how is information different from data? a.data provides a basis for action. b.data is less accurate. c.information is raw figures and facts reflecting a single aspect of reality. d.information is data presented in a way or form that has meaning. e.data is more detailed.

Answers

Answer 1

The Important Distinctions Between Data and Information,Information puts the facts into context, whereas data simply compiles facts. Information is organized, whereas data is unstructured and raw. Individual and occasionally unrelated data points are included.

What makes data different from information?Although they sound similar, the words "data" and "information" are not the same. Between these elements and their functions, there are minute variations. Information is the organizing and explanation of facts, whereas data is defined as a single fact.In the end, you can use the two parts in tandem to pinpoint and address issues. Explore in greater detail data vs. information in the sections that follow, along with how these components can be used in a business setting.Explore the distinctions between data and information further by looking at these instances of data transformation into insights:The total bill at one particular diner is information. The menu items that are most popular and if the pricing are high enough to cover materials, overhead, and labor can both be learned by collecting and analyzing various bills over a period of time by restaurant owners.

To Learn more About Data and Information refer to;

https://brainly.com/question/24429924

#SPJ4


Related Questions

Who plays Among Us?

who answered first will get a Surprise! :)​

Answers

Answer:

mE now whats the surprise? :P

Explanation:

What is the purpose of an attribute in HTML?
A.
It is a property that changes the default behavior of an element.
B.
It is an empty element.
C.
It consists of a start tag and an end tag.
D.
It is a tag without angular brackets.

It is not C.

Answers

A. It is a property that changes the default behavior of an element.

In the context of the text, how the does the article explore the costs and benefits of technology? Do you think new technology can reverse the damage done by past technology? Why or why not? Cite evidence from this text, your own experience, and other literature, art, or history in your answer.

Answers

Determining whether novel technology can counteract the detrimental consequences of prior engineering is challenging, and much depends on the specific technologies concerned, how extensive the damage may be, and other aspects.

How to explain the technology

However, it is possible that current inventions could contribute to allaying or even inverting some of the casualties of past technologies.

It should be noted that to illustrate, there are systems being created to filter carbon dioxide from the atmosphere, which might further combat climate change caused by the combustion of fossil fuels. Equally, progress in renewable energy innovations may help reduce our reliance upon non-renewable resources and decrease carbon emissions.

Learn more about Technology on

https://brainly.com/question/7788080

#SPJ1

1. YOU CAN REVERSE AN UNDO ACTION BY CLICKING REDO. *

True
False

Answers

Answer:

if it's on the keyboard false

Which of the following is not a good file-management practice?

A. Create descriptive names for folders and files.
B. Store all of the data files at the top level of the drive to make them easier to find.
C. Remove folders and files when they are no longer needed.
D. Make enough subfolders so that the files in any one folder are readably visible.

Answers

Answer:

B, Store all of the data files at the top level of the drive to make them easier to find.

Explanation:

Your files will be unorganized, and it will actually do the opposite of what you want it to.

Hope this helps!

The following is not a good file-management practice Store all of the data files at the top level of the drive to make them easier to find. Thus the correct option is B.

What is file management?

File management is referred to as a systematic technique that allows an individual to store their valuable data and information in the forms of files and documents in an organised manner to retrieve it properly.

File management is crucial since it keeps the files of an individual orderly. It could make it simpler for them to locate files when they need to utilize them. It is crucial for organizations since it makes it simpler for them to share folders with their staff or customers.

File management allows an individual to store their information with descriptive names for easy access and remove files that are not required.

It also enables to make of subfolders so that the files belonging to separate departments or folders are visible to the reader without creating any kiosk.

Therefore, option B is appropriate.

Learn more about File management, here:

https://brainly.com/question/12736385

#SPJ6

Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the 128-bit TKIP-RC4 wrapper

Answers

WPA2 uses Advanced Encryption Standard (AES) for encryption, which is stronger than the TKIP-RC4 encryption used in WPA.

WPA2 (Wi-Fi Protected Access 2) is a security protocol that utilizes the Advanced Encryption Standard (AES) algorithm for encryption. AES is a symmetric block cipher that operates on 128-bit blocks of data. It provides a high level of security and is considered much more difficult to crack than the TKIP-RC4 encryption used in WPA (Wi-Fi Protected Access). TKIP (Temporal Key Integrity Protocol) is a deprecated encryption method that was developed as a temporary solution to address security vulnerabilities in the original WPA standard. AES, on the other hand, is widely recognized as a robust encryption standard and is commonly used in various applications to ensure secure data transmission.

Learn more about WPA2 here:

https://brainly.com/question/29588370

#SPJ11

Does anyone know this?

Answers

Answer:

DOCX merupakan file Microsoft Word Open XML Format Document. Ya, ini merupakan file yang tercipta dari pembuatan dokumen di Microsoft Word, aplikasi pembuatan teks bikinan Microsoft. File dengan ekstensi DOCX berbasiskan XML dan bisa saja mengandung teks, objek, style, formating, dan gambar.

Which type of break can you insert if you want to force text to begin on the next page?
a. Column break
b. Continuous section break
c. Next page section break
d. Text wrapping break

Answers

The correct answer is c. Type of break can you insert if you want to force text to begin on the next page is Next page section break.

What type of break can be inserted to force text to begin on the next page?

A next page section break also allows you to apply different formatting options to the content in the new section.

By inserting a next page section break, you can have separate headers and footers, page numbering, margins, and other formatting settings for the new section.

This break is particularly useful when you want to create distinct sections within a document, such as chapters, appendices, or sections with different page layouts.

It provides more control over the placement of content and improves the overall organization and readability of the document.

To insert a next page section break in popular word processing software like Microsoft Word, you can usually find the option under the "Layout" or "Page Layout" tab in the ribbon toolbar.

Therefore, Next page section break can be inserted if you want to force text to begin on the next page

Learn more about inserting breaks in a document

brainly.com/question/17959804

#SPJ11

If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook? (6 points)

Average
Steady
Strong
Weak

Answers

Answer: Strong

Explanation:

Job outlook is simply refered to as a prediction of the change that'll occur regarding the number of people that'll be employed in a certain occupation based on a given number of years which can be three years, five years, ten years etc.

In a scenario whereby an occupation is projected to decline by 7% over the next 10 years, the job outlook would be rated as strong.

The Internet is considered a WAN.
O True
O False

Answers

Answer:

yes the internet is a type of wan

Explanation:

hope this helps

What are the different types of peripherals and give some examples in each category? What do you think would be a really cool type of peripheral that could be developed in the future?

Answers

Explanation:

Remember, peripheral devices are portable devices connected to a computer in other to add more functionality to the computer system such as a printer, mouse, hard drive, CD-ROM, etc.

A really cool type of peripheral that could be developed in the future is a voice-enabled mouse that can perform normal operations on the computer.

In Python iteration, a(/an) loop repeats the code block as long as the result of the conditional statement is true

Answers

Yes But it depends on the range given

Lets take example of for loop

Sample program:-

\(\tt a=3\)

\(\tt for\:i\:in\:range(4)\)

\(\tt print("a")\)

Output:-

\(\tt 3\)

\(\tt 3\)

\(\tt 3\)

\(\tt 3\)

Which of the following does NOT represent a typical method for installing the driver on a Windows system?A) PnPB) Add Hardware WizardC) Device ManagerD) Programs and Features

Answers

D) Programs and Features does not represent a typical method for installing the driver on a Windows system. Programs and Features is used to uninstall programs that have already been installed on the system, not to install drivers or other hardware components.

What is a Windows system?

A Windows system refers to a computer system that runs on a Microsoft Windows operating system. Microsoft Windows is a popular operating system used by many individuals and organizations around the world. It is designed to provide a user-friendly interface and support for a wide range of hardware and software applications.

A Windows system can be a desktop or laptop computer, server, or other device that runs on a version of the Windows operating system, such as Windows 10, Windows Server 2019, or Windows Embedded. Windows systems can be used for a variety of tasks, including productivity, gaming, web browsing, media consumption, and more.

To know more about Windows 10 visit:

https://brainly.com/question/31252564

#SPJ11

a boolean expression using the and operator returns true when

Answers

A boolean expression using the "and" operator will return "true" when both operands are true. For example, (5 > 4) and (6 > 5) returns true because both 5 > 4 and 6 > 5 are true.

A boolean expression using the "and" operator returns true when both of the conditions in the expression are true. In other words, if we have two boolean expressions A and B, the expression A && B will only return true if both A and B are true. If either A or B is false, the entire expression will return false. For example, consider the following boolean expressions: - A = true - B = false - C = true The expression A && B would return false, because B is false. However, the expression A && C would return true, because both A and C are true. In general, the "and" operator is used to combine multiple boolean expressions and only return true if all of the expressions are true. It is one of the most common operators used in boolean expressions, and is an important tool for creating complex logical conditions.

Here you can learn more about Boolean https://brainly.com/question/29846003

#SPJ11

Design a While loop that lets the user enter a number. The number should be
multiplied by 10, and the result stored in a variable named product. The loop
should iterate as long as product contains a value less than 100

In bash code please.

Answers

This program continuously asks the user to enter a number and multiply it by 10, then stores the answer in the product variable. This is done using a while loop. As long as the product value is below 100.

When the number of iterations a command or process needs to run is known, which looping statement is frequently used?

Recognizing loop statements and placeholders in PowerShell. When the number of times (iteration count) that a command or process needs to run is already known, the PowerShell for loop is frequently utilized.

product=0

while [ $product -lt 100 ]

do

   read -p "Enter a number: " num

   product=$((num*10))

done

echo "Product is now greater than or equal to 100"

To know more about loop visit:-

https://brainly.com/question/30494342

#SPJ1

11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach

Answers

Answer:

C.

Explanation:

The cognitive Artificial Intelligence Approach is an approach that helps to test theories concerning human minds. It is an artificial intelligence agent that is designed to think and act rationally like humans.

The artificial neural network is based on the cognitive artificial intelligence approach. With the help of this artificial intelligence, computers will be able to test theories of how humans recognize faces, for instance.

Therefore, option C is correct.

are our current copyright policies helping society or hurting society? i need help

Answers

Answer:

helping society

Explanation:

it can help you to protect your works and creativity and brilliant ideas from liars and cheaters and frauds

Program:/*********************************************************** This program demonstrates the sorting of a two ** dimensional array. ***********************************************************/// SortTwoDimensionalArray classpublic class SortTwoDimensionalArray{// start main methodpublic static void main(String[] args){Create a two-dimensional array and display the original array.// create a two-dimensional arrayint[][] m ={{4, 2}, {1, 7}, {4, 5}, {1, 2}, {1, 1}, {4, 1}};// print the original arraySystem.out.println("The original array:");// outer loop for rowsfor(int i = 0; i < m.length; i++){// inner loop for columnsfor(int j = 0; j < m[i].length; j++){// display the elementSystem.out.print(" " + m[i][j]);} // end inner loop// go to the next lineSystem.out.println(" ");} // end outer loopCall the sort method to sort the array and then display the sorted array.// call to sort methodsort(m);// display the sorted arraySystem.out.println("\nThe sorted array:");// outer loop for rowsfor(int i = 0; i < m.length; i++){// inner loop for columnsfor(int j = 0; j < m[i].length; j++){// display the elementSystem.out.print(" " + m[i][j]);} // end inner loop// go to the next lineSystem.out.println(" ");} // end outer loop} // end of main methodThe following sort method accepts a two-dimensional array and then sorts that array in non-descending order.// sort method implementationpublic static void sort(int m[][]){// outer loopfor(int i = 0; i < m.length; i++){int currentMin = m[i][0];int currentMinIndex = i;// inner loopfor(int j = i; j < m.length; j++){if(currentMin > m[j][0] ||(currentMin == m[j][0] && m[currentMinIndex][1] > m[j][1])){currentMin = m[j][0];currentMinIndex = j;} // end if} // end inner for// swap the elementsif(currentMinIndex != i){int temp0 = m[currentMinIndex][0];int temp1 = m[currentMinIndex][1];m[currentMinIndex][0] = m[i][0];m[currentMinIndex][1] = m[i][1];m[i][0] = temp0;m[i][1] = temp1;} // end if} // end outer for} // end of sort method} // end of SortTwoDimensionalArray class

Answers

This program demonstrates the sorting of a two-dimensional array. The program creates a two-dimensional array using the "int[][]" data type and initializes it with some elements.

The elements of the array are then displayed using nested for loops to iterate through the rows and columns of the array. The program then calls the "sort" method to sort the array in non-descending order. The "sort" method accepts a two-dimensional array as its parameter and uses nested for loops to iterate through the rows and columns of the array. The method uses a selection sort algorithm to sort the elements of the array based on their values.

Finally, the program displays the sorted array using the same nested for loops as before. The output shows the elements of the array in ascending order based on their values.

To learn more about Data type, click here:

https://brainly.com/question/14581918

#SPJ11

PLEASE HELPPPPPPP

Flight Time

You need to calculate the flight time of an upcoming trip. You are flying from LA to Sydney, covering a distance of 7425 miles, the plane flies at an average speed of 550 miles an hour.

Calculate and output the total flight time in hours.

Hint
The result should be a float.

PLEASE HELPPPPPPPFlight TimeYou need to calculate the flight time of an upcoming trip. You are flying

Answers

Answer:

Time taken by plane = 13.5 hour

Explanation:

Given:

Total distance cover by plane = 7,425 miles

Average speed of plane = 550 miles per hour

Find:

Time taken by plane

Computation:

Time taken = Distance / Speed

Time taken by plane = Total distance cover by plane / Average speed of plane

Time taken by plane = 7,425 / 550

Time taken by plane = 13.5 hour

The calculation and output the total flight time in hours is represented as follows:

def time(distance, speed):

  time = distance / speed  

  print(time)

time(7425, 550)

speed = distance / time

time = distance / speed

We used function in python  to determine the flight time. The function name is  time.

The arguments are distance and speed.

Then we declare the mathematical formula to calculate the time of flight.

The we print the time of flight.

The function is called with its arguments, distance and speed.

The answer should be 13.5 hours and the output should be 13.5.

learn more ; https://brainly.com/question/23746890?referrer=searchResults

PLEASE HELPPPPPPPFlight TimeYou need to calculate the flight time of an upcoming trip. You are flying

To keep your computer working efficiently, it is a good idea to _____ unnecessary files. delete defragment save archive

Answers

Hey the answer to this is delete or remove. because it is a good idea to remove old files that your not using.

Hope this helps

-scav

Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists

Answers

Answer:

captures data in whatever format it naturally exists

Explanation:

quizletBig Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists

What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class

Answers

Differences-
1. Theatre is live. Film has been captured in the past. We only see after the making process is done.

2.You have chance for improvement in each theatre shows but its impossible in Films. Once film is done its done.

3.Normally Theatre is cheaper, films are costly.

Similarities-

1.Theatre and films both are arts, so many varieties of arts melt into theatre or film to make it happen.

2.Theatre and films both are very effective medium of communication.

3.Theatre and films both are considered as great form of Entertainment.

the program is not going into the if loop but directly in the else one and is saying 'wrng answer' even if it is right. where is the problem? (i will give brainliest please HELPPPPPPPP) this is python btw

the program is not going into the if loop but directly in the else one and is saying 'wrng answer' even

Answers

Answer:

convert the input to an integer:

 ans = int(input(str(num1)+"+"+str(num2)+"="))

Explanation:

Your code is comparing an integer to a string, which will always return false. If you cast your input to an integer using the int() function, your problem should be solved.

Common methods of securing an IT system do NOT include

A) protecting system integrity by using antimalware programs

B) protecting data integrity by unblocking unauthorized access

C) protecting data integrity by creating backups, entering and editing data correctly

D) setting permissions to restrict access

Answers

Common methods of securing an IT system do not include B) protecting data integrity by unblocking unauthorized access.

What purposes do IT systems serve?

An information technology system (IT system) is typically an information system, a communications system, or, more specifically, a computer system, that has about all peripheral devices, software, as well as hardware, that is used by a little number of IT users.

They include:

Make a backup of your data.Use secure passwords.When working remotely, use caution.Install malware and antivirus protection.

Note that it does not include option B because that cannot guarantee system security.

Learn more about IT system from

https://brainly.com/question/25720881
#SPJ1


Provide a description of cloud computing. Include the advantages
and disadvantages and business drivers for using cloud
computing.

Answers

Cloud computing is a paradigm that enables convenient, on-demand access to a shared pool of configurable computing resources over the internet. It offers numerous advantages such as scalability, cost-effectiveness, flexibility, and reliability. However, there are also disadvantages, including security concerns, dependency on internet connectivity, and potential vendor lock-in.

Cloud computing refers to the delivery of computing resources, including servers, storage, databases, software, and networking, over the internet. It allows users to access and utilize these resources on-demand, without the need for extensive local infrastructure. One of the key advantages of cloud computing is scalability, as businesses can easily scale their resources up or down based on their needs, thereby optimizing costs and improving efficiency. Additionally, cloud services are typically offered on a pay-as-you-go basis, allowing organizations to save on upfront infrastructure costs and only pay for what they use.

Another advantage is flexibility, as cloud computing enables remote access to resources from anywhere with an internet connection. This facilitates remote work, collaboration, and global accessibility, promoting efficiency and productivity. Moreover, cloud providers often offer high levels of reliability and uptime through redundant systems and data backups, minimizing the risk of data loss or downtime.

However, there are also disadvantages to consider. Security is a major concern, as sensitive data may be stored in the cloud and exposed to potential breaches. Organizations must implement robust security measures and trust the cloud provider's security practices. Furthermore, reliance on internet connectivity becomes crucial, as any disruption in connectivity can affect access to cloud services and impact operations. Additionally, adopting a particular cloud provider's services may result in vendor lock-in, making it difficult to switch providers or migrate to alternative solutions.

From a business perspective, several drivers motivate the adoption of cloud computing. Cloud services enable organizations to be more agile by quickly provisioning resources to meet changing demands. This agility supports innovation, faster time to market, and the ability to scale operations as required. Cloud computing also allows businesses to optimize resource utilization by dynamically allocating and de-allocating resources based on workload fluctuations, thereby maximizing efficiency and cost-effectiveness. Moreover, by moving to the cloud, companies can reduce capital expenditures associated with building and maintaining physical infrastructure, shifting to a more predictable and flexible operational expenditure model.

Furthermore, cloud computing provides access to advanced technologies and services that might otherwise be costly or difficult to implement in-house. This includes machine learning, artificial intelligence, big data analytics, and high-performance computing capabilities, enabling organizations to leverage these technologies for competitive advantage and business growth.

In conclusion, cloud computing offers significant advantages in terms of scalability, cost-effectiveness, flexibility, and reliability. However, it also presents challenges related to security, connectivity, and vendor lock-in. Businesses are driven to adopt cloud computing for its ability to enhance agility, improve resource utilization, reduce infrastructure costs, and access advanced technologies and services. Careful consideration of these factors is essential for organizations seeking to harness the benefits of cloud computing while mitigating associated risks.

Learn more about computing here:

https://brainly.com/question/8645052

#SPJ11

CYBERSECURITY. ITS THE ONLY ONE I GOT STUCK ON PLS HELP.
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Answers

Answer:  How might these features enhance cybersecurity for Windows users:

1) Boot in safe mode - The safe mode only loads minimal and trusted drivers and services (excluding third-party options) thereby allowing isolation of potential issues, viruses, and trojan malware.

2) Boot from disk - The boot from disk option loads the operating system from a disk image, rather than loading it from the host system. This eliminates the loading of corrupted, infected, or altered boot loader files from a suspect system.

3) Start-up Utility - The startup utility provides the user with direct control over what applications, services, batch files, drivers, and scripts are run during the startup process. This can remove third-party bloatware or malware that can impact system performance or compromise cybersecurity for the user(s) data, access, identity, and applications.

Explanation:

All of these Windows tools enable different options for users to manage, troubleshoot, and protect their systems, data, identity, and applications from cybersecurity breaches, hackers, monitoring, and potential trojan malware. Used in together, they provide a comprehensive set of tools that can protect and disable cybersecurity threats and exploited vulnerabilities.

Please remember to vote this as Brainliest if I earn it!   :)

Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5?

Answers

The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

What does the W3C do?

The W3C's is known to help to create protocols and rules that makes sure that long-term  development of the Web.

Therefore, we can say that The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

Learn more about The W3C  from

https://brainly.com/question/11179793

#SPJ1

you are running out of time and budget for your game development project you had great ideas for making a randomized highly customizable game experience with high levels of emerg but now you can only fit in the features of one of those qualities highly immersive highly randomize or highly customized briefly describe your imaginary games style then explain which of these three qualities would be best to implement in that type of game on a limited budget​

Answers

My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

What is a game style?

Game style is known to be a term that is made or used by coaches, sports scientists, etc., to show the patterns of play in a scenario of team sports.

Therefore, My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

Learn more about Games from

https://brainly.com/question/5144258

#SPJ1

Discuss how the use of digital formats for audio-visual recording and editing has
transformed the film world.

Answers

Answer:

Digital formats allow for lossless data storage, fast editing (without the loss of original source material, ie having to manually clip pieces of film), and made collaboration easier.

Select ALL the correct answers.
In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniques will contribute to green computing?
A.virtualization
B.grid computing
C.recycling
D.autonomic computing

Answers

Answer:

c. and a.

Explanation:

I think thought are right because you have to adapt the green

Answer:

A. Virtualization

C. Recycling

Other Questions
How does the argument between the Federalists and Anti-Federalists impact us today? Be sure to include information about how both groups helped shape the United States. Find the present value of an investment in equipment if it is expected to provide annual savings of $10,000 for 10 years and to have a resale value of $50,000 at the end of that period. Assume an interest rate of 3% and that savings are realized at year end. (Round factor values to 5 decimal places, e.g. 1.25125 and final answer to O decimal places, e.g. 458,581.) Click here to view factor tables Present value of investment in equipment Solving Systems of Equations by EliminationShow all calculations10x + 9y= -177x + 10y= 14 The return air from a space is mixed with the outside air in the ratio of (4:1) by mass. The mixed air is then entering the heating coil. The following data refer to the space: Inside design conditions (t-25C; = 50%), outdoor air conditions (t= 5C; = 60%), and the room Sensible Heat Ratio SHR is -0.5, Determine: (a) the supply air dry-bulb and wet-bulb temperature (b) the supply mass flow rate for 1 m/min supply air; (c) the sensible and latent heat in kW; (d) the fresh air volume flow rate, in m/min; and (d) the total load of the heating coil. The area of a square is increasing at a constant rate of 1 cm/ sec. How fast is the diagonal increasing at the moment when it is 52 cm long? (a) 2 cm/sec (b) 1 cm/sec (c) 2/5 cm/sec(d) 2/10 cm/sec(e) none of these 1. Using examples, explain the concepts of expectancy, instrumentality, and valence.2. Some practitioners and researchers consider OB Mod unethical because it may be viewed as a way of manipulation. What would be your reaction to such a criticism?3. Many managers assume that if an employee is not performing well, the reason must be a lack of motivation. Do you think this reasoning is accurate? What is the problem with the assumption?4. Review Maslow's hierarchy of needs. Do you agree with the particular ranking of employee needs?5. How can an organisation satisfy employee needs that are included in Maslow's hierarchy?6. Which motivation theory have you found to be most useful in explaining why people behave in a certain way? Why? The transformation from parallelogram LMNO to parallelogram L'M'N'O' was carried out as shown in the coordinate plane below. A 70-kg man is walking at a speed of 2.0 m/s. What is his kinetic energy (energy is measured in Joules)? Use substitution to solve each system of equations.Explain step by step and I'll mark you Brainliest.16x - 4y = 18 x = -6y - 7 Which order of greek architecture is characterized by columns that have capitals decorated with volutes? a. phrygian b. lydian c. doric d. ionic Which argument about school uniforms would most likely appeal to an audience of taxpayers ? A. School uniforms will compromise students ' ability to express themselves . B. School uniforms will fail to hide social class differences between students C. School uniforms will be costly , requiring the government to spend more. D. School uniforms will make students feel embarrassed to come to school __________ stops can really help you to retain focus on the road.\ define credit default swap. A single phase 220/6 Volt, 50 Hz transformer has a rated primary current = 0.5 A. its maximum efficiency is at load current = 15 A and equal to 94% at unity p.f. Its efficiency at rated load, 0.65 p.f. lagging is:a) 87.8%.b) 92.3%.c) 90.9%.d) None. your patient is considerably overweight. as you measure the patient's body weight, what should you do? who were the rough riders please help me! Mg(OH)2 + 2HNO3 Mg(NO3)2 + 2H20If 375.96 grams of H20 are produced, how many grams of HNO reacted? PLS NO LINKS AND ILL GIVE BRAINLIEST . Choose the best answer and write the entire sentence. O La copital de Espaa es a. Port-of-Spain b. La Paz c. Caracas d. Madrid (ii) Caracas es la capital dea. Venezuela b. Tobago c. Nicaragua d. Cuba (iii) Managua es la capital de a. Uruguay b. Tobago c. Nicaragua d. Costa Rica (iv) La capital de Cuba es a. San Salvador b. Lima c. Caracas d. Havana (v) La capital de Per es a. Mexico City b. Lima c. Buenos Aires d. Quito evaluate 3^2018 + 3^2015 / 3^2017 + 3^2016 ILL GIVE BRANILYST give me the definition of land of egypt from the underground railroad In your own word, I need at least a sentence.