Match the items with their respective descriptions.

to navigate between worksheets

to protect a worksheet

to change the position of a worksheet

to rename a worksheet

select a password

arrowRight

drag the worksheet tab to the new position

arrowRight

double-click the worksheet tab

arrowRight

press Ctrl and Page Up or Page Down keys

arrowRight

Match The Items With Their Respective Descriptions.to Navigate Between Worksheetsto Protect A Worksheetto

Answers

Answer 1

Answer:  Here are the correct matches:

Select a Password  ---->   to protect a worksheet

drag the worksheet tab to the new position  ---->   to change the position of a worksheet

double-click the worksheet tab  ---->   to rename a worksheet

Press Ctrl and Page Up or Page Down keys  ---->   to navigate between worksheets

Explanation:  Confirmed correct.  :)


Related Questions

any time a navigation link is clicked have it do the following: (1 pt) update the content of the tag with the link text (1 pt) update the content of the tag with the link text hint: get the word of the current navigation and pass it to updatecurrentpage()

Answers

The program that updates the content of the tag with the link text each time a navigation link is clicked is given below:

Home Page View

struct HomePageView: View {

   var body: some View {

       ZStack{

          (Color(#colorLiteral(red: 1, green: 0, blue: 0, alpha: 1)))

               .ignoresSafeArea(.all)

           VStack {

               Text("Hello Chap")

               Button {

                  print("hello chap")

               } label: {

                   Text("Hello Chap")

               }

               Spacer()

           }

       }

      .navigationBarItems(leading: Text("Title"), trailing: HStack(spacing: 0.00001) {

           Spacer()

           NavigationLink(destination:WelcomePage()){

               Image("icon1")

               

           }

          NavigationLink(destination:WelcomePage()){

               Image("icon2")

               

           }

           NavigationLink(destination:WelcomePage()){

              Image("icon3")

               

           }

       })

   }

}


Welcome Page View

struct WelcomePage: View {

   var body: some View {

       NavigationView{

           NavigationLink(destination:HomePageView()){

               Text("Sign in")

               //.font(.custom(buttons_font, size: 17))

                   .foregroundColor(.white)

                   .padding()

                   .background(

                       RoundedRectangle(cornerRadius: 15)

                           .fill(Color(red: 0.14, green: 1, blue: 0.73))

                           .frame(width: 208, height: 27)

                           .overlay(RoundedRectangle(cornerRadius: 15)

                               .stroke(Color.white, lineWidth: 1))

                   )

           }

       }}}

Read more about web programming here:

https://brainly.com/question/27518456

#SPJ1

are those data that visitors and customers produce when they visit a website and click on hyperlinks. group of answer choices cookies erp clickstream data rfid

Answers

Clickstream data  are those data that visitors and customers produce when they visit a website and click on hyperlinks.

What is a clickstream data analysis?

A clickstream is a record of information about mouse or touchpad clicks made by website visitors on computer screens. This kind of data offers a visible record of user behavior together with thorough feedback. 24

Note that the tracking and analysis of website visits is known as clickstream analysis and is a type of web analytics (see separate article). Clickstream analysis commonly uses the Web server log files to monitor and measure website activity, while there are different ways to gather this data.

Hence, option C is correct.

Learn more about Clickstream data from
https://brainly.com/question/28334815

#SPJ1

See full question below

_____ are those data that visitors and customers produce when they visit a website and click on hyperlinks.

1. ERP

2. Cookies

3. Clickstream data

4. RFID

after taking over from a departed systems administrator, you find the directory and some files in it that cannot be deleted, no matter what the permissions you set on them with the chmod command. which command will you use to discover the problem?

Answers

To assist you in solving the issue, this command displays the permissions of each file in the directory. The group permissions on the directory are probably set wrongly.

When examining a script that runs successfully from the user's home directory but not from any other location, a relative path is being used. The file has more links than one. The file and another file have the same inode number. The file and another file have the same data. The ls command lists the working directory's contents by default (i.e. the directory you are in). Using the pwd command, you can always determine which directory you are in.

Learn more about command here-

https://brainly.com/question/14583083

#SPJ4

problem 11 number of needed usable hosts network address address class default subnet mask custom subnet mask total number of subnets total number of host addresses number of usable addresses number of bits borrowed 8,000 135.70.0.0 what is the 6th subnet range? what is the subnet number for the 7th subnet? what is the subnet broadcast address for the 3rd subnet? what are the assignable addresses for the 5th subnet?

Answers

510 host IP addresses are available, which is 512 minus 2. This would surely work for a network of 20 users today and 300 hosts in the future. With that knowledge, we can conclude that the network's most effective subnet mask is 255.255.254.0.

Total number of subnets: The value 248 (11111000) of the subnet mask 255.255.255.248 shows that 5 bits are utilized to identify the subnet. Simply raise 2 to the power of 5 (25) to determine the total number of subnets available. The answer is 32 subnets. The local broadcast address, which is only transmitted within the network, is represented by the number 255.255. By default, this broadcast data cannot pass across routers. It is a restricted broadcast address, in other words.

Learn more about Subnet here-

https://brainly.com/question/15055849

#SPJ4

an analyst working for a british school system just downloaded a dataset that was created in the united states. the numerical data is correct but it is formatted as u.s. dollars, and the analyst needs it to be in british pounds. what spreadsheet tool can help them select the right format?

Answers

Since the an analyst working for a British school system just downloaded a dataset that was created in the united states, the spreadsheet tool that can help them select the right format is  format as currency.

What is a spreadsheet  about?

A spreadsheet is seen as a kind  of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.

Note that Microsoft's Excel spreadsheet program is a part of the Office family of business software programs. Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Therefore, A decimal point (.) is used in the format of United States (U.S.) currency to distinguish between dollars and cents. In some nations, the distinction is denoted by a comma (,) rather than a decimal.

Learn more about spreadsheet tool from

https://brainly.com/question/26919847
#SPJ1

question 5a data analyst is working with the penguins data. they write the following code: penguins %>%the variable species includes three penguin species: adelie, chinstrap, and gentoo. what code chunk does the analyst add to create a data frame that only includes the gentoo species?

Answers

The code chunk that the analyst need to add to the data frame that only includes the gentoo species is filter(species == "Gentoo")

The filter function in R programming allows the data analyst to be specific on which part of the data they want to view. The two equal signs in the argument mean "exactly equal to." Using this operator instead of the assignment operator <- calls only the data about Gentoo penguins to the dataset.

Learn more about filter function from:

https://brainly.com/question/28209816?referrer=searchResults

#SPJ4

What database term was used to describe a single consolidated worksheet composed of values retrieved from multiple worksheets using excel vloookup that was created with the goal of improving the visibility of key information used in decision making?.

Answers

The database term was used to describe a single consolidated worksheet composed of values retrieved from multiple worksheets using excel vlookup that was created with the goal of improving the visibility of key information used in decision making is VLOOKUP.

What is VLOOKUP?

Vertical lookup is referred to as VLOOKUP. This is the process of using a spreadsheet's lookup function to search for data vertically across the entire sheet in Excel.

Vertical Lookup is referred to as VLOOKUP. VLOOKUP is a built-in Excel function that, as its name implies, enables you to find a specific number by looking for it vertically across the page. Although VLOOKUP in Excel may seem difficult, you will learn how to use it.

Therefore, When you need to search by row in a table or a range, use VLOOKUP. For instance, you could use the part number to check the cost of an automobile part or the employee ID to seek for a person's name.

Learn more about vlookup from

https://brainly.com/question/14042837
#SPJ1

in this assignment you will create, implement and test a sequence4.template file. the material from ch1 ~ 6 of the textbook can help you tremendously. the chapter 6 of the text book is focus on template class. you need to spend more time on understanding template prefix, template parameter, typename and etc. i call these (template prefix, template parameter, .etc.) are template stuff. implementing the template class almost the same as implementing a regular class, but you need to add the template stuff in the file and save the file name with a template extension. if you feel confusion with the template stuff in a file you can implement the class as a regular class and add the template stuff at the end of implementation. you are welcome to use more advance skills than the techniques introduce in the textbook to do the assignment.

Answers

As demonstrated below, you can use both keywords: declarations of the functions for the classes T and typename T templates; 3. This may be done in C++ by using template parameters.

Similar to how standard function parameters may be used to send values to a function, template parameters allow you to pass types to a function as well. A template parameter is a specific form of parameter that can be used to pass a type as an argument. It makes no difference whether you write "typename T" or "class T"; programmers who use C++ follow this norm. Personally, I like "typename T" since it more precisely specifies its purpose, i.e., defining a template with a certain type.

Learn more about Template here-

https://brainly.com/question/13566912

#SPJ4

as you learned from our class and readings, the modulo operator can be useful in surprising ways. for this assignment, you'll use it to validate upc barcodes. in most stores today, almost every item you purchase has a universal product code (upc). the upc is typically printed on the product and is read by a barcode scanner.

Answers

The program to illustrate the modulo operator will be:

#define a function to check UPC number

def is_valid_upc(list_of_integers):

#define result to store the sum of digits

result=0

# get the lenght of list

digits=len(list_of_integers)

#chaeck condition for valid and return True or False

if digits>2 and sum(list_of_integers)>0:

for i in range(digits-1,0,-1):

if i%2==0:

result +=list_of_integers[i]*3

else:

result +=list_of_integers[i]

if result%10==0:

return True

else:

return False

else:

return False

#get the list input from user

list_of_integers = eval(input("Enter the UPC number : "))

#call the function and print the result

print(is_valid_upc(list_of_integers

How to illustrate the information?

When two numbers are split, the modulo operation in computing yields the remainder or signed remainder of the division. A modulo n is the remainder of the Euclidean division of a by n, where an is the dividend and n is the divisor, given two positive numbers, a and n.

The modulus operator, which operates between two accessible operands, is an addition to the C arithmetic operators. To obtain a result, it divides the provided numerator by the denominator.

Learn more about modulo operator on:

https://brainly.com/question/28586330

#SPJ1

Candice is writing an essay about Independence Day in Australia. What fact should she include in her essay?

Answers

Since Candice is writing an essay about Independence Day in Australia. the fact that she can  include in her essay is:

The history of Australia before their Independence.The fight for Independence. The people who contributed to achieving Australia's Independence. The day that it is celebrated.

When did Australia obtain independence?

Australia is said to be  Founded on January 1, 1901. On January 1, 1901, the British Parliament passed legislation that gave the six Australian colonies the ability to jointly rule themselves as the Commonwealth of Australia.

Australia gradually wrested full autonomy from the UK. The British Parliament approved laws on January 1st, 1901, empowering the six Australian colonies to function as independent states within the Commonwealth of Australia.

Therefore, including the details about can make you write a good essay.

Learn more about Independence Day from

https://brainly.com/question/24624540
#SPJ1

you need to create a user account via the useradd utility. after checking this distribution's account creation configuration files, you discover that the home directive points to a different location than desired. which useradd option will allow you to create the home in an alternative location?

Answers

The useradd option that will allow you to create the home in an alternative location when creating a user account via the useradd utility is -d

What is the useradd command?

The useradd command is the most basic method through which you can add a user on a Linux OS. In a useradd command, there are so many options to choose from when adding or creating a new user account. They include: -d, -r -u -G jellyfin etc.  

Learn more on Useradd command from:

https://brainly.com/question/28635202?referrer=searchResults

#SPJ4

running on a particular treadmill you burn 4.2 calories per minute. write a program that uses a loop to display the number of calories burned after 10, 15, 20, 25, and 30 minutes

Answers

The software serves as an example of loop usage. Loops are phrases that carry out repeated tasks. running on a particular treadmill you burn 4.2 calories per minute.

The software serves as an example of loop usage. Loops are phrases that carry out repeated tasks. The Python program that uses comments to describe each line is as follows:

# This outputs the header print("Time t Calories").

#This loops through I in the range (10, 31, 5) iteratively from 10 to 30 with a 5 increment:

# Printing calories burned every five minutes, this function is print(i,"t", I * 4.2)

Start incorporating ascents if you typically run in a mode without ascents and descents.

Learn more about Software here-

https://brainly.com/question/985406

#SPJ4

When troubleshooting, which of the following should be the very first step?

A.
find the root cause

B.
identify the problem

C.
verify

D.
make and execute a plan

Answers

Answer:

B. identify the problem

Answer:

B. Identify the problem

lilly is responsible for security on web applications for her company. she is checking to see that all applications have robust input validation. what is the best way to implement validation?

Answers

The best way Lily can implement validation is by using both client and server side validation.

What is validation?

In validation, when data is entered in a browser, the web server will check to see that the data is in the correct format and within the constraints set by the application. Validation done in the browser is called client-side validation, while validation done on the server is called server-side validation.

Learn more on validation from:

https://brainly.com/question/13542815?referrer=searchResults

#SPJ4

you use the read csv() function to import the data from the .csv file. assume that the name of the data frame is flavors df and the .csv file is in the working directory. what code chunk lets you create the data frame?

Answers

The code chunk that lets you create the data frame is flavors_df <-read_csv("flavors_of_cacao.csv").

Here's the complete question:

you use the read csv() function to import the data from the .csv file. assume that the name of the data frame is flavors df and the .csv file is in the working directory. what code chunk lets you create the data frame?

A flavors_df <- "flavors_of_cacao.csv"(read_csv)

B  flavors_df + read_csv("flavors_of_cacao.csv")

C  flavors_df <-read_csv("flavors_of_cacao.csv")

D read_csv("flavors_of_cacao.csv") +  flavors_df

What is a code chunk?

Code chunk refers to a  runable piece of R programming language code that helps to reduce incidents of mismatch pertaining to the commentary in a paper and the results being discussed.

Learn more on code chunk rom:

https://brainly.com/question/28209816?referrer=searchResults

#SPJ4

how can green computing be implemented in an organization? answer unselected by relocating certain divisions to different areas of the world, depending upon their computing power needs unselected by using virtualization to replace hundreds of individual servers with just a few powerful mainframe computers unselected by replacing energy-draining mainframes with more energy-efficient desktop machines unselected by taking old computers to the landfill and replacing them with just a few mainframes

Answers

Green computing can be implemented in an organization by using virtualization to replace hundreds of individual servers with just a few powerful mainframe computers.

Green computing, also known as green technology, can be defined as the use of computers and other computing devices and equipment in energy-efficient and eco-friendly ways. Organizations that use green computing methods often deploy energy-efficient central processing units (CPUs), peripherals, power systems, and servers. Organizations that use green computing methods also focus on reducing resource use and properly disposing of physical and electronic waste (e-waste).

Companies that use green computing strategies can include the following steps:

Remote work.Smart technology. Upgrade and rearrange the data center. Power down. Strategic scheduling. Display selection. Computer selection.Power management. Temperature check. E-waste.Alternative energy.

Learn more about green computing here https://brainly.com/question/14491844

#SPJ4

The distance from the Earth to the Moon is an example of _____.
A. misinformation
B. the unknowable
C. a biased opinion
D. an easily verifiable fact

Answers

Answer: D. an easily verifiable fact

Explanation: Because scientists have calculated that and have used those calculations to make the moon landings possible.

Please answer
9 and 10
Asap

Answers

the answer to you two questions are true and true

what is mini computer

Answers

computer that was smaller, less expensive, and less powerful than a mainframe or supercomputer but more expensive and more powerful than a personal computer

8: operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space. this disk location is called .

Answers

Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space. this disk location is called Virtual memory.

What is a virtual memory?

A Virtual memory is referred to as a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).

Learn more on Virtual memory from:

https://brainly.com/question/28562174

#SPJ4

a list of employees that has been sorted in descending order needs to be reversed. which xxx completes the algorithm to sort the list in ascending order? ascendinglist(emplist, begin, end) { if (begin >

Answers

We can actually deduce here that the xxx that completes the algorithm to sort the list in ascending order is: AscendingList(empList, begin + 1, end - 1).

What is algorithm?

An algorithm is actually known to be a sequence of instructions that have been set in order to solve specific problems. Also, algorithm is actually used to perform computations.

In mathematics and computer science, algorithms are employed in calculations and processing of data.

Thus, we see that in the given question above, AscendingList(empList, begin + 1, end - 1) is the xxx that completes the algorithm to sort the list in ascending order.

Attached is the complete question.

Learn more about algorithm on https://brainly.com/question/24953880

#SPJ1

What is the size of the opening in the camera that the light passes through?

A.Shutter

B.Lens

C.Aperture

D.Sensor​

Answers

Answer: Aperture is the size of the opening in the lens. Some lenses have fixed apertures, but most photographic lenses have variable apertures to control the amount of light entering the lens.

Explanation:

Answer: C. Aperture is the correct answer

The Boolean operator NOT _____ terms from a search query.
A. eliminates
B. isolates
C. standardizes
D. includes

Answers

Answer:

eliminates

Use NOT in a search to: eliminate words from your search.

c define a function scalegrade() that takes one integer parameter as the student's score and one character parameter passed by pointer as the student's grade. the function updates the grade with:

Answers

Using the knowledge in computational language in C++ it is possible to write a code that define a function scalegrade() that takes one integer parameter as the student's score and one character parameter passed by pointer as the student's grade.

Writting the code:

#include<iostream>

using namespace std;

bool ScaleGrade (int points, char &grade) //function definition

{

 

if (points >= 67 && points < 80) //points validation

 

  {

      if (grade == 'C')  //when grade equals to 'C'

     return false;   //then returns false

     grade = 'C'; //assigns 'C' to grade

     return true; //returns true

  }

     

 return false;  

}

int

main ()

{    //declarations

 int studentTotal;

 char studentGrade;

 

bool isChanged;

 

cin >> studentTotal;

 

cin >> studentGrade;

 

isChanged = ScaleGrade (studentTotal, studentGrade); //funcion calling

 if (isChanged)

   

   {

     

cout << "Grade is " << studentGrade << " after curving." << endl;

   

}

 

 else

   {

     

cout << "Grade " << studentGrade << " is not changed." << endl;

   

}

 

return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

ry seven years, your company provides a 6-week sabbatical for every employee. vera edwards (vedwards), corey flynn (cflynn), and bhumika kahn (bkahn) are leaving today, while maggie brown (mbrown), brenda cassini (bcassini), and arturo espinoza (aespinoza) are just returning. the company security policy mandates that user accounts for employees gone for longer than two weeks be disabled. in this lab, your task is to complete the following: lock the following user accounts: vedwards cflynn bkahn unlock the following user accounts: mbrown bcassini aespinoza when you're finished, view the /etc/shadow file to verify the changes.

Answers

Since the company security policy mandates that user accounts for employees gone for longer than two weeks be disabled, the task function are:

Type:

usermod -l vedwards

usermod -l cflynn

usermod -l bkhan

usermod -u mbrown

usermod -u bcassini

usermod -u aespinoza

What language is used for programming computers?

Python as well as JavaScript are more frequently used in web-based startups. Larger businesses typically use PHP to create their web applications and C# or Java to create their internal software applications.

Programming languages like R and MATLAB are frequently used in data analytics programs. Both languages are widely used in programming and computer science due to the fact that C and C++ programmers have access to compilers for a wide range of platforms, the portability of the applications they create is generally high. C and C++ are regarded as high-performance programming languages.

Therefore, A programming language is a notational scheme used to create computer programs. The majority of formal programming languages are text-based, though they can also be graphical.

Learn more about Programming from

https://brainly.com/question/16936315
#SPJ1

See full question below

Every seven years, your company provides a 6 week sabbatical for every employee. Vera Edwards (vedwards), Corey Flynn (cflynn), and Bhumika Kahn (bkahn) are leaving today, while Maggie Brown (mbrown), Brenda Cassini (bcassini), and Arturo Espinoza (aespinoza) are just returning.

The company security policy mandates that user accounts for employees gone for longer than two weeks be disabled.

Task:

-Lock (disable) the following user accounts:

vedwards

cflynn

bkahn

-Unlock (enable) the following user accounts:

mbrown

bcassini

aespinoza

in the stage of the application development life cycle, the deliverable is a set of user requirements. a. systems analysis b. programming c. systems design d. prototyping

Answers

The correct option is C system design. Developing stakeholder expectations, technical requirements, logical decompositions, and design solutions are the four phases that go into system design.

Systems design is the process of defining a system's components, including modules, architecture, components, their interfaces, and data, depending on the requirements that have been given. A methodical approach to developing and engineering systems is necessary for system design. we must consider every aspect of an infrastructure when creating a strong system design, from the hardware and software to the data and the way it is kept. Allocating a large system's requirements to hardware and software components is the aim of system design. After the system requirements study is finished, the system design activity begins.

Learn more about Requirements here-

https://brainly.com/question/2929431

#SPJ4

6.18 lab: word frequencies write a program that reads a list of words. then, the program outputs those words and their frequencies. ex: if the input is: hey hi mark hi mark the output is: hey 1 hi 2 mark 1 hi 2 mark 1

Answers

A program that reads a list of words. then, the program outputs those words and their frequencies is given below:

The Program

line = input ( )

norm = line . split ( )

low = line . lower ( ) . split ( )

for chr in low :

   freq = low . count ( chr )

   print ( freq )

for x in norm:

   print ( x )

The Output

1

2

2

2

2

hey

Hi

Mark

hi

mark

There are other ways to write a program that does this same function and they are given below:

1. for word, word_lower in zip ( norm, low ):

   print ( word, low. count (word _ lower ) )

2. wordInput = input ( )

myList = wordInput . split ( " ")

for i in myList :

 print ( i , myList . count ( i ) )

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

he concept that internet service providers (isps) permit data to be transmitted and accessed without regard to the data’s content or amount of bandwidth required to transmit the data is known as net

Answers

The concept that internet service providers (isps) permit data to be transmitted and accessed without regard to the data’s content or amount of bandwidth required to transmit the data is known as net neutrality.

Does net neutrality exist in the US?

While many states have passed their own versions of net neutrality legislation, most of these have largely complied with the FCC's established guidelines. States do not have the power to override the FCC decision, according to language in the FCC's repeal.

According to the concept of "net neutrality," all websites, applications, and material must be accessible at the same speed and on the same terms, without any content being blocked or given priority by an internet service provider (ISP).

Therefore, Internet service providers (ISPs) should treat all internet traffic equally, according to this idea. To maintain an open and unrestricted internet, the FCC votes in support of strict net neutrality regulations.

Learn more about net neutrality from

https://brainly.com/question/13165766
#SPJ1

small chunks of data broken down by transmission control protocol (TCP)
A. browser
B. packets
C. IP addresses
D. internet
E. World Wide Web

Answers

Answer:

packets

small chunks of data broken down by transmission control protocol (TCP).

What result would the search expression (insects AND bugs) –spiders give you in the Go.ogle search engine?
A. information about bugs and spiders
B. information about insects, bugs, and spiders
C. information about spiders
D. information about insects and bugs, without including spiders

Answers

Explanation:

information about insects, bugs, and spiders

Other Questions
how did nationalism help germany in 1815 What rules of exponents do you use to solve 10^3*10^-7*10^2? Choose all answers that apply.Product RuleNegative RuleQuotient RulePower Rule determine the body mass index of a person 65 inches tall with a weight of 175 pounds #16 23.8 divided by 5.6 Pls help with this !!!!! on a popular fictional game show, contestants are given the opportunity to win money by reaching into a bag after being blindfolded and selecting a chip with a dollar amount written on it. assume all chips are identical. the bag contains four chips with a $0 amount, six chips with $1, five chips with $5, two chips with $10, and one chip with $100. the chips are mixed in the bag before the contestant draws their chip. a. construct a probability mass function (pmf) for x, the dollar amount won by a contestant in this game. b. what is the expected value for x? How many differentreligious groups practicetheir faith in the US? A force of 40.0 N accelerates a 5.0-kg block at 6.0 m/s2 along a horizontal surface. what is the net force acting on the block A field has width x and and length 2x+1 the area of the field is 600m^2 find the width and the length of the field If f(x) = x + 5, then what is the remainder when f(x) is divided by x + 5? according to a survey of adults, 64% have money in a regular savings account. if we plan on surveying 50 randomly selected adults, find the mean number of adults who would have regular savings accounts. I need help on number 10! asap!! Find the value of x.5779X 6. Discuss what the essay reveals about the author's tone and mood? (3-5 sentences): Identify the theme of this essay. the education minister (award) a salary increase for all secondary teachers as from next year. in passive voice if there are 36 apples and 6 bananas for a fruit basket, fill out all the possible ratios of apples to banana that could be made Find the measure of each arc. For each arc, write two or more complete sentences explaining which theorem or postulate you used to find your answer. Include your equations and calculations in your final answer.m arcQS What is the image of (-8,6) after a reflection over the line y=-x Please help me. Thank you! regarding the narrative of the tower of babel: for what reason do the people of babel want to make a tower for themselves in gen 11:4? what might have been the motivation for this choice? what ""towers"" (literal or metaphorical) do we build today and why?