Troy, an aspiring screenwriter, aspires to work with a famous director known for his philanthropic work. Troy gets an appointment with the director to present his idea for a video project. The director asks Troy to send him a synopsis of the video project. What should Troy include in the synopsis?

Answers

Answer 1

Troy should include a short overview of the story that his video will tell and why he wants to tell it (or what the video will be about and why). It should also include the target audience, and where the video will be published.

Answer 2

Answer: a brief description of the story

i hope i was able to answer your question

Explanation: passed the test with this answer

#PlatoUser

#PlatoStudentAnswers


Related Questions

to copy the content of a letter in another letter we can dash features


ans) mobile​

Answers

Answer:

Copy/Cut

Explanation:

Copy option is used to copy the text without removing it from there. To copy any text just hold the text for 2-3 seconds, then you can able to see a box(first image). From there select Copy option. Now text has been copied.

Cut option is also used to copy any text but, it will remove the text from where we have cut it. To Cut any text hold the text which you want to cut. Then, you will see a box(first image), from the box select Cut option. After selecting Cut option the text will get copied in the clipboard and the text you have cut will be removed from there.

Now, to Paste the text you have copied/cut, go to any text field and hold there for 2-3 seconds and a box(Second image) will appear. Now, select Paste option and text will get paste there.

to copy the content of a letter in another letter we can dash featuresans) mobile
to copy the content of a letter in another letter we can dash featuresans) mobile

I need help with this question.

I need help with this question.

Answers

Explanation:

Whilst it is impractical to convert all the numbers to binary, I will explain how binary works to you.

Binary is usually composed of eight bits, each representing a different number.

0000 0000

Each 0 represents a column in an 8-bit binary number. The far-right column starts at 1 and doubles each time you change to the left column.

128 64 32 16 8 4 2 1

 0    0   0   0 0 0 0 0

A number 1 means that there is a number in that column whereas a 0 means there isn't, like the normal "0 means off and 1 means on" system. When there is a 1 in every column:

1 1 1 1 1 1 1 1

There can be a maximum value of 255.

For example, the number 79 would be represented in binary as:

128 64 32 16 8 4 2 1

 0    1     0   0  1  1 1  1

64 + 8 + 4 + 2 + 1 = 79

Hope this helps!

With respect to IOT security, what term is used to describe the digital and physical vulnerabilities of the IOT hardware and software environment?

Question 4 options:

Traffic Congestion

Device Manipulation

Attack Surface

Environmental Monitoring

Answers

Answer:

Attack Surface

Explanation:

In the context of IOT security, the attack surface refers to the sum total of all the potential vulnerabilities in an IOT system that could be exploited by attackers. This includes both the digital vulnerabilities, such as software bugs and insecure network protocols, and the physical vulnerabilities, such as weak physical security or easily accessible hardware components. Understanding and reducing the attack surface is an important part of securing IOT systems.

Queries are a very useful object in a database, please explain why.

Answers

Answer:

they tell the producer what to do to make their website better

Explanation:

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

How do you make the text bold?
Select one:
a. font-weight:bold;
b. font:bold;
c. style:bold;

Answers

Answer:

The correct answer is A. font-weight:bold;

(a) Explain the problems of adverse selection and moral hazard caused by asymmetric information. How can financial intermediaries alleviate those problems? (b) Explain the Diamond model of delegated monitoring.

Answers

Asymmetric information in financial transactions can lead to adverse selection and moral hazard. Adverse selection arises when one party holds more information, leading to unfavorable outcomes.

What is the moral hazard?

Adverse selection is when higher-risk parties are more likely to engage in financial transactions than lower-risk parties. More info equals advantage in risk profiles. In insurance, high-risk individuals often buy policies, causing adverse selection.

Financial intermediaries help with asymmetric information issues. Employing mechanisms such as information gathering and screening, financial intermediaries can assess borrowers' creditworthiness and risk profile.

Learn more about moral hazard  from

https://brainly.com/question/15084670

#SPJ4

Objectives: Use arrays/vectors, files, searching arrays, manipulating array contents, characters, and strings. You are asked to implement a car ordering system for Bobcats Auto Dealership. This dealership is brand new and only sells one brand of cars with three different models. However, a buyer can add options if they choose.

Answers

To implement the car ordering system for Bobcats Auto Dealership, we can use arrays/vectors to store the car models and their respective options. We can also use strings to store the buyer's name and other details.


The system can have a file that contains the available car models and their options, which can be read and stored in arrays/vectors. When a buyer places an order, their details can be stored in a separate file. To search for available car models and options, we can use the searching arrays feature. We can also manipulate the array contents to remove or add options based on the buyer's preferences. To handle characters and strings, we can use string functions to validate input from the user and ensure that it is in the correct format.


Overall, the implementation of arrays/vectors, files, searching arrays, manipulating array contents, characters, and strings can help in creating an efficient and user-friendly car ordering system for Bobcats Auto Dealership.

To know more about Arrays/Vectors, click here:

https://brainly.com/question/13014068

#SPJ11

you must use a postman collection to create a custom connector. which two components are required for any requests added to the collection? each correct answer presents a part of the solution.

Answers

When using a postman collection to create a custom connector, the two components that are required for any requests added to the collection are:

HTTP method (Option A); andAuthorization header (Option C)What is a postman collection?

Postman Collections are a collection of previously stored requests. Every Postman request you send is saved in the sidebar's History tab.

Reusing requests through the history section is handy on a small scale. Finding a certain request in your Postman history might become time-consuming as your use rises.

You can organize your workspace by grouping Postman requests and examples into collections, interact with peers, develop API documentation and API tests, and automate request runs. To view a list of collections in a workspace, select Collections from the sidebar.

Learn more about Connectors:
https://brainly.com/question/13398645
#SPJ1

Full Question:

You must use a Postman collection to create a custom connector.

Which two components are required for any requests added to the collection? Each correct answer presents a part of the solution.

Select all answers that apply.

A. HTTP method

B. Request URL

C. Authorization header

D. Content type

4.5 Code Practice

Write a loop that inputs words until the user enters STOP.

After each input, the program should number each entry and print in this format:

#1: You entered______

Can someone please help me with this because I so stuck

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This program is written in C++.

                                                                         

#include <iostream>

using namespace std;

int main()

{

   

   string word;// variable for taking user input

   int cond;// to set condition true if user preses the stop and exit from loop

   

   cout<<"Enter word: \n";

   cin>>word;

   do// start while loop

   {

       

       

       if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit

       {

       cond=0;

       

       }

       else//otherwise loop continue

       {

           cout<<" You Entered "+ word +"\n";

           cout<<"Enter word: \n";

           cin>>word;

           cond=1;

       }

   }  

   while(cond == 1);// if user don't enter word "stop" loop run continuesly.  

   cout<<"Program exit";

   

   return 0;

}

Answer:

word = input("Please enter the next word: ")

count = 0

while word != "DONE":

      count += 1

      print("#{}: You entered the word {}".format(count, word))

      word = input("Please enter the next word: ")

print("A total of " + str(count) + " words were entered.")

Explanation:

Assuming this is python, this should help!

For a Python program that reads every third integer in a list, which arguments of the range function should you specify?

A start, a stop, and a step argument
A start and a stop argument
No arguments
One stop argument

Answers

Answer:

A start, a stop, and a step argument

Explanation:

the range function takes three arguments: a start, a stop, and a step.

HELP!!!
To see the shortcuts on the ribbon in MS Word, hold down the _____ keys at the same time. A) CTRL & X B) Shift & Alt C) Shift & Delete D) CTRL & ALT

Answers

To see the shortcuts on the ribbon in MS Word, hold down the  D) CTRL & ALT keys at the same time.

How can I display keyboard shortcuts in Word?

When you hit Alt, tabs or Quick Access buttons on the ribbon display letters or KeyTips. To open ribbon tabs, use the keyboard shortcuts shown in this table. There may be more KeyTips visible depending on the tab you choose.

Therefore, Control+Alt+Delete is seen as the combination of the Ctrl key, the Alt key, and the Del key that a user can press simultaneously on a personal computer running the Microsoft Windows operating system to end an application task or restart the operating system.


Learn more about shortcuts  keys from

https://brainly.com/question/28223521
#SPJ1

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

Answers

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. The form of computing that the project will be using is grid computing.

In the field of computers, when multiple computing systems are used so that a single task can be achieved, then such a system is referred to as grid computing.

The main purpose of grip computing is to work on a joint task where each computer system is specialized in one way or the other in order to help in the joint or single goal. Hence, the correct option is grid computing.

Other options, such as mobile computing, are not correct as mobile computing is a wireless communication for the transmission of data.

Although a part of your question is missing, you might be referring to this question:

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

A. mobile computing

B. grid computing

C. cloud computing

D. green computing

To learn more about grid computing, click here:

https://brainly.com/question/14511163

#SPJ4

The registers are the communication channels inside the computer.( true or false)

Answers

False
Registers are storage, not channels

You should see the following code in your programming environment:

import simplegui

def draw_handler(canvas):
# your code goes here

frame = simplegui.create_frame('Testing', 600, 600)
frame.set_canvas_background("Black")
frame.set_draw_handler(draw_handler)
frame.start()
Use the code above to write a program that, when run, draws 1000 points at random locations on a frame as it runs. For an added challenge, have the 1000 points be randomly red, green, or blue.

Hint: The colors can be represented by

Red: “RGB(255, 0, 0)”

Green: “RGB(0, 255, 0)”

Blue: “RGB(0, 0, 255)”

Answers

I'll answer this question using Python.Task automation, data analysis, and data visualization are all common uses for Python in the creation of websites and software.

What is the main use of Python?Task automation, data analysis, and data visualization are all common uses for Python in the creation of websites and software.Many non-programmers, including accountants and scientists, have started using Python because it's relatively simple to learn and useful for a wide range of daily tasks, including managing finances.Among the simplest programming languages to learn for beginners, Python is frequently cited.Python is a good place to start if you want to learn how to program.

Aside from that, it's one of the most popular.

I'll answer this question using Python.

print("  ^ ^")

print("( o o )")

print("   v")

To answer this question, you have to follow the hint as it is in the question

The hint says you should copy each line into a print statement and that's exactly what I did when answering this question;

In other words;

^ ^  becomes print("  ^ ^")

( o o )   becomes print("( o o )")

v becomes print("   v")

To learn more about Python refer

https://brainly.com/question/17297718

#SPJ1

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.

Answers

Answer:

A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

Explanation:

Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.

What is a personal data?

Answers

Answer:

What is personal data

Explanation:

Personal data, also known as personal information or personally identifiable information, is any information related to an identifiable person.

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

What is the purpose of the 300 Log?

Answers

Answer:

The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.

Explanation: brainliest plzzzz!

Drag the correct label to the appropriate bin to identify the type of cartilage that forms each body structure. ResetHelp Cartilage in external ear Selected Hyaline Cartilage Elastic Cartilage Fibrocartilage Request Answer Provide Feedback

Answers

Each bodily cartilage is made up of one of the following types of cartilage:Cartilage fibrosis.The ECM has a substantial collagen bundle.

Explain each body cartilage ?Each bodily cartilage is made up of one of the following types of cartilage:Cartilage fibrosis.The ECM has a substantial collagen bundle.The perichondrium is absent.In the articular discs are where it is found.It supports and connects structures, which is its job.It is the cartilage that is stronger.Flexible cartilage.ECM is a network of fibers that resembles a thread.It is found in the ear and nose tips.It works is to elasticity and strengthen and maintains shape. .Hyaline cartilage.It has chondrocytes in the lacunae and perichondrium covers the outer layer.Flexibility, support for the weakest, and stress absorption are its functions.It can be found in the nose tip and ends of bones in the fetal skeleton.

To learn more about body cartilage refer

https://brainly.com/question/10600094

#SPJ1

1. Show that a chessboard with 7 rows and 12 columns can be covered by non-overlapping
dominoes.
2. Show that given any rational number x, there exists an integer y such that x 2y is an integer

Answers

A chessboard with 7 rows and 12 columns can be covered by non-overlapping dominoes.

For any rational number x, there exists an integer y such that x^(2y) is an integer.

To prove that a chessboard with 7 rows and 12 columns can be covered by non-overlapping dominoes, we can use the fact that a domino covers exactly 2 squares. Since the chessboard has 7 rows and 12 columns, it has a total of 84 squares. Each domino covers 2 squares, so we need 42 dominoes to cover all the squares on the chessboard. Since 42 is an even number and we have an even number of squares, we can arrange the dominoes in a way that they cover the entire chessboard without overlapping.

To prove that for any rational number x, there exists an integer y such that x^(2y) is an integer, we can consider the properties of rational and integer numbers. A rational number can be written as p/q, where p and q are integers and q is not zero. We can express x as p/q. Now, if we take y to be the power of 2 such that q is divisible by 2^y, then x^(2y) will be an integer. This is because raising p/q to the power of 2y will result in p^(2y)/q^(2y), and since q is divisible by 2^y, q^(2y) will be an integer. Therefore, x^(2y) will also be an integer.

Learn more about non-overlapping here : brainly.com/question/29494695

#SPJ11

answer the queston...........​

answer the queston...........

Answers

The answer would be
1.excel
2.formatting
3.home
4.cell

Hope this helps

Have a great day/night

Feel free to ask any questions

Answer:

i am not sure what grade work this is

Explanation:

Assume, Dan's utility function is u(C, F) = ln(C) + 3ln(F). Is the utility function concave in C? What does that mean? Does the utility function represent convex preference? What does that mean? Find the optimal demand. Is F a normal good? Is C a perfect complement of F?

Answers

The utility function u(C, F) = ln(C) + 3ln(F) is concave in C, which means that the marginal utility of consumption (C) decreases as the level of consumption increases. The utility function does not represent convex preference. The optimal demands are C* = 1 and F * = 1/3. F is a normal good. C is not a perfect complement.

1. Concavity implies diminishing marginal utility, indicating that each additional unit of consumption provides less additional satisfaction or happiness compared to previous units.

2. Regarding convex preference, the utility function does not represent convex preference because the utility function itself is concave in C. Convex preference would imply that the individual has increasing marginal utility of consumption and would prefer a more balanced distribution of resources.

3. To find the optimal demand, we need to maximize the utility function with respect to C and F. Taking partial derivatives with respect to C and F, we get:

∂u/∂C = 1/C

∂u/∂F = 3/F

4. Setting these derivatives equal to zero, we find that the optimal demands are C* = 1 and F * = 1/3.

5. Based on the utility function, F is a normal good because as F increases, the utility function also increases. However, C is not a perfect complement of F because the utility function does not exhibit a fixed ratio between C and F. A perfect complement would have a specific ratio of consumption that maximizes utility, but in this case, the optimal demands for C and F are independent of each other.

learn more about complement here: brainly.com/question/31828032

#SPJ11

_____ allows a function or operator to perform different tasks depending on the types of the arguments or operands. Group of answer choices Static typing Type declaration Polymorphism Prototyping

Answers

Polymorphism allows a function or operator to perform different tasks depending on the types of the arguments or operands.

What does polymorphism helps?

Polymorphism is known to be that which helps its users to be able to carry out one action in a lot of ways that is many forms.

Note that Polymorphism allows a function or operator to perform different tasks depending on the types of the arguments or operands and thus makes one to work faster.

Learn more about Polymorphism from

https://brainly.com/question/20317264

#SJ1

Match the items with their respective descriptions.
defining focus
visual balance
color harmonies
screen design principles
helps make visually attractive and
functional web page
helps with color combinations in a
>
web page
helps scan for Information quickly in a
web page
>
helps provide visually pleasing screen
arrangement in a web page
>

Match the items with their respective descriptions.defining focusvisual balancecolor harmoniesscreen

Answers

Defining focus helps scan for Information quickly in a web page.

Visual balance helps make visually attractive and functional web pageColor harmonies helps with color combinations in a  web pageScreen design principles helps provide visually pleasing screenarrangement in a web page.

What is Defining focus?

This is known to be a form of  good screen design that can help on to highlight important areas to which one can focus on when looking for information.

Note that this form of guidance helps a person to scan for information very fast . Without having a clear focal points, you have to work a lot on the the entire web page.

Learn more about  Defining focus from

https://brainly.com/question/7284179

What is the something in the computer can be in the form of a tables, reports and graphs etc.​

Answers

Microsoft is the correct answer right

The nurse percusses the lungs of a client with pneumonia. what percussion note would the nurse expect to document?

Answers

The nurse would expect to document dullness or flatness as the percussion note in pneumonia.

When performing percussion on the lungs of a client with pneumonia, the nurse would expect to document dullness or flatness as the percussion note. These percussion notes indicate a consolidation of lung tissue or the presence of fluid in the lungs. Pneumonia causes inflammation and accumulation of exudate, leading to a loss of air-filled spaces and a denser sound upon percussion.

When percussing the lungs of a client with pneumonia, the nurse would expect to document dullness or flatness as the percussion note. Dullness or flatness is typically heard over areas of consolidation or fluid accumulation in the lungs, which can occur in pneumonia due to the presence of inflammatory exudate or consolidation of lung tissue.

Dullness is characterized by a soft and muffled sound, while flatness refers to a completely dull and high-pitched sound. These findings are significant in diagnosing and monitoring pneumonia, helping healthcare providers assess the extent and location of lung involvement. Prompt recognition of abnormal percussion notes assists in determining appropriate treatment strategies for the client.

Learn more about pneumonia

brainly.com/question/32111223

#SPJ11

______ is a form of database processing that supports top-down, query-driven data analysis.
Select one:
a. Database normalization
b. Online analytical processing (OLAP)
c. Data warehousing
d. Data mining

Answers

The answer is b. Online analytical processing (OLAP).  OLAP is a database processing technique that enables multidimensional, query-driven data analysis.

It supports a top-down approach, where users start with an overall view of the data and drill down to the details. OLAP databases are optimized for complex analytical queries and provide fast, interactive access to large amounts of data.

OLAP works by organizing data into hierarchies and dimensions that reflect the business's structure and the relationships between data elements. Users can navigate through these hierarchies to analyze data from different perspectives and levels of granularity. OLAP also allows users to create customized reports, perform "what-if" analysis, and visualize data using charts and graphs.

OLAP is widely used in business intelligence and decision-making applications, such as financial analysis, sales forecasting, and marketing research. Its ability to provide flexible, ad-hoc analysis and reporting makes it a valuable tool for organizations that need to make data-driven decisions.

Learn more about Online analytical processing here:

https://brainly.com/question/30175494

#SPJ11

imagine that you wanted to write a program that asks the user to enter in 5 grade values. the user may or may not enter valid grades, and you want to ensure that you obtain 5 valid values from the user. which nested loop structure would you use?

Answers

In a computer program, loops are used to perform repetitive operations until a condition is met.

The nested loop structure to use in this case is: A "while" loop inside of a "for" loop

The outer loop

First, you must iterate through each student.

This can be done using a for loop or a while loop.

However, it is faster to implement this kind of iteration on a for loop, than a while loop

So, the algorithm of the outer loop would look like the following:

for student = 1 to 5 step 1

The inner loop

Next, you must get input for the 5 grades for each student

After getting input for the grade of each student, a loop would be used to test if the input is valid.

The loop would be repeated until the user enters a valid input.

This can only be done using a while loop.

So, the algorithm of the inner loop would look like the following:

input grade

while grade is invalid:

    input grade

Hence, the nested loop structure to use is:

A "while" loop inside of a "for" loop

Read more about loops at:

https://brainly.com/question/11608024

Please help w/ Java, ASAP!!!!

Please help w/ Java, ASAP!!!!
Please help w/ Java, ASAP!!!!

Answers

Answer:

B

Explanation:

When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".

   int [ ] nums = new int [count];

Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:

  nums[ j ] = val;

That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.

   int j = 0;

   for (int val: array)

   {

     copyArray[j] = val;

    j++;

   }

Third, you return the copy version of the array.

return nums;

Source:

I am currently a second year Java student.

Other Questions
For summer to occur in the Northern Hemisphere, which scenario is correct? a. the south pole points towards b. the Sun the north and south poles receive equal sunlight c. the north pole points towards the Sun d. none of the above e. the north pole points away from the Sun Assume that Switzerland's population grows at a rate of 0.24 percent a year and that the 1988 population was 6.7 million.(a) Write an expression for the population as a function of time in years. (Let t=0 in 1988.)P= (b) How long will it take for the population to double from 1988 ? (c) If there is a net immigration of 10,000 people a year into Switzerland, write an expression for the population in year t.P= A regular hexagon is truncated to form a regular dodecagon (12-gon) by removing identical isosceles triangles from its six corners. What percent of the area of the original hexagon was removed Carson has 48 apples to divide equally among 8 friends. One of the friends, Ken, gives 2 of his apples away.The equation shown can be used to find a, the number of apples Ken has left after giving some away.48 82 aHow many apples does Ken have left after giving some away?aapples $7000 at 4% for 2 years. what is the probability that the request is received by this server within the first 5 minutes (300 seconds) after the hour? Haven is to sanctuary as____A) amiss is to awryB) dominant is to servile C) fallacy is to truthD) gullible is to skeptical question 22. Provide answers for the blanks in the paragraph below: carry blood away from the heart, while the heart. Capillaries are the site for the diffusion of carry blood into capillary beds are called whi A scientist who studies fossils is known as a paleontologist. If a paleontologist finds a fossil of animal remains with 88.5% as much Carbon-14 as the animal would have contained if the animal were alive today, how long ago did the animal live? Use the formula for Carbon-14: y=ae (exponent) -0.00012t Find the slope of (4,-11) and (7,13) Write a paragraph describing an alien using assonance as your main device. Please have a proper answer. Assignment 3.7. Wills trusts, and estate administration Natalie Robinson dies without a will. The tollowing relatives survive her: a husband. Len: an adopted daughter. Lana: a toster son. I homas: two sisters. Faith and Nadine: a brother. I hor: hermother, Simone; her father, Ernie; her mother-in-law, Isla; Len's sister, Cynthia; an aunt, Rose; an uncle, Oscar; two nephews, Donnie and Kevin, sons of her deceased brother, William; aniece, Diane, daughter of her deceased sister, Sharon; a grandson, David, son of her deceased daughter, Denise; a granddaughter, Luella, daughter of her deceased daughter, Nancy; andManny, a husband by a prior marriage whom she divorced.Who is the intestate:Who is the administrator or administratriX3. Name the laws that govern the passage of the decedent's estate4. Hind and cite the state statute that would determine the nassage of Natalie's estate in vour stateName the decedent S lineal relatives who are ascendants and descendantsb. Name the colateras related to the decedentTaList al the potential successors (heirs )of the decedent8. Name the relationship that entitles the persons in Ouestion 7 to possibly share in the decedent's estate PLEASE HELP!!Select the correct answer from the drop-down menu. Fill in the missing number in the equation. Help brainiest answer to whoever is correct How to Calculate the Discount Rate Implicit in the Lease? 30 points and Brainliest!Given: LFP, LF = FP LK FP , PD LF Prove: LK = PDPlease provide proof and the rule (AAA, ASA, etc.) as well. Peggy was mixing a fertilizer solution of Calcium nitrate. She uses 54. 0 g of Ca(NO3)2 and 300 ml of water. What is the molarity?Show all conversionsShow all work (watch labels) 12/14 36/40 in simplest form Solve for x5.2x + 303x + 20X Whats the correct answer for this?