Everything on a slide is an object that can be manipulated and formatted separately
from all other objects.

Answers

Answer 1
true everything on a slide is an object

Related Questions

One of the common tests used to evaluate the accessibility of a web page consists of

using an Internet search engine to see if the page can be found easily.
clicking all hyperlinks in the page to test for broken or inaccurate links.
using the TAB and ENTER keys to move through the page’s content.
comparing the page with others in the website to find inconsistent layout.

Answers

The statement provided is True. An Internet search engine examination is a comprehensively employed method to evaluate the accessibility of a webpage, gauging if the page can be expeditiously found by users.

Other methods of accessing data

Furthermore, all hyperlinks in the page are clicked upon to weed out broken or inaccurate links which may negatively affect user experience by leading them astray. This rubric helps identify any links that may pose difficulties in accessing an accurate destination or even incorrect one, thus excluding any possibility of misunderstanding or degradation of user satisfaction.

An additional arbiter frequently employed to determine the accessibility of a webpage is using TAB and ENTER keys on a keyboard only interface. Loopholes for a comfortable exploration via keyboards when digital displays cannot help decipher is demonstrated in this manner; important for those susceptible to low vision or motor impairments obeying disability codes with accessible requirements or anyone else lacking interaction means save the keyboard.

Learn more about Internet search engine at

https://brainly.com/question/26488669

#SPJ1

Fill in the blank to complete the “even_numbers” function. This function should use a list comprehension to create a list of even numbers using a conditional if statement with the modulo operator to test for numbers evenly divisible by 2. The function receives two variables and should return the list of even numbers that occur between the “first” and “last” variables exclusively (meaning don’t modify the default behavior of the range to exclude the “end” value in the range). For example, even_numbers(2, 7) should return [2, 4, 6].

def even_numbers(first, last):
return [ ___ ]


print(even_numbers(4, 14)) # Should print [4, 6, 8, 10, 12]
print(even_numbers(0, 9)) # Should print [0, 2, 4, 6, 8]
print(even_numbers(2, 7)) # Should print [2, 4, 6]

Answers

This code creates a new list by iterating over a range of numbers between "first" and "last" exclusively. It then filters out odd numbers by checking if each number is evenly divisible by 2 using the modulo operator (%), and only adding the number to the list if it passes this test.

Write a Python code to implement the given task.

def even_numbers(first, last):

   return [num for num in range(first, last) if num % 2 == 0]

Write a short note on Python functions.

In Python, a function is a block of code that can perform a specific task. It is defined using the def keyword followed by the function name, parentheses, and a colon. The function body is indented and contains the code to perform the task.

Functions can take parameters, which are values passed to the function for it to work on, and can return values, which are the result of the function's work. The return keyword is used to return a value from a function.

Functions can be called by their name and passed arguments if required. They can be defined in any part of the code and can be called from anywhere in the code, making them reusable and modular.

Functions can make the code more organized, easier to read, and simpler to maintain. They are also an essential part of object-oriented programming, where functions are known as methods, and they are attached to objects.

To learn more about iterating, visit:

https://brainly.com/question/30039467

#SPJ1



How do a write 19/19 as a whole number

Answers

As a whole number it is 1.0.

Answer:

1.0

Explanation:

You divide 19 by 19 and get 1

Write a c++ to read seven days in an array and print it

Answers

Explanation:

Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.

Assistive technology has gained currency in the 21st century since it facilitates the inclusion agenda in the country.Give four reasons to justify your point.​

Answers

Answer:

Assistive technology has gained currency in the 21st century because it provides various benefits that support inclusion. These include:

Increased accessibility: Assistive technology can make it easier for individuals with disabilities to access and interact with technology and digital content. This can increase their independence and enable them to participate more fully in society.Improved communication: Assistive technology can facilitate communication for individuals with speech or hearing impairments, enabling them to express themselves and connect with others.Enhanced learning opportunities: Assistive technology can provide students with disabilities with access to educational materials and resources, enabling them to learn and succeed in school.Greater employment opportunities: Assistive technology can provide individuals with disabilities with the tools they need to perform job tasks and participate in the workforce, increasing their opportunities for employment and economic independence.

Explanation:

Assistive technology refers to tools, devices, and software that are designed to support individuals with disabilities. In recent years, assistive technology has become increasingly important in promoting inclusion and accessibility for people with disabilities. The four reasons mentioned above provide a brief overview of the key benefits that assistive technology can offer, including increased accessibility, improved communication, enhanced learning opportunities, and greater employment opportunities. These benefits can help individuals with disabilities to participate more fully in society, achieve greater independence, and improve their quality of life.

How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?

Answers

The security for the database should be more stringent than the security for the rest of the system, as it contains the critical information that needs to be protected.

How should the security of the database be designed ?

The database security should be designed to ensure the confidentiality, integrity, and availability of the data. This means that access to the database should be limited to authorized users and activities should be audited to prevent unauthorized access or modifications.

For web-based data designs, the security of the database is even more critical, as the data is accessed over the internet and is therefore more vulnerable to attacks. Web-based data designs need to incorporate additional security measures such as user authentication, access controls, firewalls, intrusion detection, and prevention systems to protect the database from cyber threats.

Find out more on security at https://brainly.com/question/14369330

#SPJ1

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

would someone know how to write this in python and make sure it works.

Answers

The program written in Python programming language that performs the required computations is:

def calculate(data):

   for item in data:

       print(item, end = ' ')

   print()

   for item in data:

       print(item, ' ', (item**2))

   total = 0

   for item in data:

       total += item

   print("The total of the values is",total)

   total = 1

   for item in data:

       total *= item

   print("The product of the values is",total)

data1 = [12, 10, 32, 3, 66, 17, 42, 99, 20]; data2 = [14, 7, -12, 88, -17, 22, -5, 18]

calculate(data1); calculate(data2)

How to write the program in Python programming language?

The program written in Python programming language, where comments are used to explain each line is as follows:

#This defines the calculate function

def calculate(data):

   #This iterates through the list

   for item in data:

       #This prints the list elements

       print(item, end = ' ')

   #This prints a new line

   print()

   #This iterates through the list

   for item in data:

       #This prints the list elements and the squares

       print(item, ' ', (item**2))

   #This initializes the total to 0

   total = 0

   #This iterates through the list

   for item in data:

       #This calculates the total

       total += item

   #This prints the total

   print("The total of the values is",total)

   #This initializes the product to 1

   total = 1

   #This iterates through the list

   for item in data:

       #This calculates the products

       total *= item

   #This prints the products

   print("The product of the values is",total)

#This initializes data1 and data2

data1 = [12, 10, 32, 3, 66, 17, 42, 99, 20]; data2 = [14, 7, -12, 88, -17, 22, -5, 18]

#This calls the function for data1 and data2

calculate(data1); calculate(data2)

Read more about python programs at

https://brainly.com/question/26497128

#SPJ1

Some non-health-care companies offer health and wellness programs that require employee participants to share personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA regulations.

Answers

Some non-health-care companies offer health and wellness programs that require employee participants to share personal data is option A: True statement.

What is the  employee participants about?

To stop employees from visiting websites with offensive content, several businesses decide to install filters on their employees' computers. Unwanted exposure to such material by employees would be a significant indicator of harassment. Filters can help to prevent employees from wasting time on websites that are unrelated to their jobs.

Therefore, In order to prevent their employees from visiting websites that contain explicit videos or other unpleasant information, several businesses decide to install filters on their computers.

Learn more about wellness programs  from

https://brainly.com/question/14553032
#SPJ1

Some non-health-care companies offer health and wellness programs that require employee participants to share personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA regulations. A: true B: false

Select the correct answer from each drop down menu
Katie is an eight-year-old child and very fussy about eating she loves to eat anything that looks appealing to her in case of a human agent identify the part that acts as a sensor which part acts as an actuator
The ____ plays the role of a sensor. The ____ plays the role of an actuator
Drop box 1 eyes,toes,fingers drop box 2 ears,skin, hands

Answers

Answer:

eyes, hands

Explanation:

The eyes plays the role of a sensor. The hands plays the role of an actuator.

The eyes are the sensors because they take data input, and the hands are the actuators because they physically move in order to perform an instruction.

Hope this helps!

Which ad extensions can serve automatically?

Answers

Answer:

Sitelink, structured snippets, and callout.

Explanation:

Those 3 are the 3 main ad extensions that can serve automatically. I learned this on Monday.  

alignment is used in the second paragraph of the document ?​

Answers

Answer:

yes alignment is used in the second paragraph of a document if u want to justified the document

if you want to assign a user the permission to create schema and run ALTER or any user, what role should you assign to that user?
A. dp_backupoperator
B. db_accessadmin
C. db_securityadmin
D. db_datawriter

Answers

As a database administrator, if you want to assign a user the permission to create schema and run ALTER or any user, the role should you assign to that user is "db_accessadmin" (Option B)

What does it mean to run ALTER?

In SQL, the ALTER command is used to modify a table, view, or the whole database. The ALTER command in SQL allows us to add, change, and delete constraints, columns, and indexes.

It is to be noted that SQL is a computer language developed for managing data in a relational database management system or for stream processing in a relational database management system.

Learn more about database administrator:
https://brainly.com/question/13040754
#SPJ1

Which principle of layout design is shown below

Answers

…………………………………………………………..

Look at the picture ​

Look at the picture

Answers

Answer:

im pretty sure to rent somewhere youd sign a lease

Answer:

mortgage

Explanation:

a mortgage and a lease are simliar but the answer you are looking for is a mortgage

Which statements are true about the OSI reference model? The OSI model developed in the 1970s and 1980s. OSI stands for Open Systems Interface. OSI developed as two independent projects. These projects merged in 1980. The OSI reference model consists of seven layers. The model numbers these layers from 0 to 6. A layer can communicate with the layer above and below it. However, any layer can communicate with any other layer on another device.

Answers

Regarding the OSI reference model, the following statements are accurate: The Open Systems Interconnection, not Open Systems Interface, concept was created in the 1970s and 1980s.

Which of the following statements on the differences between the TCP/IP reference model and the OSI reference model is true?

Transmission Control Protocol/IP (TCP/IP) and Open Systems Interconnection (OSI) are acronyms for different protocols. Whereas OSI takes a vertical approach, TCP/IP uses a horizontal approach.

Which of the following claims about the OSI model is true?

Application, Presentation, Session, Transport, Network, Data Link, and Physical Layer are the seven levels of the OSI reference model. Open System Interconnect, or OSI for short, is a generic model.

To know more about OSI visit:-

https://brainly.com/question/25404565

#SPJ1

Match the parts of a CPU to their fuctions

Answers

Any picture ? To show the cpu

Agriscience in the United States?

Answers

Answer:

The history of agriculture in the United States covers the period from the first English settlers to the present day. In Colonial America, agriculture was the primary livelihood for 90% of the population, and most towns were shipping points for the export of agricultural products. Most farms were geared toward subsistence production for family use. The rapid growth of population and the expansion of the frontier opened up large numbers of new farms, and clearing the land was a major preoccupation of farmers. After 1800, cotton became the chief crop in southern plantations, and the chief American export. After 1840, industrialization and urbanization opened up lucrative domestic markets. The number of farms grew from 1.4 million in 1850, to 4.0 million in 1880, and 6.4 million in 1910; then started to fall, dropping to 5.6 million in 1950 and 2.2 million in 2008

Explanation:


when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged

Answers

Answer:

A . if you burn a stump because if u roll over the fire will have a 90% chance of going out

Select the correct answer from each drop-down menu. What data types can you suggest for the given scenario? Adja is working in a program for the school grading system. She needs to use a(n) (First drop down) to store the name of the student and a(n) array of (Second drop down) to store all the grade of each subject of each student.
Options for the first drop down are- A. Integer, B.String, C.Character.
Options for the second drop down are- A.Floats, B.Character, C.String.

Answers

Based on the given scenarios, the data types that would be best suited for each is:

C. Character.A. Floats

What is a Data Type?

This refers to the particular type of data item that is used in order to define values that can be taken or used in a programming language.

Hence, it can be seen that based on the fact that Adja is working in a program for the school grading system, she would need to use a character to store the name of the student and a float to store all the grades of each subject of each student because they are in decimals.

With this in mind, one can see that the answers have been provided above.,

In lieu of this, the correct answer to the given question that have been given above are character and floats.

Read more about data types here:

https://brainly.com/question/179886

#SPJ1

Answer:

A- String

B- Character

what is java programing

Answers

Answer:

Explanation:

Java is a class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. ... Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture

Answer:

The Java programming language was developed by Sun Microsystems in the early 1990s. Although it is primarily used for Internet-based applications, Java is a simple, efficient, general-purpose language. Java was originally designed for embedded network applications running on multiple platforms.

Explanation:

Perform a bubble sort on the following unsorted list:
3 2 5 6 4 1
In each blank, enter the list after the given iteration. Put one space between each pair of numbers. Do not put commas or any other character in your response besides the numbers and spaces. Do not put a space at the beginning or end of your response.
1. What will the list be after the first iteration of bubble sort?
2. What will the list be after the second iteration of bubble sort?
3. What will the list be after the third iteration of bubble sort?
4. What will the list be after the fourth iteration of bubble sort?
5. What will the list be after the fifth iteration of bubble sort?

Answers

Answer:

3 2 5 6 4 1

2 3 5 4 1 6

2 3 4 1 5 6

2 3 1 4 5 6

2 1 3 4 5 6

1 2 3 4 5 6

Explanation:

After each iteration, one more element at the end of the list is at its final position.

The bubble sort of the unsorted list after one iteration each is:

3 2 5 6 4 12 3 5 4 1 62 3 4 1 5 62 3 1 4 5 6

What is a Bubble Sort?

This refers to the simple sort algorithm that makes a sweep through a list to properly sort elements that are in improper order and loops until the list is sorted.

Hence, because one iteration is needed, there would be a new element added until the end of the list when they are all in their final position and no commas are used.

The complete answer is:

5. 2 1 3 4 5 66. 1 2 3 4 5 6

Read more about bubble sort here:

https://brainly.com/question/14944048

#SPJ2

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

Which devices are separate pieces that when combined together make a desktop computer? Choose five answers. 0000 Scanner Monitor Keyboard Stylus External speakers Mouse Tower​

Answers

There are five devices that, when combined together, make a desktop computer. These devices include a tower, monitor, keyboard, mouse, and external speakers.

The tower, also known as the computer case or CPU, is the main component that houses the motherboard, power supply, and other important hardware components. It is responsible for processing and storing data.

The monitor is the visual display unit that allows users to see and interact with their computer. It can come in various sizes and resolutions, depending on the user's needs.

The keyboard and mouse are input devices that allow users to input data and interact with their computer. The keyboard is used to type text and commands, while the mouse is used to navigate and select items on the screen.

Lastly, external speakers can be added to a desktop computer to enhance the audio experience. They allow users to hear music, sound effects, and other audio elements more clearly.

Overall, these five devices work together to create a fully functional desktop computer. While there are other optional components that can be added, such as a scanner or stylus, these five devices are essential for any desktop setup.

For more such questions on desktop, click on:

https://brainly.com/question/29921100

#SPJ11

is the trust necessary to use an emerging technology platform? why?​

Answers

Answer:

Emerging technologies can provide improved accuracy, better quality and cost efficiencies for businesses in every sector. They can enhance trust in the organization's operations and financial processes, which is crucial for sustainable success.

Emerging technologies included a range of technology like education, IT, nanotechnology, biotech, computer neuroscience, robotic devices, and artifact intellectual ability.

It could working capital in all sectors with better accuracy, quality, and cost-efficiency.It can build confidence in the accounting and business processes of the organization, which is critical for sustainable success.

Therefore, these technical innovations represent the progressives of competitive advantage converging technologies, that in some ways represent bigger and more powerful interconnections and similar goals.

Learn more:

brainly.com/question/1144539

is the trust necessary to use an emerging technology platform? why?

Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpace()getInteger()

Answers

From method names, I am compelled to believe you are creating some sort of a Lexer object. Generally you implement Lexer with stratified design. First consumption of characters, then tokens (made out of characters), then optionally constructs made out of tokens.

Hope this helps.

how would you feel if the next version of windows becomes SaaS, and why?

Answers

If the next version of Windows becomes SaaS, SaaS or Software as a Service is a software delivery model in which software is hosted on the cloud and provided to users over the internet.

Moving Windows to a SaaS model means that Microsoft will continue to deliver updates and new features through a subscription-based service rather than through major new versions of the operating system.

This approach has its own advantages and challenges.

Benefits of the SaaS model for Windows:

Continuous Updates: Users receive regular updates and new features, ensuring they always have access to the latest improvements and security patches.

Flexibility: Subscriptions offer different tiers and plans so users can choose the features they need and customize their experience.

Lower upfront costs: A subscription model could reduce the upfront cost of purchasing Windows, making Windows more accessible to a wider audience.

Improved security: Continuous updates can help address vulnerabilities and security threats more rapidly, enhancing overall system security.

Challenges and concerns with a SaaS model for Windows:

Dependency on internet connectivity: Users would need a stable internet connection to receive updates and access features, which may not be ideal for those in areas with limited or unreliable internet access.

Privacy and data concerns: Users might have concerns about data collection, privacy, and the potential for their usage patterns to be monitored in a subscription-based model.

Cost considerations: While a subscription model may provide flexibility, some users may find it less cost-effective in the long run compared to purchasing a traditional license for Windows.

Compatibility issues: Continuous updates could introduce compatibility challenges for legacy software and hardware that may not be updated or supported in the new model.

Whether you view Windows' migration to a SaaS model as a positive or negative is ultimately determined by your personal perspective and specific implementations by Microsoft.

Cost: SaaS is a subscription-based model, which means users have to pay recurring fees to use the software.

They have to rely on the provider to update, maintain, and improve the software.To sum up, I would feel hesitant about using SaaS if the next version of Windows becomes SaaS.

For more questions on Software as a Service:

https://brainly.com/question/23864885

#SPJ8

4. SHORT ANSWERS:
i. Suppose tree T is a min heap of height 3.
- What is the largest number of nodes that T can have? _____________________
- What is the smallest number of nodes that T can have? ____________________

ii. The worst case complexity of deleting any arbitrary node element from heap is ___________

Answers

Answer:

i. A min heap of height 3 will have a root node with two children, each of which has two children of its own, resulting in a total of 7 nodes at the bottom level. Therefore:

The largest number of nodes that T can have is 1 + 2 + 4 + 7 = 14.

The smallest number of nodes that T can have is 1 + 2 + 4 = 7.

ii. The worst case complexity of deleting any arbitrary node element from a heap is O(log n), where n is the number of nodes in the heap. This is because deleting a node from a heap requires maintaining the heap property, which involves swapping the deleted node with its child nodes in order to ensure that the heap remains complete and that the heap property is satisfied. This process requires traversing the height of the tree, which has a worst-case complexity of O(log n).

Explanation:

how can IT infrastructure be linked to the business strategy of any organization

Answers

Answer:

The overview of the situation is discussed in the following part.

Explanation:

It's indeed real that perhaps IT technology will have a strategic edge and improved market efficiency. IT technology can improve the protection, accessibility, and efficiency of any enterprise.

Numerous massive, small as well as medium-sized companies or beginning are currently preparing their growth plans by sustaining a stable IT infrastructure throughout the place that will ensure and increase their profitability.

Those same years, the accompanying IT infrastructure is being used to connect the market strategy:

Broadband and Wireless Connectivity,Security and Risk Management,IT Structure Strategy,Performance Strategy, etc.

4.(L.5.1.A) Select the sentence that includes an interjection,
Did we win the tournament?
ОО
Hurray, we won the tournament!
Although we arrived late to the tournament, we still won.
We arrived late to the tournament, but we still ended up winning

Answers

Answer:

Hurray, we won the tournament!

Explanation:

hurray is an interjection just like yikes, uh-oh, and others

Other Questions
Name and justify 3 human rights from the Bill of rights that protect citizens against the human right violation of safe health environment PART A: "Finding FV..." $1,000 (PV), 10% (Interest Rate), 6 (Number of Years)PART C: "Finding PV..." $1,000 (FV), 10% (Discount Rate), 6 (Number of years)h. Recalculating the PV and the FV for parts a and c if the interest rate is semiannually compoundedFuture value (FV)#REF!Present value (PV)#REF!What is the Xcel formula with the given information to find the FV and PV with an interest rate semiannually compounded?What will the FV and the PV for parts a and c be if the interest rate is 10% with semiannual compounding rather than 10% with annual compounding? Round your answers to the nearest cent. disscuss two ways in which gender stereotypes could negatively affect an indiviuals self esteem in the workplace Paranormal pop culture journalist and producer aaron sagers picked some of his favorite specters, cryptids and interplanetary interlopers for his paranormal rock stars feature. Which of his descriptions here has the wrong name attached?. [tex]x {}^{2} \div a + y {}^{2} \div b = 1[/tex]find x will give brainliest which was used to justify European imperialism in the late 19th century?1. social Utopia 2. democratic reform 3. philosophy of Karl Marx4. social Darwinism which hormone(s) increase(s) gluconeogenesis which is the formation of glucose from amino acids and free fatty acids? Radha drives her car for work.She claims 43p per mile from her employer.Radha's car travels 55 miles for each gallon of petrol.She pays 5.40 per gallon for petrol.On one journey Radha drives 341 miles.For this journey, how much more does she claim than she pays for petrol?i A bank advertises it pays 4% annual interest, compounded daily, on savings accounts, provided the money is left in the account for 5 years. What is the effective annual interest rate Suppose a shipment of 400 components contains 68 defective and 332 non-defective computer components. From the shipment you take a random sample of 25. When sampling with replacement (so that the p = probability of success does not change), note that a success in this case is selecting a defective part. What is the probability of there being no defects in the entire shipment? The members of a basketball team need to raise $895 for new uniforms. They already have $351 from food sales. To raise the remainder, they are planning a shoot-out challenge. If 34 teams sign up, how much must they charge per team to meet their goal of $895? I ready Mei wants to solve the inequalityw < 12. How can she isolate the variable? Assume that the risk-free rate is 6.5% and the required return on the market is 12%. What is the required rate of return on a stock with a beta of 1.5? Round your answer to two decimal places. A journalist is interviewing a high school student who has just survived a school shooting. Imagine the dialogue (150 words) I need help with this :(please On a city street, a transit line operates through signalised intersections. Each transit has three compartments, and each compartment can accommodate a maximum of 40 passengers. The acceptable green-to-cycle time ratio (g/C) to the particular street is 0.35. The clearance between successive transits should be 70 seconds. The passengers dwell time is 110 secounds. The reduction factor for dwell time and arrival variation is 0.785.Estimate the capacity of the transit line in passengers/h.Answer: the capacity of the transit line = Answer passengers/hourReport your answers to the nearest whole number without units (i.e., if your answer is 1720.258, you should enter 1720 or if your answer is 873.564, enter 874) Work-flow design is the process of: Select one: a. allocating resources required for completing a task. b. assigning the task to a particular job category or person. c. analyzing the tasks necessary for the production of a product. d. evaluating the resource input and the actual output of a task. e. comparing the results of a task with its objectives. During what time did the western u. S. Experience a large amount of crustal extension? When did Queen Elizabeth II visit the Old State House in Boston to watch the lion and unicorn statues be placed back on the building in their original spots?1776?1876?1976?2006? a term used when the products are sold directly to their end consumers or user without third-party retailers wholesalers or other middle men