virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called

Answers

Answer 1

Virtual communications gateways that permit a computer device to accept requests for information from other computers o networks are called logical ports.

Virtual communications gateway are also referred to as logical ports that enable resources that are outside of a mesh to communicate with resources that are inside of the mesh. Logical ports allow the computer device to organize requests for information from other computers or networks. A logical port is typically defined in software with the purpose to allow the receiving device to determine which application or service the data is specified for.

You can learn more about logical port at

https://brainly.com/question/6275974

#SPJ4


Related Questions

the computer program that is used to handle anything from a memo to a multi chapter book is called a(n):

Answers

Data base programs are computer programs that can manage everything from a memo to a multi-chapter book.

What is tabular form?

A computer program called an application launcher aids users in finding and launching other software applications. Spreadsheet, often known as tabular form, is a program that arranges data into rows and columns. Then, using graphical representations, this data can be organized, sorted, computed, analyzed, or illustrated. Data can be stored, retrieved, and processed by it. You may already be aware of the fact that you may use a computer for creating a home, playing games, sending emails, and typing documents.

To learn more about  computer programs from given link

brainly.com/question/14618533

#SPJ4

if 8 mhz clock is used as the system clock and the systick selects it as the clock, what should the systick load register be in order to generate a systick interrupt every microsecond?

Answers

To generate a systick interrupt every microsecond with an 8 MHz clock, the systick load register should be set to 7999. A systick interrupt is a type of interrupt that is generated by the systick timer, which is a timer that is built into many microcontroller systems.

The systick timer is typically used to generate periodic interrupts, which can be used to trigger events or tasks at regular intervals. The frequency at which the systick interrupt is generated is determined by the value that is loaded into the systick load register, and the systick interrupt can be used for a variety of purposes, such as maintaining a real-time clock, implementing timeouts, or managing the scheduling of tasks.

In order to generate a systick interrupt every microsecond with an 8 MHz clock, the systick load register would need to be set to 7999. This is because the systick timer counts down from the value that is loaded into the systick load register, and 8 MHz is equal to 8,000,000 cycles per second.

Therefore, to generate a systick interrupt every microsecond, the systick load register would need to be set to 8,000,000 / 1,000 = 7999.

Learn more about systick interrupt, here https://brainly.com/question/29770273

#SPJ4

your project's lead programmer leaves the company. she was responsible for engaging the systems engineers, so now that's up to you. what inputs can you use to monitor the engineers' engagement? select all that apply.

Answers

OPA, EEF, Project papers, Work Performance Data, and Project Management Plan Inputs can be used to monitor the engineers' level of engagement.

Engineers invent, design, analyse, construct, test, and evaluate complex systems, machines, structures, tools, and materials to satisfy functional objectives and criteria while keeping practical, legal, safe, and economical restrictions in mind. Latin ingeniare, which means "to contrive, devise," and ingenium, which means "cleverness," are the sources of the English term engineer. Earning a four-year bachelor's degree in engineering or, in some jurisdictions, a master's degree in engineering, as well as four to six years of peer-reviewed professional experience culminating in a project report or thesis, and passing engineering board examinations, are the fundamental requirements for becoming an engineer.

Engineers provide the link between scientific advances and their subsequent applications to social and economic demands.

Learn more about engineers here:

https://brainly.com/question/29695549

#SPJ4

which is true? group of answer choices private members can be accessed by a class user a mutator is also known as a getter method a mutator may change class fields an accessor is also known as a setter method

Answers

Only the member functions inside the class have access to the class members that have been defined as private.

Any object or method outside the class is not permitted to access them directly. The class members' secret data can only be accessed by member functions or friend functions. Private fields of classes shouldn't be altered by mutators. A mutator modifies, or "mutates," the private fields of a class. The private fields of a class should not be altered by an accessor. An accessor uses private fields to get access before returning a value or performing an action. A mutator method in computer science is a technique for managing modifications to a variable. They're also frequently referred to as setter methods. A setter is frequently present.

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

what is the correct selector for targeting all text inputs that are not disabled?what is the correct selector for targeting all text inputs that are not disabled?

Answers

The input type="text"]:options:not ([disabled]). In CSS, focusable elements that are not disabled and are consequently enabled are chosen.

First, reverse the sequence of the HTML components such that the label comes after the input. As a result, the styling rules will function as intended. Then comes the fun part: place text input labels on the left side using CSS! input[type=radio]: disabled+label functions as a shahr. An input text field is targeted using a CSS attribute selector. Use input[type=text] to target input text fields with the 'text' type. By adding the e-disabled property to the input parent element and setting the disabled attribute to the input element, you can disable the TextBox.

Learn more about sequence here-

https://brainly.com/question/17053960

#SPJ4

A ___________is a rotary device intended to pull energy from a fluid and use it in a functional process.

Question 11 options:

turbine


machine


piston


thermal equilibrium

Answers

Answer: Turbine

Explanation:

I will say the answer to this question is Turbine. If I am wrong, I am sorry; it has been a long time since I learned this!

Which type of operating system is permanently programmed into a hardware device?

A. Embedded OS
B. Firmware
C. Mobile OS
D. Hypervisor

Answers

Answer:

B.FIRMWARE

Explanation:

An operating system that is permanently etched into a hardware device (such as a keyboard or a video card).

The type of operating system is permanently programmed into a hardware device is firmware. The correct option is B.

What is firmware?

A platform's hardware components are configured and controlled by firmware, which is often computer code. As a result, firmware typically executes as the first piece of code when a device is turned on, serving as the cornerstone upon which system trust is based.

Firmware is a class of software that is permanently included in a device's read-only memory. It offers instructions on how to operate the device and reduces hardware-level security risks. Essentially, firmware refers to software that is integrated into a piece of hardware.

It is referred to as embedded software at times. A microcontroller, a component of the microprocessor that instructs the microprocessor on what to do, serves as an illustration.

Therefore, the correct option is B. Firmware.

To learn more about firmware, refer to the link:

https://brainly.com/question/28945238

#SPJ2

a loop should output 1 to n. if n is 5, the output is 12345. what should xxx and yyy be? choices are in the form xxx / yyy.

Answers

The XXX and YYY should be 'i = 0; i < n / i + 1;'

It is given that a loop outputs from 1 to n, such as if the value of n is 5, it generates the output as '12345'. It can be written as follows:

loop output 1 → n

if n = 5

output = 12345

n = scnr.nextInt();

for

{

System.out.printIn(YYY);

}

XXX ; YYY is 'i = 0; i < n / i + 1;'

What is a loop?

In the domain of computer programming, a loop is an iterative structure that repeats a set of instructions until a certain condition is met; until the condition remains true, the loop continues to execute.

You can learn more about LOOP at

https://brainly.com/question/16922594

#SPJ4

what is another name for a child class? question 10 options: derived class sub class descendent class all of the above

Answers

A subclass is a class that is descended from another class (also a derived class, extended class, or child class). A superclass is the class from which a subclass is descended (also a base class or a parent class).

All classes, including the ones you create, share behavior that is specified and implemented by the Object class, which is found in the java.lang package. A hierarchy of classes is formed in the Java platform by the fact that many classes descend directly from Object, others derive from some of those classes, and so on.

The private members of a parent class are not inherited by a subclass. However, the subclass may also use the public or protected methods that the superclass provides to access its private fields.

A nested class gets access to all the properties and methods that are private to its parent class. As a result, a subclass inheriting a public or protected nested class gets indirect access to every private member of the superclass.

Know more about java here:

https://brainly.com/question/12978370

#SPJ4

Elvin spends a lot of time in front of a computer during the day. At night, Elvin is constantly on his phone. He has been having a lot of physical discomfort in his shoulders, thumbs, and fingers. What's Elvin most likely suffering from

Answers

Elvin is most likely suffering from Repetitive stress and strain syndrome. The correct option is D.

What is Stress Strain Syndrome?

Different sources of stress can impact people of all ages, genders, and levels of innate vitality. The causes include infections, injuries, drug-induced immunological reactions, allergies, overexertion, poor nutrition, intense emotions, etc.

Beyond the body's elastic limitations, stress can lead to a variety of issues, such as stiff muscles that are unable to relax and rest after an extended period of use. Strain is the name for this condition.

Therefore, the correct option is D. Repetitive stress and strain syndrome.

To learn more about Stress Strain Syndrome, refer to the link:

https://brainly.com/question/29517071

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A. Stress on the inner car

B. Psychological disorders

C. Digital eye strain

D. Repetitive stress and strain syndrome

migrating a traditional database design to the web can require design modification, additional software, and some added expense. t or f

Answers

A standard database architecture may need to be modified for the web, which might include purchasing new software and costing more money.

What purposes serve databases?

database, often termed online version, any collection pf data, or content, that is particularly arranged for quick searches and retrievals by a robot. To make it simple to save, retrieve, update, and delete the file while performing various data-processing functions, databases are built.

What is a database, exactly?

In computing, a database is an organized set of data that is accessible and stored electronically. Large databases are housed on data centers or cloud storage, whilst small data can be kept on a file system. .

To know more about Database visit :

https://brainly.com/question/13275751

#SPJ1

when using ping, a packet is sent from one device to another device. what type of packet is sent when using the ping command?

Answers

When using the ping command, a packet is transferred from one device to another specified device. An echo request type of packet is sent when using the ping command.

Echo request provides the ability for one system to check to see if the other system is on the network and functional.  When a ping command is generated, an echo request packet is sent to the specified address. When a remote host receives the echo request, it replies with an echo reply packet. By default, the ping command sends various echo requests, typically four or five.

You can learn more about Echo Request at

https://brainly.com/question/15568382

#SPJ4

when you are troubleshooting a network problem, what is one of the first steps you should take in the process?

Answers

The first steps you should take in the process is identify the affected area.

What is troubleshooting?Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems. The first step in most troubleshooting methods is gathering information on the issue, such as an undesired behavior or a lack of expected functionality.Once the problem and how to reproduce it are understood, the next step is to remove extraneous parts to see if the problem still exists. Incompatibility problems between components and issues brought on by third-party products can be found using this.Typically, troubleshooting techniques aim to narrow down a problem so that it can be investigated. The initial objective is to identify the issue and test simple fixes, like restarting the system, switching the power on and off.

To learn more about systematic approach refer to:

https://brainly.com/question/27959993

#SPJ4

joline is writing code to calculate formulas from her electrical engineering class. she's currently working on a procedure to calculate electrical resistance, based on this formula:

Answers

Code to calculate formulas from her electrical engineering class.

PROCEDURE calc Resistance (voltage, current)

{ DISPLAY (voltage/current) }

Writing computer programming code is referred to as coding. The term "coding" is used more broadly to describe the process of classifying or categorizing anything. The main approach for enabling intercommunication between machines and humans is coding. Punch cards and other like tools were used for early forms of coding.

Early programming languages like BASIC, FORTRAN, and COBOL, each with their own syntax and operations, were utilized when digital computers were developed.

In the era of personal computers and the Internet, programmers and developers often create code in modules that correspond to distinct computing jobs. These modules are assembled as part of a larger framework or undertaking, like a unique software application.

Learn more about Code here:

https://brainly.com/question/17293834

#SPJ4

a customer plugs in a new powerful peripheral component interconnect express (pcie) 3.0 graphics card into their computer's pcie 2.1 slot. after turning the computer on, it boots but the graphics card will not show any video. what is a likely explanation?

Answers

In the event that the motherboard has four slots, any of the primary slots will function without the need for configuration changes. If the graphics card is huge and would hinder another component if fitted in the first slot, you might wish to utilize a different slot. The appropriate slots are also listed in the motherboard handbook.

Describe PCIe slots.

An interface standard for linking high-speed input output (HSIO) components is called PCIe, or peripheral component interconnect express. There are a number of PCIe slots on every motherboard for high-performance computers that you may use to install GPUs, RAID cards, WiFi cards, or SSD (solid-state drive) add-on cards.

What is PCIe used for?

A computer can be connected to one or more peripheral devices using the serial expansion bus standard known as Peripheral Component Interconnect Express (PCIe or PCI-E). Compared to parallel busses like PCI and PCI-X, PCIe offers lower latency and faster data transfer speeds.

To know more about PCIe slots visit;

https://brainly.com/question/14380167

#SPJ4

If the motherboard has four slots, any of the major slots will work without requiring any setup adjustments. You might want to choose a separate slot if the graphics card is large and would obstruct another component if it were installed in the first slot. The motherboard manual also includes a list of the suitable slots.

What are PCIe slots?

PCIe, or peripheral component interconnect express, is a standard interface for tying together HSIO components. Every motherboard for high-performance PCs has a number of PCIe slots that you may use to add GPUs, RAID cards, WiFi cards, or SSD (solid-state drive) add-on cards.

Who or what uses PCIe?

One or more peripheral devices can be linked to a computer utilizing

the serial expansion bus standard known as Peripheral Component Interconnect Express (PCIe or PCI-E). Compared to parallel busses like PCI and PCI-X, PCIe offers lower latency and faster data transfer speeds.

To know more about PCIe slots visit;

brainly.com/question/14380167

#SPJ4

the checkpoint region (cr) is defined as: select one: a. unknown location to begin file lookups b. region used to store checkpoints c. fixed and known location on disk to begin a file lookup d. checkpoints for time hacks

Answers

The checkpoint region (cr) is defined as fixed and known location on disk to begin a file lookup.

What is the purpose of checkpoint?A significant provider of cyber security solutions to corporations and governmental organizations throughout the world is (www.checkpoint.com). With a market-leading capture rate for malware, ransomware, and other cyberattacks, its products defend consumers from 5th generation cyberattacks.The checkpoint region (CR) is a fixed and well-known position on disk where a file lookup can start. Every one of the following, with the exception of: Memory capacities had leveled off.At a checkpoint, the flow of traffic is halted to allow for inspection.A Checkpoint firewall is a device that permits interconnection of various networks in accordance with a specified security policy.

To learn more about cyber security solutions refer to:

https://brainly.com/question/28004913

#SPJ4

you have a coordinate grid that is 150 x 100 pixels. assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?

Answers

To encode a coordinate in that space, you will require a minimum of 15 bits.

150 requires = 8 bits

100 requires equal 7 bits.

15 bits total are used.

The smallest unit of data on a computer is a bit, which is a binary digit. 0 or 1, which represent the electrical values of off or on, respectively, are the only two values that a bit may store.

Working with information one bit at a time is uncommon since bits are so little. To create a byte, bits are often put together into groups of eight. One ASCII letter, such "h," may be stored in a byte's worth of data.

Because computers employ binary (base 2) logic rather than a decimal (base 10) system, a kilobyte (KB) equals 1,024 bytes, not 1,000 bytes as may be assumed.

Learn more about Bits here:

https://brainly.com/question/2545808

#SPJ4

when you added security to your router during the wireless router lab, you were required to type in a passphrase. the wireless devices also needed this passphrase to connect. what was this passphrase for?

Answers

You have to enter a passcode to add security to your router during the wireless router lab. This passcode was also required for the wireless devices to connect. For security purposes, use this password.

And referred to WPS protocol. A wireless network security standard called WiFi Protected Setup (WPS) aims to speed up and simplify connections between wireless devices and routers. The WiFi Protected Access Personal (WPA) or WPA2 Personal security protocols must be used with a password to safeguard wireless networks using WPS. A secure wireless home network can be built using the network security standard known as Wi-Fi Protected Setup (WPS; formerly known as Wi-Fi Simple Config). Developed by Cisco and released in 2006.

Learn more about security here

https://brainly.com/question/28112512

#SPJ4

which technique did we discuss in class that has been used to attempt to regrow damaged axons in the cns?

Answers

For people who have had a spinal cord injury or stroke, persistent deficits result from the adult CNS axons' inability to regenerate.

The inability of damaged axons to repair and recreate functional connections with their original targets leads to permanent impairments after CNS injury. In contrast, peripheral nerve damage is followed by a powerful regeneration process, which may result in the restoration of sensory and motor abilities. This healing response necessitates the extensive activation of epigenetic and transcriptional alterations in damaged neurons. Understanding how peripheral axon damage causes these pervasive changes through the coordinated actions of transcription factors, epigenetic modifiers, and, to a lesser extent, microRNAs, has advanced significantly in recent years. These new findings provide light on the critical function of coordinated gene expression and chromatin remodelling in the neuronal response to damage, even if many concerns remain about the interaction between these systems.

Know more about systems here:

https://brainly.com/question/27148473

#SPJ4

How can I incorporate a for loop with a list?

Answers

Answer:

You can call each element in a for loop using: for element in [list name]: ...

Explanation:

for element in vowels:

  Hint = Hint.replace(element, "*")

Keep in mind, this is only for the part where you modify Hint with Hint.replace().

the ________ design technique can be used to break down an algorithm into functions.

Answers

The divide and conquer design technique can be used to break down an algorithm into functions. This technique involves dividing a large problem into smaller subproblems, solving the subproblems, and then combining the solutions to the subproblems to solve the original problem.

It is a useful approach for tackling complex problems because it allows for the development of efficient algorithms by breaking down the problem into smaller, more manageable pieces. In the context of computer science, the term "design" refers to the process of planning and organizing the various components of a system or algorithm in order to solve a particular problem. This process typically involves identifying the inputs and outputs of the system or algorithm, determining the steps or processes that need to be carried out in order to transform the inputs into the desired outputs, and organizing these steps in a logical and efficient manner.

Learn more about design: https://brainly.com/question/14035075

#SPJ4

your boss is looking for a recommendation for a cloud solution that will only allow for both onsite systems and cloud services to work together seamlessly. what type of cloud model should you recommend?

Answers

Only seamless collaboration between onsite systems and cloud services is possible with SaS (software as a service). On-demand software is another name for SaaS.

It is a piece of software where the apps are housed by a cloud service provider. With the aid of an internet connection and web browser, users can access these programmed. The SaaS service model has the following characteristics: Software as a service (SaaS) makes it accessible online. The provider provides ongoing support for the software programmed. Software licences can either be subscription- or usage-based. SaaS applications are inexpensive since they don't need any maintenance from the end user. A Gartner prediction predicted that SaaS sales would increase 23% to $72 billion in 2018.

Learn more about cloud service here

https://brainly.com/question/29531817

#SPJ4

write a python statement that displays the value referenced by the number variable formatted as 1,2,3

Answers

Str and int objects cannot be concatenated, or C4,3,2,1 is the correct response.

What does the Python formula 3 * A result in?

What value is 3 * "A" evaluated to in Python? A mistake is made as a result. The basic structure of IPO, Input, Process, Output, is followed by the majority of straightforward computer programs. When storing data, when should you use a Python list?

Is a name a value that the computer's memory refers to?

Variable Programmers simply need to remember the name of the data; the computer will keep track of where it is actually stored in memory. It is known as a variable when a name is used in this manner to refer to data that is kept in memory.

To know more about number variable visit :-

https://brainly.com/question/16898396

#SPJ4

which of the following data types used in sql could be used to define a variable-length text field of 20 characters? select one: a. char(20) b. fixed(20) c. varchar(20) d. bit(20)

Answers

One of data types used in SQL could be used to define a variable-length text field of 20 characters is Char (20) .

About SQL Server

SQL has the work of processing databases, of course it requires a value to store data. So, the brief meaning of a data type is a value that is used to store data because there are many data types.

These are the data types.

Char  is a data type to hold character or alphabetic (a-z) type data. Integer or often abbreviated INT is a data type that is used to store data of type number or numeric (0-9). Date is a data type that is used to store data of type date, month, and year, for example: -date of birth etc. Numeric is a data type that can hold data in the form of real numbers, for example: -6.00 or 7.25. Small INT is an integer data type whose range is smaller than integer. Decimal is a data type that can hold fractional data. Float is a data type that can hold real numbers (same as numeric) example: 3,33. Double is a data type of type float but with higher accuracy, for example: 3.333333 BLOB is a data type that can store binary-type data in the form of images or sounds. Text is a data type that can hold all data types. Boolean is a data type that is used to hold data that is of logical type and only knows true and false. Enum is a data type that is used to store data with only 1 character. Time is a data type that is used to store data for units of time

Learn more about Char at https://brainly.com/question/4907494.

#SPJ4

the special operator used to check whether an attribute value is within a range of values is . a. between b. null c. like d. in

Answers

The special operator that checks whether an attribute value is within a specified range of values is A: BETWEEN.

In the SQL, the BETWEEN operator is used to select values within a certain range. The values can be text,  numbers, or dates; The BETWEEN operator can be used in a SELECT, UPDATE, INSERT, or DELETE statement of SQL. The BETWEEN operator has a property of inclusion; it means that the BETWEEN operator needs beginning and ending values. The BETWEEN operator allows one to easily test if an attribute value is within a range of values (inclusive).

You can learn more about SQL operator at

https://brainly.com/question/27683309

#SPJ4

you just purchased an ipad tablet device. you want to synchronize your photos, music, email, and contacts from your windows 10 pc to the device. how can you connect the device to the pc? (select two. each option is a complete solution.)

Answers

This method of connection sharing is referred to as tethering or using a hotspot. Using tethering, some smartphones can share a Wi-Fi connection. Most Android devices support mobile data sharing through Wi-Fi, Bluetooth, or USB. Important Some cellular providers have restrictions or charge extra for tethering.

The definition of internet tethering

The mobile data on your phone can be used to link a computer, tablet, or other phone to the internet. This method of connection sharing is referred to as tethering or using a hotspot. Using tethering, some smartphones can share a Wi-Fi connection. Most Android devices support mobile data sharing through Wi-Fi, Bluetooth, or USB.

What distinguishes tethering from a hotspot?

Tethering allows you to share a safe internet connection with a different device, usually a laptop or tablet, using your current mobile phone and data plan. When using a genuine hotspot, you have access to a special gadget, such as a mobile Wi-Fi hotspot, which can establish a connection with the nearby cellular tower.

To know more about Tethering visit;

https://brainly.com/question/29392436

#SPJ4

which terms refers to a pattern of scheduling where the same commercial runs every half hour on the same network during prime time?

Answers

The term 'bursting' refers to a pattern of scheduling where during prime time the same commercial runs every half hour on the same network.

Bursting is a mobile marketing mechanism where advertisements or commercials spend is concentrated in a short period of time in an attempt to obtain as many users as possible. The goal of bursting is o generate a vast amount of downloads in a very short period of time in order to push promotion. This tactic of scheduling where at peak time the same commercial is shown every half hour over the same network.

You can learn more about advertisements at

https://brainly.com/question/1658517

#SPJ4

hat is the average i/o time to transfer a 16kb block on a 4800 rpm disk with a 5ms average seek time, 2gb/sec transfer rate with a .2ms controller overhead? (write up to two decimal places)

Answers

The rotational delay and transfer time are partially determined by rotational speed, expressed in revolutions per minute (RPM). Typically, manufacturers report seek times of 8 to 10 ms.

Hard drives are often restricted to a transfer rate of between 100 MBps and 200 MBps because of how they operate—with rotating discs—and how they store and access data. Data is transferred from the disk over a period of time, or "transfer time." The speed of the disk's spinning affects it. The number of bytes on a single track is also referred to as the disk density, and the more quickly a disk rotates, the faster we can read data from it. Lower transfer times result from faster data transfer.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

the sending of data from one computer or mobile device to another, often via the internet, is called .

Answers

The sending of data from one computer or mobile device to another, often via the internet, is called digital communication.

Using online technologies like email, social media messaging, and texting to share a message with others or a particular audience is known as digital communication. Digital communication can include even something as basic as reading the content on a webpage like this.

Over the past 20 years, a lot of businesses, organizations, and industries have had to define digital communication for themselves and adjust to the new communication landscape that has replaced not only face-to-face interaction but also more traditional forms of communication like writing and sending letters.

Governments have also questioned themselves about "what is digital communication" in an effort to better meet the requirements of residents. and modified many of their offerings to make them more effective.

Know more about digital communication here:

https://brainly.com/question/18825060

#SPJ4

write a statement that declares an array of char named streetaddress that contains exactly eighty elements.

Answers

Here is one possible statement that declares an array of char named streetaddress that contains exactly eighty elements:

char streetaddress[80];

In this statement, the type of the array is char, which means that each element in the array is a single character. The name of the array is streetaddress, and the size of the array is 80, which means that it can hold exactly 80 elements.

This is is just one possible way to declare an array of char with 80 elements. There are other ways to do this, such as using a different type for the array (e.g. int or float) or using a different name for the array (e.g. address or street_address).

Learn more about array, here https://brainly.com/question/19570024

#SPJ4

Other Questions
how was kim hyun hee indoctrinated from a very young age and what was she taught about america and its allies, japan and south korea? In some societies a deceased person will remain a valued member of the family, acting as a moral force and punishing their descendants for misbehavior. Such beings are referred to as: A rectangular property is 300' long x 250' wide. Zoning requires a minimum lot size of 15,000 sq. Ft with minimum road frontage of 60'. How many lots would fit on this property? Given the equation 4y = 164, solve for y. 41 4 168 160 Photophosphorylation during photosynthesis differs from oxidative phosphorylation during cellular respiration in thata. energy is stored in the form of a proton (H+) concentration difference.b. it involves an electron transport chain.c. the energy is provided by sunlight not by organic compounds.d. generation of ATP is driven by a flow of protons (H+) through ATP synthase. is a trembling or shaking of the ground caused by the sudden release of energy stored in rocks beneath the earth's surface. Jacob pent 1/5 of an hour cleaning the table and 3/10 of an hour mopping. After he finihed he pent 2/3 of an hour reading. How much more time did he pend reading than doing houework PLEASE HELP IMMEDIATELY Find the volume of a cylinder with a diameter of 16 inches and a height of 9 inchesWhats the volume of a NBA Basketball that has a diameter of 9.5 inches If 163.7 L of hydrogen gas reacts with excess chlorine gas, how many liters of hydrogen chloride gas will be produced? What age do kids realise Santa isn't real? Farmers on the great plains began to lose their crops during the depression because? Part AIn Joy Harjo Is the First Native American Poet Laureate, what is the author's viewpoint on Harjo's poetry?The author wishes it would include human instead of animal characters.The author appreciates that it is relevant for many audiences.The author thinks it should be more political.The author believes it should focus more on the issues of women.Part B - Points depend on a correct response in Part A.by stating that Harjo's poems show respect for different valuesby emphasizing that Harjo avoids talking about politicsby explaining that Harjo's poetry mostly deals with spiritual topicsby describing how Harjo uses a rabbit as the speaker in her poemsHow does the author convey the viewpoint identified in Part A? can someone help me with this complete the checksingles() function. return the sum of all values that match the parameter goal. update the findhighscore() function using a loop to call checksignles() six times with parameters being 1-6. return the highest score from all function calls. submit for grading to confirm two tests pass. Metamorphism is the solid-state change of a rock in response to a modification to its environment. From the list below, select four environmental changes that are most responsible for causing metamorphism. Change in groundwater pH Application of stress Increase in pressure Physical erosion Increase in temperature Exposure to hydrothermal fluids . . 2. In order to understand metamorphic rocks, it is important that we are able to use the nomenclature correctly. Below are several terms specific to metamorphic rocks. Match each term with its appropriate definition. Term Definition Protolith The apparent layering within a rock due to the alignment of minerals. Foliation A broad region of continental crust where Precambrian-aged rocks are exposed. Shield A set of metamorphic minerals formed at a specific range of pressures and temperatures. Metamorphic Facies The original rock that undergoes solid-state change during metamorphism. should depict a change the character undergoes in this section of the text. (Left arm:beginning/ Right Arm: ending). You may paraphrase here, but cite the page number(s) fromthe text where you're drawing from the explain the shift the character undergoes. john proctor Hanna needs to put a fence around her yard to keep her dog from wandering off. If her yardmeasures 40 feet by 25 feet, how many feet of fencing does she need to buy to go around thewhole yard? the car is traveling along the road with a speed of v=(2s) m/s, where s is in meters. What are the spheres of your specialization? thank you sm to whoever replies:))