can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points

Can Someone Tell Me What To Do Im Kinda Stuck And Dont Know What Hes Telling Me To Do Pls Ill Give Brainlist

Answers

Answer 1

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.


Related Questions

What is your definition of Digital Safety?

Answers

Answer:

Digital Safety is being knowledgeable in the areas of Internet safety, device security, etc. and keeping yourself safe when using the Internet.

Explanation:

When you know how to stay safe on the Internet and keep yourself safe, you know Digital Safety.

write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz​

Answers

Answer:

The program is as follows:

5 INPUT A,B

6 PROD = A * B

7 PRINT PROD

8 TOTAL = A + B

9 PRINT TOTAL

10 DIFF = A - B

11 PRINT DIFF

12 END

Explanation:

This gets input for the two numbers

5 INPUT A,B

This calculates the product

6 PROD = A * B

This prints the calculated product

7 PRINT PROD

This calculates the sum

8 TOTAL = A + B

This prints the calculated sum

9 PRINT TOTAL

This calculates the difference

10 DIFF = A - B

This prints the calculated difference

11 PRINT DIFF

This ends the program

12 END

Kim is creating a PowerPoint presentation about the life cycles of different organisms. Knowing that her file will include a number of images, technical terms, and scientific names, she decides to customize the ribbon to make her work more efficient. To do this, she must access the PowerPoint Options dialog box.

How should Kim begin this task?
by clicking the Home tab and selecting Editing
by clicking the File tab and selecting Options
by clicking the View tab and selecting Master Views
by clicking the Help tab and selecting Help & Support

Answers

Answer: Clicking on file tab and selecting options, if she has issues contact Help & Support.

Hope it helped!

Answer:

by clicking the File tab and selecting Options

Explanation:

Arranging a given set of data in ascending or descending order is ...................​

Answers

Explanation:

maybe it's answer is sorting

Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False

Answers

Answer:

True

Explanation:

True,My good sir/maam

Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.

security

what time of day you are online

protection of sensitive information

from which location you are accessing the site

Answers

Answer:

protection of sensitive information

Explanation:

Answer:

a c baka baddies

Explanation:

Which of the two previously described wing designs should result in a longer flying time?

Answers

Answer:

If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.

Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?

Answers

the info needed to log in

-This would show what is protected in the privacy policy and its related to you since it would show personal data.

-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.

What are the advantages of a watchtower?

Answers

Answer:

Usually used in securing flanks of other burning types.

Allows fast area ignition.

Crew coordination important.

Use in light to medium fuels.

Knowledge of fire behavior very important.

Explanation:

good luck

please mark me as brainlist

what method of technical drawing uses converging lines?

Answers

The foundation of linear perspective is the concept of diminution, which states that objects appear to get smaller as they travel farther away from the observer.

What's a good illustration of linear perspective?

The seeming convergence of two parallel lines, particularly when looking at a lengthy section of two-lane highway, is an illustration of linear perspective. People who watch the highway in front of them have the impression that the lanes are converging at the horizon.

One kind of linear perspective is one point perspective. In a flat work of art, linear perspective creates the appearance of space and form by using lines to depict objects. It is a methodical method of drawing. One point perspective, which only uses one vanishing point, earns its name.

There are three forms of linear perspective. One point, two point and three point. When the vanishing point for the objects in your picture is close to the center of the scene, you have one point perspective, which is the simplest sort of perspective.

To learn more about linear perspective  refer to

https://brainly.com/question/22902116

#SPJ1

The introduction of the 8-bit computer expanded the number of bytes available for encoding. This led to the development of

Answers

It led to the development of octets.

Answer: It's D: Unicode on Edge

Explanation:

In the late ’80s, developers from Xerox and Apple worked on the explicit goal of unifying the various encoding systems into one universal character set. The result is Unicode, a character encoding system that can represent text written in all of the world’s languages and scripts. Unicode assigns a unique code point, an integer value denoted in base 16, to each character in the world’s languages. Applications such as web browsers or word processors “read” the Unicode, and then render the correct character according to the application’s own programming for font, size, and style.

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

Graphics created within Illustrator CC are always vector graphics true or false

Answers

True we use illustrator to draw vectors and vectors only

why? they are infinitely  scalable

Hope this helps.

-scav

Write a Python code to take input of age of three people by user and determine youngest people among them

Answers

Answer:

# Take Ages

person1 = eval(input("Enter age of person 1 : "))

person2 = eval(input("Enter age of person 2 : "))

person3 = eval(input("Enter age of person 3 : "))

# check youngest

if person1 < person2 and person1 < person3:

print("Person 1 is youngest")

elif person2 < person1 and person2 < person3:

print("Person 2 is youngest")

elif person3 < person1 and person3 < person2:

print("Person 3 is youngest")

9.6 Code practice Edhesive

Answers

Answer:

N = [1,1,1,1,1],

[2,2,2,2,2],

[3,3,3,3,3],

[4,4,4,4,4]

def printIt(ar):

   for row in range(len(ar)):

       for col in range(len(ar[0])):

           print(ar[row][col], end=" ")

       print("")

           

N=[]

for r in range(4):

   N.append([])

   

for r in range(len(N)):

   value=1

   for c in range(5):

       N[r].append(value)

       value=value + 1

           

printIt(N)

print("")

newValue=1

for r in range (len(N)):

   for c in range(len(N[0])):

       N[r][c] = newValue

   newValue = newValue + 1

       

printIt(N)

Explanation:

I got 100%.

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def printIt(ar):

  for row in range(len(ar)):

      for col in range(len(ar[0])):

          print(ar[row][col], end=" ")

      print("")        

N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]

for r in range(4):

  N.append([])

for r in range(len(N)):

  value=1

  for c in range(5):

      N[r].append(value)

      value=value + 1

printIt(N)

print("")

newValue=1

for r in range (len(N)):

  for c in range(len(N[0])):

      N[r][c] = newValue

  newValue = newValue + 1

printIt(N)

See more about python at brainly.com/question/26104476

What is one difference between low- and high-level programming languages? (5 points)
O a
Ob
Low-level programming languages are challenging for humans to read, while high-level programming languages are easier.
Low-level programming languages are more human-friendly, while high-level programming languages are more challenging for
humans to understand.
Ос
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Od
Low-level programming languages use program code to communicate with computers, while high-level programming languages
use machine code.

Answers

Answer: Low-level programming languages are computer code at its most basic. They are difficult or sometimes impossible for humans to read, while high-level languages are designed to be easy for humans to understand. I believe the answer is A.

Answer:

Low-level programming languages require interpreters and compilers, while high-level programming languages do not.

Explanation: I AM SURE IT IS CORRECT 100% CORRECT

z 1
-- = --
7 21
solve​

Answers

Answer:

[tex]z= \frac{1}{3}[/tex]

Explanation:

Given

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Required

Solve

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Multiply both sides by 7

[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]

[tex]z= \frac{1}{21} * 7[/tex]

Rewrite as:

[tex]z= \frac{1 * 7}{21}[/tex]

[tex]z= \frac{7}{21}[/tex]

Simplify fraction

[tex]z= \frac{1}{3}[/tex]

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

How do I break CPU pins

Answers

Answer:

grab them with fingertips or insert the board at wrong angle

Explanation: According to Guinness, “Rap God” by Eminem (USA) packs 1,560 words into a fast and furious 6 min 4 sec – that's a tongue-twisting average of 4.28 words per second!

using clipers or tweezers can help you in bending the pin in the right way to snap it

-scav

A man-in-the-middle attack or impersonation are likely to result in problems with

data availability.

data confidentiality.

data integrity.

data mining.

Answers

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.

What is a  man-in-the-middle attack?

A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.

Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.

Therefore, option B is the correct option.

Learn more about man-in-the-middle attack, here:

https://brainly.com/question/13014110

#SPJ6

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

Answers

The question is incomplete. The complete question is :

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

combustion reaction , photosynthesis , respiration

water + carbon dioxide + sunlight → oxygen + glucose

methane + oxygen → water + carbon dioxide + heat

glucose + oxygen → carbon dioxide + water + energy

Solution :

The chemical reactions that is occurring in the following chemical equations are :

Photosynthesis

water + carbon dioxide + sunlight → oxygen + glucose

Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.

Respiration

glucose + oxygen → carbon dioxide + water + energy

The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.

Combustion reaction

methane + oxygen → water + carbon dioxide + heat

Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.

n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals

Answers

The answer is (B. With bullet points) have a good day :)

Scanning devices translate information processed by the system unit and present the information
on paper

Answers

Answer:

True

Explanation:

It is TRUE that Scanning devices translate information processed by the system unit and present the information on paper.

This is because the scanning device otherwise referred to as a scanner uses Optical Character Recognition software to capture the scanned document which is then processed into files accessible by predefined application, such as image viewer

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem

Answers

Answer: Configure port security on the switch

Explanation:

Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.

When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.

Match each operating system drawback to its respective operating system.

1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System

Answers

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

Answer:

1. Microsoft Windows is more susceptible to viruses

2. Mac OS X (Apple OS) has fewer compatible applications

3. Linux OS has a limited support system.

what is a soft ware?

Answers

Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, including programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.

Answer:

it is like some data

Explanation:

Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations

Answers

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.

This type of peripheral is used to interact with, or send data to, the computer.


Answers

Answer:

Input

Explanation:

also have a good day people !!

Answers

Answer:

Thx u2!!

Explanation:

Everyone have a good day!

Answer:

You too and thank you for 50 points!!

Explanation:

Other Questions
One theme in the novel The Little Prince is how easy it is for people to misunderstand each other while thinking that they do understand. As you read this passage, think about how the narrators point of view helps to reveal the storys theme.How does this storys point of view help support the theme, People tend to assume they understand each other better than they actually do?The third-person limited point of view allows the narrator to demonstrate the theme.The third-person omniscient point of view shows that everyone is capable of understanding everyone else.The narrators omniscient point of view allows him to explain how everyone feels.The narrators first-person point of view allows him to state the theme from time to time How did you say "Sorry I don't understand" in sign language? What is stereotyping?when a writer tries to persuade a reader by using reasons that are supported by relevant evidencewhen a writer makes a general assumption about a group and applies it to every group memberwhen a writer tries to make readers feel a certain way in order to convince them of an argumentwhen an author makes an overly exaggerated claim without using evidence to support that claimWhat is the term for when an author supports a point by providing weak arguments?This is known as stereotyping.This is called faulty reasoning.This is called emotional appeal.This is known as a hyperbole.Which of the following is an example of a secondary source?an original and handwritten mapa biography of a famous persona historical fiction novel on WWIIan autobiographical documentaryWhy are primary sources useful for your research?You see one perspective.You get direct information.You can get biased factsYou can find them easily.. For every 1000 hits a You Tube channel gets it makes 40 from ad revenue. How many hits will the You Tube channel need to make 1? what is deductible in health insurance with example HELPPP PLEASE THANK YOU Whats the answer to these questions Read the passage. " The Show Must Go On". What is the theme of " The Show Must Go On"? How do specific details shape the theme and affect Tessa's attitude as the story progresses? Use evidence from the text to support your response. Your response needs to be at least three complete paragraphs). (Writing out the first half now) -------> Tessa received the letter in an oversized lavender envelope with a sliver star across the addressee space. She knew what it was before she opened it due to a system error earlier that week that had sent out emails to the accepted students. She still opened it slowly to build anticipation, just like she had planned to do back when she first applied. Congratulations on your acceptance to the Hollywood Summer Stars teenage film program. Please see script submission deadlines below, and report to studio 14 on the appropriate date. It was everything she had hoped for since six months prior when she had turned over her carefully crafted application. On June 24, Tessa stood outside studio 14 clutching two binders to her chest. One contained her shooting script, which was several development stages ahead of where the program expected it to be. The second binder contained a summer-long schedule she had composed for herself, detailing the upcoming weeks and the progress she planned to make on the film. Tessa's mother had poked fun at her elaborate preparations, encouraging her to use some of her free time for actual fun before the camp took over her summer vacation. Her mother didn't understand that for Tessa, this was fun. The camp arranged students in pairs to provide feedback to and support for one another. Tessa's fondest aspiration was to be matched with someone similar to her or related to someone famous who could maybe provide an exotic outside perspective on her work.Instead, they paired her with a Midwestern boy named Varick who had never left his home state of Ohio before his acceptance letter arrived. Tessa managed her disappointment and asked about his project, hoping it wouldn't be too tedious. He told her his script was open-ended by design, and that he intended to develop the content further as he filmed. Tessa thought that approach amounted to wasting a golden opportunity to make a masterpiece under professional supervision. The first week of filming went smoothly, and Tessa managed to accomplish every single task on her extensive to-do list. The second week was less productive. The obstacles began Tuesday morning, when storms appeared on the horizon. Tessa wasn't an amateur planner, so she had penciled in the possibility of poor weather. However she had not imagined the possibility of three consecutive overcast days taking place in a single week in Los Angeles. By Thursday, her mood soured, and she berated the clouds overhead for their interference. Through it all. Varick urged her to " change it up" and capture some of the fascinating skyscapes provided by the uncooperative weather. Tessa grew frustrated with his intrusion, and reminded him for the umpteenth time her film had nothing to do with storms. ( Read the last three paragraphs of the passage in the picture that I posted). Will Mark Brainliest if correct. [ No Nonsense Answers or you'll be reported everytime. Help me pls pls pls pls pls pls 5. The bus fair oe 8 passangers is Rs 640 If the fair decreased by Rs 5 per passanger How many passangers can travel for Rs 900 HL Hill ini mill Your Answer ! lii IR 3 HIE Answer Please help me with this i will give you brainlesist Which process must occur for a muscle to be able to relax?O A The amount of ATP in the neuromuscular junction must increase.O B. Myosin and actin must attach to each other.O C. A nerve must initiate an action potential in the muscle fiber.O D. The concentration of calcium in the myJfibril must decrease. y-6=-4(x+4) show steps. SOMEONE HELP ASAP!!! PLAeASE eXPLAIN HoW U DID IT TOO I really need help. PLEASE Use the figure below to answer the question Solve for x Which of the answer choices is a possible value for x? Select all that apply.8x > 24A: 2B: 3C: 4D: 5E: 6 of the core elements of successful safety health programs, management leadership, worker participation, and what else directly relate to individual roles how do you use context clues to determine the meaning of a word (giving brainliest) In how many ways can Carlos draw a blue or a green marble from a jar containing 30 blue marbles and 6 green marbles?53624180