What command could you use to list the files in your fileAsst directory, using an absolute path to the fileAsst directory as part of your command

Answers

Answer 1

To list the files in the "fileAsst" directory using an absolute path, you can use the "ls" command in Unix-like operating systems (such as Linux or macOS) or the "dir" command in Windows. Here's an example of how you can do it:

Unix/Linux/macOS:

ls /path/to/fileAsst

Windows:

dir C:\path\to\fileAs

Replace "/path/to/fileAsst" with the actual absolute path to the "fileAsst" directory on your system. Make sure to use the correct path syntax according to your operating system.

To learn more about  command  click on the link below:

brainly.com/question/7448016

#SPJ11


Related Questions

A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?

Answers

In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.

What is sniffing?

In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.

A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.

Thus, the correct option is a. Sniffing.

To learn more about sniffing, refer to the below link:

https://brainly.com/question/17100775

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. Sniffing

b. Spoofing

c. Hijacking

d. Impersonation

In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?
A) 1
B) 47
C) 3497
D) the default r

Answers

Option A is correct. A 32-bit IPv4 address is used. An IP address is displayed as d.d.d.d.d, where d is a decimal number, which represents 4 bytes (0 - 255).

Lower order bits serve as the host identifier while high order bits serve as the network identifier. A routing table is a collection of guidelines that determines the direction that data packets traveling across an Internet Protocol (IP) network will take. It is frequently displayed in table format. Routing tables are used by all IP-capable devices, such as switches and routers. A Source Address and a Destination Address are both included in every IP datagram. A specific IP datagram is routed to its destination using the Destination Address.

Learn more about network here-

https://brainly.com/question/13992507

#SPJ4

_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning

Answers

Answer: it’s A, social media

Explanation:

Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.

What is Social Media?

Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.

Social media includes the technologies used to support virtual communities and the sharing of content.

Hence, the correct option is 1.

Learn more about Social Media:

https://brainly.com/question/18958181

#SPJ2

Which is the fastest CPU and why?

Which is the fastest CPU and why?

Answers

Answer:

the core i7 9700k because first it has a higher ghz count and its unlocked and has more cores

Explanation:

The _____ property should be used only when no markup tags are involved.
insertAdjacentHTML
textContent
outerHTML
innerHTML

Answers

Answer:

The textContent property should be used only when no markup tags are involved.

Explanation:
The textContent property sets or returns the textual content of an element and ignores any HTML tags within the element. It only deals with the text content of the element and doesn't affect the markup.

On the other hand, the innerHTML and outerHTML properties deal with the HTML content of an element and can be used to manipulate the markup tags within an element. The insertAdjacentHTML method is also used to insert HTML content at a specific position in an element's markup.

The ________ form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

Answers

The ATX form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

What is the ATX form factor?

The ATX stands for Advanced technology extended. It may be characterized as a process of replacement for the older AT and baby AT form factors. This is because ATX deals with the motherboard and power supply configuration specifically.

This format of ATX is primarily developed by Intel in 1995 in order to enhance the previous de facto standards and conditions like the AT design.

Therefore, the ATX form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

To learn more about the ATX form factor, refer to the link:

https://brainly.com/question/2114613

#SPJ1

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

Which of the following functions could possibly operate without needing any input parameters?
O average()
sum()
O random()
O sqrt()

Answers

Average() and sum() are two functions that may be used without any input parameters. The parameters you give a service to utilize when you make a service request are known as input parameters.

What is meant by input parameters ?

We frequently wish to be able to reuse code blocks inside programs without having to rebuild them from scratch. To arrange and name pieces of code so that we can subsequently refer to them, we use functions. We must first declare and name the function before we can use it, just as we would when creating a variable.

Input parameters are the information you give to a service in order to use it during a service call. It's possible that some of the services have no input parameters. Use of input parameters transmits dynamic content to the external data source. Data elements used to carry out a function are known as workflow input parameters. The data products of an activity are known as workflow output parameters.

Therefore the correct answer is average() sum() .

To learn more about input parameters refer to :

https://brainly.com/question/18798749

#SPJ1

VPython, which object can be used to create this object?
myObject =
(pos = vector 0, 5, 2)

Answers

In VPython, a vector object can be used to create the given object that is as follows:

myObject = (pos = vector 0, 5, 2).

What is VPython?

VPython may be defined as an extension for Python in order to allow easy, "pythonic" 3D. It is used in education for various purposes, including teaching physics and programming.

It has also been used by research scientists to visualize systems or data in 3D. The purpose of this exercise is to give you practice utilizing velocity to change the location of an object in order to create a 3D animation.

Python is popular in scientific research. In the study, VPython has been shown to be beneficial for visualizing situations and data in 3D. To install Vpython from the source, execute the following command from the source directory after downloading it.

Therefore, in VPython, a vector object can be used to create the given object.

To learn more about Python, refer to the link:

https://brainly.com/question/26497128

#SPJ9

in older versions of exchange, what type of file was responsible for messages formatted with messaging application programming interface, and served as the database file?

Answers

In older versions of Exchange, the type of file responsible for messages formatted with Messaging Application Programming Interface (MAPI) and serving as the database file was the Exchange Database file (EDB).

In earlier versions of Microsoft Exchange, the Exchange Database (EDB) file was used to store messages and other data. The EDB file format was designed to support the MAPI protocol, which is a messaging architecture used by Exchange for email communication and collaboration.

The EDB file served as the central database file where all mailbox data, including emails, contacts, and calendar items, were stored. It provided the underlying structure and organization for message storage and retrieval within the Exchange Server environment.

You can learn more about Exchange Database file at

https://brainly.com/question/29611893

#SPJ11

helpppppppppppppppppppppppppppppppppppppppppppppppppppp

helpppppppppppppppppppppppppppppppppppppppppppppppppppp

Answers

Answer:

I would say B.

Explanation:

It seems the most logical. :)

HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP

HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP

Answers

Answer:

I should be C! :D

Answer:

B

Explanation:

you form compound conditions by connecting two or more simple conditions using the ____ operator.

Answers

The operator used to connect two or more simple conditions in order to form a compound condition is called a logical operator. There are three commonly used logical operators:

In programming, the most common logical operators are:

"AND" operator (represented by "&&" or "and")

"OR" operator (represented by "||" or "or")

"NOT" operator (represented by "!" or "not")

AND, OR, and NOT. The AND operator requires that both simple conditions be true for the compound condition to be true. The OR operator requires that at least one of the simple conditions be true for the compound condition to be true. The NOT operator negates the simple condition, meaning that if the simple condition is true, the compound condition will be false, and vice versa.

To know more about  operator visit :-

https://brainly.com/question/28335468

#SPJ11

Who invented "qwerty" On the keyboard and why did that person mix up all of the letters

Answers

Answer: Prototypes had a problem with the bars colliding with each other and jamming. So the story goes that he arranged the keys with the most common letters in hard to reach spots, to slow typists down and try to avoid this problem.

Explanation: In the 1860s, a politician, printer, newspaper man, and amateur inventor in Milwaukee by the name of Christopher Latham Sholes spent his free time developing various machines to make his businesses more efficient.

Hope this helped!

Listen: 6 Lieder, Op. 1: No. 1, Schwanenlied
Directions: listen to it and answer this question being asked down below. I need it well thought out. I want to see question 1 please, if anyone knowledgable.
1.) For those who have heard Art Songs before: what is your aesthetic response to this piece? How do you compare it to your aesthetic responses to other Art Songs of the German Romantic tradition (Schubert, Schumann, Wolf, Brahms, Mahler)? What in the music makes you feel this way (be specific)?
Please respond to question 1 please. Be detailed and specific.

Answers

I can provide you with some general information about Art Songs of the German Romantic tradition.

Art Songs, also known as Lieder, are vocal musical compositions that combine poetry and music. They are typically performed with a solo singer and piano accompaniment. German composers such as Schubert, Schumann, Wolf, Brahms, and Mahler were prominent in the development of the Art Song genre during the Romantic period.

Each composer's style and approach to Art Songs vary, but they all share common characteristics of expressive melodies, rich harmonies, and emotive storytelling through music and text. Schubert's Lieder often evoke a sense of introspection and lyricism, while Schumann's works display emotional intensity and intricate piano accompaniments. Wolf's songs are known for their dramatic and vivid musical settings, while Brahms's compositions focus on refined and balanced musical structures. Mahler's Lieder exhibits symphonic qualities and explore profound existential themes.

To provide a detailed and specific aesthetic response, it would be best to listen to the specific piece mentioned, "Schwanenlied" from the Op. 1 collection by Art Songs by an unknown composer. Analyzing the melodic and harmonic elements, the text setting, the emotional content conveyed, and comparing it to the characteristics of other German Romantic Art Songs can help in formulating a more comprehensive aesthetic response.

Learn more about Romantic composers here:

https://brainly.com/question/30107672

#SPJ11

________ programs should be run frequently to avoid the unexpected loss of files from your devices.

Answers

Backup programs should be run frequently to avoid the unexpected loss of files from your devices.

Check more about backup program below.

What does a backup program do?

Backup software are known to be a kind of a computer programs that are said to be used to carry out a backup service in a computer. Its help to back up information against loss or theft.

Note that they are often used to make supplementary real copies of files, databases or the total computers.

Therefore, based on the above, Backup programs should be run frequently to avoid the unexpected loss of files from your devices.

Learn more about Backup from

https://brainly.com/question/5849057

#SPJ1

You must practice your speech physically, but you can generally assume your technology will work

Answers

it's equally important to prepare for potential technology issues. Don't assume everything will go smoothly, and always have a backup plan in place.

preparing for a speech, it's essential to practice physically. This means rehearsing your delivery, movements, and gestures in front of a mirror or with a friend. Practicing this way helps build muscle memory, which will enable you to deliver your speech confidently and smoothly. However, when it comes to technology, you can generally assume it will work, but it's always best to prepare for any potential issues.

Make sure you have a backup plan in case your technology fails, such as having a printed copy of your speech or a backup device with your presentation. Test your technology ahead of time to ensure it's functioning correctly and be prepared to troubleshoot any issues that may arise. In summary, while physical practice is essential for a successful speech.
To learn more about : backup

https://brainly.com/question/17355457

#SPJ11

Which of the following is true of a procedure? Check all that apply.

It can be reused.

It saves programmers time.

It is a block of code that performs a single task.

It lets you exit a function.

Answers

Answer:

A, B, C

Explanation:

ye

Answer:

It is

A

B

C

Explanation:

Got it right on edge

How can you benefit from an internship, even if it is unpaid?

college class
i couldnt find it in article

Answers

The ways that a person can benefit from an internship, even if it is unpaid is that Unpaid internships can be a fantastic way to begin developing your professional network, gain skills, and get insightful input from industry experts. They may also be a reliable predictor of your future career satisfaction.

How do you anticipate using this internship to your advantage?

Some of the gains from internship are:

Obtain useful professional experience.Consider a career route.Gain a competitive advantage in the job market.Develop and polish your skills.Obtain compensation in money.Build a network with industry experts.Gain self-assurance.Change over to employment.

Note that unpaid intern do assist you in putting your knowledge and talents to use at work. You can better comprehend the everyday responsibilities of that role by participating in work experience as part of your study.

Hence it is seen as a wonderful approach to develop and show off abilities like dependability and communication is through unpaid work experience.

Learn more about internship from

https://brainly.com/question/25385643
#SPJ1

Ravi learnt that if a laptop gets overheated, the internal parts get damaged. What happens if he leaves his device plugged in even after it is charged 100%?

Answers

Answer:

The device will probably overheat. *

Explanation:

The continual input of power will cause the laptop to heat up, and later, when he unplugs it, it will cool down. This cycle of warming and cooling will probably damage the battery as well as other parts.

* however, this being said, most devices these days have firmware to stop them from overcharging, plus batteries have improved greatly, so there is probably not too much harm in leaving a laptop plugged in

for the computer that you normally use, identify which pieces constitute the hardware and which pieces constitute the system software. now think about the file system of your computer. what part of the file system is hardware, what part software, and what part data? ( i have hp laptop of 10th generation)

Answers

Hardware: Motherboard. Central Processing Unit. Graphics Processing Unit. and RAM. Software: Operating system is a type of software that manages hardware and software on computer. Without this software, computer will not function.

What are example of software?

Software is a set of instructions (called a program) that computer executes. Example: System software enables users to complete tasks and be productive such as browsers, word processors, video editors. Application software enables programmers to create software and utilities used by computers.

Which hardware or software is more important and why?

Hardware includes all the components that make a particular device function, without which software cannot be accessed. The more expensive the hardware, the more compelling the experience (in theory). On the other hand, there is software. It's not what you see, but it's what you interact with the most.

Why is software more important than hardware?

Good hardware is not enough. Software changes the world. This may be due to the fact that they are more flexible and change faster than hardware. It's easy to test hypotheses and iterate on software and hardware solutions.

To learn more about software visit:

https://brainly.com/question/29946531

#SPJ4

which tool should be used if a user needs to optimize space on a hard drive?

Answers

If a user needs to optimize space on a hard drive, there are several tools that can be used.

If a user needs to optimize space on a hard drive, there are several tools that can be used. One of the most popular tools is a disk cleanup utility, which can be found in the System Tools section of the Windows operating system. This tool scans the hard drive for unnecessary files, such as temporary files and internet cache, and allows the user to delete them to free up space.
Another tool that can be used to optimize space on a hard drive is a disk defragmenter. This tool rearranges the files on the hard drive so that they are stored more efficiently, which can help to free up space and improve performance.
There are also third-party tools available that can help to optimize space on a hard drive. These tools often offer more advanced features, such as the ability to delete duplicate files and compress large files to save space.
Overall, there are many tools available to help optimize space on a hard drive. The best tool for a user will depend on their specific needs and the features they require. It is important to regularly clean up and optimize your hard drive to ensure that your computer is running at its best.

To know more about hard drive visit: https://brainly.com/question/10677358

#SPJ11

A palindrome is a word or a phrase that is the same when read both forward and backward. examples are: "bob," "sees," or "never odd or even" (ignoring spaces). write a program whose input is a word or phrase, and that outputs whether the input is a palindrome.
this the code that i put in it all worked until the phrase "never odd or even" gets tested
here is the code that i entered
name = str(input())
name = name.replace(' ', '')
new_name = name
new_name = new_name[::-1]
if name == new_name:
print('{} is a palindrome'.format(name))
else:
print('{} is not a palindrome'.format(name))
#and this is my output
neveroddoreven is a palindrome
#it needs to be
never odd or even is a palindrome

Answers

A word or phrase that reads the same both forward and backward is known as a palindrome. "bob," "sees," or "never odd or even" are some instances (ignoring spaces).

#include <iostream>

#include <string>

#include <cctype>

using namespace std;

bool is_palindrome(string s){

   //use two indices, we will check if characters at indices match

   int left_index = 0;                    

   int right_index = s.length()-1;

   while (right_index > left_index){    //loop until the left index is less than the right index

       if(s[left_index] == ' '){            //if char at left_index is a space ignore it

           left_index++;

       }

       else if(s[right_index] == ' '){        //if char at right_index is a space ignore it

           right_index--;        

       }

       else if(tolower(s[left_index]) == tolower(s[right_index]))     //if chars at indices match

       {        

           left_index++;                    //increment left, decrement right

           right_index--;

       }

       else{

           return false;                    //Not a palindrome

       }

   }

   return true;     //palindrome

}

int main()

{

   string text;

   cout << "Enter input string: ";

   getline(cin, text);            //read-string

   if(is_palindrome(text))        //check for palindrome

       cout << text << " is a palindrome" << endl;

   else

       cout << text << " is not a palindrome" << endl;

   return 0;

}

Learn more about palindrome here:

https://brainly.com/question/29804965

#SPJ4

What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place

Answers

Answer:

I think it's a for loop.

A for loop looks like:

for (starting statement; condition that is true; condition applied to iteration)

Explanation:

which is a program that does something undocumented that the programmer or designer intended, but that the end user would not approve of if he or she knew about it?

Answers

A software program that does something undocumented that the programmer or designer intended, but that the end user would not approve of if he or she knew about it is referred to as a Trojan horse.

What is a malware?

A malware simply refers to any type of software program (document or file) that is designed and developed to be intentionally harmful to a host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan horse.

In Computer technology, some examples of malware include the following:

WormsTrojan horseSpywareZombiesRootkitRATAdwareViruses

In conclusion, a Trojan horse is a type of malware that has the ability to perform undocumented actions (activities) which are completely unapproved by an end user of the device.

Read more on malware here: https://brainly.com/question/28260161

#SPJ1

What is the term for a male reproductive cell?​

Answers

Answer:

I believe it is a sperm cell.

Explanation:

Not a sex cell because that can apply to both female and male reproduction.

If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost

Answers

Answer:

$0.78

Explanation:

There are 4 quarts in a gallon, so you can use
12 gallons• 4 quarts= 48 quarts for 12 gallons

Now, you can divide 48 from $37.20 to find the price of 1 quart.

$37.20 / 48 quarts = 0.775, written as $0.76 per quart of ice cream.

Answer: $0.76 per quart of ice cream

To delete WordArt text outline, click ____ in the Text Outline gallery.
delete outline
no outline
reverse outline
invisible outline

Answers

To delete WordArt text outline, click "No Outline" in the Text Outline gallery.

This option will remove the outline from your WordArt text. What is WordArt in word? WordArt is a gallery of text styles that you can add to your publications to create decorative effects, such as shadowed or mirrored (reflected) text. You can use WordArt to add special text effects to your document. WordArt is a quick way to make text stand out with special effects. You begin by picking a WordArt style from the WordArt gallery on the Insert tab, and then customize the text as you wish. There are multiple varieties of text styles with WordArt, including embossed text, bordered text, and shadowed text. Users can add WordArt that uses two different colors, one color being the text border and the other color being the fill color of the text.

Learn more about Wordart: https://brainly.com/question/938171

#SPJ11

Answer the following questions: • What is cellular manufacturing? • What are the advantages and limitations of cellular manufacturing? • Give 2 examples of cellular manufacturing. · Through Internet research, find a real-life example of a company that had utilized cellular manufacturing. Summarize their transition and provided a reflection of the benefits (or lack-thereof) they experienced after going to cellular manufacturing.

Answers

Cellular manufacturing organizes workstations into self-contained cells where a group of workers is responsible for the complete production process, aiming to improve efficiency and product quality.

Advantages of cellular manufacturing include increased productivity due to reduced setup time and improved flow of materials, lower work-in-progress inventory, faster response times to changes in demand or product design, improved communication and teamwork among cell members, and enhanced product quality through focused expertise. However, there are also limitations to cellular manufacturing, such as the need for significant upfront planning and investment, potential difficulty in adapting to product variety, and the possibility of increased inter-cell coordination challenges. Two examples of cellular manufacturing are the use of assembly cells in automobile manufacturing, where teams of workers are responsible for assembling specific sections of a vehicle, and the implementation of cellular layouts in electronics manufacturing, where cells are designed to produce specific components or modules. A real-life example of a company that utilized cellular manufacturing is Toyota. Toyota implemented the cellular manufacturing concept in their production system, known as the Toyota Production System (TPS). They transitioned from traditional large-scale batch production to smaller, self-contained work cells. This allowed them to achieve several benefits.

Learn more about Toyota Production System (TPS) here:

https://brainly.com/question/32229591

#SPJ11

describe how you would open a new open word processing document

Answers

Answer:

open the program by clicking on the icon or finding it in your program. Once you have opened it you can either use the blank page that has opened or you can go to the file tab and click new word document or new document.

Explanation:

Other Questions
What is the name of the island where the original jurassic park is built?. In "sinners in the hands of an angry god" Jonathan Edwards compares a number of different items to either nonbelievers or to the wrath of god. Match each item to one of the categories 2. Draw the image of RST under the dilation with scale factor 5/3 and center of dilation (2, -2) . Label the image R'S'T' . For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality.Which of the following is the BEST step the user can take to fix this problem?Reset to factory defaultPerform a force stopRemove and replace the batteryClose all running appsAnswer: Reset to factory default hubspot - segmentation is an important piece of your inbound email marketing strategy. what does segmentation primarily help you do This leg was called the Passage Find the value of the variables. Arc length and area of a sector of a circle Which properties must you use to add or subtract complex numbers? How many more students could pass the exam if they were given quizzes at the end of lectures is this control prediction Please answer!! ASAP PLEASE and THANK YOUUU a client has thrombocytopenia. what actions does the nurse delegate to assistive personnel (ap)? (select all that apply.) according to the global status report on alcohol, the male/female ratio of heavy episodic drinking, which country as having the largest gap between males and females? Review the results of the following Nmap scan and answer the question that follows: c:/Users/test>nmap nsT nmap.org Starting Nmap 6.40 ( http://nmap.orgB) at 2014-10-12 15:37 Eastern Daylight Time Nmap scan report for nmap.org (173.255.243.189) Host is up (0.063 s latency). Not shown: 997 filtered ports PORT STATE SERVICE 22/ tcp open ssh 80/ tcp open http 443/ tcp open https Nmap done: 1 IP address (1 host up) scanned in 53.04 seconds Identify which of the above port(s) is considered insecure AND explain why it is insecure. It was late in the afternoon, and the light was waning; there was a difference in the look of the tree shadows out in the yard. Somewhere in the distance cows were lowing, and a little bell was tinkling; now and then a farm wagon tilted by, and the dust flew; some blue-shirted laborers with shovels over their shoulders plodded past. There seemed to be a gentle stir arising over everything for the mere sake of subsidencea premonition of rest and hush and night. This soft commotion was over Louisa Ellis also. She had been peacefully sewing all the afternoon; now she quilted her needle carefully into her work, which she folded precisely and laid in a basket. Louisa could not remember that ever in her life she had mislaid one of these little feminine appurtenances, which had become, from use and constant association, a part of her personality. Louisa tied a green apron around her waist, got out a flat straw hat with a green ribbon, and then she went into the garden with a little blue crockery bowl, to pick some currants for her tea. After the currants were picked, she sat on the back doorstep and stemmed them, collecting the stems carefully in her apron, and afterwards throwing them into the chicken coop; she looked sharply at the grass beside the step to see if any had fallen there. Louisa was slow and still in her movements; it took her a long time to prepare her tea, but when ready it was set forth with as much grace as if she had been a veritable guest to her own self. The little square table stood exactly in the center of the kitchen and was covered with a starched linen cloth whose border pattern of flowers glistened. Louisa used china every daysomething which none of her neighbors did. They whispered about it among themselves because their daily tables were laid with common crockery, their sets of best china stayed in the parlor closet, and Louisa Ellis was no richer nor better bred than they, but still she would use the china.Which themes does the author develop in the passage?A. Life on a farm is often lonely, and people may not understand others' good intentions.B. Gardens are sources of nourishing food, and a well-set table can be like a fine work of art.C. Leisure can bring a sense of peace, and each person has unique skills and talents.D. Routine can provide a sense of delight, and the good things in life can beautify the ordinary. If a number has the units g/L then its A) a number we are not going to use at all.B) an imaginary unit that we are not going to use.C) creating a relationship between mass and volumeD) a relationship between volume and distance. CSUSM offers you an option to pay your remaining balance of $1,800 tuition today or pay $2000 for the tuition balance in one year. The interest rate you can earn (adjusted for inflation) is 15%. What should you do to save the most money? Show you calculation please help me solve this a numerical value used as a summary measure for a sample, such as sample mean, is known as a a titration for the determination of chloride ion on 90 ml of water required 19.34 ml of 0.10 m agno3 to reach the endpoint (using k2cro4 as an indicator). what is the molarity of chloride ion in this water sample? enter your answer to three places after the decimal.