How to make an outgoing call go straight to voicemail.

Answers

Answer 1

Making an outgoing call go straight to voicemail is helpful in several situations, such as when you're in a meeting or on a date, and you don't want your phone to disturb you. Here are some methods for sending an outgoing call directly to voicemail:

Method 1: Caller ID Spoofing
This approach entails falsifying your phone number to appear as though you're calling from another number that isn't in use, and then sending a call directly to voicemail.


It's crucial to remember that the steps outlined above may differ depending on the phone's operating system. Nevertheless, it is worth noting that making an outgoing call go directly to voicemail can help you avoid distractions and manage your time effectively.

To know more about voicemail  visit:

https://brainly.com/question/31356766

#SPJ11


Related Questions

What is output by the following program?

def sample(val):
val = val * 10

#MAIN
n = 4
sample(n)
print(n)

Answers

The output of the above program is "4".

How can output be defined in programming?

A program is a set of instructions that specify a certain process. The output is how the computer shows the results of the operation, such as text on a screen, printed materials, or sound through a speaker.

Output is any information (or effect) generated by a program, such as noises, lights, pictures, text, motion, and so on, and it can be shown on a screen, in a file, on a disk or tape, and so on.

Learn more about output  at:

https://brainly.com/question/27646651

#SPJ1

Shaun is giving a presentation on how to use a certain technique in oil painting. For his presentation, he wants to use a friend’s video that demonstrates the technique. Shaun comes to you for advice about whether he should include the video in his presentation.

Which statements about the video are true? Check all that apply.

The resource is from an expert.
The resource is current.
The resource clarifies a key point.
The resource is credible.
The resource is relevant.

Answers

Answer:

b,c,e

Explanation:

i got it right

Answer:

b, c, e

Explanation:

Im big brain

11.6 Code Practice edhesive

Answers

Answer:

This is not exactly a copy paste but required code IS added to help

<html>

<body>

<a href=" [Insert the basic www wikipedia website link or else it won't work]  ">

<img src=" [I don't believe it matters what image you link] "></a>

</body>

</html>

Mainly for the Edhesive users:

I received a 100% on Edhesive 11.6 Code Practice

The program for html code for the 11.6 code practice edhesive can be written in the described manner.

What is html element?

HTML elements are a component of html documents. There are three kines of html elements viz, normal elements, raw text elements, void elements.

The html code for the 11.6 code practice edhesive can be written as,

<html>

<body>

<a href="https:/website-when-image-clicked.com">

<img src="https://some-random-image"></a>

</body>

</html>

Hence, the program for html code for the 11.6 code practice edhesive can be written in the described manner.

Learn more about the code practice edhesive here;

https://brainly.com/question/17770454

The four major categories of tools are as ___________,__________,__________ and_________. the saw that is used for cutting along the grain is called the ____________ saw. . the drill bit is an example of a _________ tool. the saw used for cutting across the grain is the __________ saw.

Answers

The four major categories of tools are as follows: cutting tools, shaping tools, fastening tools, and measuring tools. The saw that is used for cutting along the grain is called the rip saw. The drill bit is an example of a cutting tool. The saw used for cutting across the grain is the crosscut saw.

In woodworking and carpentry, there are four main categories of tools: cutting tools, shaping tools, fastening tools, and measuring tools. Cutting tools are used to remove material and include saws, chisels, and knives. Shaping tools are used to give the material a desired shape and include planes, rasps, and files. Fastening tools are used to join pieces of material together and include hammers, screwdrivers, and nails. Measuring tools are used to ensure accuracy and include rulers, tape measures, and squares.

Specifically, the saw that is used for cutting along the grain is called the rip saw. It has a long, narrow blade with large teeth that are designed to efficiently cut through the wood fibers. The drill bit, on the other hand, is an example of a cutting tool. It is used with a drill to create holes in various materials. Finally, the saw used for cutting across the grain is the crosscut saw. It has a wider blade with smaller teeth that are designed to make clean, precise cuts across the wood fibers.

Know more about cutting tools, here:

https://brainly.com/question/33310843

#SPJ11

what is the definition of a computing device ​

Answers

Answer:

Any electronic equipment controlled by a CPU, including desktop and laptop computers, smartphones and tablets. It usually refers to a general-purpose device that can accept software for many purposes in contrast with a dedicated unit of equipment such as a network switch or router.

Explanation:

hope this helps...

yeah what they said :)

what is a proxy? a. a standard that specifies the format of data as well as the rules to be followed during transmission b. a simple network protocol that allows the transfer of files between two computers on the internet c. a standard internet protocol that provides the technical foundation for the public internet as well as for large numbers of private networks d. software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons

Answers

An intermediary proxy server serves as your connection to the internet. End consumers are separated from the websites they visit by an intermediary server.

What is the purpose of a proxy?

Proxies are frequently used for system optimization, such as load balancing and caching comparable requests for faster response times, as well as information security against threats. They can handle authentication requests and act as a firewall.

What kind of proxy would that be?

Some proxy servers consist of a collection of programs or servers that obstruct popular internet services. An SMTP proxy, for instance, intercepts email, whereas an HTTP proxy intercepts online access. An organization's single IP address is shown to the internet through a proxy server using a network addressing system.

To know more about proxy here:

brainly.com/question/14403686

#SPJ4

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

Ms. Osteen gives her class an assignment to insert background color that gradually changes from blue to green. To accomplish this design
effect the students must add a:
O A. swatch.
OB. fill.
C. gradient.
D. pattern.
Need help

Ms. Osteen gives her class an assignment to insert background color that gradually changes from blue

Answers

Answer:

C

Explanation:

Which of the following are stages in the computers lifecycle

Which of the following are stages in the computers lifecycle

Answers

The stages in the computer life cycle include:

Planning for and purchasing equipmentRetiring computersDisposing of computersDeploying computersSupporting and upgradingOptimizing computers

What are the stages in the computer life cycle?

In the computer life cycle, several stages are involved. Firstly, planning for and purchasing equipment is crucial to determine the computing needs and acquire the necessary hardware. Once computers become outdated or inefficient, retiring them is necessary to make room for newer technology.

Proper disposal of computers is important to ensure environmentally responsible practices. Deploying computers involves setting up and configuring the hardware and software for use. Supporting and upgrading computers involves providing technical assistance and periodically updating the systems. Finally, optimizing computers ensures that they are running efficiently and meeting the desired performance standards.

Read more about computer life cycle

brainly.com/question/16591056

#SPJ1

why does low air pressure usually indicate bad weather?

Answers

Areas with high pressure typically have calm, fair weather. Areas with low pressure have comparatively thin atmospheres.

Why does poor weather typically signal low air pressure?

Low pressure causes active weather. The atmosphere becomes unstable when the air rises since it is lighter than the surrounding air masses. When the air pressure increases, water vapor in the air condenses, creating clouds and rain, among other things. Both severe weather and active weather, such as wind and rain, are brought on by low pressure systems.

What type of weather lowers air pressure?

Low-pressure areas are typically associated with bad weather, while high-pressure areas are associated with calmer winds and clear skies (such as cloudy, windy, with potential for rain or storms).

To know more about low air pressure visit:-

https://brainly.com/question/2194071

#SPJ4

2. Assume that x and y are boolean variables and have been properly initialized.
(x && y) && ! (x & & y)
The result of evaluating the expression above is best described as
Aalways true
(B) always false
(C) true only when x is true and y is true
(D) true only when x and y have the same value-
(E)true only when x and y have different values

2. Assume that x and y are boolean variables and have been properly initialized.(x &amp;&amp; y) &amp;&amp;

Answers

Assume that x and y are boolean variables and have been properly initialized. The result of evaluating the expression above is best described as (B) always false.

What is the Boolean variables about?

The logical AND operator && returns true only when both operands are true. For example, true && true is true, true && false is false, and false && false is false.

The expression (x && y) is true only when both x and y are true, and the expression ! (x & & y) is the negation of this, which is true only when x and y are not both true.

Therefore, the overall expression is only true when x and y are both true and also not both true at the same time, which is not possible. As a result, the expression is always not true.

Learn more about Boolean from

https://brainly.com/question/13527907

#SPJ1

What are the importance of Help and Support feature of Windows​

Answers

Answer:

Explanation:

Start Menu Returns. It's what Windows 8 detractors have been clamoring for, and Microsoft has finally brought back the Start Menu. ...

Cortana on Desktop. Being lazy just got a lot easier. ...

Xbox App. ...

Project Spartan Browser. ...

Improved Multitasking. ...

Universal Apps. ...

Office Apps Get Touch Support. ...

Continuum.

a school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.

A. asking the school board to ask parents

B. Creating a email survey for parents

C. Ordering the equipment and asking parents to contribute

D. Setting up a web conference for a small group of parents

Answers

Answer:

D. is the correct answer!

Answer:

B. Creating a email survey for parents

Explanation:

I did this on edg

How did people feel about the difference engine that could solve math problems?

A. they did not understand it
B. they were excited about it
C. they did not like the idea

How did people feel about the difference engine that could solve math problems?A. they did not understand

Answers

Answer:

Either A or C

Explanation:

.........................

They did not understand it

Write a program in Java to input a letter. If it is an uppercase letter then

encode it by next 5th letter, otherwise encode it with 3rd previous letter in the

ASCII table.​

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 char chr;

 System.out.print("Input Character: ");

 chr = input.next().charAt(0);

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

 else{      chr-=3;  }

 System.out.println("Encode Character: "+chr);

}

}

Explanation:

This declares the character

 char chr;

This prompts for input

 System.out.print("Input Character: ");

This gets the input from the user

 chr = input.next().charAt(0);

This checks for uppercase; if true, it is encoded by the next 5th

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

If lowercase, it is encoded by the previous 3rd

 else{      chr-=3;  }

This prints the encoded character

 System.out.println("Encode Character: "+chr);

Read each of the following statements about Computer Science and explain why you think that statement is true.

1.Computer science is about using computers to solve problems better and faster.

2.Coding is one part of computer science. Other parts include understanding how
computers work and how they impact our world.

3.Computer science is connected to every part of our lives.

4.Computer science is the study of the ideas ways of thinking languages software, and
hardware needed to solve problems with computers.

5. Anyone can learn about computer science.

Answers

Answer:

sytaragadr

Explanation:

when a computer contacts a wsus server for the first time, what groups will the computer be added to by default?

Answers

By default, when a computer contacts a WSUS server for the first time, it will be added to the Unassigned Computers group.

When a computer contacts a WSUS server for the first time, it will download the list of available updates from the server. Before any updates can be installed, the computer must be assigned to a computer group. The Unassigned Computers group is the default group for all computers that have not been explicitly assigned to a different group.

The Unassigned Computers group allows administrators to review and approve updates for individual computers before deploying them to larger groups.

Learn more about WSU server:

https://brainly.com/question/14294062

#SPJ11

as you are entering sales data into a new worksheet, you inadvertently type 6/31/2019. which action will excel take with this?

Answers

Excel will show it as 6/31/2019, but it won't be a real date; it'll merely be a series of digits and dashes in left-justified format.

What kinds of data are permitted to be entered into spreadsheet cells?

You can enter data in the form of numbers, text, dates, or times. There are numerous methods to format the data. Additionally, there are a number of parameters you can change to facilitate data entry for you.

What comes first while entering data?

Data processing starts with data collection. Data is retrieved from the many sources, such as data lakes and data warehouses. In order to acquire the highest quality data possible, it is critical that the data sources used are reliable and well-designed.

To know more about Excel visit :-

https://brainly.com/question/3441128

#SPJ1

What areas does ABET provide accreditation?
students
programs
institutions
teaching staff
industries

Answers

It is a form of quality assurance for programs in the areas of applied and natural science, computing, engineering, and engineering technology. Our accreditation is recognized globally as evidence that a program meets the standards set by its technical profession.

"We are a nonprofit, non-governmental agency that accredits programs in applied and natural science, computing, engineering and engineering technology." - ABET

which three (3) factors make cybersecurity far more difficult now that it was in the past when you only needed to protect the computer?• Local nature of business• Mobile technology - everyone has a smartphone• Data protection - your data is everywhere• Multiple different vendors, each supporting different technology and protocols

Answers

• Increased threat landscape - more malware, ransomware, and other      malicious actors

• Complexity of networks - more devices and applications connected to the network

• Lack of visibility into cloud-based services - the use of cloud services   makes it difficult to monitor and detect threats.

What is Cloud Service?
Cloud Service is a type of internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model of network computing where a cloud service provider makes resources, such as applications and storage, available to users over the Internet. This can be done without the need for users to have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them.

To know more about Cloud Services
https://brainly.com/question/28233143
#SPJ1

CodeHs can some help me.

CodeHs can some help me.
CodeHs can some help me.

Answers

Answer:

youre tags arent strong and some of

Explanation:

fill in the blank: once a search engine bot discovers your web page, it _______.

Answers

Once a search engine bot discovers your web page, it indexes it in its database.

When a search engine bot crawls a web page, it reads and analyzes the content to understand what the page is about. It then adds this information to its database, making it available to users who search for relevant keywords or phrases.

After a search engine bot discovers your web page, it goes through a process called "indexing." This involves analyzing the content and structure of your web page, then storing it in the search engine's database. This allows the search engine to quickly retrieve your web page in response to relevant search queries from users.

To know more about engine visit:-

https://brainly.com/question/4853593

#SPJ11

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

what do you call the set of commands that a printer understands in order to print content?

Answers

The set of commands that a printer understands in order to print content is commonly known as a printer language or printer command language.

This language is used to communicate with the printer and instruct it on how to print a document, including details such as the page layout, font size and style, color, and other formatting options. Some common printer languages include PCL (Printer Command Language) and PostScript.

PCL is a widely-used printer language that was developed by Hewlett-Packard. It is supported by many printer models and is used to create high-quality text and graphics. PostScript is another printer language that was developed by Adobe Systems. It is used to create complex graphics and layouts and is often used by graphic designers and desktop publishers.

In summary, printer language is a set of commands that a printer understands in order to print content, and it plays a crucial role in determining the quality and accuracy of the printed output.

Learn more about printer command language:https://brainly.com/question/7221369

#SPJ11

Learning Task 1 Write YES if the statement is correct and NO if it is incorrect.

1. Fruit orchards include any facility focused on growing cashew,almond and cacao.

2. Seed orchards focus primarily on growing trees that produceseeds rather than nuts or fruit.

3. Orchard is a piece of land where herbs are maintained for commercial production

4. Cashew, almond and cacao are plants found in the fruit orchard.

5. Papaya and mango orchards are example of Fruit Orchard.​

(ayusin nyo naman po malapit na po yung pasahan namin

Answers

Answer:

1) YES

2) YES

3) YES

4) NO

5) YES

In the Learning Task given above, the response are:

YESYESYES NO YES

What is Orchard?

An orchard is known to be a kind of plantation that is made up of trees or shrubs done or kept for food production.

Note that Fruit orchards include any facility focused on growing cashew, almond and cacao.

Learn more about orchards  from

https://brainly.com/question/11642092

#SPJ2

you are running windows 10 and want to use a virtualization program so you can test out a new distribution of linux and work with other operating systems while still being able to use windows 10. what should you install?

Answers

Virtualization is a method of running multiple operating systems on a single computer. Virtualization software allows you to run one operating system inside another.

If you are running Windows 10 and want to use a virtualization program so you can test out a new distribution of Linux and work with other operating systems while still being able to use Windows 10, then you should install a virtualization software such as Oracle Virtual Box. The operating system running on the actual computer is known as the host operating system, while the operating system running inside the virtualization software is known as the guest operating system. Virtualization software makes it easier to run multiple operating systems on a single computer simultaneously. With virtualization, you can run multiple operating systems, each with its own applications, on a single computer. Virtualization is often used in the IT industry to manage servers and to test software on different operating systems. Oracle Virtual Box is a virtualization program that allows you to run multiple operating systems on a single computer. It is an open-source virtualization software that is available for Windows, Linux, and macOS. Virtual Box allows you to create virtual machines that can run different operating systems, including Linux, Windows, macOS, and others. With VirtualBox, you can install and test new distributions of Linux and work with other operating systems while still being able to use Windows 10.

Learn more about Virtualization here:

https://brainly.com/question/31257788

#SPJ11

Which of the following is the best example of a manager with a delegator
leadership style?
A. Hank gives his employees detailed instructions for completing
tasks and asks them to check in with him as soon as they are
done.
B. Melinda closely monitors the work her employees do as they
restock the shelves, but asks them if they have any ideas for
making this process more efficient.
• C. Erin gives her employee step-by-step instructions for writing a
letter to a customer. She asks to proofread it before the employee
sends it to the customer.
D. Gerard tells his employees that the company website needs to be
redesigned. He tells them what features it should have and when
it's due, but let's them decide on the design.

Which of the following is the best example of a manager with a delegatorleadership style?A. Hank gives

Answers

Answer:

D. Gerard tells his employees that the company website needs to be

redesigned. He tells them what features it should have and when

it's due, but let's them decide on the design

this exercise is designed to get you familiar with the numeric limits class links to an external site.in stl. (30 minutes coding) create a c program to print out the max and min value of the following primitive types: int, unsigned int, long, double and float. what do you find from this program? try other methods on different primitive types per your interest.

Answers

In this program, we use the limits.h header file to access macros that define the maximum and minimum values for each primitive type. The macros used are: INT_MAX, INT_MIN, UINT_MAX, LONG_MAX, LONG_MIN, DBL_MAX, DBL_MIN, and FLT_MAX, FLT_MIN.

What is C Program?

A C program is a computer program that is written in the C programming language. C programs are typically composed of functions and statements that are executed in a specific order to perform a particular task or set of tasks. The language provides a wide range of features, including data types, control structures, functions, and pointers, that enable the programmer to write efficient, high-performance code.

C is widely used for developing systems and applications, particularly those that require low-level access to hardware resources. Some examples of applications and systems written in C include operating systems, device drivers, embedded systems, and scientific simulations.

Here's an example C program that will print out the max and min values for the primitive types: int, unsigned int, long, double and float:

#include <stdio.h>

#include <limits.h>

#include <float.h>

int main(void) {

   printf("Int: Max = %d, Min = %d\n", INT_MAX, INT_MIN);

   printf("Unsigned Int: Max = %u\n", UINT_MAX);

   printf("Long: Max = %ld, Min = %ld\n", LONG_MAX, LONG_MIN);

   printf("Double: Max = %.10g, Min = %.10g\n", DBL_MAX, DBL_MIN);

   printf("Float: Max = %.10g, Min = %.10g\n", FLT_MAX, FLT_MIN);

   return 0;

}

In this program, we use the limits.h header file to access macros that define the maximum and minimum values for each primitive type. The macros used are: INT_MAX, INT_MIN, UINT_MAX, LONG_MAX, LONG_MIN, DBL_MAX, DBL_MIN, and FLT_MAX, FLT_MIN.

This program outputs the maximum and minimum values for each primitive type, allowing you to see the range of values that each type can represent.

As for exploring other methods, one option could be to create variables of each type and manually assign the largest and smallest values, and then print them out, as follows:

#include <stdio.h>

int main(void) {

   int i = 2147483647;

   unsigned int ui = 4294967295;

   long l = 9223372036854775807;

   double d = 1.7e+308;

   float f = 3.4e+38;

   printf("Int: Max = %d\n", i);

   printf("Unsigned Int: Max = %u\n", ui);

   printf("Long: Max = %ld\n", l);

   printf("Double: Max = %.10g\n", d);

   printf("Float: Max = %.10g\n", f);

   i = -2147483648;

   l = -9223372036854775808;

   d = -1.7e+308;

   f = -3.4e+38;

   printf("Int: Min = %d\n", i);

   printf("Long: Min = %ld\n", l);

   printf("Double: Min = %.10g\n", d);

   printf("Float: Min = %.10g\n", f);

   return 0;

}

Learn more about C Programming click here:

https://brainly.com/question/29330362

#SPJ4

What is a graphics card?

Answers

Answer:

a printed circuit board that controls the output to a display screen.

makes ya games or other things look pog

Explanation:

Write a function named filterAnswersByType that
takes in an array of student answers
returns an array of the answers that have isEssayQuestion set to true
If none of the answers are essay questions, return an empty array.

Answers

This code filters an array of student answers to only include those with isEssayQuestion set to true and returns an empty array if there are no essay answers.

Here's an example implementation of the filterAnswersByType function in JavaScript:

function filterAnswersByType(studentAnswers) {

 const essayAnswers = studentAnswers.filter(answer => answer.isEssayQuestion === true);

 return essayAnswers.length > 0 ? essayAnswers : [];

}

The function takes in an array of studentAnswers as a parameter. It then filters the answers array to only include those that have the isEssayQuestion property set to true. If there are any essay answers, the function returns the filtered array. Otherwise, it returns an empty array.

Here's an example of how you can use this function:

const studentAnswers = [

 { answer: 'The sky is blue', isEssayQuestion: false },

 { answer: 'What is the meaning of life?', isEssayQuestion: true },

 { answer: '2+2=4', isEssayQuestion: false },

 { answer: 'Explain the process of photosynthesis', isEssayQuestion: true }

];

const essayAnswers = filterAnswersByType(studentAnswers);

console.log(essayAnswers); // Output: [{ answer: 'What is the meaning of life?', isEssayQuestion: true }, { answer: 'Explain the process of photosynthesis', isEssayQuestion: true }]

In this example, the studentAnswers array contains four elements, two of which have the isEssayQuestion property set to true. The filterAnswersByType function filters the array to only include these two elements and returns them. The output of the function call is an array with these two elements.

Learn more about array here:

https://brainly.com/question/30726504

#SPJ4

Other Questions
Leo is participating in a study in which the researchers measure his brain activity while he is in the REM stage of sleep. Which area is likely to show the LEAST amount of activation Sofian's current age is (2x + 3) times Mastura's age. Given that Mastura's current age is (x + 5) years and 6 years ago, the sum of their ages is 44 years. Calculate the value of x. What is the value of the x variable in the solution to the following system of equations?2x 3y = 35x 4y = 4 a 1 b 0 c x can be any number as there are infinitely many solutions to this system d There is no x value as there is no solution to this system Anderson Windows lowered costs, enhanced quality and variety, and improved its response time to customers byA. creating a new paper-based catalog.B. creating an interactive computer version of its paper catalogs.C. creating an integrated computer system of catalogs, products, orders, and manufacturing.D. creating a manufacturing system for ordering parts. 3. This was the President who made a statement to European Countries that they would no longerbe ablecolonize or interfere in the affairs of the Western Hemisphere or Latin America.(last name only & capitalize) cmEnter your answer what is (-3v) to the fifth power simplified An ultra-low friction pulley deal is as shown. The two weights experience an acceleration of 3.8m/s2. The first weight has 1.08kg. Find the mass of the second weight in chapter 1, what does the plaid avenger say has been the biggest modifier of the planet? What is the solution to the inequality 75 is greater than x over 15 for brainiest:):):):):):):):):):) If the area of an octagon (8 sides) sign is 242 in squared and the apothem is 12. 1 in, what is the length of the sides You can multiply -2.2 by 6.2 to find the total variation in water level. What decimal represents the total variation in water level that Ericka observed? When the plants absorb the nitrates from the soil and from their roots. the nitrogen is then used for chlorophyll, nucleic acids and amino acids.a. Trueb. False Utilizing proper recycling and composting habits is important for minimizing environmental waste but has absolutely no impact and nothing to do with sustainability.Group of answer choicesTrueFalse(The class is actually culinary arts) Write a paragraph about 13 reasons why being your favorite movie and why ? AABC is dilated by a factor of 2 to produce A'B'C'. Which statement is not true? 62 34 16 A 28 30 If you anwser the question i give you brainly 4. Assume that the equation for demand for bread at a small bakery is Qd = 60 - 10P6 + 3Y, where Q4 is the quantity of bread demanded in loaves and Y is the average income in the town in thousands of dollars. a. If the average income in the town is 10, state the equation for Qd in terms of Pb. b. Draw a graph of the demand curve with Qd on the horizontal axis and Ph on the vertical axis. Label the curve DD. Lydia is buying some jewelry for her fried Michelle for her birthday. Each set is $5 and shipping is $4 flat. If Lydia buys 4 jewelry sets, how much will she spend? what can your core values be considered as a. your opportunities b.your decisionsc.your roots d.your laws