who invented the smart phone?​

Answers

Answer 1

Answer:

IBM created the first smart phone


Related Questions

what ice system is mostly closely related to nissan’s e-4orce system?

Answers

The ICE (Internal Combustion Engine) system most closely related to Nissan's e-4ORCE system is its All-Wheel Drive (AWD) system.

Nissan's e-4ORCE is an electric AWD system designed to provide better handling, stability, and comfort in electric vehicles, while the traditional ICE AWD system offers similar benefits for vehicles with internal combustion engines. The i-Pilot system that is used here in Volvo's XC90 and XC60 Recharge models, while the e-4ORCE system is used in Nissan's Ariya electric crossover.

To know more about electric vehicles visit:

brainly.in/question/55313932
#SPJ11

As computers gained popularity, the ____ typewriters decreased along with the price.
a) manual
b) electric
c) electronic
d) portable

Answers

a) manual As computers gained popularity, the demand for manual typewriters decreased along with the price.

As computers became more popular, they gradually replaced manual typewriters in offices and homes. The convenience of electronic documents, email, and the ability to edit and format text easily with software made computers a more efficient choice. As the demand for manual typewriters decreased, manufacturers had to reduce their prices to compete with electronic alternatives, leading to a decline in profitability. With the rise of personal computers in the 1980s and 1990s, manual typewriters became nearly obsolete, and production decreased dramatically. Today, manual typewriters are mostly used as collectibles or for specialized purposes such as addressing envelopes or filling out forms that require carbon copies.

Learn more about typewriters here;

https://brainly.com/question/30435893

#SPJ11

mention five internet services​

Answers

1 ) cable internet 2) DSL internet 3) sattalite internet4) mobile internet5) BSNL

please mark me as brainlist

answer(s)

communication services,

informational retrieval services,

web services,

world wide web,

& video conferencing.

Which options allow users to modify the existing data in a report?
Report or Create
Create or Design View
Design view or Layout view
Print Preview or Report

Answers

Answer:

the answer is print preview

Explanation:

because i just tried both answers givin they were both wrong

what is thesaurus?what do you mean by spell chek feature

Answers

Answer:

Thesaurous is a book that lists words in groups of synonyms and related concepts.

A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.

Write a code segment to change the name of the Thing object, something, such that the new name consists of the old name with one character removed at random. For example, if something has name "ABCD", its new name could be set to "ACD". Write the code segment below. Can you help me by writing it in java?

Answers

A code segment to change the name of the Thing object, something, such that the new name consists of the old name with one character removed at random is given below:

The Code Segment

// C++ program to check whether two strings are anagrams

// of each other

#include <bits/stdc++.h>

using namespace std;

/* function to check whether two strings are anagram of

each other */

bool areAnagram(string str1, string str2)

{

// Get lengths of both strings

int n1 = str1.length();

int n2 = str2.length();

// If length of both strings is not same, then they

// cannot be anagram

if (n1 != n2)

 return false;

// Sort both the strings

sort(str1.begin(), str1.end());

sort(str2.begin(), str2.end());

// Compare sorted strings

for (int i = 0; i < n1; i++)

 if (str1[i] != str2[i])

  return false;

return true;

}

// Driver code

int main()

{

string str1 = "gram";

string str2 = "arm";

// Function Call

if (areAnagram(str1, str2))

 cout << "The two strings are anagram of each other";

else

 cout << "The two strings are not anagram of each "

   "other";

return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Write a code segment to change the name of the Thing object, something, such that the new name consists

what is the worst-case complexity to remove a node from the non-visited nodes data structure and insert it into the visited one?

Answers

It is to be noted that node removal can cause a lot of instability. For example, removing a node from a non-visited set of data can trigger a collapse of the data structure making the data corrupt.

What is a node?

Database nodes are storage nodes that connect to databases and conduct different operations on them, such as update, insert, delete, and select. Each database type needs a unique set of setup parameters.

It is critical to understand that nodes serve as a safeguard against faults that may occur on the primary database node, and you will have a standby node ready to take over the primary role from the malfunctioning node at any moment.

Learn more about data structures;
https://brainly.com/question/29487957?
#SPJ1

Help please and thanks

Help please and thanks

Answers

Answer:

B

Explanation:

THAT IS THE ANSWER BECAUSE YOU HAVE TO ADD ALL OF THEM AND THE ANSWER WOULD BE 3

Adding videos to your website can be tricky because there may be problems making sure they will play in all platforms .

Answers

It is true to state that Adding videos to your website can be tricky because there may be problems making sure they will play on all platforms.

Why do people add videos to websites?

Videos will assist you in reaching new website visitors and leaving a lasting impression. A video supplements the static content on a website to give a more exciting experience for the user. Videos are an excellent approach to establishing a long-term relationship with web visitors.

When it comes to educating potential consumers about a product, video footage is an excellent resource. In fact, 94% of marketers believe that leveraging video content has increased customer knowledge of a product or service.

Learn more about websites:
https://brainly.com/question/19459381
#SPJ1

Full Question:

True or False?

Adding videos to your website can be tricky because there may be problems making sure they will play on all platforms

X = 10
y =
20
х» у
print("if statement")
print("else statement")

Answers

Answer:

"else statement"

Explanation:

Given

The above code segment

Required

The output of the program

Analyzing the program line by line, we have:

x = 10 ----> Initialize x to 10

y = 20 ----> Initialize y to 20

if x > y ----> check if x is greater than y

    print("if statement") ----> Execute this line if the condition is true

The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed

else

   print("else statement")

"else statement" without the quotes will be printed because the if condition is false

what tools do businesses use to protect their networks from external threats? firewalls vpn antivirus software broadband

Answers

Firewall, VPN , antivirus software, and broadband are the tools do businesses use to protect their networks from external threats.

So, the correct answer is A, B, C and D.

Businesses use a variety of tools to protect their networks from external threats.

Firewalls are a key component, as they monitor incoming and outgoing network traffic and block unauthorized access.

VPNs (Virtual Private Networks) help secure data transmission by encrypting it, ensuring that sensitive information remains confidential.

Antivirus software plays a vital role in detecting and removing malicious software that could compromise a network's security.

Broadband, while not a direct security tool, provides a high-speed internet connection, enabling businesses to efficiently use these security measures and maintain a robust network defense.

Hence, the answer of the question is A, B, C and D.

Learn more about network at https://brainly.com/question/14464698

#SPJ11

Using Python, solve this problem.

Using Python, solve this problem.

Answers

Below is a Python function that takes two arguments, food_cost and location, and returns the total cost of the order including tax based on the location:

python

def calculate_total_cost(food_cost, location):

   if location in ['Williamsburg', 'James City County', 'York County']:

       tax_rate = 0.07

   elif location in ['Charlotte County', 'Danville', 'Gloucester County', 'Halifax County', 'Henry County', 'Northampton County', 'Patrick County']:

       tax_rate = 0.063

   elif location in ['Central Virginia', 'Hampton Roads', 'Alexandria', 'Arlington', 'Fairfax City', 'Fairfax County', 'Falls Church', 'Loudoun', 'Manassas', 'Manassas Park', 'Prince William', 'Charles City', 'Chesterfield', 'Goochland', 'Hanover', 'Henrico', 'New Kent', 'Powhatan', 'Richmond City', 'Chesapeake', 'Franklin', 'Isle of Wight', 'Newport News', 'Norfolk', 'Poquoson', 'Portsmouth', 'Southampton', 'Suffolk', 'Virginia Beach']:

       tax_rate = 0.06

   else:

       tax_rate = 0.053

   total_cost = food_cost + (food_cost * tax_rate)

   return total_cost

What is the code about?

To calculate the total cost of an order, simply call the function with the food cost and the location as arguments. For example:

scss

# Williamsburg order with food cost $32.50

total_cost = calculate_total_cost(32.50, 'Williamsburg')

print(total_cost)

# Halifax order with food cost $28.90

total_cost = calculate_total_cost(28.90, 'Halifax')

print(total_cost)

# Arlington order with food cost $45.67

total_cost = calculate_total_cost(45.67, 'Arlington')

print(total_cost)

# Winchester order with food cost $10.88

total_cost = calculate_total_cost(10.88, 'Winchester')

print(total_cost)

Therefore, This will output the total cost of each order including tax.

Read more about Python here:

https://brainly.com/question/26497128

#SPJ1

See text below

Using Python, solve this problem.

You're working for Chick-fil-A to update their registers. You're writing code to calculate the total cost of customers' orders with tax.

Create a function that has two arguments:

cost of food tax based on location

The function should return the total cost of the order including tax.

Run/call the function for the following:

food costs $32.50 & was ordered in Williamsburg food costs #28.90 & was ordered in Halifaxfood costs $45.67 & was ordered in Arlington food costs $10.88 & was ordered in Winchester

General Sales Tax Rate

In these locations

7%

• James City CountyWilliamsburg• York County

6.3%

Charlotte County• Danville• Gloucester County• Halifax County• Henry CountyNorthampton County• Patrick County

6%

Central VirginiaCharles City, Chesterfield, Goochland, Hanover, Henrico, New Kent, Powhatan, and Richmond CityHampton RoadsChesapeake, Franklin, Hampton, Isle of Wight, Newport News, Norfolk, Poquoson, Portsmouth, Southampton, Suffolk, and Virginia BeachNorthern VirginiaAlexandria, Arlington, Fairfax City, Fairfax County, Falls Church, Loudoun Manassas, Manassas Park, and Prince William

5.3%

Page Everywhere else

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

A program executes 15 billion instructions. You are running this program in two systems: System A: has a processor with 3 GHz and an average CPI of 2.0 System B: has an average CPI 1.2 and execution time is 1.5 X more than system A. What is the clock speed of processor in system B.

Answers

Answer:

Clock speed of B = 7.5 GHz

Given:

Processor speed of A = 3 GHz

Average CPI of A = 2

Average CPI of B = 1.2

Execution time of B is 1.5 times then A

Find:

Clock speed of B

Computation:

Execution time = CPI × Processor speed × Instructions

Execution time of B = 1.5[Execution time of A]

1.2 × Clock speed of B[15 billion] = 1.5[2 × 3][15 billion]

Clock speed of B = 7.5 GHz

- What is "metadata"?
- Give an example of a type of metadata that is important for the
USGS hydrograph datasets
- Why is metadata important?

Answers

Metadata is the data that explains other data. It provides additional information about a particular data set that is stored in a database or file. Metadata is essential for finding, understanding, and using data, as well as for data management and archiving.

Example of a type of metadata that is important for the USGS hydrograph datasetsUSGS hydrograph datasets include metadata that describes all aspects of the dataset. Here is an example of a type of metadata that is important for USGS data.Metadata is important for the following reasons

:1. It provides context for data - Metadata provides information about the data's source, collection, and meaning, providing necessary context for understanding the data.

2. It improves data management - Metadata is critical for managing data in a database or other system.

3. It improves data discovery - Metadata helps users locate and access data more easily. It is used for searching and filtering data sets.

4. It enables data sharing - Metadata facilitates data sharing by making it possible to understand data sets from different sources.

5. It enhances data quality - Metadata provides information about data quality, including the accuracy, precision, and completeness of the data.6. It aids in reproducibility - Metadata allows researchers to understand how the data was produced, facilitating the reproduction of the data.

To know more about Metadata visit:

brainly.com/question/30299970

#SPJ11

Q1 – A python script is attached below. Please choose the correct approach to update it so that it will draw a square instead of a line.
import turtle
t1 = turtle.Turtle()
for m in range(4):
t1.forward(50)
turtle.done()
A. Add “t1.right(90)” in the for loop, after the forward(50) statement.
B. Add “t1.right(90)” before the for loop.
C. Replace “t1.forward(50)” with “t1.square()” statement.
D. Replace “t1.forward(50)” with “t1.left(90)” statement.

Q2 – Try the following script, what will you get?
G1 = turtle.Turtle()
for i in range(50):
G1.forward(50)
G1.right(144)
turtle.done()

A. A star
B. A circle
C. A square
D. A curve

Answers

Answer:

A and A

Explanation:

Q1 – The correct approach to update the script so that it will draw a square instead of a line is:

A. Add “t1.right(90)” in the for loop, after the forward(50) statement.

This will make the turtle turn right by 90 degrees after each forward movement, creating a square.

Q2 – The script will draw:

A. A star

The script moves the turtle forward by 50 units, then turns it right by 144 degrees. This process is repeated 50 times, creating a star pattern. The angle of 144 degrees is chosen because it is a divisor of 360, which ensures that the turtle returns to its starting position after completing the loop.

どういたしまして

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

how do you open a program when there are no icons on the desktop?

Answers

Answer:

Press the windows button, then search for the program you wish to open. Then just left click on the program

When you open a program, If there are no icons on the desktop we need to double click on the desktop to reveal the hidden icons.

What is a desktop?Desktop icons are mainly designed for quick access to often used programs, files, and folders.some times your desktop icons may be hidden.To view them, we need to right-click the desktop, select the View option, and then select Show desktop icons. To add icons to your desktop such as This PC, Recycle Bin, and more we need to follow the steps given below.Select the Start button->and then select Settings->Personalization->Themes->Under Themes->Related Settings, select Desktop icon settings.Choose the icons you would like to have on your desktop and then select Apply and OK.

To learn more about the desktop refer to:

https://brainly.com/question/27029280

#SPJ

A user finished working on a computer in the lab. What should the user do so
that their work is safe and others can use the computer?

Answers

Answer:

Explanation:

The best thing to do in this scenario would be to save all of the work that the user has just finished on a personal data USB drive and then delete any of his work off of the computer. Also, if the user entered into the computer using their own account they should also log off from the computer. The next individual can log in with their own account if they need to use the computer. This would make sure that their work is safe and with them, as well as making sure that no other individual can see, take, or modify the work that they have done.

. Electricians will sometimes call ______ "disconnects" or a "disconnecting means."
A) SwitchesB) Three-pronged plugsC) Two-pronged plugsD) Electrical cords

Answers

Answer: A: Switches

Explanation:

Answer:

A) Switches

Explanation:

Overview
Once a project's charter is signed off and and the Work
Breakdown Structure has been created, the project manager must put
together plans to accomplish all the work required to complete the
p

Answers

Once a project's charter is signed off and the Work Breakdown Structure has been created, the project manager must put together plans to accomplish all the work required to complete the project. This is done through project planning, which is the process of defining, organizing, and coordinating the work required to complete a project.

Project planning has a few steps that a project manager must go through.

They include defining the project scope, developing the project plan, and establishing a project team.

The project scope is the detailed description of what will be accomplished during the project, including its objectives, goals, and deliverables.

This step is important because it helps ensure that everyone involved in the project understands what is expected of them.

It also helps to prevent scope creep, which is when the project's objectives change during the project's life cycle.

Developing the project plan involves creating a plan for how the project will be executed.

Read more about Work Breakdown Structure.

https://brainly.com/question/32636813

#SPJ11

The CPU is often called the
of the computer.

Answers

Answer:

Explanation:

Tower?

Answer:

Its often called the brains of a computer.

Explanation:

Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?

Answers

The PC-A should be able to request an IPv6 address from the DHCPv6 server and receive an address from the configured pool.

As an AI language model, I am not able to see any exhibit or visual content. However, in general, to allow PC-A to receive an IPv6 address from the DHCPv6 server, the following steps need to be taken:

1) Verify that the DHCPv6 server is operational and configured with a pool of IPv6 addresses to allocate to clients.

2) On the DHCPv6 server, configure a DHCPv6 scope for the subnet that PC-A is connected to. This scope should include the range of IPv6 addresses that will be allocated to clients, as well as other DHCPv6 options such as DNS server addresses and domain names.

3) On the router or layer 3 switch that serves as the default gateway for the subnet, enable IPv6 routing and configure an IPv6 helper address to forward DHCPv6 requests to the DHCPv6 server. The helper address should be the IPv6 address of the DHCPv6 server.

4) On PC-A, ensure that IPv6 is enabled and that the network interface is configured to obtain an IPv6 address automatically using DHCPv6.

For such more questions on  DHCPv6 server:

https://brainly.com/question/14143295

#SPJ11

The posting of thousands of State Department documents on the Wikileaks Web site is an example of _____.

Answers

The posting of thousands of State Department documents on the Wikileaks website is an example of a leak. The documents, which included diplomatic cables and other confidential information, were provided to Wikileaks by former U.S.

Army intelligence analyst Chelsea Manning, who was later convicted and sentenced to 35 years in prison for violating the Espionage Act.The posting of these documents on Wikileaks, which is a platform that allows whistleblowers to leak confidential information anonymously, caused significant controversy and led to debates about the limits of free speech and the responsibility of media organizations to protect confidential information.

In response to the leak, the U.S. government has taken a number of steps to increase the security of classified information, including the creation of the National Insider Threat Task Force and the implementation of stricter security protocols for government employees and contractors.In conclusion, the posting of thousands of State Department documents on the Wikileaks website is an example of a leak that caused significant controversy and led to debates about the limits of free speech and the responsibility of media organizations to protect confidential information.

To know more about confidential information visit:

https://brainly.com/question/16230661

#SPJ11

explain how do compare and contrast graphic organizers help you to synthesize information?

Answers

Answer:

Answer: Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set.

Explanation:

Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set

connor is caught cheating at school. when his parents find out, they hug connor and tell him not to worry about what the school thinks; he is a great kid, and they know he tried his best. connor's parents are most likely using which parenting style?

Answers

Connor's parents are most likely using Permissive Parenting style.

What is Permissive Parenting?

Parents who are permissive are lenient. They frequently wait until there is a serious issue before intervening.

They adopt a "kids will be kids" mentality and are quite forgiving. When they do impose penalties, they might not make the penalties last. If a child begs for their privileges, they might return them, or if they promise to behave well, they might let them out of time-out early.

Parenting styles of permissive parents frequently resemble those of friends more than those of parents. They frequently encourage their kids to talk to them about their problems, but they typically don't make an effort to discourage bad decisions or bad behaviour.

Learn more about permissive parents

https://brainly.com/question/28133579

#SPJ4

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

Which protocol is used to handle delivery of information from one network to another?.

Answers

Transmission Control Protocol (TCP)  is used to handle the delivery of information from one network to another.

In the field of computer and technology, a Transmission Control Protocol  (TCP) can be described as a kind of internet protocol that ensures establishing conversations between computing devices. Information can be delivered from one network to another using the Transmission Control Protocol (TCP). It transmits information in the form of pockets of data.

The usage of TCP ensures that a stable is made between digital networks for proper end-to-end data delivery.

The Transmission Control Protocol  (TCP) protects the integrity of the data shared between the net sources and before transmission of data, it ensures that a connection has been built between the source and the delivery system.

To learn more about Transmission Control Protocol (TCP), click here

https://brainly.com/question/14280351

#SPJ4

A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device

Answers

The information that would be the next to be processed by the receiving device is: IP at the internet layer.

Internet protocol (IP)

Internet protocol is a network protocol that help to transmit data to user device across the internet or network which inturn make it possible for user device to connect and communicate over the network.

Internet protocol at the internet layer is a TCP/IP software protocol which sole purpose is to transfer data packets across the internet after receiving and processing the data.

Inconclusion the information that would be the next to be processed by the receiving device is: IP at the internet layer.

Learn more about internet protocol here:https://brainly.com/question/17820678

Complete the sentence about mobile apps.
Some mobile apps use an
platform.
in the drop down menu it says blueberry xml and ios

which is the answer

Answers

Certain mobile apps require the aid of an integrated development platform (IDP) to produce and handle their software. Of these IDPs, Blueberry XML and iOS are two available for mobile app creation.

What is the best choice?

An adaptable choice among developers is Blueberry XML owing to its cross-platform IDP property - making it conducive for several programming languages.

In contrast, iOS is more specialized in creating apps solely designed for Apple's mobile operating system. Both IDPs offer accessible tools aiding developers to craft interfaces that are user-friendly, code-writing and app-testing for a seamless finish; ultimately delivering ideal mobile experiences for users.

Read more about mobile apps here:

https://brainly.com/question/30143420
#SPJ1

Other Questions
Cmo eres?Ella es inteligente.Estoy nervioso.Estoy enfermo.Soy alto Sara was thinking of a number. Sara halves the number and gets an answer of 38.5. Form an equation with x for the information How do you think evidence from nursing journals affects patient care?. Carl's class is collecting canned food for afood drive. If the class collects 33 poundson the first day and 41 pounds on thesecond day, how many pounds of foodhave they collected so far?Give your answer as a mixed number in simplest form.Enter the number that belongs in the green box.[2] pounds As Sierra and her friends joke about the hipster coffee shop, they also criticizing how and why her neighborhoods are changing. What is the meaning behind this conversation and what do Sierra and her friends see? What is the particular solution to the differential equation dy = x(2y 3) with the initial condition y(0) = -1? Answer: y = Submit Answer attempt 1 out of 2 What is the area of the polygon? it is a rectangle and a triangle [tex]f(x)=(x+2)^2(x-1)^2.[/tex]Find the range In this unit, you looked at numerical measures for statistics, including measures of central tendency and distribution for one-dimensional data and correlations for two-dimensional data. You also used histograms, box plots, and scatter grams to visually analyze central tendency, distribution, and correlation.What do you consider to be the advantages of the numerical values? What do you consider to be the advantages of the visual representations? Which do you prefer working with, and why? What type of skills are personal attributes or personality traits? A client is receiving leuprolide as part of his treatment for prostate cancer. The nurse would be alert for which of the following as a possible adverse effect?Gynecomastiamaintain optimal bladder emptyingbreast tenderness PLZ HELP! Which term most clearly describes a medium?A. Stage PlayB.PrideC.StoryD.Idea 50pts What similarities do van Gogh and Williams share?They both had multiple wives.They were in good health until they died.They were both well-respected.They both worked until death. The place where a new idea, invention, technology, etc. begins is known as a: Based on your findings, which theory about alien thickness seems most valid or most accurate? a. alien thickness is mainly affected by sunlight. the thickness may be used as a way to shield out the sunlight. b. alien thickness is mainly affected by temperature. this may be because aliens become dehydrated (lose water) at higher temperatures and become thinner. c. alien thickness is mainly affected by temperature. the greater thickness at lower temperatures may be used as a way to stay warmer in colder weather. d. alien thickness seems to change at random. it does not seem to be affected by the environment. please select the best answer from the choices provided a b c d you have arrived on the scene of a stabbing. as you approach the patient, you note that his shirt is off and a single stab wound to the right lower quadrant of the abdomen is evident. the patient appears unresponsive as you approach. at the patient's side, your first action should be to: Complete an analysis of the image Where is this quadratic function increasing?ResponsesA x = 3x = 3B x > 3x > 3C x 3x 3D x < 3 how has mary kom's perseverance and determination in the face of challenges contributed to her success as a boxer and as inspiration for others Each of the following can be a form of collateral when applying for a loan EXCEPT:A.carB.cashC.homeD.jewelry