what is the name of the attribute of an item (assuming an item element is nested inside a style element) that lets you specify the color of some text?

Answers

Answer 1

The attribute used to specify the color of text within an item element, assuming it is nested inside a style element, is the "color" attribute. The "color" attribute is a commonly used CSS attribute that allows you to define the color of text content.

In CSS, the "color" attribute accepts various color values, such as named colors (e.g., "red", "blue", "green"), hexadecimal color codes (e.g., "#FF0000" for red), RGB values (e.g., "rgb(255, 0, 0)" for red), or HSL values (e.g., "hsl(0, 100%, 50%)" for red). For example, within a style element, if you have an item element that you want to style with a specific text color, you can use the "color" attribute as follows: html<item>This text will be displayed in red color.</item>

In the above example, the "color" attribute is set to "red", specifying that the text content within the item element should be displayed in the color red.

Learn more about color here

https://brainly.com/question/30508604

#SPJ11


Related Questions

How does making a call differ when using a cell phone public phon box? consider the kinds of user, types of activity and context of use

Answers

Answer:

Explanation:

Making A Call:

Public Cell Phone:

A public telephone box is a fixed and noncompact gadget that is associated by the means of electrical wires and is utilized for correspondence by making telephone calls. For settling on the telephone decision, both the telephones ought to be working appropriately and the wires interfacing both the cases ought to likewise be working appropriately without any harm. The voice is communicated starting with one gadget then onto the next as electrical signals pass across the wires.

Cell Phones:

A cellphone is a mobile and versatile gadget whose essential capacity and purpose are to build up correspondence by settling on telephone decisions. Dissimilar to the public telephone box, we don't utilize any wires, rather the correspondence is finished by the methods for a sim card in the telephone which is answerable for building up correspondence between the cellphone and the relating network tower. For the correspondence to occur or call to happen the sim in both the mobile phones should be working appropriately and should be associated with their separate or closest organization towers. The signs are moved from the gadgets to the organization towers which will be additionally moved to wanted cellphones and the other way around or vice versa.

Considering the device design based on:

a)  The kinds of User:

Individuals who don't utilize the telephone every now and again and talk for long hours sometimes when they use the telephone, for the most part, lean toward public telephone box since, supposing that you have a mobile cell phone and assuming you don't utilize it much, it is simply misused of cost. Be that as it may, in wireless the expenses are fixed upon the measure of time utilized for settling on telephone call decisions.

b) Type of activity:

Public telephone boxes can be utilized distinctly for settling on telephone decisions whereas personal digital assistance (PDAs, i.e cell phones) can be utilized to settle on telephone decisions, access the web, send instant messages, share pictures and video, and numerous different things.

c) Context of usage:

The context of usage whereby public telephone box is utilized when less often calls are made and the correspondence at whatever point made is for longer periods then public telephone boxes are utilized and furthermore individuals who don't wish to carry and move about with a cell phone and charge each an ideal opportunity to keep up the cell phones for the most part incline toward public telephone box. Individuals who are open to carrying the cell phones and have no issues charging the mobile and who need to settle on telephone decisions oftentimes buy the idea of cell phones over public telephone boxes.

A 32-character password is an example of using biometricsTRUE OR FALSE

Answers

Answer:

falseExplanation:

Biometrics is something on your body that you can use to identify yourself (It falls into the something you are category), and password is a secret that you remember, and the characters are just the length of the password

The given statement is False.

A 32-character password is not an example of using biometrics.

Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics of an individual, such as fingerprints, iris patterns, voiceprints, or facial recognition.

Biometric authentication relies on these unique traits to verify a person's identity.

On the other hand, a password is a form of knowledge-based authentication, where the user needs to provide a secret string of characters to gain access. In the case of a 32-character password, it is a long and complex passphrase that aims to enhance security by increasing the length and complexity of the secret information.

While both biometrics and passwords can be used for authentication purposes, they are distinct concepts. Biometrics relies on physical or behavioral attributes of an individual, whereas passwords rely on knowledge of a secret string of characters.

Learn more about Biometrics click;

https://brainly.com/question/30762908

#SPJ6

Write any four advantage of computer.

Answers

Answer:

this is my answer hope you will find the right

Explanation:

Increase your productivity. ... Connects you to the Internet. ... Can store vast amounts of information and reduce waste. ... Helps sort, organize, and search through information. ... Get a better understanding of data. ... Keeps you connected. ... Help you learn and keep you informed.

There are some advantages to a computer

thank you if you like then gave point

Answer:

Any four advantages are:

1) It is fast and accurate device.

2) It is a versatile machine.

3) It has high storage capacity.

4) Computer can be used in various fields for different purposes.

Suppose we are using a three-message mutual authentication protocol, andAlice initiates contact with Bob. Suppose we wish Bob to be a stateless server, and thereforeit is inconvenient to require him to remember the challenge he sent to Alice. Lets modify theexchange so that Alice sends the challenge back to Bob, along with the encrypted challenge. So the protocol is:Step 1: Alice send a message [I’m Alice] to Bob. Step 2: Bob sends a random number, R. Step 3: Alice sends a message [R,KAlice−Bob{R}]. Is this protocol secure?

Answers

No, this protocol is not secure. A secure mutual authentication protocol must, among other things, support mutual authentication, which allows both parties to confirm the identities of one another.

Due to the fact that Bob cannot recall the challenge he gave to Alice, he is unable to confirm Alice's identity using this protocol. As a result, an attacker can read Alice and Bob's messages and then pretend to be Alice to Bob by simply playing back the message that Alice originally sent.

This problem can be resolved by changing the protocol so that Bob sends a challenge along with the random number R, and Alice must respond with the challenge as well. This way, Bob can verify Alice's identity by checking if the challenge in Alice's response matches the one he sent earlier.

For such more question on protocol:

https://brainly.com/question/8156649

#SPJ11

How do I fix’s this error

How do I fixs this error

Answers

Note that the corrected JavaScript code is given as follows:

function start() {

 var lengthM = parseInt(prompt("What is the length of the mat?"));

 var widthM = parseInt(prompt("What is the width of the mat?"));

 var areaM = calculateAreaM(widthM, lengthM);

 console.log("The area of the mat is " + areaM);

 var lengthR = parseInt(prompt("What is the length of the floor?"));

 var widthR = parseInt(prompt("What is the width of the floor?"));

 var areaR = calculateAreaR(lengthR, widthR);

 var matsNeeded = areaR / areaM;

 console.log("The number of mats needed is " + matsNeeded);

}

function calculateAreaM(width, length) {

 return width * length;

}

function calculateAreaR(width, length) {

 return width * length;

}

What is the difference between the incorrect and the corrected JavaScript Code?
Incorrect syntax: The function readInt does not exist in JavaScript, it should be parseInt instead.Incorrect output: The statement println("The area of the mat is" + areaM); should use console.log in JavaScript.Incorrect variable names: In the incorrect code, some variable names have inconsistent capitalization, such as lengthm and LenghtM. In JavaScript, variables are case-sensitive, so LenghtM is considered a different variable than lengthM.Incorrect input: In the incorrect code, var lengthr = readInt("What is the length of the floor?") and var lengthr = readInt("What is the width of the floor?") both use the same variable name lengthr, which would result in the latter value overwriting the former.Incorrect calculation: The calculation for areaR in the incorrect code has an error, as lenght and width are not defined.Infinite loop: The calculateAreaR function in the incorrect code calls itself, which would result in an infinite loop.

Learn more about JavaScript:
https://brainly.com/question/5621294
#SPJ1

How do I fixs this error

__________ is more efficient than interrupt-driven or programmed I/O for a multiple-word I/O transfer.

Answers

Answer:

Direct memory access

Explanation:

DMA is Direct Memory Access, which is the way a peripheral transfers data in blocks, rather than characters. It's faster, and frees up the CPU to get on with other stuff while the data transfer happens independently.

What does the acronym PECs stand for?

Answers

Answer:

Picture Exchange Communication System

Explanation:

PECS stands for Picture Exchange Communication System

Answer:

Picture Exchange Communication System

Explanation:

there

mark me brainliest pls

Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)

Answers

Answer:

The expression is:

if widthOfBox % widthOfBook != 0

Explanation:

Given

Variables:

(1) widthOfBox and

(2) widthOfBook

Required

Statement that checks if (1) is divisible by (2)

To do this, we make use of the modulo operator. This checks if (1) is divisible by 2

If the result of the operation is 0, then (1) can be divided by (2)

Else, (1) can not be divided by (2)

From the question, we need the statement to be true if the numbers are not divisible.

So, we make use of the not equal to operator alongside the modulo operator

An attacker plants a device in a native subnet and sends traffic to a computer on an external subnet in order to perform a denial of service (DoS) attack against the host in the external subnet. What type of attack does this refer to

Answers

The type of attack you are referring to is called a "Distributed Denial of Service" (DDoS) attack. In this scenario, an attacker plants a device in a native subnet, which sends traffic to a computer on an external subnet, with the goal of performing a denial of service (DoS) attack against the host in the external subnet.

A subnet refers to a smaller network segment within a larger network. The native subnet is the attacker's local network, while the external subnet is the network of the target host. In a DDoS attack, the attacker exploits multiple devices within different subnets to generate a large volume of traffic, overwhelming the targeted system and preventing it from processing legitimate requests.

The attack typically involves the following steps:
1. The attacker compromises a device within the native subnet and installs malicious software or tools.
2. The compromised device is used to send a high volume of requests or data to the target host in the external subnet.
3. The targeted host becomes overwhelmed by the excessive traffic and is unable to process legitimate requests, resulting in a denial of service for users.

DDoS attacks can cause significant disruptions and damage to organizations, as they can render websites, services, and applications inaccessible to users. It is crucial for organizations to implement security measures to detect, mitigate, and prevent DDoS attacks in order to maintain the availability and integrity of their systems.

More questions on subnet : https://brainly.com/question/29527004

#SPJ11

Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables

Answers

Answer:

tables

Explanation:

For accessing the database there are four objects namely tables, queries, forms, and reports.

As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database

Therefore in the given case, the last option is correct

Answer:

D. tables

Explanation:

took the test, theyre right too

Consider the following class definitions, public class Class public String getValue() return "A"; public void showValue() System.out.print(getValue(); public class Classe extends Class public String getValue() return "B"; The following code segment appears in a class other than ClassA or Classe. ClassA obj = new Class(); obj.showValue(); What, if anything, is printed when the code segment is executed? A. AB. BC. ABD. BAE. Nothing is printed because the code does not compile

Answers

When the code segment is executed, the method showValue() of the ClassA object obj is called, which in turn calls the getValue() method of ClassA. Since the getValue() method in ClassA returns "A", the output will be "A".

The correct answer is A.

This is because even though Classe extends Class and overrides the getValue() method, the object being referred to in this case is still of type ClassA. Therefore, the getValue() method of ClassA is the one that is called.


The ClassA obj is created with an instance of Classe, which extends ClassA. When obj.showValue() is called, it refers to the showValue() method in ClassA. This method prints the result of getValue(), which is overridden in Classe to return "B". Therefore, "B" is printed.

To know more about code segment visit:-

https://brainly.com/question/30353056

#SPJ11

Here are a few elements of breaking news and a feature story. Match the elements of breaking news and a feature story with their correct images.

Here are a few elements of breaking news and a feature story. Match the elements of breaking news and

Answers

Breaking News:

➡️Highlights key events

➡️Answers some, but not necessarily all questions, such as when, where, who, why, and how.

Feature Story:

➡️ No urgency to be reported

➡️Adequate time for research

➡️Includes reviews and Q&A type interviews

➡️Summary lead is the most traditional form often used to create a script

Explanation:

Breaking news is known as a special report or news which reports something current and urgent. It usually interrupts a scheduled program or current news. It answers some questions on the news that just broke out.

Feature story is known to be a news that is non-fiction. It is also known to be a type of soft news. It includes Q&A interviews and reviews. It takes adequate time for research.

Breaking News

Highlights Key eventsIncludes Reviews and Q&A type interviewsAdequate time for research

Feature story

Answers some , but not necessarily all questions , such as when , where , who , why , and howNo urgency to be reportedSummary lead is the most traditional form often used to create a script.

if a string consists of one or more components, you can parse it into its individual components. to locate the characters that separate the components, you would use which function?

Answers

If you need to parse a string into its individual components, you can use the split() function.

This function allows you to locate the characters that separate the components by specifying a delimiter, such as a comma or space.

Once you specify the delimiter, the split() function will return an array containing the individual components of the string.

This can be useful if you need to process data from a CSV file or extract specific values from a larger string. It's important to note that the split() function only works with strings, so you may need to convert your data to a string before parsing it.

Learn more about the split() function at

https://brainly.com/question/14169063

#SPJ11

What are the advantages of using an intermediate machine for the implementation of a language?

Answers

An intermediate machine is a virtual machine that acts as an intermediary between the source code of a programming language and the machine code of a particular hardware platform.

The advantages of using an intermediate machine for the implementation of a language are numerous.
Firstly, an intermediate machine allows for platform independence, meaning that the same code can be executed on different machines without modification. This is because the intermediate machine abstracts the underlying hardware and provides a consistent interface for the code to interact with.
Secondly, an intermediate machine can improve code portability, which is the ability to move code from one platform to another. This is because the intermediate machine provides a standardized environment for the code to run in, reducing the need for platform-specific optimizations and adaptations.
Thirdly, an intermediate machine can simplify the implementation of complex language features, such as garbage collection and exception handling. This is because the intermediate machine provides a framework for these features to be implemented in a consistent and efficient manner.
Overall, the use of an intermediate machine as a virtual machine can greatly enhance the development and deployment of programming languages by providing a platform-independent and consistent environment for the code to run in.

Learn more about virtual machine here:

https://brainly.com/question/30896458

#SPJ11

Host A is sending a file to Host B. There are 3 links (therefore 2 switches) between the hosts. The file is segmented into packets of 40 bytes, with a 10 byte header added to each packet. Each link has a transmission rate of 100 kbps and a speed of 1000 km per sec. The switches are 100km away from each other. Host A is 50 km away from the first switch while Host B is 150 km away from the second switch. Data travels from Host A to the first switch, on to the second switch and then to Host B. What is the propagation delay (in seconds) when a packet of data travels between the 2 routers?

Answers

Answer:

The propagation delay is "0.1 Sec".

Explanation:

Please find attachment of the figure.

The given values are:

Transmission rate of each link

= 100 kbps

Distance

= 100 km

Speed

= 1000 km

Now,

The propagation delay between R1 as well as R2 will be:

⇒  \(\frac{DR_1 R_2}{speed}\)

On substituting the estimated values, we get

⇒  \(\frac{100 \ km}{1000} \ Sec\)

⇒  \(0.1 \ Sec\)

Host A is sending a file to Host B. There are 3 links (therefore 2 switches) between the hosts. The file

How many times would the for loop below execute if variable times = 9 % 2?

for (int x=times; x <=times; x++) ?

1
0
2
3

Answers

Answer:

1

Explanation:

9 % 2 = 1

So x = 1

It will execute once

Why are charts and graphs included in documents rather than just raw data?

Answers

Answer:

It's more organized and easier to look at

Explanation:

If it was just the raw data, it would take more time to analize, rather than it already being in a chart or graph

PYTHON 7.1.6: Sandwich Sandwiches (codehs)

In this exercise, write a function called sandwich which takes a 3 letter string. Your function should return the letters that are at the beginning and end of the string.

For example,

sandwich("pbj")
# => "pj"
sandwich("blt")
# => "bt"

Answers

I've included my code below. Best of luck.

PYTHON 7.1.6: Sandwich Sandwiches (codehs)In this exercise, write a function called sandwich which takes

Following are the Python program to calculate the string value:

Program Explanation:

Defining a method "sandwich" that takes string variable "x" in parameter.Inside the method, a return keyword is used that removes the middle string value.Outside the method, a print method is used that calls the "sandwich" method which accepts a string value in it and prints its return value.

Program:

def sandwich(x):#defining a method sandwich that takes string variable x in parameter

return x[0]+ x[-1]#using return keyword that remove middle string value

print(sandwich("pbj"))#calling method and print its return value

print(sandwich("blt"))#calling method and print its return value

Output:

Please find the attached file.

Learn more:

brainly.com/question/8647085

PYTHON 7.1.6: Sandwich Sandwiches (codehs)In this exercise, write a function called sandwich which takes

Write a for loop that uses the print function to display the integers from 10 down to 1 (including 10 & 1) in decreasing order

Answers

Answer:

ill do this in Java, C# and C++

Java:

       for(int i = 10; i >=1; i--)

       {

           System.out.println(i);

       }

C#:

       for(int i = 10; i >=1; i--)

       {

           Console.WriteLine(i);

       }

C++:

       for(int i = 10; i >=1; i--)

       {

           cout << i << endl;

       }

Need answer ASAP!!!!

They’re not in the right spots just showing you where they can be placed

Need answer ASAP!!!! Theyre not in the right spots just showing you where they can be placed

Answers

Answer:

I am looking at it. Of course I can't  move anything. But I think relationship matches cardinality and entity matches entity name. Entities and entity relationships were what we used years ago when I was involved with designing hierarchical databases.

you will get a 8 out of 10 score for this

 

Which of the following statements is
TRUE?
A. You must be connected to the Internet to compile
programs.
B. Not all compilers look the same.
C. All machines have a built in compiler.
D. All compilers contain a file browser.

Answers

Answer: B / Not all compilers look the same.

Explanation: Depending on the language you are programming in, would determine which compiler you use.

6.36. Four kilograms of steam in a piston/cylinder device at 400kPa and 175 ∘
C undergoes a mechanically reversible, isothermal compression to a final pressure such that the steam is just saturated. Determine Q and W for the process.

Answers

To determine Q (heat transfer) and W (work) for the given process, we can use the first law of thermodynamics:

Q = ΔU + W

where ΔU is the change in internal energy of the system.

For an isothermal process, the change in internal energy (ΔU) is zero since the temperature remains constant. Therefore, the equation simplifies to:

Q = W

Now let's calculate the work done:

Work done (W) = P_initial * V_initial * ln(V_final / V_initial)

Given:

P_initial = 400 kPa

V_initial = (mass of steam) / (density of steam at initial conditions)

V_final = (mass of steam) / (density of saturated steam at final pressure)

To calculate the specific volume (V), we can use the steam tables or properties of water and steam at different conditions.

Once we have the specific volumes at initial and final conditions, we can calculate W using the equation mentioned above.

To calculate Q, we can use Q = W since it is an isothermal process.

To know more about temperature visit-

https://brainly.com/question/14532989

#SPJ11

If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost

Answers

Answer:

$0.78

Explanation:

There are 4 quarts in a gallon, so you can use
12 gallons• 4 quarts= 48 quarts for 12 gallons

Now, you can divide 48 from $37.20 to find the price of 1 quart.

$37.20 / 48 quarts = 0.775, written as $0.76 per quart of ice cream.

Answer: $0.76 per quart of ice cream

Why is a service level agreement (sla) important?
1.it documents expectations of rising costs.
2.it documents expectations of future resource availability.
it documents expectations of availability, uptime, and security.
3.it documents expectations of usage.

Answers

Service level agreement (SLA) important for "It documents expectations of availability, uptime, and security."

A Service Level Agreement (SLA) is a contract between a service provider and its customers that outlines the level of service and support that the provider is committed to delivering. The SLA documents the expectations of availability, uptime, and security, which are critical factors in determining the quality of service a customer receives. By setting clear expectations and defining metrics for service delivery, an SLA helps to ensure that both the provider and the customer are on the same page, reducing the risk of misunderstandings or disputes. Additionally, an SLA can help to establish a foundation for ongoing communication and collaboration between the provider and the customer.

To learn more about  (SLA) visit;

https://brainly.com/question/15269079

#SPJ4

Consider the following code:

start = int(input("Enter the starting number: "))
stop = int(input("Enter the ending number: "))

x = 3
sum = 0
for i in range (start, stop, x):
sum = sum + i

print (sum)
What is output if the user enters 10 then 15?

Group of answer choices

10

15

23

39

Answers

Answer:

23

Explanation:

The user is prompted to enter the starting number and ending number, which in this case are 10 and 15 respectively. The variable x is assigned the value of 3. The variable sum is initialized to 0. The for loop is executed, with the loop variable i taking on the values start, start+x, start+2x, and so on, up to but not including stop. In this case, the loop variable i will take on the values 10, 13, and 16 (since start is 10, and x is 3). The loop will not include 15 because it is the stopping point and not included. The statement sum = sum + i adds each value of i to the sum variable on each iteration of the loop. After the loop has completed, the value of sum (which is 10 + 13 = 23) is printed. So the correct answer is 23.

Make each word to its correct meaning baiting click-jacking cross-site scripting

Answers

Answer:

Explanation:

Sure! Here are the correct meanings for the given terms:

1. Baiting: Baiting refers to the act of enticing or luring someone into a trap or a specific action, often through deception or manipulation.

2. Click-jacking: Click-jacking is a technique used by malicious actors to trick users into clicking on a seemingly innocent element or link on a webpage, which actually performs a hidden action or leads the user to unintended destinations. It is designed to deceive and hijack the user's clicks for nefarious purposes.

3. Cross-site scripting: Cross-site scripting (XSS) is a security vulnerability that occurs when an attacker injects malicious scripts into a trusted website or web application. When other users visit the affected site, the injected scripts can execute on their browsers, potentially allowing the attacker to steal sensitive information, perform unauthorized actions, or manipulate the website's content.

I hope this clarifies the meanings of the terms "baiting," "click-jacking," and "cross-site scripting" for you.

T/F: query by example uses a graphical user interface that assists users with retrieving data.

Answers

Answer:  True

Explanation:

Query by Example (QBE) is a technique that uses a graphical user interface (GUI) to assist users in retrieving data from a database. Instead of writing complex queries in a programming language like SQL, users can interact with the GUI and specify their search criteria by providing examples or patterns of the desired data.

With QBE, users typically utilize forms or grids where they can input values, select options, or define conditions using logical operators. The GUI then translates these user inputs into underlying query operations, simplifying the process of constructing queries.

By providing a visual and intuitive interface, QBE allows users with varying levels of technical expertise to interact with databases and retrieve data without the need for extensive knowledge of query languages or complex syntax.

Learn more about  graphical user here:

https://brainly.com/question/16956142

#SPJ11

The system tray contains

Answers

Answer

-antivirus settings

-battery status

-volume

Explanation:

Answer:

the operating system

Explanation:

hope this helps

make a story that ends in ´ I have never found such a kind person ever since´​

Answers

My dog went missing October 16 and I spent hours looking for him that day. I was beginning to think that I would never find him, but then I ran into a guy named Bryce. Bryce went home and printed missing dog posters for me and 3 days later I found my dog. Bryce was a stranger who became my bestfriend, and I have never found such a kind person ever since.


Lol I know this isn’t that good , but you can change it up or add stuff.

Which of the following memory is faster? PC4 22400 DDR4 3200

Answers

Answer:

DDR4-3200

Explanation:

PC4 22400 is the bus speed that can get a memory upt to DDR4-2800.. sort of

Other Questions
Find (a) PQ to the nearest tenth and (b) the coordinates of the midpoint of PQ. P(-6,6), Q(4,-1) Why are my veins poping out of my hands Explain how to determine the zeros of the polynomial f(x)= x + (b-a)x - abxfor the positive real numbers a and b. What are 3 activites which took place at the taboui / carbet of the kalinago Carmen made 270$ for 18 hours of work.At the same rate, how many hours would she have to work to make 165$? Solve 1/3x- 1 = 5.A. x = 12B. x = 18C. x = 1D. x=2 The position of my white neighbor is much more difficult. No brown specter pulls up a chair beside me when I sit down to eat. No dark ghost thrusts its leg against mine in bed. The game of keeping what one has is never so exciting as the game of getting. I do not always feel colored...I feel most colored when I am thrown against a sharp white background. 1) How does ZNH see herself in comparison to her white neighbor? Solve:one third plus five ninths equals blanka six ninthsb six twelfthsc eight ninthsd four sixths Math 5th gradeThe rule for an input/output table is output = x + 2 Briefly discuss dynamic and embedded SQL. Cite an example of how either enhance database design and performance the command function must be clearly established from the beginning of an incident. when command is transferred, the process must include: define absolute price how to improve your eyesight when you have glasses Question 5 (1 point)Scientific law explains how long something happens; scientific theory describes when something happens. True False Prepare a bond discount amortization table for Ayayai Corp., assuming Ayayai uses the effective interest method required by IFRS. (Round answers to 2 decimal places, e.g. 52.75.) De 1280 alumnos que tiene una escuela, 1088 salieron de excursin, qu porcentaje representa alos alumnos que faltaron a la excursin?A) 117.65%B) 85%C) 17.65%D) 15% for the budget year ending june 30, 2017m what was the single largest revenue source categroy for the califorina state goverment Hurry Which number line represents the solutions to -2xl = 4? a client has been completing the following exercise protocol for the barbell deadlift exercise three times per week for the past six weeks:first set: 6 repetitions; 275 poundssecond set: 5 repetitions; 265 poundsthird set: 5 repetitions; 265 poundsfourth set: 4 repetitions; 250 poundshe states that for the past two sessions the last set has not challenged him. what is the most appropriate adjustment to his program to continue increasing muscular strength? Simplify 20/32 into simplest form