Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. ​src.
b. ​loop.
c. ​controls.
s. ​preload.

Answers

Answer 1

Answer:

B. Loop

Explanation:

The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;

<video controls loop>

<source src="dance.mp4" type=video/mp4">

</video>

To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.


Related Questions

By what decade were books readily available to the public across the United States and Europe? A. 1690 B. 1750 C. 1860 D. 1820

Answers

Answer: 1820

Explanation:

I believe the answer is the 1820, as the introduction of steam powered printing presses and steam powered paper mills significantly lowered the cost of books to decrease and significantly increased their circulation/availability.

hope this  helps

-lvr

Dr. Garcia is a business professor at a large state college. At the start of each workday, he opens a Web browser on his office computer and accesses the university’s Web site. From there, he logs into his institution’s "MyCollege" portal with his username and password. From the portal he can access his email, Web pages for each of his courses, and confidential information about the students he advises. Most likely, Dr. Garcia is using what kind of network when using the portal?

Answers

Answer:

b. Intranet

Explanation:

An intranet refers to the private network that used to sharing the information, for collaboration, connecting the servcies, etc. It can be accessed by only the users who are authorized to use it. Plus, it only used inside the outside organization

So according to the given situation, since Dr Garcia has his credentials that represents the confidential information so it is an intranet netwrok

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

A user's computer will not boot. A technician notices four indicator lights on the backside of the
computer. Two of the lights are green, and two are amber. Which of the following documentation
should the technician read to determine what the lights are indicating?
A. Network diagram
B. Computer manual
C. Asset management
D. Wiring scheme

Answers

Answer:

B.

Explanation:

Computer manual is the user guide that comes along with the computer set to inform the users about the functions, ways to assemble the parts, and so on.

The user manual consists of guide for the users specially for electronic products such as computers, refrigerators; softwares, and so on. These manuals are written by technical writers, programmers, etc.

In the given scenario the technician needs to refer to computer manual to know the meaning of the lights on the backside of the computer.

So, the correct answer is option B.

Identify the statement below which is true. Cloud computing eliminates the need for companies to own their own software and servers. Cloud computing is a control technique for system availability. Cloud computing eliminates the need for backup of applications and data. Cloud computing refers to the practice of storing application files and backup data on satellites "in the clouds."

Answers

Answer:

The answer is "Cloud computing is a control technique for system availability".

Explanation:

The term cloud computing provides on-demand computer network services, which including storing data (information) and computing resources, without client-specific active management. Its definition is often used to identify network infrastructure for several web users, that's why the above choice is a correct and wrong choice can be described as follows:

It also needs in businesses with using their apps and servers but can't be removed, that's why it is wrong  It does n't  only one the satellites, that's why it is wrong  It is used for storing data not for removing, that's why it is wrong.

CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).​

Answers

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

What process is used to convert numbers between the binary system and the decimal system? (A.)Enter the number in a calculator, divide by 2, and multiply by 10.,(B)Convert each binary number to a letter, then use the letter’s place in the alphabet as the decimal representation ( e.g., A = 1, B = 2),(C.)Add up the digits in the binary number and place the sum behind a decimal point,(D.)Look up the number on a binary-to-decimal conversion table.

Answers

Answer:

(D.)Look up the number on a binary-to-decimal conversion table.

Explanation:

Though there are other ways of converting binary-to-decimal but from the given list of options, the best option that describes this conversion is option D.

Analyzing each of the options;

Option A

A binary number can't be converted to decimal by merely dividing it by 2 and multiplying the result by 10;

Take for instance; 11 in binary;

Divide by 2

11/2 = 5.5

Multiply result by 10

5.5 * 10 = 55

This final outcome is incorrect; as 11 in binary = 3 in decimal

Option B

This is also incorrect because as there is no room for alphabets in binary representation of numbers

Option C

This will also give an incorrect result;

Take for instance 11

Add up the digits

1 + 1 = 2

Place a decimal point behind;

This gives 2. or 2.0

This final outcome is incorrect; as 11 in binary = 3 in decimal

Option D

Looking up the number on a conversion table gives the accurate result

There are different types of conversion process. The process used to convert numbers between the binary system and the decimal system is to Look up the number on a binary-to-decimal conversion table.

Binary to decimal conversion is often done to show a number that is listed out in binary number system to its equivalent usually in decimal number system.

For easy conversion, one can Divide the binary number by 2 and write out the remainder. Thereafter you can divide by 2  again and write remainder and this process continue till the last remainder becomes 1 .

After that write all the remainders in the (0 , 1)  order. With this, the decimal is converted into binary.

Learn more about binary from

https://brainly.com/question/4467709

Does anyone know how to fix this problem My kali Linux is getting stuck on the failed to send host log message the first time I run it but when I reset it it gets fixed but I wanna stop it from freezing and getting stuck on that error message

Answers

Update it, or just get a new Linux

Answer:

Is

Explanation:

You should check with a person repairing computers or call him and ask him Wats the problem with your pc or laptop or computer. This is just a suggestion. U can also get what to do from sites in the internet.

Hope this helps....

Have a nice day!!!!

Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed.
​Andy wants the borders to be distinctly visible for each cell in the product details table. Which of the following properties must Andy add to his code to accomplish his goal?
A. ​border-spacing: length;
B. ​border-collapse: separate;
C. ​border-collapse: collapse;
D. ​border-spacing: initial;

Answers

Answer:

CSS documentation

Explanation:

Use this CSS reference to browse an alphabetical index of all the standard CSS properties, pseudo-classes, pseudo-elements, data types, and at-rules. You can also browse a list of all the CSS selectors organized by type and a list of key CSS concepts. Also included is a brief DOM-CSS / CSSOM reference.

Locatiopn: https://devdocs.io/css/

The properties that Andy must add to his code to accomplish his goal is (B), border-collapse: separate.

What is border-collapse?

The border-collapse property in CSS determines how the borders of table cells are collapsed. The default value of border-collapse is collapse, which means that the borders of adjacent cells are merged together. To make the borders of the cells in Andy's table distinctly visible, he needs to set the border-collapse property to separate.

The other possible answers are incorrect. The border-spacing property determines the amount of space between the borders of adjacent cells. The border-spacing: initial value sets the border spacing to the default value, which is 0 pixels.

Find out more on CSS properties here: https://brainly.com/question/14918146

#SPJ2

Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability

Answers

Answer:

RAID Array

Explanation:

Backups are needed in the IT industry to take care of some harm that can affect data resulting in its lose. RAID is the acronym for Redundant Array of Independent Disks. RAID combines multiple physical disks into a large virtual disk. It has different levels which range from 0, 1, 5, 6, and 10. RAID has a high degree of optimizing the data capacity of a backup device and its different levels prioritize features like performance, capacity, and reliability.

It also accommodates the future growth of disk capacity and reduces to the minimum the risk of data loss. It is very useful in ensuring data storage.

The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class that implements this interface represents a task to perform.

Answers

Answer:

Runnable.

Explanation:

Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.

Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.

The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

Which of the following statements is false? a. The Java API consists of packages. b. The Java API helps programmers avoid "reinventing the wheel." c. The Java API consists of import declarations. d. None of the above.

Answers

Answer:

The answer is "Option c".

Explanation:

In Java programming, the API stands for "application programming interface", which is also known as the lists of all classes in the JDK. It contains all packages, classes, and interfaces, with their techniques, fields. It is a built-in class, which gives the programmer a great deal of usability, and correct choices can be described as follows:

In option a, It is correct because it imports the package to use API. In option b, It allows you to "re-invent the wheel" by developers, that's why it is correct.

Referential integrity states that:______.
A. Something assigned to an attribute when no other value applies (N/A) or when the applicable value is unknown;
B. Values of an attribute must be taken from a pre-defined domain;
C. No primary key attribute (or component of a primary key) can be null;
D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null;

Answers

Answer:

D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null.

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Which of the following is a true statement about milestones?
O A. Meeting milestones contribute to the meeting of a key deliverable.
O B. Milestones are the high level events or actions in a schedule.
O C. Milestones are a helpful but not essential part of a schedule.
O D. Most milestones concern the delivery of a product.

Answers

Answer:

B option

Explanation:

my stones are the high level events are actions in a schedule.

Which one of these tasks best describes the process of localization?

Answers

Answer:

Localization is the process of adapting the project and service at a particular language.

Explanation:

Localization is that adapted to the product and service that need a desired to the popular look and feel.

Localization is to perform that including changing the local culture.

Localization is addition to perform the such details and time zone ,local color, holiday and name translation, money all to be considered.

Localization can sometimes  be perform with automatic language translation.

Localization that requirement to the enabling product to be different national product known as globalization.

Case-Based Critical Thinking Questions Case 1-2 Ted is asked to create a page containing his family photos for a family reunion website. He has about 20 pictures to post, with a caption that he wants to display before each one. Each picture is a group photo of a particular family. Which tag will Ted need to use to display the pictures

Answers

Answer:

Image tag or <img> tag

Explanation:

HTML refers to Hypertext Markup language. In this, we can be designed our documents by applying the font, color, image i.e to presented in the web browser. It is used for creating the webpages

Since in the question, Ted has approx 20 pictures for the post having caption and wants to display the picture so he needs to use the image tag or <img> for displaying the pictures. This tag is used for linking the images for the web pages you have created

Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size? (Choose two answers.)

Answers

Answer:

Host and network.

Explanation:

The parts of the structure of the IP addresses in this network already exist, with a specific size,  are Host and network.

The best advice for setting a study session is

Answers

to take breaks and not do all the work at once.

Answer: A

Explanation:

How do I make my kali Linux faster in my virtual box?

Answers

Answer:

If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.

does that make sense?

What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.

etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

Answers

Answer:

"Inline" is the correct answer.

Explanation:

Network behavior analysis (NBA)  or Analysis of network activity seems to be the technique to observe traffic trends that aren't groups or sets throughout the cable network's everyday traffic. Simplest terms, this is the organization's effort to define network anomalies outside pure congested traffic expect a seamless.

So that the above is the correct answer.

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont know what to do someone please help

Answers

Answer:

Type the password

Explanation:

It's probably trying to open some kind of compressed file to access data.

List any four routes of transmission of computer virus.
please give me answer​

Answers

Opening attachments or links from unknown or spoofed emails. note: shown above are two examples of how viruses can often appear as legitimate messages, but are designed to trick the computer user. ...

Downloading software from malicious sites. ...

Online Ads. ...

Social media. ...

Unpatched software.

follow me

The routes of the transmission of computer virus include:

Downloading infected files.Shared devices.Corrupt email attachments.Infected drives.

A computer virus refers to a malicious piece of computer code that is designed in order to damage a device or steal data.

The routes of infection for a computer virus include attached files, external storage media, downloading infected files, sharing infected devices, etc.

Read related link on:

https://brainly.com/question/19584310

Brainly won't let me see any answers. I've been trying to check my answers for 45 minutes now. I am unable to see ANY answers at all. Please help. I really need to finish all my work by tonight. *URGENT*

Answers

Answer:

I'm having the same problem. I think it has something to do with the Honor Code

Explanation:

When an "is a" relationship exists between objects, it means that the specialized object has Group of answer choices Some of the characteristics of the general object, but not all Some of the characteristics of the general class, but not all, plus additional characteristics None of the characteristics of the general object All the characteristics of the general object, plus additional characteristics

Answers

Answer:

All the characteristics of the general object, plus additional characteristics

Explanation:

In case when an is a relationship exists between objects. Here is a relationship refers to a relationship in which there is a reference of one class to another class.

So this represent that the specialized object contains all the attributes of a general object along with it it also involved the extra attributes

Hence, the last option is correct

The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: Student Success Site Media Center dashboard Guidance Center

Answers

I Inferred you are referring to the Georgia Virtual School resource program.

Answer:

Guidance Center

Explanation:

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

Find dy/dx and d2y/dx2. x = t2 + 5, y = t2 + 5t dy dx = Correct: Your answer is correct. d2y dx2 = Correct: Your answer is correct. For which values of t is the curve concave upward? (Enter your answer using interval notation.) Changed: Your submitted answer was incorrect. Your current answer has not been submitted.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Given value:

[tex]x = t^2 + 5......(1)\\\\ y = t^2 + 5t........(2)[/tex]

To find:

[tex]\bold {\frac{dy}{dx} \ \ \ and\ \ \ \frac{d^2y}{dx^2} = ?}[/tex]

Differentiate the above equation:

equation 1:

[tex]\frac{dx}{dt}= 2t.......(1)\\[/tex]

equation 2:

[tex]\frac{dy}{dt}= 2t+5[/tex]

Formula:

[tex]\frac{dy}{dx}= \frac{\frac{dy}{dt}}{\frac{dx}{dt}}\\\\[/tex]

[tex]\boxed{\bold{\frac{dy}{dx}=\frac{2t+5}{2t}}}[/tex]

To calculate the [tex]\bold{\frac{d^2y}{dx^2}}[/tex] we Differentiate the above equation but before that first solve the equation:

Equation:

[tex]\frac{dy}{dx}=\frac{2t+5}{2t}[/tex]

    [tex]=\frac{2t}{2t}+\frac{5}{2t}\\\\= 1+\frac{5}{2t}\\\\=1+\frac{5}{2} t^{-1} \\[/tex]

Formula:

[tex]\bold{\frac{d}{dx} \ x^n = nx^{n-1}}[/tex]

[tex]\frac{dy^2}{dx^2}= 0+\frac{5}{2} (-1 t^{-2})\\\\[/tex]

      [tex]= -\frac{5}{2} t^{-2}\\\\= -\frac{5}{2 t^2} \\\\[/tex]

[tex]\boxed{\bold{\frac{d^2y}{dx^2}=-\frac{5}{2t^2}}}[/tex]

Answer:

d2y dx2

Explanation:

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software.
What type attack has infected Hector's computer?

Answers

Answer:

Rogue antivirus

Explanation:

A Rogue antivirus is a security software in which it misguides the users to pay for it so that the malware or virus could be removed from the computer but actually this is a malware which is installed in the computer system so that they could able to do fraud with the users

In the given situation, since Hector is trying for run Windows defender but it is disabled and on the other side the other antivirus software that infected the computer

Therefore this situation represents the rogue antivirus

Question 3 of 10
What is one advantage of video tutorials about maintenance and repairs?
O A. Video tutorials help you fix problems by doing the work for you.
O B. Sometimes, seeing a picture of the process is more helpful than
reading about it.
O C. Video tutorials are easier to make than written guides.
O D. Video tutorials cannot do the repair or maintenance for you.
SUBMIT
PREVIOUS​

Answers

Answer:

B. Sometimes, seeing a picture of the process is more helpful than  reading about it.

Explanation:

Video tutorials are a form of communication in which the instructions are given through video instructions. The users drive more information from video tutorials than written or audio. The visual and the auditory aids together helps in creating a better impact on the users. The video tutorial is more user friendly and can easily be controlled by the user. This helps in better understanding and analyzing the information.

Answer: B. Sometimes, seeing a picture of the process is more helpful than reading about it.

Explanation: took the quiz

Other Questions
write down structures for three isomers of hexane Bryan drives at an average speed of 60 miles per hour. At this rate, it will take him 3 hours to drive miles. If the distance between two objects increased, what would happen to the force of gravity between them? It would increase. It would stay the same. It would depend on the speed. It would decrease. Direct Materials Purchases BudgetTobins Frozen Pizza Inc. has determined from its production budget the following estimated production volumes for 12'' and 16'' frozen pizzas for November:Units12" Pizza 16" PizzaBudgeted production volume 70,000 50,000 There are three direct materials used in producing the two types of pizza. The quantities of direct materials expected to be used for each pizza are as follows:12" Pizza 16" PizzaDirect materials:Dough 0.55 lb. per unit 0.80 lb. per unitTomato 0.25 0.40 Cheese 0.70 1.20 In addition, Tobins has determined the following information about each material:Dough Tomato CheeseEstimated inventory, November 1 2,500 lbs. 1,000 lbs. 3,000 lbs.Desired inventory, November 30 2,000 lbs. 1,200 lbs. 2,800 lbs.Price per pound $0.50 $0.60 $0.85 Prepare Novembers direct materials purchases budget for Tobins Frozen Pizza Inc. For those boxes in which you must enter subtracted or negative numbers use a minus sign.Tobins Frozen Pizza Inc.Direct Materials Purchases BudgetFor the Month Ending November 30Direct Materials Direct Materials Direct Materials Dough Tomato Cheese TotalUnits required for production: 12" pizza 16" pizza Desired inventory, November 30 Total units available Estimated inventory, November 1 Total units to be purchased Unit Price x $ x $ x $ Total direct materials to be purchased $ $ $ $ The sum of two numbers, one is as large as the other is 24. Find two numbers what idea do you form of Mr keesing as a teacher? what are reflected from his character? what is that you like most about him?pls ANSWER this question. The probability that two independent events both occur is the sum of the probabilities of each independent event. 4. When choosing a card randomly from a deck of cards, choosing a 5 or a spade are not A _____ is a personal tax that must be paid before voting.voter taxcampaign taxJim Crow taxpoll tax What evidence from the passage supports the inference that sugar was expensive and not available to everyone? Which is most likely to happen during a precipitation reaction?A. A solid substance will break down into two new substances thatare gases.B. An insoluble solid will form when ions in dissolved compoundsswitch places.C. A substance will react with oxygen to form water and carbondioxide.D. A gas will form when positive ions switch places to form newcompounds. Please help Factorise completely 36ab - 18b+6a-3 0Which of the following can you conclude about a particle labeledCheck all that apply.O A. It has one electron.OB. It has one neutron.I C. It has one nucleon.O D. It has one proton.E. It is negatively charged.OF. It is an alpha particle.O G. It is a beta particle. In 1864, the CP's construction was slow and a cash crisis occurredin the spring. Things began to look up as additional locomotivesarrived and the government:O passed the second Pacific Railroad Act which doled out more loans forconstruction.sent in the military under Grenville Dodge to help supervise andconstruct the tunnels through the Sierras.sent Hungarian and Scandinavian immigrant workers who had built theBaltimore/Ohio railroad in earlier years.I What is the slope of (3,-2) (2,-4) x varies directly as y, when x=4,y=3. find Y when x=5 Below are amounts (in millions) from three companies' annual reports. Beginning Ending AccountsAccounts Receivable Receivable Net Sales WalCo $1,735 $2,682 $314,427 TarMart 5,766 6,294 59,878 CostGet 549 585 60,9631. Calculate the receivables turnover ratio and the average collection period for WalCo, TarMart and CostGet.2. Which company appears most efficient in collecting cash from sales? If cot(x)=2/3, what is The value of csc(x) Identifying Gerunds, Participles and InfinitivesDirections: Read each of the following sentences to determine whether the sentence contains a gerund,participle, or infinitive. At the left of the number, write G, P, or I.1) Facing college standards, the students realized that they hadn't worked hard enough inhigh school.2) Swimming in your pool is always fun.3) The college recommends sending applications early.4) Mrs. Sears showing more bravery than wisdom invited thirty boys and girls to a party.5) To be great is to be true to yourself and to the highest principles of honor.6) He won the game by scoring during the overtime period.7) Jim is expected to program computers at his new job.8) Her most important achievement was winning the national championship.9) Going to work today took all my energy.10) The student left in charge of the class was unable to keep order.11) The president wants to use nuclear energy for peaceful purposes.12) Fighting for a losing cause made them depressed.13) Getting up at five, we got an early start.14) Telling your father was a mistake.15) The crying boy angered by the bully began to fight.16) Applicants must investigate various colleges learning as much as possible about them before applying for admission.17) Statistics reported by the National Education Association revealed that seventy percent of American colleges offer remedial English classes emphasizing composition. 4x 12 dimplify solve for x Journalize the following transactions assuming a perpetual inventory system: May 5 Purchased merchandise from Archie Co., $6,000, terms FOB shipping point, 2/10, n/30. Prepaid freight costs of $100 were added to the invoice. May 12 Issued a debit memo to Archie Co. for $2,500 of merchandise returned from purchase on May 5. May 14 Paid Archie Co. for invoice of May 5, less debit memo of May 12.