when a salesforce user is deactivated, what happens to all of the records the user owns in salesforce?

Answers

Answer 1

In the case of deactivating a salesforce user, all of their associated records in salesforce become frozen until reassigned to them.

Salesforce is a cloud-based customer relationship management (CRM) platform for marketing, service, sales, collaboration, analytics etc. Salesforce assists businesses to discover more prospects, attracting customers with amazing services, and close more deals.

Deactivating a user in salesforce refers to the concept that the user will not be deleted from the system, but will no longer be able to log in to 'salesforce' as well as will lose access to any records that were manually shared with them before or records that were shared with them as team members.

You can leran more about salesforce at

https://brainly.com/question/28064650

#SPJ4


Related Questions

An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a connection the host established, what type of attack has occurred?

Answers

Reverse shell is known to be the type of attack that is said to have occurred in the above case.

What is reverse shell?

A reverse shell is said to be “connect-back shell,” and it is one that often takes advantage of the computer weakness of the target to start a shell session and it often access the victim's system.

Hence, Reverse shell is known to be the type of attack that is said to have occurred in the above case.

See options below

A.) Man-in-the-Browser (MitB)

B.) Reverse shell

C.) Rootkit

D.) Session hijacking

Learn more about Reverse shell from

https://brainly.com/question/16607263

#SPJ1

data analysts ask, "why?" five times in order to get to the root cause of a problem.
t
f

Answers

The given statement "Data analysts ask 'why?' five times in order to get to the root cause of a problem" is true.

This technique is known as the "5 Whys" and it is used in problem-solving and improvement processes.The 5 Whys is a simple but powerful tool used to identify the underlying cause of a problem.

When a problem occurs, rather than merely treating the symptoms, it aims to identify the root cause of the problem, thus preventing it from recurring in the future. To accomplish this, it uses a series of questions, which are referred to as the 5 Whys.

The method works by continually asking why the problem is occurring, until the underlying cause of the issue is discovered and addressed

Learn more about Five Whys technique at

https://brainly.com/question/31724414

#SPJ11

Which one?..........

Which one?..........

Answers

Answer:

d. Clock

Explanation:

A flip flop is an circuit, an electrical circuit precisely that is used as a means to story data or information. This type of data or information stored in a flip flop is binary data or information. A flip flop has a high stable state and a low stable state.

A flip flop is a circuit that is very essential and must be present when building systems like the computer or communication system.

A flip flop must have a CLOCK signal or indicator because this helps control the triggering(i.e the change from one state to another) that occurs in a flip flop.

Which of the following is not one of the challenges posed by international networks, including the Internet? A. Quality of service B. Costs and tariffs C. Security D. Network management E. Differences in Internet protocols

Answers

Correct option is A. Quality of service,it is not one of the challenges posed by international networks, including the Internet.

How do international networks not pose a challenge in terms of quality of service?

Quality of service (QoS) is not one of the challenges posed by international networks, including the Internet. QoS refers to the ability of a network to deliver reliable and predictable performance, such as low latency, high bandwidth, and minimal packet loss.

While QoS is important in many network environments, it is not typically considered a significant challenge in international networks.

On the other hand, challenges such as costs and tariffs, security, network management, and differences in Internet protocols are commonly encountered in international networks.

International networks often involve complex billing structures, regulatory frameworks, and varying pricing models, which can pose challenges in terms of cost management and tariff negotiations.

Security is a critical concern in international networks due to the diverse range of cyber threats and the need to protect sensitive data during transmission.

Network management becomes challenging due to the physical distance, diverse infrastructure, and varying technical standards across different countries.

Finally, differences in Internet protocols can hinder interoperability and require careful consideration when establishing connections between networks with varying protocols.

Learn more about Quality of service

brainly.com/question/15295852

#SPJ11

All keyboards are made up of the main ______ area, the ______ keys and the _______ keys.

A. Typing, Number, Symbol
B. Letter, Number, Control
C. Typing, Function, Control

Answers

Answer:

A.

Explanation:

All keyboards are made up of the main Typing area, the Number keys and the Symbol keys.

How is it possible for the router to know whether it is supposed to send a cat photo to your laptop
or your mom's phone or the display on your smart fridge?
O It uses the public IP address.
O It uses the POP address.
O It uses the private IP address.
O It uses the DNS address.

Answers

It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Router  is a  device that help to transfer data and across the internet or across the user device and the internet.

Private IP addresses are internet protocol addresses that is often  assign to user device by   router in order to a successful communicate to take place between the internet and user device.

Private IP addresses are mostly at:

•Home

•Office

•Business  environments

Inconclusion It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Learn more here:

https://brainly.com/question/19112414

you hide three worksheets in a workbook and need to unhide them. how can you accomplish this? select an answer: type the name of the hidden worksheet on the keyboard, then click unhide. right-click any visible sheet, then select which worksheet you want to unhide. right-click the button, then select which worksheet you want to unhide. click the view menu, then select unhide worksheets.

Answers

To unhide the hidden worksheets in a workbook, you can follow a simple process in Microsoft Excel.

The correct way to unhide worksheets is by right-clicking any visible sheet, then selecting which worksheet you want to unhide. Follow these steps:

Open the workbook containing the hidden worksheets.Right-click on the tab of any visible sheet at the bottom of the screen.From the context menu that appears, select "Unhide."A new dialog box will open, displaying a list of all hidden worksheets.Click on the worksheet you want to unhide and then click the "OK" button.

Repeat steps 2-5 for each hidden worksheet you want to unhide.

By right-clicking any visible sheet and selecting the worksheet you want to unhide from the context menu, you can easily unhide multiple hidden worksheets in a workbook.

To learn more about Microsoft Excel, visit:

https://brainly.com/question/24202382

#SPJ11

How does HTTP rely on the other layers of the Internet?

Answers

HTTP is commonly used on web browser and being on top of transport layer

When a document contains text displayed in 10-point Cambria, to what does the 10-point refer?-the font style-the number of colors in which a character can be displayed-the font size-the number of characters that can fit in one linear inch of text

Answers

In typography, the term "point" refers to a unit of measurement used to define the size of characters in a font. It is commonly used in the design and printing of documents, as well as in digital typography.

Therefore, when a document contains text displayed in 10-point Cambria, the "10-point" refers to the font size, which is the size of the characters in the font. In this case, the characters in the Cambria font are 10 points in height, which is a common size for body text in many documents.Hence, the correct answer is: "the font size".

To learn more about typography click the link below:

brainly.com/question/26733261

#SPJ11

Write a pseudocode algorithm that uses the For Each loop to display all of the
values in the following array:
Constant Integer SIZE = 10
Declare Integer values[SIZE] = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

Answers

so i’m not sure it’s making me answer a question

Here is a pseudocode algorithm that uses the For Each loop to display all of the values in the given array:

```

declare a constant integer named SIZE and set its value to 10

declare an integer array named values with SIZE elements and initialize it with the values 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10

for each integer value in values do

display the value

end for

```

This algorithm first declares a constant integer `SIZE` and an integer array `values` with `SIZE` elements, initialized with the given values. It then uses a For Each loop to iterate through each value in the `values` array and display it. The loop will execute 10 times, once for each element in the `values` array.

Consider the data about gender in the questionnaire from example 1.2. There we have n=227 obvservations and K=2 classes. If we encode the attribute values as 1 (female) and 2 (male), we have y1 =123 and y2=104. Using this data we can estimate the proportion of female students in the population to be

Answers

Consider the given information, n = 227, K = 2, y1 = 123, and y2 = 104. These values have been obtained by encoding the attribute values as 1 for female and 2 for male. Using these values, the proportion of female students in the population can be calculated as follows

:Step 1: Compute the total number of students in the population as follows:n = y1 + y2 = 123 + 104 = 227Step 2: Calculate the proportion of female students in the population as follows:Proportion of female students in the population = y1/n = 123/227 = 0.541Step 3: Interpret the result The proportion of female students in the population is 0.541 or 54.1%. Hence, the proportion of male students in the population would be 1 - 0.541 = 0.459 or 45.9%.
Therefore, the proportion of female students in the population is 0.541 or 54.1%. The answer can be written in 150 words as shown above.

Learn more about proportion here,
https://brainly.com/question/31548894

#SPJ11

write short note on social and emotional interaction

Answers

Social and emotional interaction refers to the way individuals interact with others and their ability to manage their own emotions in social situations. This involves skills such as communication, empathy, and understanding social cues.

Social and emotional interaction skills are critical for individuals to navigate social situations successfully and form strong relationships. Effective communication, empathizing with others, and understanding social cues can enhance one's ability to connect with others and foster positive interactions. Being able to regulate one's emotions in social situations is also crucial for managing stress, building resilience, and maintaining mental health. These skills can be improved through practice, such as engaging in social activities, seeking feedback, and learning from experience. Education and therapy can also provide valuable tools and strategies for developing social and emotional interaction skills and promoting healthy relationships and emotional wellbeing.

Learn more about mental health here;

https://brainly.com/question/31708532

#SPJ11

How has technology changed in 5 years? 2015 to 2020.

Answers

Answer:

From 2015 to 2020 technology has changed A LOT. Back then, we still had smartphones, but they aren't as advanced now. Smartphones now have artificial intelligience and lots of new social networking apps. And now, we get alerts if an earthquake happens or if something happens that affects the country.

Explanation:

The simple concept of personal computing, hatched by several Silicon Valley entrepreneurs and permeating almost all of modern society, remains perhaps the most important technological idea of the last 50 years.

a. True
b. False

Answers

Answer:

True

Explanation:

The advent of personal computing brought about by the implementation of several technologies including MOSFET, semiconductors, microchip and integrated circuits has revolutionized life in at a very high rate of change where traditional ways of doing things rapidly change and for the first time power was easily reachable by accessing a personal computer.

1. The computer personal computer brought about word processing, where there are very limited errors in individually printed documents and the time to produce a quality document was reduced

2. Email - With the advent of personal computers email, the information and communication time were lowered and it resulted in changes in commerce

3. Video conferencing - It was possible to have video conferencing with people and make decisions regarding direction can be made real time from very distant locations, which improved business reaction time

4. The mouse- The concept of having a graphic user interface improved computer interaction for people with limited programming skills.

Which of the following is used to regularly update an operating system? App Extension OS Patch

Answers

Answer:

patch

Explanation:

patch, by definition, is an update meant to fix security flaws.

app, extension, and os dont update

To regularly update an operating system is Patch.

What is Patch?Unlike different news apps, the Patch app allows users to subscribe to a personalized newsfeed from considerable cities and towns across the U.S. Following a smooth launch before this year, the app already includes over 233,000 downloads and averages a 4.5-star rating on both the Apple and Android app stores.In 2013, Patch was spun out of AOL as a joint experience with Hale Global. In January 2014, the latest owners reported layoffs of 400 journalists and other workers. In February 2016, The Wall Street Journal documented that Patch had 23 million users, which was advantageous and developing into new territories.The birth management patch may be a good alternative for someone who's sexually active, considers less than 198 pounds (90 kilograms), and discovers it hard to determine to take a pill every day or who keeps trouble ingesting pills. In some cases, medical or other circumstances make the use of the patch less practical or riskier.

To learn more about Patch, refer to:

https://brainly.com/question/20652851

#SPJ2

Consider the following code segment.
int[][] multi = new int[4][4];

for (int rows = 0; rows < 4; rows++)

{

for (int cols = 0; cols < 4; cols++)

{

if (cols == 0)

{

multi[rows][cols] = 0;

}

else if (cols == 1)

{

multi[rows][cols] = 1;

}

else if (cols == 2)

{

multi[rows][cols] = 2;

}

if ((rows % 2 == 0) && (cols % 2 == 0))

{

if ((rows >= 2) && (cols <= 2))

{

multi[rows][cols] = 9;

}

}

}

}

As a result of executing the code segment, how many elements in the two-dimensional (2D) array multi will store the value 9 ?


A) 0
B)1
C)2
D)4
E)6

Answers

Answer:

C

Explanation:

C.10 15 20 35

30 35 40 45

50 55 60 65

As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

How the elements in the array can be calculated?

Given the array

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

Therefore, As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

Learn more about array on:

https://brainly.com/question/13107940

#SPJ2

Your client is using advanced matching in the bank feed to find a match for a deposit that was made last week. While in the match transactions screen, he realizes that a rebate cheque was missing from the deposit, and he wants to enter it right onto the deposit. What two things are true about using the resolve difference feature in this scenario?

One or more of your selected options was incorrect. Selecting even just one incorrect option will earn no credit for this question. Please try again.

QuickBooks Online creates a journal entry to reflect the added information

QuickBooks Online creates a new deposit to reflect the added information

The total amount of the deposit – including the resolving transaction – will appear as two separate deposits on your bank reconciliation screen

The total amount of the deposit – including the resolving transaction – will appear as a single deposit on your bank reconciliation screen

QuickBooks Online creates a resolving transaction that posts to a Reconciliation Discrepancy account that gets automatically created

Answers

Firstly, QuickBooks Online creates a new deposit to reflect the added information of the missing rebate cheque. Secondly, the total amount of the deposit, including the resolving transaction, will appear as a single deposit on the bank reconciliation screen.

When using the "resolve difference" feature in QuickBooks Online to add a missing rebate cheque to a bank deposit, the software will create a new deposit to incorporate the missing transaction. This ensures that the deposit is accurately represented in the system with the added rebate cheque. Instead of modifying the original deposit, QuickBooks Online maintains a clear audit trail by creating a separate deposit entry for the missing amount. The resolving transaction, which includes the rebate cheque, will now be part of the deposit entry in QuickBooks Online. This means that when performing a bank reconciliation, the total amount of the deposit, including the added transaction, will be reconciled as a single deposit. This simplifies the reconciliation process, as there will be no need to deal with multiple entries for the same deposit, avoiding confusion or duplication errors.

As for the other options listed:

QuickBooks Online does not create a journal entry in this scenario.QuickBooks Online does not create a Reconciliation Discrepancy account for this resolving transaction. Instead, it directly adds the missing rebate cheque to the deposit entry.

Learn more about bank reconciliation here:

https://brainly.com/question/15525383

#SPJ11

How do we “read” and “write” in MAR and MDR memory unit, please help I am very confused :)

Answers

Answer:

No entiendo

Por favor traduce al español

our first question focuses on main-two-cvs-while.c (the working solution). first, study the code. do you think you have an understanding of what should happen when you run the program?

Answers

Since the code is: main-two-cvs-while.c, My response is Yes, I do think I have an understanding of what can happen when you run the program.

What does "running code" mean?

Running a code, as we call it, is when a team of medical professionals—doctors, nurses, respiratory therapists, technicians, and others—rushes to the bedside of a patient who is dying or, technically, has already passed away and makes an attempt to revive her despite all odds.

The act of a computer executing a program's instructions is known as "running" the program. Because it grants the program controlled access to the computer's resources, the operating system is crucial when you run or execute a program.

Therefore my response is Yes because the figures from the chapter are further developed and illustrated in this working example.

Learn more about program from

https://brainly.com/question/27359435
#SPJ1

Write a program that:

Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod).
Displays the sum.
Situation B
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Situation A:

#include <iostream>

#include <vector>

#include <string>

int main(int argc, char* argv[]) {

 //Fill it by own.

 std::vector<int> lotsOfNumbers = {0,1,2,3,4,5,6,7,8,9};

 //Loop to find odd numbers.

 for(int i=0;i<lotsOfNumbers.size(); i++) {

   if(lotsOfNumbers[i]%2!=0) std::cout << lotsOfNumbers[i] << std::endl;

   else continue;

 }

 return 0;

}

Situation B:

#include <iostream>

#define check(x) ((x>30) ? 2*x : 30-x)

int main(int argc, char* argv[]) {

 std::cout << check(15) << std::endl;

 std::cout << check(-2) << std::endl;

 std::cout << check(30) << std::endl;

 std::cout << check(78) << std::endl;

 

 return 0;

}

Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers
Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers

when you sign into a website, which computer does the processing to determine if you have the appropriate credentials to access the website?

Answers

The server hosting the website performs the processing to determine if you have the right credentials to access the website.

What is website

A website is an online collection of webpages, images and other digital assets that is hosted on a web server. It can be accessed through a web browser and viewed on any device with an internet connection. Websites are typically used to provide information or services to its users. They can be used for personal, business, or educational purposes. Websites are created by coding in HTML, CSS, and JavaScript, and are hosted on a web server. They can be maintained by the website owner or by a webmaster. Websites are a great way to connect with customers, share information, and promote products and services. They are also used for entertainment, providing users with games, videos, and more. Websites are an important part of the internet, and are essential for businesses to build their brand and reach new customers.

To know more about website
https://brainly.com/question/19459381
#SPJ4

When you sign into a website, the processing to determine if you have the appropriate credentials to access the website typically happens on the web server hosting the website.

What happens when you enter your login credentials?

When you enter your login credentials (such as your username and password) into the website's login page, your web browser sends that information to the website's server. The server then compares the entered credentials with the ones it has on file, typically stored in a database. If the credentials match, the server sends back a message to your browser granting you access to the site.

It's worth noting that some websites may also use additional authentication methods, such as multi-factor authentication, that involve additional processing on the user's device or on a separate authentication server.

To learn more about website, visit: https://brainly.com/question/28431103

#SPJ4

which of the following combinations of keys is used as a short for saving a document on a computer

Answers

ctrl+s  

is used to save

Hope this helped

-scav

Women in Mathematics: This woman, who was born in London in 1815, was one of the first people to realize that computing machines (such as the never-completed Analytical Engine) could perform more general actions than just arithmetic. Her namesakes include a programming language and two computing awards?

Answers

Augusta Ada King, Countess of Lovelace, an English mathematician and author who lived from 10 December 1815 to 27 November 1852, is most remembered for her contributions to Charles Babbage's Analytical Engine, a mechanical general-purpose computer.

What is programming language?For programmers (developers) to interact with computers, they need to use a programming language. In order to generate machine code or, in the case of visual programming languages, graphical elements, programming languages must follow a set of rules that allow string values to be transformed into different types of code. A programming language is a notational scheme used to create computer programmes. While they occasionally include graphics, formal programming languages tend to be text-based. They are an instance of a computer language. The fact that it took at least two years to complete developing the first Malbolge code demonstrates how difficult Malbolge is to learn.

To learn more about programming language, refer to:

https://brainly.com/question/16936315

The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts where it operates. calculates the expected expenditure for the federal government every year. outlines expected revenue that is due from the collection of taxes and fees.

Answers

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

for Jenny's personal computer?
id videos. Which operating
system would be appropriate Jenny's needs to buy a computer to create word documents, make presentations, listen to music, and watch movies and videos.
OA. UNIX
O B. Linux
O C. Microsoft Windows
O D. MS-DOS

Answers

Answer: C

Explanation: Microsoft Windows would be the most viable option here because UNIX and Linux are used for server-side applications, and MS-DOS is an old operating system which is not supported anymore. There is also the Microsoft 365 suite on Microsoft Windows, which can allow Jenny to make presentations using powerpoint, and edit videos.

once you have written your pseudo-code, you can then translate your psuedo-code directly to code. True or False

Answers

False. Pseudo-code is a high-level, informal representation of an algorithm.

It is used to outline the logic and structure of a program, but it is not meant to be directly translated into code. Pseudo-code is a tool for planning and communication, allowing developers to discuss and understand the algorithm before implementing it in a specific programming language. Translating pseudo-code to code involves converting the algorithm's logic and structure into the syntax and conventions of a particular programming language, which may require additional considerations and adjustments.

Learn more about Pseudo-code here:

https://brainly.com/question/30388235

#SPJ11

30 POINTS FOR THE CORRECT ANSWER
For this discussion, choose two different binding techniques, two different papers, and two different finishing techniques for a 24-page brochure. Describe the pros and cons of your choices and how it may impact your design and the setup of the document.

Answers

The chosen type of binding techniques are:

Saddle stitch binding. Hardcover or case binding.

The papers type are:

Uncoated paper coated cover stock

The finishing techniques are:

Lamination Spot UV varnish.

What are the pros and cons of my choices?

Case binding is best because  it is used in a lot of  books were all the inside pages are known to be sewn together.

The Cons of case Binding is that it does not give room for one to lay books  flat.

Saddle stitching is good because it can be used in small books that has fewer pages. Its limitations is that it only takes about 100 pages.

Learn more about binding techniques from

https://brainly.com/question/26052822

#SPJ1

Everytime a friend thies. to select something in
Windows, she gets a menue popping up Explain
to her what she is doing whing and why
she
cannot
select the objeto

Answers

Answer:

Please write properly your sentence is incomplete

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve this. On which tab is the Ruler option found?

choose *View got a 100%

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the
Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the

Answers

Answer:

view

Explanation: post protected

how can i fix this???

how can i fix this???

Answers

Answer:

ummm it seems like that you've destroyed (crack) your screen. Either take it to a repair shop or if you know how, try fixing it yourself

how can i fix this???
Other Questions
a transcranial doppler ultrasonography detects cerebral vasospasms in a client experiencing lethargy 8 days following a subarachnoid hemorrhage. the nurse anticipates which therapeutic intervention? Test whether 712.008 is divisible by 11 g suppose you received these bit strings over a communications link, where the last bit is a parity check bit. in which string are you sure there is an error? a) 00000111111 b) 10101010101 c) 11111100000 d) 10111101111 The Hernandez family is evenly splitting 777 liters of gasoline between their 444 cars.How many liters of gasoline should each car get? donita is angry with her boss, so she left work a little early in order to run an extra mile before it gets dark. which defense mechanism is donita employing? group of answer choices a. repression b. reaction formation c. rationalization d. sublimation The fact that culture influences language suggests that the same word might have different _____ meanings for individuals in one audience, verses individuals in another audience. Which of the following is the term used in psychology for a broad general idea that is organized based on science and explains a group of observations or details? Read "Sonnet" by James Weldon JohnsonMy heart be brave, and do not falter so,Nor utter more that deep, despairing wail.Thy way is very dark and drear I know,But do not let thy strength and courage fail;For certain as the raven-winged nightIs followed by the bright and blushing morn,Thy coming morrow will be clear and bright;'Tis darkest when the night is furthest worn.Look up, and out, beyond, surrounding clouds,And do not in thine own gross darkness grope,Rise up, and casting off thy hind'ring shrouds,Cling thou to this, and ever inspiring hope: Tho' thick the battle and tho' fierce the fight, There is a power making for the right.Which words or phrases reflect a positive tone? according to the class lecture, what is a characteristic of premium cable service? group of answer choicesa. they include channels like mtv, cnn, and comedy central. b.they tend to be part of a less expensive package from cable companies.c. they include local television stations as well as regional pbs stations. d.they cost more but generally offer newer movies and little or no advertising. In a 5.00 km race, a runner runs at a steady 3.0 m/s. what is their time for the race? The following reactionKBr + Mg --> awill occur because Mg is more active than K bwill not occur because Mg is more active than K cwill occur because K is more active than Mg dwill not occur because K is more active than Mg Consider the line shown on the graph. Enter the equation of the line in the form y=mx Find the surface area of each of the figures shown. At the end of chapter 5, Katniss gives Peeta a kiss. for what reason and where I need help with these two problems please and thank you Summary of the second chapter of Frankenstein Choose the correct pronunciation for the word. strictly strk-(t)l strk-(t)l strk-(t)l strk-(t)le 1. Simply supported beam, 6 in by 12in,fb=600psi, find center load P= ? (Include self-weight, assume 150 pcf concrete) How do I solve this question? Which sentence is an example of third-person narration?A. "Can you help me figure out the answer?" I asked the teacher,B. She asked the teacher to help her figure out a math problem,C. You ask the teacher to help you figure out a math problem,D. I asked the teacher to help me figure out a math problemHelppp !!!