PLZ HELP ME QUICK I'M TIMED
You want to learn more about how URL addresses are translated into IP addresses. Which of these webinars is most likely to meet your need?

What You Need to Know about MAC/IP


Everything You Ever Wanted to Know About DNS


How LANs Work


How Full Stacks Are Developed

Answers

Answer 1

Answer:

I think it would be how LANs work

Answer 2
I think how land work or how to use a Mac IP

Related Questions

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to you? Why or why not?

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to

Answers

Answer:

yes she is a real person she had  a son named Phil and her husband was alexander Hamilton he died in a duel with the vice president Aaron burr

there son died in a duel two so Eliza  was just alone in the world with out her some and husband  she ran a orphanage and saw all of the kids and it reminded her of Alex  

Explanation:

Answer:

yeah shes human i refuse to think shes not

Explanation:

Tests, fixes, and maintains network systems:

Tests, fixes, and maintains network systems:

Answers

Its the last one to be exact

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

A large company has extensive downtown office space with many conference rooms. To lower their electric bill, the company has installed a new system that automatically turns off the heat and lights in a conference room when no one is in the room. What is the simplest explanation for how the system works?

A camera in each room is connected to the security desk. When the officer on duty sees that a room is empty, they turn off the heat and lights in that room.

A small robotic device on wheels knows the building layout. It roams the offices, peeking into each conference room to see if anyone is using it. If not, the robot turns off the lights and heat.

A sensor detects and reports on movement in the room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.

Every hour, the system emits a loud sound in each room. Pressing a large red button in the middle of the table turns off the sound in that room. If nobody does so within 30 seconds, the system turns off the heat and lights.

Answers

The simplest explanation for how the system works is option C: a sensor detects and reports on movement in the conference room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.

What is the office space about?

The system that automatically turns off the heat and lights in a conference room when no one is in the room is commonly referred to as an occupancy sensor. An occupancy sensor uses various technologies, such as infrared or ultrasonic, to detect the presence or absence of people in a room.

Therefore, Once the sensor detects that no one is in the conference room, it sends a signal to the control system, which then turns off the heat and lights. When someone enters the room again, the sensor detects their presence and sends a signal to turn the heat and lights back on. This system is designed to save energy by ensuring that heating and lighting are only used when needed.

Learn more about office space from

https://brainly.com/question/28885269

#SPJ1

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

Pls answer will give brainlest dont answer if you dont know
Upload your 300-word essay containing the following: the definition of methane an explanation of how it is produced a description of how methane can be used as an energy source an explanation of how farmers are using methane from farm animals as an energy source a specific example of an actual farm where this system is being used

Answers

The main source of agricultural methane is a process called enteric fermentation, a normal part of digestion in ruminant animals such as cows, sheep, goats, buffaloes and camels. Ruminants have a compartment in their stomach called a rumen where food is broken down through fermentation. This process produces methane gas, which the animals then belch out into the atmosphere. Enteric fermentation accounts for 18 percent of all anthropogenic methane emissions.

If enteric fermentation is a natural part of ruminant digestion, then what’s the solution? One strategy is to adjust the feed mix. The harder a food is to digest, the more time it spends in the rumen and the more methane that is produced. Some supplements can help as well. A recent study in Wales found that garlic may cut methane emissions.

The other major source of methane from farm animals is manure – particularly when stored in uncovered tanks or lagoons. Cow paddies sprinkled across a field of grass are exposed to the air where they quickly dry out. In tanks and lagoons (used because feedlots contain so many animals), lack of oxygen increases the amount of methane that’s emitted.

One way to handle the problem is through anaerobic digestion of manure stored in closed vessels. The captured methane can be used to generate heat and electricity. The 7,000+ dairy and swine operations in the U.S. could generate enough electricity to power nearly 600,000 homes annually, preventing the release of 1.3 million tons of methane into the atmosphere (see EPA report [PDF]). As an added benefit, the digested manure can be used as a fertilizer. (Raw manure also is used as fertilizer, but has a much stronger odor.) Since producing synthetic fertilizer burns a lot of fossil fuel energy, fertilizing with manure is a way to reduce greenhouse gas emissions as well as save money.


Don’t know how many words... plz give me brainiest

Methane is often written as  (CH4). It is known to be a part of the  hydrocarbon family.

What is a methane known for?

Methane is known to be a type of natural gas that is said to be odorless, and flammable in nature. It is used in the making of  fuel.

Conclusively, it is known to be a a primary aspect of natural gas and it  is also a greenhouse gas. Methane is said to be often emitted from a lot of of human-affected substance and natural sources.

Learn more about methane  from

https://brainly.com/question/25649765

What type would the object X be in the following statement:

if (X) { ... }

A.
Number
B.
Boolean
C.
String
D.
Date

Answers

Answer:

Boolean

Explanation:

If statement condition always returns true or false,which is a boolean data type.

X is true or false

it maybe a variable or an expression.

I think it’s Boolean

On the planet Mongo, each year has 15 months and each month has 26 days.
Write a function compute_mongo_age(birthYear, birthMonth, birthDay, currentYear, currentMonth, currentDay)
that residents of Mongo can use to compute their age. It should take 6 positive integers as input: the person's birthdate (year, month from 1 to 15, and day from 1 to 26) and the current date (year, month from 1 to 15, and day from 1 to 26), and return a float of the age of the person in years.

For example, print(compute_mongo_age(2879,8,11,2892,2,21)) should print 12.6256410256, the age (in Mongo years) of a person, who was born on the 11th day of the 8th month of the year 2879, is on the 21st day of the 2nd month of the year 2892.

Answers

Answer:

DateTime now = DateTime.Today;

int age = now.Year - bday.Year;

if (now < bday.AddYears(age))

age--;

So your helper method would look like:

public static string Age(this HtmlHelper helper, DateTime birthday)

{

DateTime now = DateTime.Today;

int age = now.Year - birthday.Year;

if (now < birthday.AddYears(age))

age--;

Which of these represents information that is fact-based, measurable, and observable?

objective information
predictive information
subjective information
interpretive information

Answers

Answer: objective information

Objective information should be answer

Riley receives an email containing several grammatical errors with a link to sign a petition. Which of the following strategies should he use to make sure the email is trustworthy? (5 points) Evaluate source credibility. Fact check. Listen to his gut. Look for authenticity.

Answers

The Answer:

Explanation:

He should evaluate the source credibility.

The image below could be considered to be a typical conference room. Imagine that you have to present to your corporate team in this room. What are a few things you would have to consider when presenting in this room?

The image below could be considered to be a typical conference room. Imagine that you have to present

Answers

Answer: presenting new ideas for new tech and new ways to improve todays society with tech ways to improve the company.

Explanation:

Well first of all it would depend on the business bit probably while writing i would consider spelling grammar and maybe add a little joke but while presenting i would focus on everyone’s facial expressions from what i know expressions are the most important thing because they tell you if you’re bombing or doing ok

A brief description of a project, document, paper, etc. that presents the most important points in the most effective way. Question 2 options: Goldilocks Rule Rudolph Rule Executive Summary tagline Elevator Pitch

Answers

An executive summary is a brief document that summarizes the most important points of a larger report, proposal, or project. It is usually no more than one or two pages long and is designed to give readers a quick overview of the key information they need to know. An executive summary typically includes the purpose of the project or document, the main findings or recommendations, and any key data or statistics. It is written in a clear and concise manner and should be easily understandable to a wide audience. The goal of an executive summary is to convey the most important information in the most effective way possible.

A concise document called an executive summary highlights the key ideas from a longer report, proposal, or project.

What is Project Document?

It is intended to provide readers with a brief summary of the most important information they need to know and is often no more than one or two pages.

The major conclusions or recommendations, any important data or statistics, and the project's or document's objective are often included in an executive summary.

A large audience should be able to understand it easily because it is written in a clear and succinct manner. An executive summary's objective is to effectively communicate the most crucial facts.

Therefore, A concise document called an executive summary highlights the key ideas from a longer report, proposal, or project.

To learn more about documents, refer to the link:

https://brainly.com/question/12401517

#SPJ1

The crop tool is used for _______, ___________ and ________.
a. Resizing, trimming and straightening
b. Cutting, separating, and deleting.
c. Shaping, moving, and sizing.
d. Resizing, separating and removing

Answers

i dont konow just want the pionts

Explanation:

Jason needs to add a picture of his baseball team to the team's web page. Which file format should he use?

ZIP
IMG
JPG
MPG

Answers

Answer:

JPG file(s)

Explanation:

JPG are typically used for digital images. Since he's posting this onto a website, he should use the JPG file format.

Answer: JPG would be the best!

Hi! Does anyone know how long it takes for a S o u n d C l o u d import to finish importing to a video-making website (Flixier to be exact) It'll be much appreciated if you answer this! I'll mark brainliest!

Answers

Answer:

It takes me around 20 to even an hour but its always different depending on the length

Explanation:

Answer:

It can take 5-7 business days

Explanation:

Hope this helps

5 pros and cons about 5g plz i need this badly

Answers

5g creates a greater bandwidth
Advantage of 5g network is it is 100 times more faster then what we use 4g network
but disadvantage of 5g network is it slowly disturb the radar which is used for weather forecasting and all time it can crate an issue for the scientists

ASAP PLS
Studying how air currents affect the weather is an example of _____. modeling science prototyping technology

Answers

Answer:

E⁣⁣⁣xplanation i⁣⁣⁣s i⁣⁣⁣n a f⁣⁣⁣ile

Socratic

Explanation:

The answer is socatric

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

50 points! ㅠㅠ does anyone speak korean or watch korean animes? 안녕 ㅋㅋ ㅇㅅㅇ How do people make animationsss.

Answers

Answer:

Explanation Well depends on what type of animations your asking for but Anime is almost entirely drawn by hand but It also takes skill to create hand-drawn animation and experience to do it quickly. ... They're the ones who make all the individual drawings after the top-level directors come up with the storyboards and the middle-tier “key animators” draw the important frames in each scene it has a lot of process .

In what ways can information be slanted in a news report? List at least five ways.

Answers

Answer:

author, journalist and speaker/media trainer this is all I know so

author, journalist and speaker/media trainer

Answer:
Author and journalist

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My teacher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)

Answers

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

Yes we are dependable we use our phones everyday

HELP!!!
THIS HAPPENS EVERY TIME

HELP!!!THIS HAPPENS EVERY TIME

Answers

Idek but hope u figure it out!
Lol sorry maybe try tinder you never know

What is the Fastest Tesla right now?
(A) Tesla Model X (P100D)
(B) Tesla Model S (P100D)
(C) Tesla Roadster
(D) Tesla Model S (Performance)
(E) Tesla Model 3 (Performance)

Answers

D tesla model s performance
d tesla model s performance

STAY SAFE!!

MAY YOU AND UR WHOLE FAMILY LIVE FOR MORE THAN 100 YEARS!!!


JUST BECAUSE SOME OF THE PASSED AWAY DOESN'T MEAN THEY ARE STILL NOT WITH YOU

ITS LIKE PLANETS THEY ARE FAR AWAY FROM EACH OTHER, BUT THE FORCE OF LOVE KEEPS THEM TOGETHER!!

ITS TOO STRONG TO BE BROKEN!! :) <3 <3

WHOEVER HAS THE BEST AND NICE AND SWEET COMMENT GETS BRAINLIEST!!

Answers

Answer:

The true words of a wise and noble man

Explanation:

Also, whatcha think about Nevada and Pennsylvania finally turning in their ballots, and making Biden 2020 happen?

Omg thank you so much you are an angel i hope u have the BEST day ever king/queen! So how’s ur day, good I hope we’ll have a good one!

does gon from hxh die

Answers

Nope, thanks God

no one major dies

but the rumors about kurapika dying is spreading (don't beilve it though)

What subject is this I’m just wondering

Construct pseudocode for a program that prints ‘Hello World’ on the screen.

Answers

Answer:

Declare a class with name A.

Declare the main method public static void main(String args[]){

Now Type the System. out. println("Hello World"); which displays the text Hello World.

Explanation:

google

A is the answer!!! good luck

!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:

a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:

Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age

Date: [Insert Date]

Byline: [Your Name]

[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.

The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.

In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.

One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.

According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.

During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.

On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.

After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.

The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.

As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.

In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.

I hope this helps. Cheers! ^^

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?

a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.

Answers

Answer:

a

Explanation:

sis is gonna get scammed

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

Other Questions
Identify the national road that mr smith must use if he travels from johannesburg and stops at bloemfontein to stretch his legs Read the excerpt from "In with the New." What does the reader learn about Samantha from this flashback? She remembered staring into her closet on the morning of her first day at Central Middle School. "Why don't you wear your green and purple layered T-shirt?" her mom had suggested, seeing that Samantha looked overwhelmed. O Samantha was worried about her first day of school. Samantha tried hard to impress people on her first day of school. Samantha did not care about her first day of school. O Samantha was looking forward to her first day at school. Samantha picked up the shirt and then put it down. "I do like that one," she explained, "but it's a little bright, and I don't want to stand out. Today I only want to blend." Answer this please its about volumes on spheres Calculate the indefinite integral: (Use C for the constant of integration.)t e2 tdtintegral.t ea tdtintegral.t(t ?a) (t ? b)integral.dtt sin(a t + b)dtintegral. information security should be treated as a separate discipline and not integrated into all areas of information technology. Allison invests $5,000 in a CD at an interest rate 2% what will her total investment be worth at the end of 3 years Dadoh(x)=-5x-4h ( x )= 5x _4, encontrar h(3)h ( 3 ) Identify the directrix, focus, and vertex of the parabola in the figure. (Image Attached Below in Pic 1)Directrix^(0,4), (-3, 2), (-3, 3), y = 4, (1,-1), x = 4Focus^(0,4), (-3, 2), (-3, 3), y = 4, (1,-1), x = 4Vertex^(0,4), (-3, 2), (-3, 3), y = 4, (1,-1), x = 4__________________________________________2) Identify the directrix, focus, and vertex of the parabola in the figure.(Image Attached Below in Pic 2)Match the correct coordinates or equation with the correct part of the parabola.Directrix^(2, -4), y = -6, x = -6, (6, -1), (2, -5), (0, -6)Focus^(2, -4), y = -6, x = -6, (6, -1), (2, -5), (0, -6)Vertex^(2, -4), y = -6, x = -6, (6, -1), (2, -5), (0, -6) i) In which company is cash most likely to be a wasting asset? A,B,or C?ii) In which company is cash most likely to be a potential value creator? A,B,or C?iii) In which company is cash most likely to be a neutral asset? A,B,or C? Someone please answer this iligal na pagputol sa mga puno sa kagubatan how did lifetime tenure for british judges help secure the rights of the people against the monarch? Describe the overall movement in our solar system. Explain the role played by the sun that movement. Prove that tan 480. Sin 300. Cos 14. Sin (-135) Sin 104. Cos 2250 =3/2 during glycolysis, does the enzyme phosphoglycerate kinase cause an increase or decrease in the potential energy of the substrate 1,3-bisphosphoglycerate relative to the product 3-phosphoglycerate? Write an informative essay that explains a natural phenomenon such as the Pitch Lake in Trinidad or the aurora borealis. Has to have 150 words or more.No cheating, no copying words from others sites and use your own words.If I get a zero I will fail the older adult client with a history of congestive heart failure is upset following the death of their spouse yesterday. the practitioner observes the client for which complication? At a pizza shop, 6 slices of pizza and 2 drinks cost the same as 5 slices of pizza and 5 drinks. Each slice of pizza costs $4.50. Find the cost in dollars of each drink. Plz help me well mark brainliest if correct................? MENDELIAN GENETICS. X-LINKED FRUIT.FLY CROSS INTRODUCTION LABORATORY SIMULATION xy vial XX' vial xx xxxvial XX 'YX Hazardous waste Morgu EL Magnifying glass Fly morgue Paper cards Fly anesthetic Brush Swabs METHODS RESET MY NOTES LAB DATA HIDE LABELS Complete the following steps: 1 In Lab Data, record expected phenotypic ratio of XRx' female and XRy male flies cross Lab Data X Male red eye Male white eye Female red eye Female white eye Predicted ratio Observed fly counts . Observed phenotypic ratio