The cutting tool that has a zig zag edge is called a?

Answers

Answer 1
The cutting tool that has a zig zag edge is called “Pinking shears “

Related Questions

Submitting Unit 11 Assignment – Step 1 Python CS Fundamentals
Need the code to this.

Submitting Unit 11 Assignment Step 1 Python CS FundamentalsNeed the code to this.

Answers

The Step 1 Python CS Fundamentals  coding work is given in the document attached below.

What are the basic fundamentals of Python?

The basic steps or lessons in Python is made up of:

Kinds of Data types ( such as int, float, strings)The kinds of Compound data structures ( such as lists, tuples, and dictionaries), etc.

Note that by knowing the Step 1  of the Python CS Fundamentals  coding work, one can know what to do next. See the document attached for more information.

Learn more about Coding from

https://brainly.com/question/16397886

#SPJ1

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

calculate the total and average number from 1 to 100

Answers

Answer:

Thus, 50.5 is an average of numbers from 1 to 100.

Explanation:

getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.

50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.

Address the formula, input parameters & values.

Formula: Average = Total Sum of Numbers / Total Count of Numbers

Input parameters & values:

The numbers from 1 to 100 are

1, 2, 3, 4, . . . . , 98, 99, 100

Total Count of Numbers = 100

step 2 Find the sum of numbers from 1 to 100.

sum = 1 + 2 + 3 + . . . . + 99 + 100

= 5050

step 3 Divide the sum by 100 Average = 5050/100 = 50.5

Thus, 50.5 is an average of numbers from 1 to 100.

In order to view a page break what should you do

Answers

Answer:

.

.

Explanation:

I do a order view page .

.

.

.

.

Most of the indentured servants in the American colonies were born in. A. Africa B. Asia OC. South America OD. Europe

Answers

Answer:Europe

Explanation: Just took it

in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.

Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831

Answers

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

in python Simple geometry can compute the height of an object from the object's shadow length and shadow

Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the strings are the same size, return the string that occurs later according to the dictionary order. Use the function in a program that takes two string inputs, and outputs the string that is longer.

Answers

Answer:

Here you go :)

Explanation:

Change this to your liking:

def longer_string(s1, s2):

   if len(s1) > len(s2):

       return s1

   elif len(s1) < len(s2):

       return s2

   else:

       return s2

x = input("Enter string 1: ")

y = input("Enter string 2: ")

print(longer_string(x, y))

Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)

Answers

Answer:

D

Explanation:

Based on the information given, the correct option will be:

D. findMin(-1,1)

findMin(1,-1)

findMin(1,1)

It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.

In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.

In conclusion, the correct option is D.

Learn more coding on:

https://brainly.com/question/22654163

Fill in the blank

A is a reserved word and can only be used for its intended purpose within a python program

Answers

Answer:

Keywords

Explanation:

In computer language, a word that cannot be used as an identifier is called reserved word e.g function, name of a variable or label, all these are reserved from use, while in python keywords are called  reserved words, they have specific purpose and meaning. They cannot be used for anything else apart from their specific purposes. Python keywords are always available hence there is no need to import them into code.

Answer: keyword

Explanation:

Simply put, a Python keyword cannot be used outside of its intended purpose. It's reserved for it's intended purpose within a Python program. The person above wasn't necessarily wrong, they just made the term plural. Be sure to enter "keyword", as written.

I hope this helped!

Good luck <3

Drag each label to the correct location on the table.
Match the correct features to virtualization and cloud computing.

allows multiple operating systems
to run on a single machine
consolidates hardware devices into
a physical server
allows users to access data from anywhere
includes services such as platform
as a service and desktop as a service
uses a hypervisor that can be type 1 or type 2
allows users to run software applications
on web browsers without installing
the application locally

Answers

Match the correct features to virtualization and cloud computing is allows multiple operating systems to consolidates hardware and  uses a hypervisor to allows users to access

Divide the statement in virtualization and cloud computing ?

sing virtualization, different operating systems can operate on a single machine using a type 1 or type 2 hypervisor.

Users can access data from anywhere using cloud computing, which combines hardware devices into a physical server and offers services like platform as a service and desktop as a service. Users can execute software applications on web browsers without having to install them locally.

Know more about virtualization Visit:

brainly.com/question/31037702

#SPJ1

In what year was napier bone invented ​

Answers

The Napier's Bones is a manually-operated calculating device, invented by the Scottish mathematician John Napier in the early 17th century, around the year 1617.

What is Napier bone used for?

Napier's Bones, also known as Napier's rods, are used for multiplication, division, and square root calculations. The device consists of a set of rectangular rods or bones with each bone representing a single digit in the multiplication table.

By manipulating the rods, users can quickly perform calculations that would otherwise be time-consuming to complete by hand. The Napier bone is an early example of a calculating device and is considered a predecessor to modern mechanical calculators.

Learn more about Napier bone  at:

https://brainly.com/question/24242764

#SPJ1

which type of cisco access lists can restrict ip traffic entering or leaving a router's interface based only on the source ip address?

Answers

The type of cisco access lists that can restrict ip traffic entering or leaving a router's interface based only on the source ip address is Standard IP.

What is an IP address standard?

The IP addresses used by most residential networks begin with 192.168. Typically, the router's IP address will be something like 192.168.1.1 or 192.168.2.1.

Therefore, one can say that the degree of protection offered by an enclosure for electrical equipment with a rated voltage not exceeding 72.5 kV is categorized by the IP rating or IP code. This standard establishes different levels of sealing performance against "ingress," or entry of foreign objects like tools, dirt, and liquid water.

Learn more about cisco access  from

https://brainly.com/question/29489223
#SPJ1

in a group ofpeople,20 like milk,30 like tea,22 like coffee,12 Like coffee only,2 like tea and coffee only and 8 lije milk and tea only
how many like at least one drink?​

Answers

In the given group of people, a total of 58 individuals like at least one drink.

To determine the number of people who like at least one drink, we need to consider the different combinations mentioned in the given information.

First, we add the number of people who like each drink separately: 20 people like milk, 30 people like tea, and 22 people like coffee. Adding these values together, we get 20 + 30 + 22 = 72.

Next, we need to subtract the overlapping groups. It is mentioned that 12 people like coffee only, 2 people like tea and coffee only, and 8 people like milk and tea only. To find the overlap, we add these three values: 12 + 2 + 8 = 22.

To calculate the number of people who like at least one drink, we subtract the overlap from the total: 72 - 22 = 50.

Therefore, in the given group, 58 individuals like at least one drink. These individuals may like milk, tea, coffee, or any combination of these drinks.

For more questions on group

https://brainly.com/question/32857201

#SPJ8

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network. a. user- or server-specific b. port- or program-specific c. role- or function-specific d. file or folder-specific

Answers

Answer:

c. role- or function-specific.

Explanation:

The Security Configuration Wizard was  firstly used by Microsoft in its development of the Windows Server 2003 Service Pack 1. It provides guidance to network security administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.

Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.

After checking the Group policy by an administrator, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after testing it in a well secured environment.

Basically, the Microsoft Security Configuration Wizard (SCW) typically help administrators in running the following;

1. Role-Based Service Configuration.

2. Registry settings.

3. Network and Firewall Security settings.

4. Auditing Policy settings.

____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist. a. RIPv1 b. Classless c. Classful d. Class-oriented

Answers

Classful  routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

What is classful routing protocols?

Older networks are the only ones that use the outdated classful routing protocols RIPv1 and IGRP.

                      Both RIPv2 and EIGRP are classless routing protocols that have developed from these earlier ones. Link-state routing protocols are inherently non-classical.

What defines classy and unclassy behavior?

IP addresses are divided into five groups using the classful addressing approach when they are assigned. In order to prevent the depletion of IP addresses, classless addressing is a method of IP address allocation that will eventually replace classful addressing.

                        Problems involving routing between classfull and classless systems are resolved using static routes. You can't, sorry. In accordance with the wider routing context, static routes might be either.

Learn more about Classful  routing protocols

brainly.com/question/28446917

#SPJ4

Test if a date is a fee day for a subscription based on the day of the month (the subscription has fees on the 16th and the 29th every month).

Sample Run 1
Enter today's day numerically: 17
Sorry, not a fee day.
Sample Run 2
Enter today's day numerically: 29
It's a fee day!

Answers

The program to test the date will be:

def test_fee_day(day):

   if(day!=16 and day !=29):

       #if else loop to check if its a fee day or not

       print("Sorry, not a fee day.")

   else:

       print("It's a fee day!")

#main driver method

if __name__=='__main__':  

   while(True):

       #get user input

       day=int(input("Enter today's day numerically: "))

       if(day>0 and day<=31):

           #call the function

           test_fee_day(day)

           break

       else:

           print("Invalid Input!")

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. A program is a set of instructions that a computer follows in order to complete a specific task.

In this case, the program is to test if a date is a fee day for a subscription based on the day of the month.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

write a program that first defines three string objects called firstName, middleName, and lastName which contains your own first, middle and last name separately. If you do not have middle name, then make up one. Then try to generate a new user name for you by using your first letter of your first name(captilized), first letter of you middle name (Captilized), plus all letters in your last name, add a random number between (1 to 100) to the your new user name. Here is an exampl: Name: John blake adams then the user name generated by your program coulde be: JBadams23

Answers

Answer:

Written in Python

import random

firstName = "Charles"

lastName = "Dawson"

middleName = "Rutherford"

pwd = firstName[0] + lastName[0]+middleName+str(random.randint(1,101))

print(pwd)

Explanation:

This line imports random library into the program

import random

The next three lines initializes the name of the user

firstName = "Charles"

lastName = "Dawson"

middleName = "Rutherford"

This line generates the password

pwd = firstName[0] + lastName[0]+middleName+str(random.randint(1,101))

This line prints the generated password

print(pwd)

Duolingo is a widely used foreign language app, with 300 million users in 2018. While there is a free version of the app, a premium Duolingo subscription eliminates advertisements during language practice and offers new quizzes with the ability to save lessons for offline use. a. Identify each hurdle for users of the free version of the app.

Answers

The hurdle for users of the free version of the app is the subscription fee paid for the premium version of the app.

A lot of people do not pay and cannot afford the premium fee. Some people are not very sure at the initial stage of using the app.

People sometimes want use app for free for some time.

A Subscription is simply known to be paid so as to access content from an app or service for a set out period of time. For example,  subscription to Netflix on a monthly basis.

Learn more from

https://brainly.com/question/15301858

Change the screen resolution so you can view more information on your screen. Use the resolution that enables you to fit the most information on the screen while still being able to read the display.

Use the space below to indicate your screen resolution and to describe the steps you used to do this.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

My laptop's current screen resolution is (1366 by 768 recommended). When you change your screen resolution, your pc automatically suggests the recommended screen resolution that helps you to view more information on your screen and enable you to fit the most information on the screen while still being able to read the display.

To change the screen resolution, you need to go through from the following steps:

Right-click on empty space of desktop.As you right-click, a list of options will open, select "display setting" among themA new setting window will get open, at the left of the window, among given option, click on the first option i.e "display"The content of the display setting gets open in the right area of the window. scroll down and find the "Scale and Layout"under scale and layout, you can change your screen resolution while selecting the different screen resolution. However, it is good to select the recommended screen resolution based on your screen size.

Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?

Answers

A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.

What is a dictionary attack?

A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.

The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.

To know more about the dictionary attack, visit: https://brainly.com/question/14313052

#SPJ1

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

Describe the importance of the human interaction in the computing system your class created

Answers

Answer:

The goal of HCI is to improve the interaction between users and computers by making computers more user-friendly and receptive to the user's needs

Explanation:

Human-computer interaction (HCI) is a multidisciplinary subject that focuses on computer design and user experience. It brings together expertise from computer science, cognitive psychology, behavioural science, and design to understand and facilitate better interactions between users and machines.

Human interaction is crucial in the computing system created by your class because it determines the system's usability and effectiveness in meeting user needs and goals.

What is a computing system?

A computing system refers to a collection of hardware and software components that work together to process and manage data.

What is a class?

In programming, a class is a blueprint for creating objects that define a set of properties and methods.

To know more about hardware and software, visit:

https://brainly.com/question/15232088

#SPJ1

Order the steps to successfully create a data table.
Answer: Write the formula used to create table values
Select the range
Select the Data tab and What-If Analysis
Select Data Table
Select the values for row/column input.

Answers

Here are the steps to successfully create a data table:

Select the range.Select the Data tab and What-If Analysis.Select Data Table.Write the formula used to create table values.Select the values for row/column input.

How to create the data table

For achieving the desired outcome of generating a data table, it is suggested to adhere to the following measures:

Choose the cells group in which you intend to generate the data table. Include both the cells for input and presentation of results in the specified range.

Provide the equation that you intend to apply for computing the figures enlisted in the data chart. This equation must refer to the designated cells and yield the intended outcome.

Access the What-If Analysis feature by navigating to the Data tab within your spreadsheet program. To access the menu, simply click on it.

Choose the Data Table option from the What-If Analysis menu. This action will trigger the appearance of a dialog box or prompt that will require you to input the required details.

Determine the desired input values for either the row or the column in the data table dialogue box. The table's outcomes will be computed based on these values.

By adhering to these guidelines, you can produce a chart of data that exhibits computed figures derived from various input situations, aiding you in scrutinizing and comprehending the ramifications of different factors on your data.

Read more about data tables here:

https://brainly.com/question/32534586

#SPJ1

TRUE/FALSE. according to stuart hall's encoding/decoding model, the ''real meaning'' of any popular culture text is simply located in either the senders or the receivers. group starts

Answers

According to Stuart hall's encoding/decoding model, the ''real meaning'' of any popular culture text is simply located in either the senders or the receivers is true.

What is the encoding and decoding hypothesis of Stuart Hall?

According to Stuart Hall, producers encode (create/insert) a range of signals into media texts, which consumers subsequently decode (understand). What we see is therefore just a "re-presentation" of what the makers want us to see.

So, each stage is "quite autonomous" from the others in his eyes. This indicates that while a message's coding does affect how it is received, this control is not obvious because each stage has unique constraints and opportunities.

Therefore, Hall argued that audience members can actively participate in message decoding because they draw on their own social contexts and have the power to alter messages through group action. Thus, encoding and decoding refer to the translation required to make a message understandable.

Learn more about Stuart hall's encoding from

https://brainly.com/question/28115577
#SPJ1

In "PUBATTLEGROUNDS” what is the name of the Military Base island?

Answers

Answer:

Erangel

Explanation:

Answer:

Erangel

Explanation:

The Military Base is located on the main map known as Erangel. Erangel is the original map in the game and features various landmarks and areas, including the Military Base.

The Military Base is a high-risk area with a significant amount of loot, making it an attractive drop location for players looking for strong weapons and equipment. It is situated on the southern coast of Erangel and is known for its large buildings, warehouses, and military-themed structures.

The Military Base is a popular destination for intense early-game fights due to its high loot density and potential for player encounters.

Hope this helps!

Draw a data flow diagram that indicates the condition and factors that must be satisfied before a customer request for goods can be granted from a factory

Answers

Skies in here and the beach and

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

PLEASE HELP WILL MARK BRAINLEST!!


What are some inadvertent effects of technology?

PLEASE HELP WILL MARK BRAINLEST!!What are some inadvertent effects of technology?

Answers

Answer:

Industrialization increased our standard of living, but has led to much pollution and arguably, even some social ills. The benefits brought by the internet are too many to mention, yet viral misinformation, vast erosion of privacy, and the diminishing patience of society as a whole were all unintended consequences.

Answer:

It has also increased idle time of workers

It is also true that we are now spending more time visiting social networking sites, rather than our friends and family

Explanation:

Ethics in Al can contribute toward social progress and boost positive changes in society. Which aspect should be removed to achieve this change society ?
A. safety
B. management
C. bias
D. law

Answers

Answer: Hayaa~!

The answer is: . c. bias

Is known when someone purposefully biased an answer towards what they belive or think, this can be avoided by not asking them about topics that we firmly believe they are biased.

Explanation: I took the test

Hope this Helps

-Aaden<3

Other Questions
Question 5: Find the area of the following rectangle. Hint: multiply the binomials (x-3)(x+6). * You are making a blanket with a fringe border of equal width on eachside. (Section 7.1 and Section 7.2) In which position is it most likely that the spring has lost its elastic potential energy?zwgooozOwwOz A food intolerance is characterized by the development of unpleasant symptoms that consistently occur after the consumption of certain foods. True or false? Thanks.Required information Sunrise Accounting provides basic tax services and "rent-a-controller" accounting services. Sunrise has identified three activity pools, the related costs per pool, the cost drive Her background as a counselor was an _______ in her new role as human supervisor, which sometimes involved _____conflicts between employees THIS IS NO JOKE HURRY Key Vocabulary:Input - the information computers get from users, devices, or other computersOutput - the information computers give to users, devices, or other computersPet ChooserTry out the pet chooser app a few times to see how it works. What are its inputs and outputs?InputsOutputs what major physical change was necessary to allow multicellular life-forms to appear and flourish about 635 million years ago? A professional golfer, 10 years from planned retirement, plans to invest a fixed amount of e20,000 a month for 5 years to save an amount to be used to lease a private jet over the final 5 years of their career. (i) How much will they have at the end of the initial 5 year period if they earn 10% interest (compounded monthly) on their deposits from a crowd lending site? what monthly lease payment can the golfer afford over the 5-year lease period assuming constant withdrawals from the total in (i) with the remainder earning interest at 11%, compounded monthly? Jessica is a 28 year-old married female. She has a very demanding, high stress job as a second year medical resident in a large hospital. Jessica has always been a high achiever. She graduated with top honors in both college and medical school. She has very high standards for herself and can be very self-critical when she fails to meet them. Lately, she has struggled with significant feelings of worthlessness and shame due to her inability to perform as well as she always has in the past. For the past few weeks, Jessica has felt unusually fatigued and found it increasingly difficult to concentrate at work. Her coworkers have noticed that she is often irritable and withdrawn, which is quite different from her typically upbeat and friendly disposition. She has called in sick on several occasions, which is completely unlike her. On those days, she stays in bed all day, watching TV or sleeping. At home, Jessicas husband has noticed changes as well. She has shown little interest in sex and has had difficulties falling asleep at night. Her insomnia has been keeping him awake as she tosses and turns for an hour or two after they go to bed. He has overheard her having frequent tearful phone conversations with her closest friend, which have him worried. When he tries to get her to open up about what is bothering her, she pushes him away with an abrupt everythings fine. Although she has not ever considered sui-slide, Jessica has found herself increasingly dissatisfied with her life. She has been having frequent thoughts of wishing she were dead. She gets frustrated with herself because she feels like she has every reason to be happy, yet cant seem to shake the sense of doom and gloom that has been clouding each day as of late. What is Jessica's diagnosis? Explain your answer. In order to ensure that funding for standards setting does not result in politicization of standard setting, the IASB has committed to four principles related to funding. Which of the following is not one of these principles? Select one: a. Funding should be broad-based. b. Funding should be compelling. c. Funding should be open-ended. d. Funding should not be country-specific true or false along with natural selection,genetic drift has profoundly affected the evolution of human traits throughout our species history Given that f(x)=x^2 + x and g(x) = 3x + 1, find the value f(g(4)) after a bomb blast in a city, why would the federal government send the medical reserve corps (mrc) to the site? Describe your preferred learning strategies. compare your current preferred learning strategies to the identified strategies for your preferred learning style. 1. a bank offers a cd that pays a simple interest rate of 7.5%. how much money in dollars must you put in this cd in dollars now in order to have $5,000 in 3 years? What did Andrew Carnegie's father do for a living? Which are the prepositions in the sentence? Most of them had spent many hours working on their research prior to the due date.A. working, due dateB. of, on, and prior toC. Most, their Antwan determines the distance between the points 7 and 2 on a numberline. Maggie determines the difference between the numbers 7 and 2. How are Antwans and Maggies solutions related?Maggies solution is the absolute value of Antwans solution.Antwans solution is the absolute value of Maggies solution.Both solutions are greater than either of the two numbers in the problem.Both solutions are less than either of the two numbers in the problem.