Which icon allows you to see paragraph formatting features?

bullets
shading
show/hide
alignment

Answers

Answer 1

An icon that allows you to see paragraph formatting features is known as alignment. Thus, the correct option for this question is D.

What is Paragraph formatting?

Paragraph formatting refers to formatting commands that significantly affect entire paragraph settings such as indenting, bullets, line spacing, and paragraph spacing.

There are four types of paragraph alignment available in Microsoft Word. They typically include left-aligned, center-aligned, right-aligned, and justified.

The paragraph formatting is located on the Home tab or on the Page Layout tab, click the Paragraph Dialog Box Launcher in the Paragraph group.

Therefore, an icon that allows you to see paragraph formatting features is known as alignment. Thus, the correct option for this question is D.

To learn more about Paragraph formatting, refer to the link:

https://brainly.com/question/29327739

#SPJ1


Related Questions

Can anyone please answer this question?
What are the uses of a relational database?

Answers

Answer:

Explanation:

tool for storing various types of information that are related to each other in various ways. For example, a relational database for an online store might maintain customer data and maintain related information as well, such as their various addresses, wish lists, orders, etc.

To insert an equation, click on the Object in the Text group on the Insert tab, then click Microsoft Equation 3.0 in the Object type box, and then click OK.

Answers

The statement which is "to add an equation, click on the 'Object' in the Text group on the Insert tab, then in the Object type box click Microsoft Equation 3.0, and then click OK" is true because it correctly depicts the way to insert an equation in MS Equation Editor embedded in MS word.

MS Word includes an Equation Editor that is used to insert common mathematical equations in the document. Using Equation Editor, it is easy to add complex equations by just picking symbols from a toolbar and typing variables and numbers. As an equation is written, Equation Editor automatically adjusts spacing, font sizes, and formatting in keeping with mathematical typesetting conventions.

"

Complete question:

To insert an equation, click on the Object in the Text group on the Insert tab, then click Microsoft Equation 3.0 in the Object type box, and then click OK.

True

False

"

You can learn more about MS Word at

https://brainly.com/question/20659068

#SPJ4

Using the code below, will the body of the page have the background-color defined in the file style.css or the background color define in the

A.

Answers

Any background-color defined within the HTML page will not take precedence over the style.css file.

The file style.css or the background color define in the (Option B.) background color defined in the HTML page.

Using CSS to Define the Background Color of a Page

The background color of the body of the page will be the one defined in the style.css file, as the code in the HTML page is linking to that file and using the background-color property defined in it. This means that the background color of the body of the page will be the one defined in the style.css file, and not the one defined in the HTML page.

Since the question is incomplete, here's the full answer:

Using the code below, will the body of the page have the background-color defined in the file style.css or the background color define in the:

Choose the right option:

A. background-color defined in the file style.cssB. background color defined in the HTML page

Learn more about HTML: https://brainly.com/question/4056554

#SPJ4

Consider the following code segment. int[] nums = {10, 5, 8, 13}; for (int i : nums) { System.out.print(i + " "); } What is printed when this code segment is run?

Answers

Since the code section does not compile, the array newVals will be empty. A value that can be printed is not returned by the reset procedure.

What will happen to the program's output if the array's starting address is 65486?

# Incorporate Stdio H void main () int arr [] 12 14 15 23 45; printf%U%U ARR &ARR);?

The array's base address is 65486, therefore arr, &arr points to the array's base address arr. As a result, the program's output is 65486, 65486.

How to use length () in C++ to determine an array's length?

Thus, by simply dividing the array's size by the size each member of the same acquired, we can determine the total number.

To know more about array visit:-

https://brainly.com/question/19570024

#SPJ4

Consider the following procedure. PROCEDURE doSomething(numi, num2) { DISPLAY(num1) RETURN(num1) DISPLAY(num2) } Consider the following statement. DISPLAY(doSomething(10, 20)) What is displayed as a result of executing the statement above? a. 10 10 b. 10 20 C. 10 10 20 d. 10 20 10

Answers

(b) 10 20

10 20 is displayed as a result of executing the statement above.

Procedural abstraction: What is it?

When we build code parts (known as "procedures" or, in Java, "static methods") that are generalized by having variable parameters, we use procedural abstraction. Depending on how its parameters are set when it is called, our code is designed to be able to handle a wide range of various situations.

Improves speed procedural abstraction?

Program execution performance is increased through procedural abstraction. This method determines whether a character is a vowel.

Reduces duplicate code procedural abstraction?

Eliminating redundant code is an excellent usage of the technique. Using a procedure will make that section of code easier to edit because it only appears once in the application, in addition to making the app easier to read.

To know more about programming visit:

https://brainly.com/question/22654163

#SPJ4

You are purchasing a PC system that will be used as a file and print server in a small business. Which of the following hardware selection criteria is the MOST important for this system?

Answers

RAID 1+0 array, 64-bit multi-core processor.

Which PC parts should I purchase first?

The motherboard is indeed the circuit that links everything together, including your hardware, your power supply, and the graphics cards, thus you should pick it as your initial component.

According to this quiz, which tool could you use to manage the equipment on your PC?

You may manage peripheral devices and other hardware components by using Windows' Device Manager app.You can update drivers and fix hardware issues with Device Manager, which also lets you inspect the technical details of hardware devices.

To know more about PC system visit:

https://brainly.com/question/13885035

#SPJ4

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Hurry! Please

Answers

Answer:

primary source

Explanation:

Kuta Software - Infinite Pre-AlgebraName___________________________________Period____Date________________Solving Equations Containing Fractions

Answers

Over 90 topics, including arithmetic, equations, and polynomials, are covered by Infinite Pre-Algebra, which covers all of the standard Pre-Algebra material. An introduction to algebra that is appropriate for any class.

How does infinite algebra 1 work?

The more than 90 topics covered in Infinite Algebra 1 range from adding and subtracting positives and negatives to solving rational equations. suitable for any subject that includes algebra. Designed for all learning abilities, from beginners to experts.

Is Kutasoftware cost-free?

With a free, 14-day trial, experience the strength and adaptability of our software for yourself. Installation is quick and easy. Even for today's class, you may install the software in a matter of minutes and produce the exact worksheets you require. Use every trial for a maximum of 14 days.

To know more about Pre-Algebra visit :-

https://brainly.com/question/29119877

#SPJ4

What logical security concept ensures that all computers in a Windows Server environment adhere to the same policies

Answers

Portable electronics like laptops should be properly secured with a lock because they are particularly susceptible to theft, loss, and resale. A cable lock can be used to connect to the majority of laptops and desktop computers' built-in slots.

present in order for this to succeed?

A Windows operating system is often deployed using an unattended installation. Unattend. xml is the answer file used by unattended instals, and it stores user input for the different GUI dialogue boxes that pop up during the installation process.

What aspect of security is host- or network-based?

IDS may be host-based or network-based. In order to detect suspicious behaviour, a network-based IDS monitors network traffic for specific network segments or devices and analyses network, transport, and application protocols.

To know more about IDS visit:-

https://brainly.com/question/29038449

#SPJ4

A computer can still operate without which of the following? cpu ram os gpu lan

Answers

A computer can still operate without a LAN connection. It can still function correctly when not connected to a local area network or the internet, as long as you have already installed all the necessary software and drivers. Without a LAN connection, the computer will not be able to access other devices or the internet.

The nature of hardware development projects is more diverse than software-oriented projects. a. True *b. False.

Answers

It is false that projects focused on hardware development are more diversified than those that are software-focused.

How should I define hardware?

The phrase "hardware" refers to all of the internal and exterior hardware, including interface, intake, collection, networking, processing, and more, that you need to do important tasks. There are two types of computer hardware: internal and external. a separate physical component of a technology infrastructure or system.

What functions do hardware devices serve?

Hardware components frequently operate on huge datasets in memory without using the system's primary CPU. Examples of such cases include descriptors, structures defining a collection of tasks for a gadget to complete, and communications infrastructure bits that devices have processed (or kept in memory).

To know more about hardware visit:

https://brainly.com/question/9810817

#SPJ4

What happens to information in short-term memory that is not further processed or rehearsed?
A) The information moves back into sensory memory.
B) The information is transferred to working memory until it is ready to be processed further.
C) The information is sent to long-term memory until it is ready to be further processed.
D) The information fades or decays.

Answers

Short-term memory serves as the initial stage of information processing before moving on to long-term memory. rehearsal for maintenance.

What transpires to information in short-term memory that is not retained any longer?

The knowledge is quickly lost from short-term memory without practice or without repeating the number until it is committed to memory.

What happens to the knowledge stored in short-term memory?

The term "short-term memory" refers to the brain's memory mechanisms that help people recall bits of information for a brief period of time, frequently up to 30 seconds. The brain stores information in short-term memory as a sort of "visuospatial" sketch that will later be converted into memories.

To know more about Short-term memory visit :-

https://brainly.com/question/7095837

#SPJ4

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed

Answers

The command line command yum list installed httpd will check to see if the Apache HTTP Server package is installed on a Linux distribution that uses RPM for package management.

In Linux, what do yum and RPM mean?

For Linux distributions based on Red Hat, two package management systems were developed: RPM and YUM. A collection of tools called a package management system is used to automate the installation, updating, and removal of packages. The fundamental functional differences between the two package managers outweigh their similarities.

What do Linux's APT and yum stand for?

Popular package management programs designed for Debian-based and Red Hat-based Linux distributions, respectively, include APT and YUM. The two package managers are among of the most widely used and simple to use tools for package management.

To know more about HTTP visit :-

https://brainly.com/question/13155990

#SPJ4

You are an IT network architect. Your firm has been hired to perform a network security audit for a shipping company. One of the company's warehouses has a server room containing one Windows server and two Linux servers. After interviewing the server administrators, you learn they have no idea what to do if the Linux servers cease to function. What is needed here

Answers

When you need to quickly reference how to connect, you can utilize this. the most typical method of reaching a remote Linux server.

What should you do while keeping backup tapes for servers offsite?

Keep all of your backup tapes and other media in a safe, climate-controlled, and most critically, fireproof location. Your offsite storage facility should be reasonably close to your primary location, whether you back up a single file or a complete system.

What does server disaster recovery entail?

Disaster recovery is the process used by a company to regain functioning and access to its IT infrastructure following a natural disaster, cyberattack, or even business interruptions brought on by the COVID-19 pandemic. various disaster recovery methods A disaster recovery strategy may include a number of different disaster recovery (DR) techniques.

To know more about Linux servers visit:-

https://brainly.com/question/23841223

#SPJ4

The process of sending print jobs from the print queue to the printer is called?
a. spooling
b. queuing
c. redirecting
d. printing

Answers

Correct choice (D), The act of printing involves sending print jobs from the print queue to the printer.

Print queue management – what is it?

In order to dynamically manage the GDDM Master Print Queue while it is being serviced by the GDDM print utility ADMOPUT, a system administrator or controller can use the GDDM Print Queue Manager (PQM), an ISPF panel-driven, standalone program.

Which of the following describes the procedure by which printing is carried out using grooves etched into a plate?

In the intaglio printmaking technique of engraving, a metal plate has lines carved into it to serve as a support for the ink. Copper or zinc can be used to make the engraving plate.

To know more about printing visit :-

https://brainly.com/question/2926554

#SPJ4

Which of the following statements is true of geographic top-level domains (TLDs)?
Select one:
a. They are used by the organizations that provide information services.
b. They are used to promote business and tourism.
c. They are limited to members of a defined community.
d. They are owned by corporations to control use of their brands.

Answers

They are employed in the marketing of commerce and travel. Whichever of the following is accurate about geographic top-level domains (TLDs).

Do top-level domains include TLD?

After the root domain in the Internet's hierarchical Domain Name System, a top-level domain (TLD) is one of the domains at the highest level. In the name space's root zone, top-level domain names are deployed.

What do TLD names for top-level domains mean?

A top-level domain (TLD) sits after the root zone in the DNS hierarchy as the first stop. A TLD, or top-level domain, is the part of a domain name that comes after the last dot. The TLD for "gobgle.com," for instance, is ".com." ' and are a few additional well-known TLDs.

To know more about top-level domains visit :-

https://brainly.com/question/28041008

#SPJ4

to remove spyware, users need to obtain a special program that can detect and delete it. true or false

Answers

It is true that consumers must get a specialized program in order to identify and remove spyware.

Spyware: What is it?

Spyware. an instance of malware that tracks down and records user data covertly. Virus. a piece of code with the ability to duplicate itself that generally has negative effects, including damaging the system or erasing data

What technique is employed to confirm the identification of computer users?

Biometric verification Users are increasingly choosing to have their biometrics verified. Today, two common techniques are fingerprinting and facial recognition. Other approaches consist of hand geometry, retinal and iris scans, voice recognition, and analysis based on signatures.

To know more about spyware visit :-

https://brainly.com/question/29786858

#SPJ4

The earliest way in which most users connected to the Internet was using a 56Kbps ___ connection using their phone line

Answers

The majority of users initially linked to the Web via dialing up at 56 Kbps using their phone line.

What does the term "internet" mean?

The Internet, also referred to as "the Internet," is a vast network of computer systems. It is a network of networks that allows users at any one computer to obtain information from any other computer with license (and sometimes talk directly to users at other computers).

I have WiFi, so why am I not online?

There are a number of causes why this could occur: The WiFi adapter in your computer is broken. ISP (internet service provider) down for you. Your computer's internet control message protocol (IP) address is incorrect.

To know more about Internet visit :

https://brainly.com/question/18543195

#SPJ4

Every time I try opening an image I get: 400. The server cannot process the request because it is malformed. It should not be retried. That's all we know.So what the heck does that mean, and how do I fix it?

Answers

An poorly written URL, syntax that is illegible or contains illegal characters, corrupted files in the web browser, or issues with voided browser cookies can all result in a 400 Bad Request error.

Describe a server :

A server sends, receives, and stores data. In fact, by offering, it "serves" another function. A server, which might be a system, software program, or simply a storage device, may provide one or more services.

Is a server software or hardware?

A server is a hub enabling other computers or programs to access services, data, or both. It can be made of components, software, or a combination of the two. The dedicated server is typically accessed via a network similar to the Internet.

To know more about Server visit :

https://brainly.com/question/7007432

#SPJ4

A 400 Bad Request error can be caused by a badly crafted URL, syntax that is difficult to read or contains illegal characters, damaged files in the web browser, problems with revoked browser cookies, and more.

What makes a server?

Data is sent, received, and stored by a server. In actuality, it "serves" another purpose by giving. A server, which might be a computer system, piece of software, or even just a storage device, could offer one or more services.

Is a server software or hardware?

Another computer or software can receive care, data, or both through a server, which acts as a hub. Components, software, or a mix of the two can be used to create it. A network resembling the Internet is frequently used to reach the dedicated server.

To know more about Server visit :

brainly.com/question/7007432

#SPJ4

pseudocode uses the end-structure statement ____ to clearly show where the structure ends.

Answers

Due to the fact that it spares the user from having to install anything, this kind of email account is more popular.

The following are email's characteristics: It entails an automatic response to messages. It makes it easier for messages to be automatically forwarded and redirected. It entails the facility sending copies of a message to a large number of individuals. self-filing and message retrieval. Webmail’s are email accounts with a web interface. These accounts are frequently free email accounts that can be used on a variety of websites. Yahoo Mail is one of them, among others. As a result, web-based email accounts are more popular since they eliminate the need for users to install and maintain email clients on each computer.

Learn more about Webmail’s here:

https://brainly.com/question/28604285

#SPJ4

Which of the following increases or decreases how crisp the objects in a photo appear?
a. brightness
b. sharpness
c. crispness
d. contrast

Answers

the answer is b. sharpness

Which framework should be recommended for establishing a comprehensive information security management system in an organization?

Answers

The best framework for establishing a comprehensive information security management system in an organization is the ISO 27001 standard.

Implementing an ISO 27001 Standard ISMS for Comprehensive Information Security Management

This framework provides a set of guidelines, processes, and best practices for how to develop, implement, and manage an effective information security management system (ISMS). It helps organizations identify, assess, and manage their information security risks, as well as set up appropriate security controls to protect their data. Additionally, it is the most widely adopted information security standard in the world.

Learn more about Security Management: https://brainly.com/question/14364696

#SPJ4

When the terminals of a control transformer have to be linked by wire, the manufacture-recommended wire types and sizes should be used.

Answers

A control transformer is a transformer that steps down the voltage in order to supply electricity to a machine's or circuit's control devices. Technicians operating on the equipment are significantly safer thanks to the lower voltage.

What is the process of a control transformer?

A control transformer is made to deliver the recommended output voltage at maximum VA. The output voltage rises as the load falls. On the other hand, higher loads will lead to lower output voltages.

What distinguishes a transformer from a control transformer?

The isolation transformer shields the electrical equipment from interference from the power supply's harmonics while the control transformer supplies power for the control system during operation of the electrical equipment.

To know more about control transformer visit:-

https://brainly.com/question/4195445

#SPJ4

Which of these plays an important role in keeping attack traffic off your systems and helps to protect users

Answers

Software or firmware used as a firewall limits illegal access to a network. Using a set of rules, it examines incoming and outgoing communications to look for dangers and prevent them.

What offers resistance against data theft and can stop an attacker from stealing private data from a stolen hard drive?

Encrypting the entire disk (FDE). Systems with completely encrypted hard drives are resistant to data theft, preventing an attacker from taking private data from a hard disk that has been taken or misplaced.

What connections do attack surfaces and attack vectors have?

An attack vector is a technique for breaking into a network or computer system without authorization.

To know more about firewall visit :-

https://brainly.com/question/13098598

#SPJ4

Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issue

Answers

It confirms connection and highlights any potential application issues. You make an effort to print a test page.

What does fundamental problem-solving entail?

A methodical approach to problem-solving is troubleshooting. The objectives of troubleshooting include identifying the root of an issue and offering suggestions for fixing it. A clear explanation of the issue serves as the initial step in the troubleshooting procedure.

Troubleshoot or Troubleshot, which is it?

The past tenses of the verbs troubleshoot and troubleshooted are both valid. Troubleshot may be used more frequently because shooted is not the past tense of shoot. Example: Despite my efforts to fix the program, it simply isn't functioning properly.

To know more about troubleshoot visit:

https://brainly.com/question/30048504

#SPJ4

A dial-up access network typically has high ___________ delays compared to most other access networks. Pick the best answer

Answers

With a dial-up connection, you can access the Internet at data transfer rates (DTR) of up to 56 Kbps using a regular phone line and an analog modem.

Dial-up access is it?

refers to using a modem and the public telephone network to connect a device to a network. Dial-up access is essentially identical to a phone connection, with the exception that computer devices rather than people are the participants at both ends.

Dial networking: What is it?

Dial-up networking is the collection of protocols and software used to link a computer to an online service, a distant computer, or an Internet service provider using an analog modem and POTS (plain old telephone system). The most popular kind of computer connection to the Internet is dial-up networking.

To know more about DTR visit:-

https://brainly.com/question/12914105

#SPJ4

Users are mentioning that a file share on a Windows server is no longer accessible. You check the server and see the share is still in place. You decide to check to see if any related ports are currently blocked on the server. What command can you use to investigate the ports

Answers

You can examine the ports using the other address command.

Which of the following presents a security risk following the installation of a new app on a mobile device?

storage of data. The data that you save on the device and whether other apps can access it is the most frequent security worry for Android applications.

What management tool may be used to investigate often unresponsive applications?

What management tool may be used to investigate often unresponsive applications? A log of issue events connected to system stability can be viewed using the Windows Reliability Monitor.

To know more about address command visit :-

https://brainly.com/question/29990582

#SPJ4

Which of the following objects is installed between the back side of the system case and the motherboard's ports?
I/O shield
Heat spreader
Fan
Standoffs

Answers

Between the ports on the motherboard and the rear of the system casing are installed I/O shield objects.

What tasks are carried out by a motherboard's chipset?

The movement of data between components on a motherboard is controlled by an electronic chipset. Between the CPU, GPU, RAM, storage, and peripherals, it serves as the traffic controller. It has been referred to as the motherboard's "glue" by experts.

What benefit does buying a motherboard with integrated graphics and audio provide?

The term "integrated" denotes that all of the parts, including connectors, slots for peripheral devices, serial ports, and I/O ports, have been incorporated by the manufacturer into the circuit board. The fact that this kind of board is the less expensive choice is its greatest advantage.

To know more about motherboard visit :-

https://brainly.com/question/29834097

#SPJ4

What is 90x8-78x0
help me pls

Answers

Answer:

720 - 0 = 720

Therefore, your answer is 720

Answer:

720

Hope it helps:)

Which of the following penetration tests provides complete knowledge and information, such as network diagrams, about the environment to be tested

Answers

White-box penetration tests provides complete knowledge and information, such as network diagrams, about the environment to be tested.

About Penetration test

According to experts in this field, information system security is basically handled in the following ways:

The first is for defense purposes and the other is proactive security. Penetration tests are carried out in the form of trying to infiltrate company information systems by trying every possible cam. The purpose of this test is not only to identify vulnerabilities, but also to detect these vulnerabilities and to ensure that only authorized persons have access to the system to detect possible infiltration.

Penetration tests are generally carried out using certain pre-designed methodologies. These test methods are used to ensure that the study can be verified, interpreted, and reproducible when the tried and standard set is applied, the more precise the obtained In general, weakness screening and infiltration tests are similar For weakness screening, a number of software tools are used and security holes in the system identified In this penetration test aims not only to determine security vulnerabilities, but also to detect access to Data bases information in the system by using comments in.

As a result, the problem of how secure the applications and data in the system is is a common problem of all companies.

Penetration tests provide answers to problem in Various infiltration tests are available, these vary depending on the target, the attack to be simulated and the system, Therefore, the penetration test to be applied to an enterprise depends on the characteristics and needs of the enterprise.

Typically, a penetration test includes network penetration , applicant penetration, database penetration, and wireless cable penetration

Your question is incomplete but most probably your full question was:

Which of the following penetration tests provides complete knowledge and information, such as network diagrams, about the environment to be tested?

a. White-box penetration

b. Grey-box penetration

c. Black-box penetration

Learn more about penetration test at https://brainly.com/question/29560410.

#SPJ4

Other Questions
A student wants to investigate the motion of a ball by conducting two different experiments, as shown in Figure 1 and Figure 2 above. In Experiment 1, the student releases a ball from rest and uses a slow-motion camera to film the ball as it falls to the ground. Using video analysis, the student is able to plot the balls horizontal position x and vertical position y as a function of time t. In Experiment 2, the student horizontally rolls the same ball off a table, and uses video analysis to plot the balls horizontal position x and vertical position y as a function of time t starting from the instant the ball leaves the table. The graphs from each experiment are shown above along with each graphs best-fit curve line.Question:Suppose that Experiment 1 and Experiment 2 are conducted at the same time; one student drops the ball from rest at the same instant that a second student horizontally rolls an identical off the table. After both balls have traveled half their vertical distance to the floor, what is the acceleration of the center of mass of the two-ball system relative to Earth?A) Equal to gB) Less than g, but not zeroC) Less than g , but not zeroD) Zero A chemist reported that 100 gallons of a gas were available in a laboratory. Which property of the gas did the chemist report?O LengthO MassO TemperatureO Volume A twig floating in a small pond is initially at rest. On the twig is a snail, which begins moving along the length of the twig with a speed of 1.2 cm/s. The twig moves in the opposite direction with a speed of0.40 cm/s. If the snail's mass is 2.5 g, what is the mass of twig? np.arange(5,8,1) what output will be produced? In the passage above, Huck gives the reader the idea that something is going to happen with the duke and the Dauphin. What is this literary technique called is 0.2/2.6 0.3/3.6 proportional or not proportional How the Constitution was the result of the compromise? In a certain school district, students from grade 6 through grade 12 can participate in a school-sponsored community service activity. The following bar chart shows the relative frequencies of students from each grade who participate in the community service activity. What is the meaning of this expression he was having the time of his life? Josefina wants to prove that figures d and d are similar.What seguence of transformation could Josefina perform to prove the figures are similar? least common number ( sorry i forgot what its called )of 598 and 45 What do the last two lines of Sonnet 18 mean? Messages are impulses are carried from one part of the body to another by The cost of an online newspaper is 7. 99 per month. If you buy a one year subscription the cost is 89. 88. How much do you pay each month if you choose the one year subscription Before sending a large file over the Internet, you might want to use one of these programs. A. Disk defragmenterB. UninstallerC. Disk cleanup programD. File compression program the total cost for 5 adult tickets and 18 student tickets at a local theater is $98. The total cost was 98. The total cost for 4 adult tickets and 22 student tickets at the theater is $105. Whats the cost for one adult ticket and one student ticket? PLEASEE BRO Can someone paraphrase this poem sentence by sentence ? Thanks!We plant seeds in the ground And dreams in the sky,Hoping that, someday, the roots of oneWill meet the upstretched limbs of the other.It has not happened yet.We share the sky, all of us, the whole world:Together, we are a tribe of eyes that look upward, Even as we stand on uncertain ground.The earth beneath us moves, quiet and wild, Its boundaries shifting, its muscles wavering.The dream of sky is indifferent to all this, Impervious to borders, fences, reservations.The sky is our common home, the place we all live. There we are in the world together.The dream of sky requires no passport.Blue will not be fenced. Blue will not be a crime.Look up. Stay awhile. Let your breathing slow. Know that you always have a home here. The equations of three lines are given below.Line 1: y= 3x +8Line 2: y=3x-3Line 3: 6x - 2y= -8For each pair of lines, determine whether they are parallel, perpendicular, or neither. PLEASE HELP ME WITH PROBLEM C1) The Magnolia trees purchased for planting at the school are 3 feet tall. Research shows that these types of trees grow at an average rate of 3/4 feet per year. a) Write an equation in Slope-Intercept form to represent the growth of the trees over time. Let x represent the number of years and let y represent the height (in ft.) of the tree. Y=3/4x+3 b) What does the y-intercept represent in your equation Y=3. 3 stands for feet tall c) Determine the height of the tree in 3 years. The romantic movement in literature began as a reaction to the movement