Which of the following is an example of reducing? (waste management)

- printing on both sides of a piece of paper instead of just one

-processing use paper into new sheets of paper

-writing a report about the benefits of reusing paper

-emailing a document instead of printing and mailing it

Answers

Answer 1

Answer:

emailing a document instead of printing and mailing it


Related Questions

If you were going to construct a table that only included shapes name with number prefixes, which shape would you inlcude?
Asap

Answers

Answer: Triangle

Explanation: Triangle has Tri

When we look for errors inside of our code on our own or with a partner , what is that called?

Answers

It’s called that he is cheating
Debugging or troubleshooting

technician a says that some networks contain terminators located at both ends of the network. technician b says terminators are usually positioned inside some of the network computers. who is correct?

Answers

Based on the information, Technician B is mistaken, but Technician A is right.

Whuch technician is correct?

In computer networking, a terminator is a component that stops signals from reflecting at a transmission line's termination.

Terminators are not typically placed inside some of the network computers, as claimed by technician B. Network computers do not often contain terminators. Instead, they are typically located at the termination of the transmission line, which could be a port on a hub, switch, or router or the actual physical end of a cable.

As a result, Technician A is true that some networks contain terminators at both ends of the network, but Technician B is incorrect when they claim that some network computers also contain terminators.

Learn more about technician on

https://brainly.com/question/18428188

#SPJ1

what might be some challenges if you’re trying to design a product for someone

Answers

Answer:

failure

Explanation:

if someone dosnt like it

Failure,a picky person,time consumption if they can’t make up there kind,wasting time and money,

You are working as a software developer for a large insurance company. Your company is planning to migrate the existing systems from Visual Basic to Java and this will require new calculations. You will be creating a program that calculates the insurance payment category based on the BMI score.



Your Java program should perform the following things:



Take the input from the user about the patient name, weight, birthdate, and height.
Calculate Body Mass Index.
Display person name and BMI Category.
If the BMI Score is less than 18.5, then underweight.
If the BMI Score is between 18.5-24.9, then Normal.
If the BMI score is between 25 to 29.9, then Overweight.
If the BMI score is greater than 29.9, then Obesity.
Calculate Insurance Payment Category based on BMI Category.
If underweight, then insurance payment category is low.
If Normal weight, then insurance payment category is low.
If Overweight, then insurance payment category is high.
If Obesity, then insurance payment category is highest.

Answers

A program that calculates the insurance payment category based on the BMI score is given below:

The Program

import java.io.FileWriter;

import java.io.IOException;

import java.io.PrintWriter;

import java.util.ArrayList;

import java.util.Scanner;

public class Patient {

   private String patientName;

   private String dob;

  private double weight;

   private double height;

   // constructor takes all the details - name, dob, height and weight

   public Patient(String patientName, String dob, double weight, double height) {

       this.patientName = patientName;

       this.dob = dob;

       if (weight < 0 || height < 0)

           throw new IllegalArgumentException("Invalid Weight/Height entered");

       this.weight = weight;

       this.height = height;

   }

   public String getPatientName() {

       return patientName;

   }

   public String getDob() {

       return dob;

   }

   public double getWeight() {

       return weight;

   }

   public double getHeight() {

       return height;

   }

   // calculate the BMI and returns the value

   public double calculateBMI() {

       return weight / (height * height);

   }

   public static void main(String[] args) {

       ArrayList<Patient> patients = new ArrayList<Patient>();

       Scanner scanner = new Scanner(System.in);

       // loop until user presses Q

       while (true) {

           System.out.print("Enter patient name: ");

           String patientName = scanner.nextLine();

           System.out.print("Enter birthdate(mm/dd/yyyy): ");

           String dob = scanner.nextLine();

           System.out.print("Enter weight (kg): ");

           double wt = scanner.nextDouble();

           System.out.print("Enter height (meters): ");

           double height = scanner.nextDouble();

           try {

               Patient aPatient = new Patient(patientName, dob, wt, height);

               patients.add(aPatient);

           } catch (IllegalArgumentException exception) {

               System.out.println(exception.getMessage());

           }

           scanner.nextLine();

           System.out.print("Do you want to quit(press q/Q):");

           String quit = scanner.nextLine();

           if (quit.equalsIgnoreCase("q")) break;

       }

       try {

           saveToFile(patients);

           System.out.println("Data saved in file successfully.");

       } catch (IOException e) {

           System.out.println("Unable to write datat to file.");

       }

   }

   // takes in the list of patient objects and write them to file

   private static void saveToFile(ArrayList<Patient> patients) throws IOException {

       PrintWriter writer = new PrintWriter(new FileWriter("F:\\patients.txt"));

       for (Patient patient : patients) {

           double bmi = patient.calculateBMI();

           StringBuilder builder = new StringBuilder();

           builder.append(patient.getPatientName()).append(",");

           builder.append(patient.getDob()).append(",");

           builder.append(patient.getHeight()).append(" meters,");

           builder.append(patient.getWeight()).append(" kg(s), ");

           if (bmi <= 18.5) builder.append("Insurance Category: Low");

           else if (bmi <= 24.9) builder.append("Insurance Category: Low");

           else if (bmi <= 29.9) builder.append("Insurance Category: High");

           else builder.append("Insurance Category: Highest");

           builder.append("\r\n");

           writer.write(builder.toString());

           writer.flush();

       }

       writer.close();

   }

}

Read more about java programming here:

https://brainly.com/question/18554491

#SPJ1

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

how can a mantrap provide multifactor authentication?

Answers

A mantrap can provide multifactor authentication by requiring a user to pass through two or more secure doors that are controlled by an access control system. As the user enters the first door, the access control system will authenticate their identity using a biometric or credential-based system. Once their identity is verified, the first door will close and the second door will open, allowing the user access to the secure area.

A mantrap is a physical security access control system that uses two or more interlocking doors or gates to create a small enclosure. It is a highly secure access control method that ensures that only one person can enter or leave at a time. By requiring a user to pass through multiple secured doors, a mantrap can provide an additional layer of security for sensitive areas. The authentication methods can include biometrics, such as fingerprints or retinal scans, or access cards or key fobs.

You can learn more about multifactor authentication at

https://brainly.com/question/27560968

#SPJ11

How to solve defenders heart basement levers?

Answers

To solve the defenders heart basement levers, you will need to follow these steps:

Locate the levers in the basement of the defenders heart.Observe the symbols on the levers and take note of their positions.Determine the correct order to pull the levers based on the symbols and their positions.Pull the levers in the correct order to solve the puzzle.

By following these steps, you should be able to successfully solve the defenders heart basement levers.

What is defenders heart basement levers?

Defenders heart basement levers is about a video game, where you can have fun while solving it.

For more information about heart basement levers, visit:

https://brainly.com/question/27894163

#SPJ11

When using an array in a GUI program, if array values will change based on user input, where must the array be stored? a. It must be stored inside an event handler. b. It must be stored outside the method that processes the user's events. c. It must be stored inside the method that processes the user's events. d. It must be stored outside of the main program. QUESTION 17 When you declare an object, what are the bool fields initialized to? a. false b. null c"0000 d. true QUESTION 18 When you declare an object, what are the character fields set to? a. null b. false

Answers

When using an array in a GUI program, if array values will change based on user input, the array must be stored inside the method that processes the user's events.

It must be stored inside the method that processes the user's events.An explanation to the given question is as follows:If the values in an array are going to change due to user input, then the array needs to be located where the event processing method can access it. The array cannot be stored in an event handler since it would then only be accessible within the scope of the handler.

The purpose of an array is to store a set of similar data type variables, for example, integers or strings. Arrays are also used to hold data, such as survey data, stock prices, and other types of data that can be grouped into a list. Arrays in Java are a powerful feature since they may store any type of variable.You can create an object by using the keyword new. A new instance of a class is created when the new operator is used. It is essential to know what happens to the instance's data fields when a new instance is created.

To know more about GUI program visist:

https://brainly.com/question/33324790

#SPJ11

why is what you say in business as important as how you say it

Answers

Answer:

Because the things you say and how you say it can determine whether or not you sell an item, make a deal with another company and things of that nature.  Hope this helps!!

Because you have to be taken serious in business so that’s how it’s different

The entry to record in the proprietary accounts is notable because it uses account titles that are unique to the federal government.
O Blank 1: appropriations
O Blank 1: allotments
O Blank 1: debits
O Blank 1: Custodial

Answers

The entry to record in the proprietary accounts is notable because it uses account titles that are unique to the federal government. In this case, the correct term to use in Blank 1 is "appropriations."  The entry to record in the proprietary accounts is notable because it uses account titles such as appropriations, which are unique to the federal government.

The entry to record in the proprietary accounts is notable because it uses account titles that are unique to the federal government, specifically, the use of appropriations and allotments. This refers to the budgetary accounting process used by the federal government to control spending and allocate funds to specific programs and agencies.

Appropriations are the legal authority granted by Congress to federal agencies to spend money for specific purposes, while allotments are the amount of appropriations that are allocated to each agency. These unique account titles are used to track and monitor the use of federal funds, and are an important part of the accountability and transparency requirements of the federal government. Additionally, the use of custodial accounts may also be relevant in certain situations, as they are used to account for funds held by the government on behalf of individuals or entities outside of the federal government. Overall, the entry to record in the proprietary accounts is a complex process that reflects the unique nature of federal accounting and the need for precise tracking and control of government spending.
The entry to record in the proprietary accounts is notable because it uses account titles that are unique to the federal government. In this case, the correct term to use in Blank 1 is "appropriations."  The entry to record in the proprietary accounts is notable because it uses account titles such as appropriations, which are unique to the federal government.

To know more about appropriations visit:-

https://brainly.com/question/15578043

#SPJ11

What is the best budget electric skateboard under 500$ by your fact or opinion?
I'm giving brainliest to any answer + lots of points!!

Answers

Answer:

I have the Meepo Mini 2s and it is and amazing electric skateboard. The top speed for this skateboard is 28 mph.

It would also help me out a lot if you could solve my question too.

Adam has decided to add a table in a Word doc to organize the information better.
Where will he find this option?
Insert tab, Illustrations group
Insert tab, Symbols group
O Insert tab, Tables group
Design tab, Page Layout group

Answers

Answer:

no. 1 is the answer is the answer

Need answer ASAP. I’ll mark brainliest if correct

Need answer ASAP. Ill mark brainliest if correct

Answers

Answer:

I am pretty sure for the first option the answer is tasks, and for the second option, it is logical.

Explanation:

"tasks to be performed in a logical manner" sounds right to me.

help
i don't know answer

help i don't know answer

Answers

Answer:

the process ..................

During the normalization process the remedy for a relation that is not well formed is to?

Answers

During the normalization process, the remedy for a relation that is not well-formed is to decompose the relation into smaller, more well-formed relations. This helps to remove any redundancies and inconsistencies in the relation.

The normalization process involves breaking down complex relations into simpler relations to ensure that they meet certain standards of data integrity and consistency. This is done by eliminating redundancy and inconsistency, as well as ensuring that each attribute in the relation is dependent on the primary key. There are several normalization forms, each with its own set of rules and requirements.

The most commonly used are first normal form (1NF), second normal form (2NF), and third normal form (3NF). In general, a relation is said to be in a higher normal form if it meets the requirements of the lower normal forms.For example, if a relation is not in 1NF, it must be decomposed into two or more smaller, well-formed relations to eliminate any redundancies and ensure that each attribute is dependent on the primary key.

To know more about normalization process visit :-

https://brainly.com/question/33512570

#SPJ11

what can accommodate most file formats? btw there are no answer choices

Answers

Answer:.doc and .docx - Microsoft Word file.

.odt - OpenOffice Writer document file.

.pdf - PDF file.

.rtf - Rich Text Format.

.tex - A LaTeX document file.

.txt - Plain text file.

.wpd - WordPerfect documen

Explanation:

To find the location’s name of the cell, look to the . To add an action to the cell for that data, add commands in the . To move from one cell to the next, use .

Answers

Answer:

Name Box

Formula Bar

Either Tab or Enter

Explanation:

Answer:

To find the location’s name of the cell, look to the

✔ name box

.

To add an action to the cell for that data, add commands in the

✔ formula bar

.

To move from one cell to the next, use

✔ either tab or enter

.

Explanation:

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

Select all statements from the given choices that are the negation of the statement:
Michael's PC runs Linux.
Select one or more:
a. It is not true that Michael's PC runs Linux.
b. It is not the case that Michael's PC runs Linux.
c. None of these
d. Michael's PC runs Mac OS software.
e. Michael's PC runs Mac OS software and windows.
f. It is false that Michael's PC runs Linux.
g. Michael's PC doesn't run Linux.
h. Michael's PC runs Mac OS software or windows.
i. Michael's PC runs Windows

Answers

The statements that are the negation of "Michael's PC runs Linux" are: a. It is not true that Michael's PC runs Linux. b. It is not the case that Michael's PC runs Linux. d. Michael's PC runs Mac OS software. e. Michael's PC runs Mac OS software and windows. f. It is false that Michael's PC runs Linux. g. Michael's PC doesn't run Linux. h. Michael's PC runs Mac OS software or windows. i. Michael's PC runs Windows.

The negation of a statement is the opposite or contradictory statement. In this case, the statement "Michael's PC runs Linux" can be negated in multiple ways.

Options a, b, f, and g all express the negation by denying the truth of the original statement. Option d states that Michael's PC runs Mac OS software, which contradicts the statement that it runs Linux. Option e extends the negation by adding the condition that Michael's PC runs both Mac OS software and Windows, further diverging from the original statement. Option h also offers a contradictory statement by stating that Michael's PC runs either Mac OS software or Windows, but not Linux. Finally, option i simply states that Michael's PC runs Windows, which excludes Linux.

In summary, options a, b, d, e, f, g, h, and i all provide statements that negate the original claim that Michael's PC runs Linux.

Learn more about software.

brainly.com/question/32393976

#SPJ11

All variables are----------------------------------------------- help please

Answers

Answer:

variables are any characteristics that can take on different values, such as height, age, species I think

Answer

A variable basically works as a "placeholder" for anything that might change a majority of the time.

Examples

In science one may call a factor in a experiment that is subject to change a variable.

In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.

In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.

Which operation is not efficiently supported by (min) binary heaps?
a. DeleteMin
b. DeleteMax
c. FindMin
d. Insert
e. All of the above are efficiently supprted

Answers

The operation that is not efficiently supported by (min) binary heaps is DeleteMax.

How does the efficiency of (min) binary heaps differ for different operations?

Binary heaps are a type of data structure that are commonly used to implement priority queues. In a (min) binary heap, the minimum element is always located at the root, and the children of each node are guaranteed to be larger than their parent. This structure allows for efficient access to the minimum element (FindMin) and insertion of new elements (Insert) in logarithmic time complexity.

However, the DeleteMax operation is not efficiently supported by (min) binary heaps. Since the heap is organized in a way that the minimum element is always at the root, deleting the maximum element would require traversing the entire heap to find the maximum element and remove it. This operation would take linear time complexity, resulting in reduced efficiency compared to other operations.

Learn more about Binary heaps

brainly.com/question/14953093

#SPJ11


What is the total number of counts for
one whole note plus one dotted half
note plus two quarter notes minus one
half note multiplied by one half note?

Answers

Answer:

i belive your answer would be 32 because

Explanation:

whole note =4 beats

dotted half note =3 beats

and 2 quarter notes get =8 beats

all of that added together equals 18 minus half note =2 beats

which=16 times a half note which =2 would give you your answer 32

Answer:

I would say its 32 because

Explanation:

whole note =4 beats

dotted half note =3 beats

and 2 quarter notes get =8 beats

all of that added together equals 18 minus half note =2 beats

which=16 times a half note which =2 would give you your answer 32

How is IT used in entertainment to make cartoon movies

Answers

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct

Imagine a program with the following statement being the first line of its main method: Scanner input; Immediately after it is executed, the value of input is undefined.

Answers

To correct the error gotten from the bug when the program is executed and you get "the value of input is undefined", you have to rename the function parameter.

The code

Scanner input= new Scanner(System.in);

   while(choice < 1 || choice > 9) {

       System.out.println("Select an option from the menu below: "

               + "\n1. Letters only"

               + "\n2. Numbers only"

               + "\n3. Binary data"

               + "\n4. Hexadecimal data"

               + "\n5. Binary data which represents an even number"

               + "\n6. A binary string which contains one of 2 patterns"

               + "\n7. Validate a binary stirng which contains both of the patterns"

               + "\n8. Determine if a word is a pattern"

               + "\n9. Exit");

       if(choice < 1 || choice > 9) {

           System.out.println("Invalid input -- try again\n");

       }

   }

   return choice;

}

The error from your code is based on the fact that The scanner variable in the class is shadowed by the String parameter called input.

Read more about java programming here:

https://brainly.com/question/25458754

#SPJ1

NOT!!! Do not use a library (queue) and (stack) , you write it
Write function to check the vowel letter at the beginning of
names in Queue?

Answers

The provided function allows you to check if names in a queue start with a vowel letter. It does not rely on any library functions and utilizes a comparison with a predefined list of vowels. This function facilitates the identification of names that meet the vowel letter criteria within the given queue.

The following function can be used to check if the names in a queue begin with a vowel letter:

```python

def check_vowel_at_beginning(queue):
   vowels = ['a', 'e', 'i', 'o', 'u']
   while not queue.empty():
       name = queue.get()
       first_letter = name[0].lower()
       if first_letter in vowels:
           print(f"The name '{name}' starts with a vowel letter.")
       else:
           print(f"The name '{name}' does not start with a vowel letter.")

```

In this function, we first define a list of vowel letters. Then, we iterate through the elements in the queue until it is empty. For each name in the queue, we extract the first letter using `name[0]` and convert it to lowercase using `.lower()`. We check if the first letter is present in the list of vowels. If it is, we print a message stating that the name starts with a vowel letter. If it's not, we print a message indicating that the name does not start with a vowel letter.

This function allows you to process the names in the queue and identify which ones begin with a vowel letter.

To learn more about Functions, visit:

https://brainly.com/question/15683939

#SPJ11

What was the basis of building ARPAnet?

Answers

The basis of building ARPAnet is due to the zeal or the desire to assign  information over wide  distances without the use of  dedicated phone connections that will exist between all computer on a network.

What is ARPANET?

ARPANET is known to be the very first network that was said to be made up of distributed control.

Note that It was said to be implement TCP/IP protocols as it is the one that starts the use of Internet along  with use of these technologies.

Therefore, The basis of building ARPAnet is due to the zeal or the desire to assign  information over wide  distances without the use of  dedicated phone connections that will exist between all computer on a network.

Learn more about ARPAnet from

https://brainly.com/question/13721059
#SPJ1

many people shop online. Dicuss the benefits and drawbacks to the customer of shopping online.

Answers

Answer:

Explanation:

Shopping online has become increasingly popular in recent years due to the convenience it offers. There are several benefits and drawbacks to shopping online for customers.

Benefits:

Convenience: Online shopping allows customers to shop from the comfort of their own home, eliminating the need to travel to a physical store.

Time-saving: Online shopping saves time, as customers can easily find and purchase products without having to navigate through crowded stores or wait in long checkout lines.

Access to a wider variety of products: Online shopping provides customers with access to a wider variety of products, including rare and hard-to-find items.

Better prices: Online retailers often offer lower prices than physical stores due to lower overhead costs.

Easy price comparison: Customers can easily compare prices of similar products from different retailers, which helps them make informed purchasing decisions.

Drawbacks:

Unable to see or touch the product before purchasing: Customers cannot physically examine the product before purchasing, which may result in receiving a product that is different from what they expected.

Delivery delays: Delivery times may vary and sometimes take longer than expected.

Shipping costs: Shipping costs can add up, especially for larger and heavier items.

Risk of online fraud: There is a risk of online fraud, such as stolen credit card information or identity theft.

Lack of personal interaction: Online shopping lacks the personal interaction that customers may receive in physical stores, such as the ability to ask questions or receive recommendations from sales associates.

Benefits of Online Shopping:


1. Greater Selection: Online shopping allows customers to access a wider range of products than they might find in a physical store. This is particularly true for niche or specialty products that might not be available locally.

2. Competitive Pricing: Online retailers often offer lower prices than physical stores, due to lower overhead costs. Customers can also easily compare prices across different retailers to find the best deal.


Drawbacks of Online Shopping:


1. Shipping Costs: Depending on the retailer and the product, shipping costs can add a significant amount to the total cost of a purchase.

2. Delayed Gratification: Unlike physical stores, where customers can take their purchases home immediately, online shopping often requires a waiting period for shipping.

a) Artificial Intelligence is a way of making a computer, a computer-controlled
robot, or a software think intelligently, in the similar manner the intelligent
humans think. Explain THREE (3) AI perspectives.
b) Compare the Programming without AI and with AI
c) AI has been dominant in various fields. Classify the application of AI.

Answers

The option that is not a good way to define AI is: "ai is all about machines replacing human intelligence." The correct option is C.

Artificial intelligence (AI) is the science and engineering of creating intelligent machines, particularly intelligent computer programs. AI refers to intelligent agents that can learn from their environment and make decisions that will optimize their chances of achieving a particular goal. AI is not solely replacing human intelligence.

Rather, it is about augmenting human capabilities and making tasks more efficient and effective.Basically, AI is the application of computing to solve problems in an intelligent way using algorithms, and it is designed to augment intelligence and extend human capabilities, not replace them.  

Learn more about AI here:

brainly.com/question/28390902

#SPJ1

Cookie Scenario:public int removeVariety(String cookieVar)

Answers

The method removeVariety(String cookieVar) in the Cookie scenario would likely be a public method used to remove all cookies from the cookie jar that match the given variety.

This method would likely take a String parameter representing the variety of cookie to be removed and return an integer representing the number of cookies that were removed from the jar. The method would likely use a loop to iterate over the cookies in the jar and check if each cookie's variety matches the given cookieVar parameter. If a match is found, the cookie would be removed from the jar and a counter would be incremented. The method would then return the final count of cookies that were removed.

To learn more about variety  click on the link below:

brainly.com/question/3544037

#SPJ11

Other Questions
the nurse is caring for a client who is admitted for hypertension (htn). the nurse notes that the client has not been eating the food provided, and family members have brought in homemade food. what would be the best response by the nurse? Describe conduction and give an example Question 151 ptsRead the selection and the question, and then choose the option that best answers thequestionSi se da usted un golpe en la espalda, puede escuchar las recomendaciones del doctor:.Cuidese mejor si quiere sanar.. Descanse por una semana. Lave la herida bien con agua para no tener picor. No cubra la herida.According to the text, what would NOT be a good idea?Relaxing for seven daysResting at homeo Washing the woundO Going for a run around the block A contractor developed a multiplicative time-series model to forecast the number of contracts in future quarters, using quarterly data on number of contracts during the 3-year period from 2010 to 2012. The following is the resulting regression equation: In = 3.37 + 0.117 X - 0.083 Q1 + 1.28 Q2 + 0.617 Q3where is the estimated number of contracts in a quarter X is the coded quarterly value with X = 0 in the first quarter of 2010 Q1 is a dummy variable equal to 1 in the first quarter of a year and 0 otherwise Q2 is a dummy variable equal to 1 in the second quarter of a year and 0 otherwise Q3 is a dummy variable equal to 1 in the third quarter of a year and 0 otherwise In testing the coefficient for Q1 in the regression equation (-0.083), the results were a t-statistic of -0.66 and an associated p-value of 0.530. Which of the following is the best interpretation of this result? a. The number of contracts in the first quarter of the year is not significantly different from the number of contracts in an average quarter (a = 0.05). b. The number of contracts in the first quarter of the year is significantly different from the number of contracts in an average quarter (a = 0.05). c. The number of contracts in the first quarter of the year is significantly different from the number of contracts in the fourth quarter for a given coded quarterly value of X (a = 0.05).d. The number of contracts in the first quarter of the year is not significantly different from the number of contracts in the fourth quarter for a given coded quarterly value of X (a = 0.05). What is the total number of common tangents that can be drawn to the circles? Someone plsss help me I will make you brain Responda as questes identificando as respostas: A) quais pases fazem parte do BRICS? B) O que eles tm em comum? C) O que significa dizer que eles possuem economias emergentes? D) Quais so as possveis vantagens de se participar do BRICS? E) O que o grupo tem feito recentemente? F) Que impactos as suas aes tm para o Brasil?Responda as questes identificando as respostas: A) quais pases fazem parte do BRICS? B) O que eles tm em comum? C) O que significa dizer que eles possuem economias emergentes? D) Quais so as possveis vantagens de se participar do BRICS? E) O que o grupo tem feito recentemente? F) Que impactos as suas aes tm para o Brasil? The instantaneous rate of a reaction is determined by the slope of a line tangent to the curve detiined by the change in concentration versus time: False True What is the strongest point made by the World Systems Theory? Can someone help me shorten my sentence????Ill post the sentence in the comments!! 1. What are the characteristics of a gas?A. a definite shape but no definite volumeB. no definite shape or definite volumeC. a definite volume and definite shapeD. no definite shape but a definite volume Please answer question 19 with specific answers, reasons andreferences.For questions # 17 through # 19, consider this recent perspective on targeting PCSK9 in cardiovascular therapies: https://www.dicardiology.com/article/what-trends-are-ahead- cardiovascular-medicine-2018 17. (10 pts) What are PCSK9 inhibitor 'drugs' and what are their mechanisms of action(s)? (Hint: there may be more than one type of inhibitor!) 18. (10 pts) Describe the PCSK9 molecular targets and their structure, function and tissue distribution. 19. (10 pts) How are they similar or different to related drugs, such as statins? A nurse is preparing a client who is to receive chemotherapy for treatment of ovarian cancer. Which of the following actions should the nurse plan to take? a. Tell the client to expect dark stools following chemotherapy.b. Have the client floss 4 times daily.c. Have the client swish with commercial mouthwash before therapy.d. Administer an antiemetic prior to the procedure. A centrifugal pump has impeller 400 mm in diameter and 20 mm wide at outlet. The vane angle is 45 and the velocity of flow 2.59 m/s at outlet. If the pump delivers 3.6 m3 of water per minute when running at 920 r.p.m. Assume overall pump efficiency as 68% and the power of the pump 65.75 kW. Determine: (i) Pump net head. (ii) The torque. (iii) Specific speed if hmano =25.23 m. ????????????????????????????????????????????? 5- Match the right to the left:a) Amlodipine.blocking Ang 2 formationDecreases retention of water and salt byb) Enalapril ACEHDilates Blood vessels to decrease bloodpressureDecreases retention of water and salt by Anc) Labetalol.receptors.d) Lorsartan.Slows down Heart ratee) Furosemide.Increases diuretic but retains the potassiuIncreases Diuresisf) Spironolactone. Eighty-year old mrs. smith has a bent-over stance with a noticeable hump back. along with osteoporosis, mrs. smith also is afflicted with which condition? who is the first president in Philippines The cylinder below has a volume of 785 Feet cubed, and the cone has a volume of 314 Feet cubed.A cylinder has a volume of 78.5 feet squared and a cone has a volume of 78.5 feet squared.Which explains which figure has the greater height?The cylinder has a greater height because the bases are the same, but the cylinder has a greater volume.The cylinder has a greater height because the volume of the cylinder is greater than twice the volume of the cone.The cone has a greater height because the bases are the same, but the volume of the cylinder is less than 3 times the volume of the cone.The cone has a greater height because the bases are the same, but the volume of the cylinder is less than 4 times the volume of the cone. Name:Weekly LangMondayIs the verb past, present, or future tense?Mars is the fourth planet from the sun.