requirements and circumstances of the project.

Here are some considerations for each option:

ARM Templates:

1. ARM templates are Infrastructure as Code (IaC) templates used to define and deploy Azure infrastructure resources. They provide a declarative approach to provisioning resources.

2. Use ARM templates when you need precise control over the infrastructure configuration, including virtual machines, networking, storage, and other Azure services.

3. ARM templates are beneficial when you require version control, repeatability, and scalability for infrastructure deployments.

4. They allow for automation and rapid provisioning of resources, making it easier to manage and maintain infrastructure deployments.

Blueprints:

1. Azure Blueprints are used to create and manage a collection of Azure resources that can be repeatedly deployed as a package.

2. Use blueprints when you want to enforce compliance, governance, and organizational standards across multiple deployments.

3. Blueprints are suitable for scenarios where you need to ensure consistency and security compliance within a specific environment or for specific types of workloads.

4. They enable centralized management and governance, allowing organizations to maintain control over deployments and ensure compliance with regulations.

The choice between ARM templates and blueprints ultimately depends on the specific needs of the project. If the focus is on infrastructure provisioning and customization, ARM templates provide granular control.

On the other hand, if the emphasis is on governance, compliance, and enforcing standards, blueprints offer a higher level of abstraction and central management.

It is appropriate to use ARM templates when you require flexibility, customization, and fine-grained control over the infrastructure. However, if the primary concern is enforcing standards and ensuring consistency across deployments, blueprints would be a more suitable choice.

In summary, evaluate the project requirements in terms of infrastructure control versus governance needs to determine whether to use an ARM template or a blueprint for configuring the new system using existing configurations.

Learn more about Blueprints:

https://brainly.com/question/4406389

#SPJ11

Design a counter with the following repeated binary sequence: 0->2->3->5->6->0

The missing numbers 1,4,7 are considered as don’t care conditions. Use a SR flip-flop to construct the circuit.

Answers

To design a counter with the given repeated binary sequence using SR flip-flops. To achieve this, we can start by converting the sequence to binary and finding the number of bits needed to represent the sequence. In this case, we have 0->2->3->5->6->0, which in binary is 000->010->011->101->110->000. This means we need three flip-flops to represent the sequence.

To design the circuit, we can use three SR flip-flops and connect their outputs to an XOR gate. The inputs to the flip-flops can be connected as follows: the Q output of the first flip-flop (FF1) is connected to the S input of the second flip-flop (FF2), the Q output of FF2 is connected to the S input of FF3, and the Q output of FF3 is connected to the R input of FF1. Additionally, the Q outputs of FF1 and FF2 can be connected to the inputs of the XOR gate.

The explanation behind this design is that the three flip-flops will cycle through the binary sequence 000->010->011->101->110->000 and repeat. The XOR gate will output a high signal whenever the Q outputs of FF1 and FF2 are different, which happens when the counter is at 2, 3, or 5. The missing numbers 1, 4, and 7 are considered don’t cares, so the circuit will not output any signal when the counter is at those values.

Overall, the designed circuit uses three SR flip-flops and an XOR gate to create a counter with the given repeated binary sequence.

Learn more about binary sequence: https://brainly.com/question/18286442

#SPJ11

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

if an administrator configures local text file logging in nps, where is the log saved to?

Answers

If an administrator configures local text file logging in NPS, the log is saved to a file on the NPS server's local disk.

Network Policy Server (NPS) is a Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server used for network access protection. By default, NPS logs to the Windows event log. However, an administrator can configure NPS to log to a text file instead. When configured to log to a text file, NPS will save the log to a file on the local disk of the NPS server. The administrator can specify the path and filename for the log file in the NPS configuration. The local text file logging option provides an additional level of logging detail that can be useful for troubleshooting and auditing purposes.

Learn more about NPS here: brainly.com/question/32140392

#SPJ11

Which learning model allows an AI system to create its own categories of data without labeling those categories

Answers

The learning model that allows an AI system to create its own categories of data without labeling those categories is known as Unsupervised learning.

In unsupervised learning, the AI system is not given any pre-defined labels or categories, but instead, it is allowed to analyze and discover patterns or relationships in the data on its own. The system then groups or clusters the data based on these patterns, without any external guidance or supervision.

This type of learning is particularly useful when working with large datasets where it may not be practical or even possible to manually label every data point. Unsupervised learning can help identify hidden patterns and relationships in the data that might otherwise be missed, leading to new insights and discoveries.

Examples of unsupervised learning include clustering, dimensionality reduction, and anomaly detection. Unsupervised learning can be challenging as it requires the AI system to make sense of the data without any prior knowledge or guidance, but it can also be incredibly powerful when used correctly.

Learn more about datasets:

https://brainly.com/question/30154121

#SPJ11

has asked that you provide them a list of all potential vulnerabilities on their network. what tool would you use to meet this requirement?

Answers

Nmap is a tool that may be used to fulfill the requirement of providing a list of all potential network vulnerabilities.

Tools for vulnerability management are created to identify system vulnerabilities in the business in order to reduce future security risks. By assigning danger ratings to all of the vulnerabilities discovered in a system, these technologies may help address possible cybersecurity concerns.

To find vulnerabilities, a variety of technologies are available. One of the popular open-source, free network scanning tools is Nmap, which is used by many security experts. For network host and operating system discovery, Nmap employs the probing approach. This function assists in identifying vulnerabilities in a single or a number of networks.

Learn more about NMAP scan here: brainly.com/question/15114923

#SPJ4

Other Questions
what is 9+ 10 i need the answer you pick the one you think is right.A) 19 B) 21 tell me how you got the answer. "If an interest rate expressed in decimal places is stated as 0.472,how will this be written in percentages (%)?Enter your answer as a number toone decimal place. What are the objectives of the computer communication with the surrounding world? 1) solve 9(x-11)=9 2) solve 4(3x-2)=52 3) solve 44=2(3x-5) 4) solve 2x-4/5 = 45) solve 3x+2/2 = 13 6) solve 4x-5/5 = 37) solve 10x+4/7 = 88) solve 6x-1/2 = 1 I need full workings out please x thank you What will most people do when making a purchase decision, if all else is equal?A. Opt for the low-cost optionB. Opt for the environmentally responsible optionC. Opt for the sustainability optionD. Opt for the fair labor standards optionE. None of the above HELP! ASAP!! Will Mark brainliest! A university is interested in promoting graduates of its honors program by establishing that the mean GPA of these graduates exceeds 4.20. A sample of 37 honors students is taken and is found to have a mean GPA equal to 4.30. The population standard deviation is assumed to equal 0.40. The parameter to be tested is __________. The observation deck of a skyscraper is 420 m abovethe street. Determine the time required for a penny tofree fall from the deck to the street below? Do you believe that the Miranda rights are used as a protector of a persons rights or as a tool by criminals? What is margin trade and how do margin trades magnify both the upsidepotential and the downside risk of an investment position? Although some people like to make hot chocolate with milk, I prefer to make it with water. William wants to create a composition that is made in the style of bach. how will he best represent bach in his work?o a.he will compose music that is mathematically precise.ob.he will create a work that honors the catholic church.oc. he will compose a lengthy opera with many parts.od.he will eliminate the use of complex textures and ornamentation. preventing workplace violent incidents is a natural extention of the responsibilities of safety and health professionals. True or false Which action can Congress not perform, according to the Constitution? Which one of the following prohibits fraudulent and unfair behavior such as sales practice abuses and insider trading?a. The Securities Act of 1933. b. The Securities Exchange Act of 1934. c. The Investment Advisers Act of 1940.d. The Sarbanes-Oxley Act of 2002. e. The Investment Company Act of 1940. In a set of bivariate data, an additional point is added near the regression line but far away from the rest of the data. thiswill the slope of the regression line and the correlation coefficient.A slightly change, strengthenB greatly change, weakenC slightly change, weakenD greatly change, strengthenE not change, not change When writing a passage of someones perspective, does it have to be in that persons point of view Which two statements describe how the Industrial Revolution affected the population of Britain?A. Population growth started slowing down as poverty increased in urban areas.B. Greater food production led to an increase in the overall population.C. The population increased rapidly in rural areas where the air was cleaner.D. The population declined because of deaths caused by poor working conditions.E. Half of Britains population ended up living in cities where jobs were more readily available. State, in terms of chemical bonds, what occurs when a chemical reaction has taken place: Change 59 to a wholeor mixed number.[?]