Help plz

Which of the following statements are true about cyberbullying:

1. Cyberbullying uses electronic communication to bully a person.

11. Cyberbullying is a crime in many states.

III. Instances of cyberbullying do not affect the digital footprint of the victim.

IV. Cyberbullying hurts real people even though we can't always see their reactions
online.

I and IV

O ll and III

O 1, 11, and IV

All of the above

Answers

Answer 1
1 and IV are the are the right answers because cyber bullying is online and it hurts real people but you can’t see there reaction.
Answer 2

The following statements are true about cyberbullying: Cyberbullying uses electronic communication to bully a person. Cyberbullying hurts real people even though we can't always see their reactions.

What is cyberbullying?

The use of mobile phones, instant messaging, e-mail or social networking sites to intimidate or harass someone is known as cyberbullying.

The correct answer is "I and IV." Statement I is true because cyberbullying is defined as using electronic communication to bully a person.

Statement IV is also true because even though we may not be able to see the victim's reactions online, cyberbullying can still have real-life consequences and can hurt the victim emotionally or mentally.

Statement II is false because cyberbullying is a crime in many states, and statement III is also false because instances of cyberbullying can affect the victim's digital footprint.

Hence, the correct statements are "I and IV".

To learn more about cyberbullying click here:

https://brainly.com/question/8142675

#SPJ2


Related Questions

what are the main social and cultural impacts of lot?

Answers

Internet of Things refers to the connected devices and the technology that enables communication between the devices and between them and the cloud.

What are the main social and cultural impacts of IoT?Social impacts : Reduced waste, costs, and difficulties are promised benefits of the Internet of Things (IoT). As a result, it helps to increase productivity and enables us to live a more joyful, eco-friendly, and productive life.The Internet of Things (IoT) is also having a physical impact on society. Students will have access to the most recent materials and data thanks to IoT, which will free them from reliance on outmoded textbooks.Cultural impacts: IoT can build connection networks that change how people interact. The Internet of Things is working to keep us healthier and provide better healthcare.From wearable devices that incorporate medical equipment to smart sensors that provide real-time data on illnesses and remote monitoring of vital body processes ,the cultural role of IoT is tremendous.

To learn more about Internet of Things , refer:

https://brainly.com/question/29240985

#SPJ1

what is a cross-site scripting (XSS) attack?​

Answers

An XSS is a common type of online attack targeting web applications and websites, the attack manipulates the web application or website to give the user client-side scripts to install malware, obtain financial information or send the user to more malicious sites.

There are many types of XSS attacks including:

   Reflected XSS    Stored XSS    DOM-based XSS

Write and execute a query that will determine the average number of days that automobiles are rented. Show your result broken out by makes. Do not include an automobile if it has not yet been returned.

Answers

Using the knowledge in computational language in SQL it is possible to write a code that query that will determine the average number of days that automobiles are rented

Writting in SQL:

select Customer.CID,CName,Age,Resid_City,BirthPlace,

Rentcost.Make,Cost,Rentals.Rtn,Date_Out,Pickup,Date_returned,Return_city

from Customer,Rentcost,Rentals where

Customer.CID=Rentals.CID and Rentcost.Make=Rentals.Make

order by Customer.CID, Rentcost.Make asc;

select Customer.CID,CName from Customer,Rentals where Customer.CID=Rentals.CID

and Pickup='Cary';

select distinct(CName),age from Customer,Rentals where Customer.CID=Rentals.CID

and Return_city='Erie' order by CName asc;

select Customer.CID,CName from Customer,Rentals where Customer.CID=Rentals.CID

and Return_city is null;

select CName from Customer,Rentals where Customer.CID=Rentals.CID

and Resid_City=Pickup;

See more about SQL at brainly.com/question/13068613

#SPJ1

Write and execute a query that will determine the average number of days that automobiles are rented.

how to find HCF and LCM of a number in Q Basic program?? ​

Answers

CLS
INPUT "Enter the first number"; a
INPUT "Enter the second number"; b
m = a
n = b
WHILE a <> 0
r = b MOD a
b = a
a = r
WEND
l = (m * n) / b
PRINT "HCF is "; b
PRINT "LCM is "; l


2. Which of the following is a shortcut key to Exit from any operation?
a) Ctrl+R
b) Ctrl+Q
c) Ciri-Y

Answers

Answer:

Its b) Ctrl+Q. Hope it helps.

Explanation:

Answer:

ctrl r

Explanation:

ctrl r is redo

OJT hearing and deaf Experience 2023

1. What is your work?
2. What is your schedule tome of work from Monday to Friday? Shifting time or changes every week?
3. How is your relationship with your supervisor (hearing boss)
4. Do you have hearing friends in your work?
5. How do you communicate in the workplace?
6. How do you manage/ budget your time?
7. How do you discipline yourself by not being late and absent?
8. What did you learn from your OJT?

Answers

The work is a customer service representative in a call center.

The schedule is a shifting schedule that changes every week.

How to explain the information

The supervisor is a hearing boss, and the relationship is professional and respectful.

There are hearing and deaf colleagues in the workplace, and there is no discrimination based on hearing ability.

Communication is done through various methods such as sign language, written notes, and technology like video conferencing and instant messaging.

Time management is essential, and the individual uses a planner or scheduling software to keep track of tasks and deadlines.

Discipline is maintained through a commitment to punctuality and attendance, setting reminders and having backup plans in case of emergencies.

The OJT experience has taught the individual about the importance of adaptability, open communication, and embracing diversity in the workplace. It has also improved their communication skills and time management abilities.

Learn more about customers service on

https://brainly.com/question/1286522

#SPJ1

Write a console application that requests the user to enter the name of their Pet and the year their pet was born.Calculate the age of the pet and display the name and age of the pet.

Answers

The console application that requests the user to enter the name of their Pet and the year their pet was born and calculate its age is as follows:

from datetime import date

def nameAndAge(x, y):

   today = date.today()

   age = today.year - y.year - ((today.month, today.day) < (y.month, y.day))

   return f"The name of your pet is {x} and the age is {age}"

   

# Driver code

print(nameAndAge("mike", date(1997, 2, 3)), "years")

Code explanation

The code is written in python.

we have to import date from datetime module.We declared a function named  "nameAndAge". The arguments of the function are the users input which are the name and date of birth of the pet.We store todays date in the variable called "today".Then we calculate the age of the pet.The next line of code, we returned the name and the age of the pet base on the users input.Finally, we call the function with the print statement.

learn more on python here: https://brainly.com/question/25285677

Write a console application that requests the user to enter the name of their Pet and the year their

a hardware production method of lesser expense whereby the casket hardware sections are pressed out on a hydraulic press.

Answers

the casket hardware is pushed out using a hydraulic press, which is a less expensive technique of producing hardware. equipment for plastic extrusion molding.

What is the process for creating hardware?

There are seven phases in the hardware product development lifecycle. Design, construction, testing, distribution, use, upkeep, and disposal are the steps after requirements or ideation.

How are hydraulic systems pressed?

A modest amount of force is used by the hydraulic press to push the fluid below by applying it to the plunger. Following an uniform distribution of pressure, the Ram is raised. The object placed between the Plunger and the Ram is crushed by the pressure exerted by the two.

To know more about hydraulic press visit:-

https://brainly.com/question/12978121

#SPJ4

Which statements reflect your experience with studying? Check all that apply.

Answers

Answer:

The end of an experience is a great time to reflect on your learning. With every research experience you will gain new skills, learn more about the type of environment you enjoy being in, further explore your strengths and interests, and test out your motivation to further study or pursue a career in a field or discipline.

Explanation:

Computers are used to input, store, process, find and share vast amounts of data and information, and they can do so in
fractions of a second. Discuss the concept of abstraction and abstract data types on computer programming

Answers

The concept of abstraction and abstract data types on computer programming is given below.

The use of abstraction to manage complexity is crucial. When anything is regarded abstractly, just the salient characteristics are highlighted. It is not necessary to recall or even notice the information that is left out.

What is abstraction?

An abstraction of a data structure that merely provides the interface to which the data structure must conform is referred to as an abstract data type. No precise information about how something should be implemented or in what programming language is provided by the interface.

An object's behavior can be described by a set of values and a set of actions, and this behavior is known as an abstract data type (ADT).  The definition of ADT merely specifies the actions that must be taken, not how they must be carried out.

Therefore, List data structures, stack data structures, and queue data structures are examples of abstract data types in data structures. The abstract data type defines a number of legitimate operations that can be performed on a specific data structure.

Learn more about abstraction  from

https://brainly.com/question/7994244
#SPJ1

problem description IT​

Answers

In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.

How is this so?

It involves providing relevant details about the symptoms, impact, and context of the problem.

A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.

A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.

Learn more about Problem Description at:

https://brainly.com/question/25923602

#SPJ1

PLEASE HELP!!!
I have no clue how to find my recently viewed images on the web on my windows 10. Please help, if you could also give a step-by-step image example or if that's too much I will and might give you brainly.

Answers

Answer:

To find your recently viewed images on the web on a Windows 10 computer, you can try the following steps:

Open the Start menu and type "history" into the search bar.

Click on "History" in the search results. This will open the history menu in your web browser.

In the history menu, click on the "Images" tab. This will show a list of all the images you have recently viewed on the web.

If you want to see more details about a specific image, you can click on it in the list to view its URL and the date it was viewed.

If you want to delete any images from your history, you can click on the checkbox next to the image and then click on the "Remove selected items" button.

Alternatively, you can use the search feature in your web browser to search for specific images that you have recently viewed. To do this, you can type the name or description of the image into the search bar and press Enter. This will show a list of search results, including any images that match your search criteria.

I hope this helps! Let me know if you have any questions or need further assistance.

Explanation:

You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers have made non-functional the Communications system (Phone, Internet, and Cellular), Water supply, Electrical, Natural Gas, and Waste Treatment. Your staff assures you that each system can be recovered but will take an undetermined time period. You must decide what system should be made operational first with the limited staff available to you.

Answers

Answer:

okay actually what are you trying to get an answer for

Explanation:

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Answers

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA

Answers

The  port which  is the fastest is  ESATA.

What is ESATA?

eSATA  can be described as the  SATA connector which can be access from outside the computer and it help to give the necessary  signal  connection that is needed for  external storage devices.

The eSATA serves as a version of the eSATA port which is been regarded as the  External SATA port, therefore, The  port which  is the fastest is  ESATA.

Read more on the port here:

https://brainly.com/question/16397886

#SPJ1

Please help me this goes with computer science so yeah

Please help me this goes with computer science so yeah

Answers

In today's world, the electronic version of the above can be sent as an ecard via any standard email service provider instantly over the internet.

How can the sender and receiver achieve the above?

In order for the above to be possible today, the sender must have have an electronic mail address which is referenced to a domain name. The same goes to the receiver.

It is to be noted that the data (in this case the text and pictures contained int he postcard) are delivered to user accounts across several computer servers.

The computer servers transport the messages to their final destination and store them so that users may retrieve and send them whenever they connect to the email infrastructure. An email client or a web interface can be used to access email.

What are the comparisons?

While there is a feeling that comes with handling physical mail such as the advantage of having the card retrieved without electricity, the ability to create handcrafted art, and even perfumed cards, they took relatively too long to prepare and to be sent to receiver.

Unlike traditional mail, electronic postcards are can be created, customized and sent withing a minute. E-post cards, unlike traditional ones, can be automated and sent to million of people at the same time in an instant.

Learn more about postcards:
https://brainly.com/question/15435088
#SPJ1

What is the data type of the following variable?
name = "John Doe"

Answers

In computer programming, a variable is a storage location that holds a value or an identifier. A data type determines the type of data that can be stored in a variable. The data type of the following variable, name = "John Doe" is a string data type.

In programming, a string is a sequence of characters that is enclosed in quotes. The string data type can store any textual data such as names, words, or sentences.The string data type is used in programming languages such as Java, Python, C++, and many others. In Python, the string data type is denoted by enclosing the value in either single or double quotes.

For instance, "Hello World" and 'Hello World' are both strings.In conclusion, the data type of the variable name is string. When declaring variables in programming, it is important to assign them the correct data type, as it determines the operations that can be performed on them.

For more such questions on variable, click on:

https://brainly.com/question/28248724

#SPJ8

16 Select the correct answer. Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is this? ОА. NIC B. hub C. modem D. switch E. bridge Reset Reset Next​

Answers

Answer:D. switch

Explanation:cause it is

10 disadvantages of Edp​

Answers

The  disadvantages are:

High initial investmentTechnical complexitySecurity risksDependence on technologyWhat is the  Electronic Data Processing?

EDP (Electronic Data Processing) alludes to the utilize of computers and other electronic gadgets to prepare, store, and recover information.

Therefore,  Setting up an EDP framework requires a noteworthy speculation in equipment, computer program, and other hardware, which can be a obstruction for littler businesses.

Learn more about  Electronic Data from

https://brainly.com/question/24210536

#SPJ1

4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).

Answers

Answer:

Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:

import java.util.ArrayList;

import java.util.Scanner;

import java.io.File;

import java.io.FileNotFoundException;

public class SalesDemo {

   public static void main(String[] args) {

       // Ask the user for the name of the file

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the name of the sales file: ");

       String fileName = input.nextLine();

       // Read the daily sales data from the file

       ArrayList<Double> salesData = new ArrayList<>();

       try {

           Scanner fileInput = new Scanner(new File(fileName));

           while (fileInput.hasNextDouble()) {

               double dailySales = fileInput.nextDouble();

               salesData.add(dailySales);

           }

           fileInput.close();

       } catch (FileNotFoundException e) {

           System.out.println("Error: File not found!");

           System.exit(1);

       }

       // Calculate the total and average sales

       double totalSales = 0.0;

       for (double dailySales : salesData) {

           totalSales += dailySales;

       }

       double averageSales = totalSales / salesData.size();

       // Display the results

       System.out.printf("Total sales: $%.2f\n", totalSales);

       System.out.printf("Average daily sales: $%.2f\n", averageSales);

   }

}

Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.

I hope this helps!

Explanation:

Computer need this hardware to connect to a network

Answers

Hello! can you restate the question?

4.15 LAB: Password modifier

4.15 LAB: Password modifier

Answers

I've included my code in the picture below. Best of luck.

4.15 LAB: Password modifier

The program written modifies inputted password, replacing certain characters to make it stronger. The program is written in python 3 thus ;

password = input("Set your password : ")

#accepts input from user meant for password

modified_password = ''

#initialize an empty string to hold the modified password

for val in password:

#loop through each password value

if val == 'i':

modified_password += "!"

elif val == 'a':

modified_password += ''

elif val == 'm' :

modified_password += 'M'

elif val == 'B' :

modified_password +='8'

elif val == 'o':

modified_password += '.'

else :

modified_password += val

#checks for certain values in the input and replaces them, with the output assigned to the modified password variable

print(modified_password+"q*s")

Sample run of the modified password with the string "q*s" concatenated at the end.

Learn more :https://brainly.com/question/15086326

4.15 LAB: Password modifier
4.15 LAB: Password modifier

Discuss the various ways you can classify and quantify risk. Keep in mind that this evaluation is often subjective and it is important to understand that sometimes you have to make judgement calls and/or enlist the assistance of others to help make this determination.

Answers

Risk classification and quantification are essential components of risk management. Here are various ways to classify and quantify risk:

1. Qualitative Classification: Involves assigning subjective descriptions to risks based on their impact, likelihood, or other factors. Risks can be classified as low, medium, or high, or ranked based on qualitative scales such as low, moderate, or severe.

2. Quantitative Classification: Involves assigning numerical values to risks based on specific criteria. This can include assigning probabilities to the likelihood of occurrence, estimating potential financial losses, or using mathematical models to calculate risk scores.

3. Risk Categories: Risks can be classified into categories based on their nature, such as operational, financial, legal, or strategic risks. Categorizing risks helps in understanding their sources and implementing targeted risk mitigation strategies.

4. Risk Impact: Risks can be classified based on their potential impact on project objectives, organizational goals, or stakeholder interests. They can be categorized as minor, moderate, or catastrophic based on the extent of harm or disruption they can cause.

5. Risk Probability: Risks can be classified based on their likelihood of occurrence, ranging from rare to frequent. This helps in prioritizing risks for mitigation efforts.

It's important to note that risk assessment involves subjective judgments and may require the input of various stakeholders with different perspectives and expertise. Collaboration and discussions among team members, experts, and decision-makers are crucial to make informed determinations about risk classification and quantification.

For more questions on Probability, click on:

https://brainly.com/question/30390037

#SPJ8

The binary number system is suitable for computer system. Give reason.

Answers

Answer: It enables devices to store, access, and manipulate all types of information directed to and from the CPU or memory.

THIS DOES NOT BELONG TO ME!

Explanation:


Your teacher has asked you to redesign a common board game to depict the historical periods of
technology. The board game should include instructions and questionis specific to the design problem. All
resources should include APA or MLA citations.

Answers

Answer:

APA include citations correct answer

There are about 1,932 calories in a 14-pound watermelon. How many calories are there in 1 pound of the watermelon?

Answers

Answer:

138

Explanation:

1932:14

x:1

1932/14 = 138

Therefore x = 138

There are 138 calories per pound of watermelon

Hope that helps

Write a function that takes two integer lists (not necessarily sorted) and returns true precisely when the first list is a sublist of the second.
The first list may appear anywhere within the second, but its elements must appear contiguously.
HINT: You should define and test a helper function that you can use in sublist.

Answers

Answer:

The function written in Python is as follows:

def checksublist(lista,listb):

     if(all(elem in lista for elem in listb)):

           print("The first list is a sub list of the second list.")  

     else:

           print("The first list is not a sub list of the second list.")

Explanation:

This line defines the function

def checksublist(lista,listb):

The following if condition checks if list1 is a subset of list2

     if(all(elem in lista for elem in listb)):

           print("The first list is a sub list of the second list.")  

The following else statement is executed if the above if statement is not true

     else:

           print("The first list is not a sub list of the second list.")

The function that takes two integer lists (not necessarily sorted) and returns true precisely when the first list is a sub list of the second is as follows:

def check_sublist(x, y):

  if(set(x).issubset(set(y))):

     return "The first list is a sublist of the second"

  else:

     return "The first list is not a sublist of the second"

print(check_sublist([2, 3, 5], [1, 2, 3, 4, 5, 6, 7]))

The code is written is python.

Code explanation:A function is declared called check_sublist. The function accept two parameters namely x and y.if the parameter x is a subset of y then the it will return  "The first list is a sublist of the second"Else it will return  "The first list is not a sublist of the second"Finally, we use the print statement to call our function with the required parameter.

learn more on python code here; https://brainly.com/question/25797503?referrer=searchResults

Write a function that takes two integer lists (not necessarily sorted) and returns true precisely when

Which of the following takes place during the research phase

Answers

i would say a formulation of the hypothesis

I am unsure if this is the correct question, but I think this is the full question:

Which of the following takes place during the research phase? (choose all that apply)

O software requirements are gathered

O software requirements are implemented in code

O software requirements are analyzed

O software requirements are detailed in a specification document

The answers to this question are software requirements are gathered, software requirements are analyzed, and software requirements are detailed in a specification document (1st, 3rd, and 4th options).

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Answer in 3-5 sentences for each

What is a baseline? Why is recording an accurate baseline critical to the troubleshooting process?

Demonstrate through discussion that you understand the types of software applications that are prime for NLB and those that are better protected with failover clusters. Discuss various operations known and dissect the functions. Which functions should be protected by which technology?

Answers

A baseline is a constant point of comparison that is employed in comparison studies.

What is baseline?

In business, a project's or product's success is frequently evaluated in comparison to a baseline figure for expenses, sales, or any other number of factors. A project may go over or under its predetermined benchmark.

For instance, a business can use the number of units sold in the first year as a benchmark against which to compare subsequent annual sales in order to assess the success of a product line. The baseline acts as the benchmark against which all subsequent sales are evaluated.

Any number that acts as an acceptable and specified beginning point for comparisons can be used as a baseline. It can be used to assess the results of a change, monitor the development of an improvement project, or compare two periods of time.

Therefore, A baseline is a constant point of comparison that is employed in comparison studies.

To learn more about baseline, refer to the link:

https://brainly.com/question/14799723

#SPJ1

Other Questions
write your answers to these questions in complete sentences in French use the imparfait. during brian's infancy, his mother suffered from alcoholism and abused drugs. she was never emotionally available to him. as a result, he now has difficulty in his relationships with others and cannot trust people easily. this situation supports the views of the . what is an easy method to workout 35% of 70 Tony and Suzie see the need for a rugged all-terrain vehicle to transport participants and supplies. They decide to purchase a used Suburban on July 1,2022 , for $13,400. They expect to use the Suburban for five years and then sell the vehicle for $5,200. The following expenditures related to the vehicle were also made on July 1,2022 :- The company pays $2,150 to GEICO for a one-year insurance policy. - The company spends an extra $4,400 to repaint the vehicle, placing the Great Adventures logo on the front hood, back, and both sides. - An additional $2,350 is spent on a deluxe roof rack and a trailer hitch. The painting, roof rack, and hitch are all expected to increase the future benefits of the vehicle for Great Adventures. In addition, on October 22,2022 , the company pays $1,100 for basic vehicle maintenance related to changing the oil, replacing the windshield wipers, rotating the tires, and inserting a new air filter. Researchers have designed a study where the health of a large group of recent newborns will be followed for several years. what type of study is this? Please help me ASAP factoring by grouping example ?? i need one pls What states do not allow the admission exception as part of the statute of frauds? (Check all that apply.)CaliforniaLouisianaNew HampshireMinnesota you lanch a new line of electical scooters. the monthly production cost in euros is C(x)=200+34x+0.02x , and the number of scooters produced monthly.a) find the revenue equation, R(x)=x.p(x)b) show that the profit equation is P(x)=-0,04x +56x-200c) find P'(x) and then the value of x for which the profit is a maximumd) what is the maximum profit? pursuant to the equal protection clause of the fourteenth amendment to the u.s. constitution, if a law prevents individuals from exercising a fundamental right, the action will be subject to . Describe three policy instruments that the SouthAfrican reserve Bank can use to implement expansionary monetarypolicy. one study participant described overeating in response to a sense of anxiety about the state of the world, especially in relation to global climate change and the poor economy. this anxiety most closely reflects the effect of which kind of stressor? a. acute b. microstressor Dominic has a $60 gift card to starbucks. Each time he buys a drink, it costs him $4.50. Which equation describes the relationship between n, the number of drinks Dominic buys, and A, the amount in dollars remaining on his gift card? Who brought bacteria and germs to the attention of other doctors? 1) Measure the cice OTYou can use any vehicle (cars, bikes, scooters, tractors, dirt-bikes, etc areall acceptable). Fill out the table below (you fill out the cells in orange).Note: the formula for circumference is C = 2tr, where r = radius. You canalso just write nas "pi." Remember that pi is just a number (3.1415926...)Radius of TireCircumference of TireExample:r= 1 ft(just a normal minivan)C = 21(1)= 2tt feet= 6.28 feetTire #1Tire #2Tire #3Pls help! A bag of candycontains Skittles andM&Ms. There are 6Skittles to every 4M&Ms. How many M&Msare there if Emerycounted 18 moreSkittlesthat M&Ms? lesson 6.1Graph the image of the figure using the transformation given.options are out of the last 3 images The base of a prism is a polygon with 125 sides. How many edges does the prism have? 125 250 500 750 a number not listed here At a school fundraiser Ms. Navaro sold 24 plates of cookies, which is 80% of the total number of plates of cookies she baked. How many plates of cookies did Ms. Navaro bake? Hii please help i would really appreciate it (multiple choice)x= [select] -140 -120 -160 -100y= [select] -50 -60 -80 -70