Ill give brainliest if possible

Ill Give Brainliest If Possible

Answers

Answer 1
i can’t see that zoom it in
Answer 2

Answer:

it is C

Explanation:

it is C because it will check morning list and afternoon list to find the kid


Related Questions

HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Primary memory is and .
~ Volatile ~ Permanent
~ Not Volatile ~ Not Permanent

Answers

Answer:

Volatile and permanent

Explanation:

hope it is helpful

Answer:

Volatile and not permanent

Explanation:

What does it mean LF will be replaced by CRLF?

Answers

It means that the Line Feed (LF) character software will be replaced by the Carriage Return (CR) and Line Feed (LF) characters.

Line Feed (LF) is a character (represented by the ASCII code 10) that is used to indicate the end of a line of text. It is commonly used in text editors and programming languages. Carriage Return (CR) is a character (represented by ASCII code 13) that is used to indicate the beginning of a new line of text. When LF will be replaced by CRLF, this means that the LF character will be replaced by both the CR and LF characters together. This combination is used to indicate the end of a line of text and the beginning of a new line of text. This is most commonly used in Windows-based systems as it allows for the proper formatting of text files. In other operating systems, such as Linux and Mac OS, the LF character is usually used to indicate the end of a line of text.

Learn more about software here-

brainly.com/question/29946531

#SPJ4

what is crowd sourcing​

Answers

Answer:

The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

Explanation:

Just search on the internet

if you want to monitor the average cpu usage of your ec2 instances, which aws service should you use

Answers

If you want to monitor the average CPU usage of your EC2 instances, then you should use the Amazon CloudWatch AWS service.

What is Amazon CloudWatch?

Amazon CloudWatch is a unified monitoring service for resources and applications running on the AWS Cloud. With Amazon CloudWatch, you can collect and access all your monitoring data in one place, monitor resource usage, as well as app performance metrics.

CloudWatch collects data in the form of logs, metrics, and events, which allow you to monitor your AWS resources, applications, and services.

Amazon CloudWatch can help you monitor and analyze log data, set alarms, and react to changes in your AWS resources.

CloudWatch is integrated with most AWS services and can handle custom metrics as well as predefined metrics. With CloudWatch, you can monitor average CPU usage, network usage, and much more.

Learn more about Amazon at

https://brainly.com/question/32475999

#SPJ11

What would be the data type of "Number"+str(14)?

A string
An integer
It would produce an error

Answers

Answer:

string but see below.

Explanation:

Depending on the language, it would produce a string in most languages I know. More precisely it would convert an integer into a string that would be attached to the string "number". If it works for you, I would put a space between the r in number and the " mark. But you may want it to read as "Number14.

WILL MARK AS BRAINLIEST FOR PAPER ASAP PLEASE HELP

Research and write a 3-to-5-page paper, giving examples to support the following concepts we learned in this lesson:

pseudo code
code blocks
variable scope

Answers

Pseudo code is a type of informal language that is used to express the logic of a computer program in a human-readable format. It is often used to plan out a program before it is actually written in a programming language. Pseudo code typically uses simple words and phrases to express the logic of a program, making it easy to understand for both programmers and non-programmers.

An example of pseudo code to find the average of three numbers might look like this:

1. Start

2. Input num1, num2, num3

3. Set sum = num1 + num2 + num3

4. Set avg = sum / 3

5. Print avg

6. End

Code blocks are a set of instructions that are executed together as a unit. They are typically used to group related instructions together and make it easier to understand the flow of a program. In many programming languages, code blocks are defined by curly braces {} or indentation.

An example of a code block in Python to find the sum of two numbers might look like this:

x = 5

y = 7

def add_numbers(x, y):

   sum = x + y

   return sum

result = add_numbers(x, y)

print(result)

Variable scope refers to the region of a program where a variable can be accessed. In programming, variables can have either global or local scope. Global variables can be accessed by any part of the program, while local variables can only be accessed within the code block where they are defined.

An example of variable scope in Python might look like this:

x = 5

def print_x():

   x = 3

   print(x)

print_x()

print(x)

In this example, the variable x is defined as a global variable with a value of 5. Within the code block of the function print_x(), a local variable x is also defined with a value of 3. Within the function, the local variable x is printed and the global variable x is not affected. But outside the function, the global variable x is printed and its value is still 5.

It's important to note that the concept of variable scope is present in almost all programming languages and the specific syntax and semantics may vary from one language to another.

Code blocks are a fundamental concept in programming, as they are used to group related instructions together and make it easier to understand the flow of a program. They are typically defined by curly braces {} or indentation, and can be used to organize code into functions, loops, or conditional statements. For example, in C-like languages, a loop can be defined as a code block like this:

for(int i=0; i<10; i++){

   printf("Hello World!\n");

}

In this example, the code inside the curly braces is executed as a block, it will print "Hello World!" ten times.

Pseudo code is a way to express the logic of a program in a human-readable format, making it easy to understand and plan out a program. It uses simple words and phrases to express the logic of a program, making it easy to understand for both programmers and non-programmers. For example, a pseudo code for a program that prints out the first n prime numbers would look like this:

1. Start

2. Input n

3. Set count = 0

4. Set i = 2

5. While count<n

6.  for j=2 to i-1

7.  If i is divisible by j

8.   break

9.  If j is equal to i-1

10.  print i

11.  count = count+1

12. i = i+1

13. End

14. End

This pseudo code is easy to understand and gives a clear understanding of the overall logic of the program, making it easier to convert the pseudo code into a specific programming language.

It's important to note that while the syntax of pseudo code may vary, it's main goal is to convey the logic of the program in a way that can be understood by anyone who is familiar with the problem domain and the general concepts of programming.Variable scope is an important concept in programming as it determines the region of a program where a variable can be accessed. In general, there are two types of variable scope: global and local.

In conclusion, pseudo code, code blocks, and variable scope are all important concepts in programming. Pseudo code is a way to express the logic of a program in a human-readable format, making it easy to understand and plan out a program. Code blocks are used to group related instructions together and make it easier to understand the flow of a program. Variable scope determines where a variable can be accessed within a program, with global variables being accessible by any part of the program and local variables being accessible only within the code block where they are defined. Understanding these concepts and using them effectively can greatly improve the readability and maintainability of a program.

 Which device containing sensors send signals to the computer whenever light changes are detected? 

A. Light pen

B. Reflectors

C. Deflector

D. All the above​

Answers

Light pen is the answer to the question.

This device is an input device that is used on the computer.  It is a light sensitive device that can select written words on the computer, it can draw and can also interact with other elements on the computer screen.

It is simply like the mouse. It performs similar operations like the computer mouse. It contains a photocell and a an optical cell that is placed in an object that resembles a pen.

Read more at https://brainly.com/question/13787883?referrer=searchResults

Which of the following is true of planning and buying TV and radio advertising? O Radio formats appeal to mass audiences, giving it more spillover than TV. O Radio ads are much more expensive to produce than TV ads. O A disadvantage of TV is that it is unable to build awareness quickly. O TV advertising takes up a lesser portion of the IMC budget as compared to radio. O TV is still the best medium to generate excitement around a brand.

Answers

When it comes to planning and purchasing TV and radio advertising, TV is still the strongest medium for generating excitement about a brand.

Which of the following is NOT a benefit of television advertising?

Television gives a transient message with nothing concrete for the audience to scrutinize or think about, which is one of its benefits. For a very long time, advertisers have utilized television commercials to promote their goods and services to customers.

Which of the following is true regarding radio advertising's benefits?

With radio, communications may be customized and regionalized for each intended audience. Advertisers can target particular demographics, psychographics, geographic regions, as well as events and genres within a market.

To know more about radio technology visit:-

https://brainly.com/question/14455347

#SPJ4

Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly

symbolic link cannot create a file when that file already exists

Answers

A symbolic link, also known as a soft link, is a special type of file that serves as a reference to another file or directory. It does not contain the actual data of the target file but rather acts as a pointer to it.

When creating a symbolic link, it does not create a new file or directory; instead, it creates a link to an existing file or directory.If a file already exists with the same name as the symbolic link you are trying to create, the symbolic link creation will fail. This is because the file system does not allow two different files with the same name to exist in the same directory.To create a symbolic link, the target file or directory should not already exist with the same name. If you want to create a symbolic link with a specific name, ensure that no other file or directory shares the same name in the target location.

To know more about directory click the link below:

brainly.com/question/29602931

#SPJ11

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Which of the following is an invalid C++ identifier?
TwoForOne
A_+_B
two_for_one
A_plus_B

Answers

The invalid C++ identifier is "A_+_B".

Long answer: In C++, identifiers are used to name variables, functions, and other user-defined items. An identifier can only consist of letters (both uppercase and lowercase), digits, and underscores (_), and it cannot begin with a digit.
The first option, "TwoForOne", is a valid identifier as it consists of letters only and follows the naming convention of camel case.

The third option, "two_for_one", is also a valid identifier as it consists of letters and underscores, and follows the naming convention of snake case.
The fourth option, "A_plus_B", is also a valid identifier as it consists of letters and underscores.
However, the second option, "A_+_B", is an invalid identifier as it contains a plus (+) symbol which is not allowed in identifiers.

Therefore, the invalid C++ identifier is "A_+_B".

To know more about identifier visit:-

https://brainly.com/question/32354601

#SPJ11

How are satellite radio, Internet radio, and podcasting different?

Answers

Satellite radio is a subscription-based service, while HD radio is provided at no cost by current radio providers. Internet radio and podcasting have allowed many new programs and stations to be broadcast at low cost.

Predict the output a b= 12 13 print(print(a+b)) ​

Answers

Answer:

Invalid Syntax

We if correct the syntax then output is 25

Explanation:

In the given question a=12 ,b=13 if we used print(print(a+b)) ​ this syntax then invalid syntax will occur if we correct the syntax then correct syntax program is given below

a =12

b=13

print(a+b)

it gives 25 as output because we used "+" operator between a and b variable this operator provide addition between the two variable .

what are the two methods of creating a folder​

Answers

Answer:

1. right click empty space, go to New, and click New Folder

2. press Ctrl + Shift + N

Explanation:

EASY POINTS who is your favorite in family
1. mom
2. dad
3. sister
4. brother

Answers

Answer:

Thank you! And it would be my dad.

Explanation:

Mom and dad and sistrt………………………

all cell addresses included in a valid formula are outlined in ________.

Answers

All cell addresses included in a valid formula are outlined in absolute notation.

What is cell address?

Cell address is an address or location of a cell in a spreadsheet. It is often referred to as a cell reference, or simply a reference. Cell addresses are composed of the column letter and row number of the cell, such as A1, B2, or X99. The column letter and row number together make up the cell address, which is used to identify the specific cell in the spreadsheet. Cell addresses are often used to reference cells in formulas, making them easier to read and understand. For example, A1*B2 would be much easier to read than the formula (1*2). Cell addresses are also used in macros, allowing users to quickly select the cells that they need to automate a process.

To learn more about cell address
https://brainly.com/question/2146195
#SPJ4

The three principal levels within a business organization hierarchy are (LO 1.2, 2.1, 2.2)a senior management, operational management, and service workers.b senior management, middle management, and operational management.c senior management, operational management, and information systems.d senior management, middle management, and service workers.e senior management, data workers, and service workers.

Answers

The three principal levels within a business organization hierarchy are senior management, middle management, and operational management. The correct option is b.

What is business organization hierarchy?

A word used to describe an organization's organisational structure is "business hierarchy."

Entry-level workers, mid-level workers, mid-level managers, senior managers, and executives, such as the CEO, are all included in this.

Typically, businesses are organized as one of three types: sole proprietorships, partnerships, or limited liability companies (or corporations).

Senior management, middle management, and operational management make up the three main organizational levels in a company.

Thus, the correct option is b.

For more details regarding business, visit:

https://brainly.com/question/15826604

#SPJ1

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

C is the correct answer

I have a question how do I get my level out of high school.When I'm a middle school student?

Answers

Answer:

there is an option in settings for that.

in the 1960s and 1970s, the existing telephone network was used for computer-to-computer communication beyond the local area. why was the telephone network not well suited for supporting computer traffic? be specific.

Answers

A group of computers that share resources on or provided by network nodes is referred to as a computer network.

What is  computer network ? In order to communicate with one another, the computers use standard communication protocols through digital networks. These linkages are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency means that may be organized in a number of  computer network. Among the nodes of a computer network are laptops, servers, networking equipment, and other specialized or general-purpose hosts. In addition to having hostnames, they are recognized by network addresses. Hostnames act as distinctive designations for the nodes and are hardly ever modified after first assignment. For communication protocols like the Internet Protocol to locate and identify the nodes, network addresses are used.Computer networks can be categorized using a variety of factors, such as the signal-transmission medium, bandwidth, communications protocols used to manage network traffic, network size, topology, traffic-control mechanism, and organizational goals.Internet connectivity, digital video and audio, the shared use of application and storage servers, printers, fax machines, and email and instant messaging software are just a few of the many applications and services supported by computer networks.

To Learn more About computer network refer to:

https://brainly.com/question/1167985

#SPJ4

Discuss a simple findpath problem using multiple point-mass robots in an obstacle cluttered 2-D bounded workspace. Derive the control laws using the Lyapunov-based Control Scheme and prove stability of the system. Design and discuss new potential field functions (without deriving new control laws) when a selection of the obstacles turn into landmarks (or waypoints) and guide the robots to their destination.

Answers

The problem of navigating multiple point-mass robots through a cluttered, bounded 2-D workspace can be addressed through a find path problem.

The control laws required to guide the robots through the workspace can be derived using a Lyapunov-based control scheme. In order to prove the stability of the system, the Lyapunov stability theorem can be applied to the control laws.
One way to design new potential field functions for guiding the robots to their destination when a selection of the obstacles turns into landmarks (or waypoints) is to use a combination of attraction and repulsion forces.

The attraction force would be directed towards the waypoint, while the repulsion force would be directed away from any obstacles in the robots' path. By balancing these forces, the robots can be guided towards their destination while avoiding collisions with obstacles.

To know more about navigating visit:

https://brainly.com/question/32343228

SPJ11

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed. Since all files are contiguous, copying a
file squires a seek and rotational delay to read the file, followed by the transfer at full speed. Writing the file back requires the same work. Assuming a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and an average file size of 8 KB, how long does it take to read a file into main memory and then write it back to the disk at a new location? Using these numbers, how long would it take to compact half of a 16-GB disk?

Answers

Answer:

The answer is below

Explanation:

a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB

Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec

The time required to read and write is twice the sum of the seek and transfer time.

Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec

b) half of 16 GB = 8 GB = 8000000 KB

number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000

Transfer rate = 8 MB/sec = 0.008 GB/sec

Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec

Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec

what type of network would be suitable for linking all computers in a building

Answers

Answer:

Local Area Network (LAN)

Explanation:

LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources.

Is a server processing at the same speed when it is overwhelmed with multiple clients?.

Answers

When the server is overwhelmed with multiple clients, it causes "server overload," which is a condition that causes a server to exhaust its resources so that it fails to handle incoming requests, and thus server processing speed decreases in this condition.

What is Server Overload?

Hard drive speed, memory, and processor speed are a few of the elements that assist the server in handling its load. Virtual memory or hard drive space, as well as bus speeds, may influence how the server handles the load, but neither is usually involved in server overload.

Several factors can contribute to server overload. Many operations consume too much bandwidth, and in other cases, the system consumes too much RAM or runs out of processor power.

Your server is designed to handle certain levels of traffic, just as the Transportation Security Administration (TSA) plans for a certain number of travelers at each airport. When it is overloaded at any point, it responds too slowly or not at all, which is reflected in website load times and user experience with applications and tools, for example.

Why is my Server Overloaded?

Natural traffic spikes occur infrequently. Too many users attempting to use a site at the same time can cause a server to crash or overload. This type of server overload error is common on the first day of an online sale, the release of an updated version to a game server, or the rollout of a new web service.

To learn more about servers, visit: https://brainly.com/question/29214413

#SPJ4

Aside from ms excel, what other spreadsheet programs are used today find out what these are and describe their similarities and differences with excel.

Answers

Answer:

Libre office, Gogle sheet

Explanation:

Spreadsheets programs are immensely useful to organizations as they are used for entering data and making several analytical calculations and

decision. The most popular spreadsheet program is Excel which is from Microsoft. However, other spreadsheet programs have been developed. The most common of those are ;Libre office and Gogle sheets.

Similarities between the programs include :

Most have similar functionality and aim, which is to perform and make analytics easy.

The differences may include ; Microsoft excel is credited to Microsoft corporation and the program which forms part of Microsoft office suite including Word , power point, outlook e. T c. Microsoft excel is this not a free program.

Gogle sheets is from Gogle.

Libre office is open source and hence it is free

an intentional action designed to prevent legitimate users from making use of a computer service over the internet is called

Answers

When a malicious cyber threat actor prevents authorized users from accessing information systems, devices, or other network resources, it is said to be a denial-of-service (DoS) attack.

are made to thwart authorized access to a system within a company.

DoS attacks: These aim to block authorized access to your system. Additionally, this involves distributed denial of service, as you'll learn in later chapters (DDoS). Web attacks: Any effort to access your website using an attack.

What is the name of the procedure that determines if a user is authorized to carry out a specific action on a computer?

The process of confirming that someone or something is, in fact, who or what it claims to be is known as authentication. By comparing a user's credentials to those stored in a database of authorized users or on a data authentication server, authentication technology controls access to systems.

to know more about computer services here:

brainly.com/question/5048040

#SPJ4

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

6. A small design agency you are consulting for will be creating client websites and wants to purchase a web server so they can host the sites themselves. How will you advise them on this purchase?

Answers

Answer:

Explanation:

The best way to advise the agency in this matter would be to help them completely understand the total cost of ownership of the server. This includes the server itself but many other factors as well. Such as any and all server software and application software that they will need, an IT server manager, facility costs, security costs, backup features. These are some of the main costs that they will be incurring but there may be more unforeseen costs. Therefore the best way to advise them is by providing all of this information so that they can make the most informed decision possible.

Other Questions
Even though the idea of recycling materials and using them in other ways seems like a good idea, why is the idea of using recycled tires at playgrounds a concern for some scientists?edge2021 I will mark Brainist if someone can answerComplete the following for the chemical formula: 5Ba(OH)2Number of elements= ?Number of subscripts= ?Number of of atoms= ?What is the coefficient?A. 1B. 3C. 5D. 15 Find the first 6 terms in the sequence: f(k) = 2f(k-1) - f(k-2) + f(k-3) describe acceretion disc the nurse is concerned that a widowed, older adult suffers from depression. which statement from the client is reassuring that the client is still hopeful about the future? What is the twisted zipper shape of DNA called? HELP ASAP!1) solve for yy+ y/a =b, if a 12)solve for zz-a= z/b, if b 1 Why is it difficult to conduct a security cost-benefit justification for controls before an attack occurs?. question: 4 you are working at the frozen yogurt shop in the mall. your boss asks you to count how many flavors have the word chocolate in their name. you begin going through the list of flavors, but quickly realize that their are over 9000 flavors to check! luckily, your boss stored all of the different flavors in a java array named flavorarray on the company computer. write a java program to count the number of flavors that have chocolate in their name. Read the article "Overcoming Difficulties: How Helen Keller Learned to Communicate" and answer the question.Every day, millions of people worldwide use their mouths to speak, their ears to hear, and their eyes to see. However, not all people have those abilities. Some are born without the ability to speak, see, or hear. Others lose one or all of these abilities due to illness or accident. Not being able to communicate can be a major obstacle, but people who overcome these challenges are often determined, resourceful, and dedicated to helping others. Instead, people who have to overcome these challenges are often determined, resourceful, and dedicated to helping others.A Great TeacherOne person who did not allow her disability to limit her was Helen Keller. Keller, who became blind and deaf at the age of one and a half due to illness, learned at a very young age that her life was going to be different. As a child in the late 1800s, she did not have access to the technology we have today that assists people with disabilities in their daily lives. Instead, she had a very dedicated and creative teacher who stuck with Keller throughout her life. This teacher's name was Anne Sullivan. As a result of Sullivan's dedication and Keller's own determination, she learned when many thought she could not.Learning How to CommunicateSullivan helped her learn to communicate by using the resources and abilities Keller did have. Keller could touch, taste, and smell. Sullivan taught her to associate hand movements with words. She would spell words on Keller's hand while having her touch the related object. By associating a physical object with the hand movements, Helen learned the meaning of countless words. Learning to speak was tackled in a similar way. By feeling lips as they moved, Keller learned how to use her lips to form words. Using such innovative techniques and the resources available to her opened whole new worlds for Keller's learning. Sullivan encouraged and mentored Keller, never letting her give up and always believing the best for her.An Inspiration to OthersAnother way Keller learned to communicate was through writing. As an adult, she attended Radcliffe College, which allowed her to advance her education, even though many people doubted her ability to be successful. While she was there, she wrote her autobiography, which told the world about her struggles and accomplishments. She was able to share her story through Braille, a form of writing using raised dots felt with the fingers. Throughout her entire college career, Anne Sullivan was beside her, encouraging Keller and interpreting the words she could not see and the sounds she could not hear. Helen Keller's perseverance and Anne Sullivan's dedication became an inspiration for many children and adults around the world.Helen Keller went on to be a successful author and teacher. She became a mentor to other children and adults living with disabilities. To this day, Keller is remembered for her determination, resourcefulness, and dedication that helped her to overcome obstacles and inspire others.Which details best support the claim that Keller learned to communicate successfully? A She eventually became a traveling motivational speaker.B She went to college and wrote her own autobiography.C She helped to develop modern American Sign Language.D She was a favorite playmate among the neighbor children. What is the main purpose of the seeds in plants that have them? What body system do vascular lesions involve? MAJOR HELP PLSSS!!!!!Young company expects to double their profits every year for the next 10 years. If their profits were $5000 this year, which expression represents the profits after 10 yearsA.5,000x2x10B.5,000x2^10C.5,000^2x10D.5,000^10 A 2.8 m ladder is to be laid against a wall so that the top of the ladder is 2 m up the wall. How far out from the base of the wall should the ladder be placed? figure abcd is similar to figure mnkl if ab = 2x + 1, bc= 12, mn = 8, nk=7 and kl=13, what is the value of x Which expression gives the volume of a sphere with radius 17?O A. (172)OB. 4(17)O C. (17)O D. 4(172) What are the 3 C's of group discussion? cvs is the largest pharmacy retailer in the united states with more than 9,600 storesto sustain its competitive advantage, it uses a strategy of locational excellence, which means it There is a simple solution to the problem of high european unemployment: reduce labor market rigidities. is there another side to this story we must consider? Which graph represents the function f(x)=(x)=3-12X5432-1-5 -4 -3 -2 -11 2 34 5941