Which of these is NOT an example of a GUI?

a
virus protections software

b
microphone

c
icons

d
USB cord

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.  

Explanation:

First, we need to know what is the graphic user interface (GUI)?

A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.

so, in the context of the question, the following are examples of GUI.

Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.

Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.

The followings are not the example of GUI:

Microphone and USB cord because these are the electronic parts and they don't possess the GUI.


Related Questions

let Xi; i=1,2....,n from distribution with p.d.f , f(x) = ϑx^ϑ-1, 0

Answers

Answer:

User is very angry...................

..

Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries

Answers

Answer:

The answer is "One week".

Explanation:

Following are the number represents of the given values:  

Serial number (se)  [tex]= 200302028[/tex]

Refresh (ref) [tex]= 3600 \ second = 1 \ hour[/tex]

Updated -retry (ret)[tex]= 3600 \ second = 1 \ hour[/tex]

Expiry [tex]= 3600 \times 24 \times 7 = 604800 \ second \ = 1 \ week[/tex]

Minimum [tex]TTL = 3600 \ min = 1 \ h[/tex]

Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him. Which challenge is making it difficult to stop the cyberbullying of Mohammed? The classmates are using secure computers. The classmates are using technology positively. Mohammed doesn’t have any evidence of the cyberbullying. Mohammed doesn’t believe the cyberbullying exists

Answers

Answer:

Mohammed doesn't believe the cyberbullying exists.

Explanation:

If he knew he wouldn't say they are teasing him. I mean, how would their parents know he is being cyberbullied without evidence? Text messages(such as imessages) are most likely on phones, and not on computers.(Unless its an mac I believe.) And they are bullying him; its not using technology positively.

Answer:

d

Explanation:

🃒🂧🃖🃯🂶🂤ã¨ã’ã½ã‚…ã­ã£ã–

_______________ are distinguished from microcontrollers by their complexity and increased on-chip resources.A. Systems on a chip B. Systems on a driveC. Chip on a chip D. Device on a chip

Answers

Answer:

the correct option is (A)

Explanation:

According to the given scenario, the system on a chip is a chip that is different from the microcontrollers in terms of complexity and rise on the chip resources

The system on a chip is a circuit i.e. integrated most the computer things

hence, the correct option is (A).

Therefore the rest of the options are wrong

Answer:

a

Explanation:

A Flash Translation Layer translates user data to a format that can be written on the NVM. tracks which physical block contains the most number of consecutive invalid pages. tracks which physical block contains only valid pages. tracks which physical block contains only invalid pages.

Answers

Answer:

tracks which physical block contains only valid pages.

Explanation:

Flash translation layer or FTL is a system made up of software and hardware that manages solid-state drive or SSD operations. It implements data concurrency techniques like striping, interleaving, and pipelining to generate a high throughput. It also performs logical to physical addressing amongst other functionalities.

The FTL also tracks which physical block in the memory that contains only valid pages by performing a bad block management process, isolating and discarding the blocks with no valid pages

Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image without accidentally changing other parts it keeps the file size small and manageable it makes it easier to open the data file in different drawing applications it makes the print out a higher quality

Answers

Answer:

enables you to make changes to one part of an image without accidentally changing other parts

Explanation:

Computer aided designs incorporate the use of multiple layers in drawings. The first layer is known as the layer 0, while the present layer the designer is working on is known as the current layer. The advantage of the incorporation of layers in designs include the following

1. It helps objects to be altered, grouped, hidden and moved as the designer wishes.

2. Layers can be grouped and worked on separated and common properties like color and line weight assigned to them.

3. Layers can be manipulated as the user wishes. They can be locked, frozen, turned off, etc.  Locking prevents accidental changes being made on objects.

Write a program that reads an integer and determines and prints whether it is odd or even.

Answers

num = int(input("Enter a number: "))

print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")

I wrote my code in python 3.8. Best of luck.

The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this function (python):def add_prices(basket): # Initialize the variable that will be used for thecalculation total = 0 # Iterate through the dictionary items for ___: # Add each price to the totalcalculation # Hint: how do you access thevalues of # dictionary items? total += ___ # Limit the return value to 2 decimal places return round(total, 2)groceries = {"bananas": 1.56, "apples": 2.50, "oranges": 0.99,"bread": 4.59, "coffee": 6.99, "milk": 3.39, "eggs": 2.98, "cheese":5.44}print(add_prices(groceries)) # Should print 28.44

Answers

Answer:

def add_prices(basket):

 

   total = 0

   for items in basket.values():

       total += items

   return round(total, 2)

groceries = {"bananas": 1.56, "apples": 2.50, "oranges": 0.99,"bread": 4.59, "coffee": 6.99, "milk": 3.39, "eggs": 2.98, "cheese":5.44}

print(add_prices(groceries)) # Should print 28.44

Explanation:

The python dictionary is a data structure that stores items of data as a key-value pair. The keys and values can be listed separately using the keys() and values() built-in function.

The program above uses a for loop statement to iterate over the values of the groceries dictionary to return the total sum of the values.

Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface attached to EC2d) An Internet Gateway attached to VPC

Answers

Answer:

d) An Internet Gateway attached to VPC.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.

Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;

I. A VPC

II. A subnet in a VPC

III. A network interface attached to EC2

However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.

You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the permanent unique identifier of your networking device to help them troubleshoot. What are they asking for?

Answers

answer: from when it stopped working?

#include <iostream>
using namespace std;

// function prototypes
float get_Price();
int get_Type();
void tax(float, int);

// start main function
int main() {
float price = 0; // should > 0

int type = 0; // 1 -> Electronic
// 2 -> Sports & Outdoor
// 3 -> Vaccine

price = get_Price;
type = get_type();

cout << "Price before tax = " << price << "\n\n";
tax(price, type);
cout << "Total price after tax = " << price << '\n';

return 0;
}

// start new user-defined functions
void get_Price() {
float p = 0;

while (p < 0) {
cout << "Item price (RM): ";
cin >> p;
}

return p;
}

float get_Type() {
int t == 0;

do {
cout << "\n";
cout << "1 -> Electronic\n";
cout << "2 -> Sports & Outdoor\n";
cout << "3 -> Vaccine\n";
cout << "Item type (1,2,3): ";
cin >> t;
} while (t > 1 || t < 3);

cout << "\n";
return t;
}

// tax is based on item types as follows:
// 1 -> Electronic => 5%
// 2 -> Sports & Outdoor => 3%
// 3 -> Vaccine => 1%
void tax(float p, int t) {
float tax = 0;
switch (t) {
case 1: tax = p * 5 / 100; break;
case 2: tax = p * 3 / 100;
case 3: tax = p * 1 / 100;
}

cout << "Tax cost = " << tax << "\n";
p += tax;
}

What problem?​

Answers

Answer:

10⁶666666666666666666666666

vgggjhhii9

Explanation:

uyyyyyyyy6666y6666666666

For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?

a
"Sign In"

b
"Rates"

c
"Pay"

d
"Time remaining"

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

Answers

It’s called a firewall! :)

What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier to trace back to their source than others?

Answers

Explanation:

Note, a DoS (Denial of Service) attack is different in scope from a DDoS (Distributed Denial of Service) attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement that would be listed for parking officers?

a
add and store payment information

b
displaying hourly costs

c
transact remote payment for parking

d
register a fine

Answers

Answer:

b. displaying hourly costs

Explanation:

Displaying hourly costs would be very useful for parking staff because it would allow customers to understand how the charge for the service was made, without the need for an employee to have to explain it. In this way, work becomes less stressful and more optimized.

helppp plzzz thanksss enjoy ur day ​

Answers

Answer:

D

Explanation:

I believe...

Answer:

the answer is b

Explanation:

you should check for spelling errors and correct punctuation before you mail the letter and/or submit the document. now I am starting to sound like my language teacher

hope I helped :)

What sum will amounts to Rs 1227 in 9 months at 6%
e emple Interest 2.​

Answers

Answer:

given us,

principal (p)= Rs 1227

Time(t)= 9

Rate(r)= 6./.

Here,

simple interest= P×T×R/100

= 1227×9×6/100

= 66258/100

= 662.58

Explanation:

by using simple interest formula

The principal investment required to get a total amount, principal plus interest, of Rs 227.00 from simple interest at a rate of 6% per year for 0.75 years (9 months) is $1,174.16

Given Data

Final Amount A = Rs 1227

Time = 9 months

Rate = 6%

Principal = ?

Equation:

P = A / (1 + rt)

Calculation:

First, converting R percent to r a decimal

r = R/100 = 6%/100 = 0.06 per year.

Putting time into years for simplicity,

9 months / 12 months/year = 0.75 years

Solving our equation:

P = 1227 / ( 1 + (0.06 × 0.75)) = 1174.1626794258

P = $1,174.16

Learn more about simple interest here:

https://brainly.com/question/2294792

Why I/O modules is needed between system bus
and I/O devices?​

Answers

Answer:

1. Processor communication -- this involves the following tasks:

a. exchange of data between processor and I/O module

b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc.

c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors.

d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address.

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs

Answers

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.

HELLLP
Abigail’s supervisor asks for an iteration variable to be added to the program. Which of these lines of code will do that?
count = count + 1
variable = random
variable = count
count + 1 = count

Answers

[] Hello ! []

Answer:

C. Variable = Count

Explanation:

If you want to add something to the variable you will put in:

count + 1 = count

To start off the variable put in

Variable = (name of your variable) Then, (name of your variable) = (stat of your variable)

-------------------------------------------------------------------

I hope this helpedBrainliest appreciated!

+If this answer is wrong of displeases you, please tell me in the comments I would like to know+

Thank you for your time!

before the 20th century how did most people experience computing​

Answers

Answer:

   

Explanation:

anyone have the Dell xps 13 laptop? if not pls don't answer but if you do, how is it going for you?​

Answers

I do and it’s going alright; would recommend. Here’s what I think in bullet points.

- Good aesthetic design. Weave-like texture is nice and somewhat opulent.

- Good performance; you can overclock the i7 CPU.

- Battery life is at the upper end of the spectrum.

- No USB Type A Ports, big downside.

- Graphics are about 1000 points above industry average (3D Mark Fire Spark)

- Uses an SSD rather than a HDD; much quicker load time.

- I’d go for the $1,899 personally; it’s worth the extra money.

Thanks.

Yes and I really love it

________ implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.

Answers

Answer:

counting semaphore

Explanation:

Counting Semaphore is a technical term that is used to describe a form of Semaphore in computer operation that utilizes a count that enables assignments to be obtained or published on several occasions. The counting semaphore is established in such a way that it equals its count.

Hence, COUNTING SEMAPHORE implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.

the {blank} view is the working window of a presentation.
A. Outline
B. Handout
C. Notes
D. Slide

Answers

The view which serves as the working window of a presentation is: D. Slide.

The types of view.

On Microsoft PowerPoint, there are three (3) main types of views and these include the following:

Slide sorter viewSlide show viewSlide (Normal) view

What is slide view?

Slide view is also referred to as Normal view and it can be defined as the main working window of a presentation when using Microsoft PowerPoint.

Under the Slide view, the slides are displayed on a computer monitor in full screen. Thus, it is a view which serves as the working window of a presentation.

Read more on slides here: https://brainly.com/question/26187618

#SPJ2

d. slide

cuz i said so lol.

What is computer virus?​

Answers

Answer:

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Explanation:

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.

How to get it?

You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisements

and thats just a couple of examples, there's many many more but you get the idea.

Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.

That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.

Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.

If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.

Hope this helped!!

Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the top, and less common work styles are listed toward the bottom. According to O*NET, what are some common work styles Petroleum Engineers need? Select four options.

reaction time
cooperation
integrity
sales
analytical thinking
dependability

Answers

Answer:

2 (cooperation )

3 (integrity)

5 (analytical thinking)

6 (dependability)

Explanation:

Good luck! Hope this helps.

According to O*NET, some common work styles which Petroleum Engineers need are:

2 (cooperation )3 (integrity)5 (analytical thinking)6 (dependability)

What is Integrity?

This is a positive quality of a person where he is considered to be dependable and trustworthy.

With this in mind, we can see that among the requirements from O'NET for the common work styles which Petroleum Engineers need, some things such as integrity, dependability, etc were mentioned.

Read more about integrity here:
https://brainly.com/question/1188458

Here is the header for a function named computeValue:
void computeValue(int value)
Which of the following is a valid call to the function?
A) computeValue(10)
B) computeValue(10);
C) void computeValue(10);
D) void computeValue(int x);

Answers

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);

In the function header given:, the following can be observed:

The function name is computeValueIt has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

Modern CPUs need only a few ___________ to execute an instruction when all operands are in its registers.

Answers

Answer:

Nanoseconds.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

REST Basics REST is a protocol and a set of operations that many web services conform to in order to exchange information and interact with each other. Which of the following are true?
a) REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.
b) REST is a server-server interaction meaning that both sides can make requests and send responses to requests.
c) In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.
d) REST responses are not capable of specifying any caching related information regarding the accessed resource. Caching must be resolved with other mechanisms.

Answers

Answer:

The answer is "Option A and Option C".

Explanation:

In choice a, it is true since a client-server design can be used for REST-application. A user is somebody who needs space and it doesn't deal with storing data on a central computer. A client is someone with the money, and the interface does not. Its server doesn't want to worry regarding core functionality on the ends of the server. The server does not have to know anything at all about the layer of UI used at the end of the server.

In choice c, it is true As just a Web app, services like corporate/employee resources must be organized, and HTTP verbs like the GET, Place, POST, DELETE must be used to modify these. It must be obvious, as a programmer, that what is required is clearly to look only at the interface or HTTP method used.

The options that are true about REST include:

A. REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.C. In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.

It should be noted that REST applications should possess a client-server architecture. Also, it's important for web applications to be organized into resources band then use HTTP verbs such as GET, POST, DELETE, etc.

Learn more about REST on:

https://brainly.com/question/24160573

Other Questions
Parvis makes all sales on account, subject to the following collection pattern: 20% are collected in the month of sale; 70% are collected in the first month after sale; and 10% are collected in the second month after sale. If sales for October, November, and December were $70,000, $60,000, and $50,000, respectively, what was the budgeted receivables balance on December 31 Read this excerpt from "Collision CourseNow I felt like a friendless alien in this wide-opensuburb. The openness of it just made me feel small andmore alone. In our apartment in the Richmond District,there were always people walking around, and theneighborhood was always humming with fruit sellers,taquerias, and restaurants, especially Chineserestaurants and my favorite, dim sum bakeries. Andyou could rely on the street noise and interestingsmells. The Geary and Clement bus lines ran late intothe night and started up again early in the morning.Something was always happening. Our neighborhoodwas alive. It was my dream childhood.In this excerpt, the author uses descriptive languagemainly to Yin wants to create figure Y that is similar to figure Y. Yin begins by reflecting figure Y across the y-axis.Which of the following should Yin do next to get a figure similar to figure Y? A. Yin should rotate the figure 90. B. Yin should dilate the figure by a scale factor of 2. C. Yin should reflect the figure across the x-axis. D. Yin should translate the figure 3 units to the left. the means by which long-term objectives will be achieved are Determine the overhead allocated to Job XZ3275 which has 150 pieces, requires 200 miles of driving, and 0.75 hours of logistics. (Round answer to 2 decimal places, e.g. 12.75.) find two fraction with the same denominator that are equivalent to 7/8 and 5/12 The only taxonomic category in which microevolution can occur is the ________ level.a. domain.b. species.c. genus.d. kingdom.e. family.f. population. Will give BRAINLIEST!!!!Does coordinate mmm or coordinate nnn represent a greater number?Choose 1 answer:Choose 1 answer:(Choice A)Ammm(Choice B)Bnnn 8. Geologists have evidence of an igneous rock formation under Earth's outer layer. Is it possible thatmaterial from this rock formation could ever form sedimentary rock on Earth's surface? Point R on the coordinate grid below shows the location of a car in a parking lot. A second car needs to park 6 units above R to leave room for a utility truck. What are the coordinates of the location of the second car? Image of a coordinate grid with point R R located at negative 1, negative 3. (1, 3) (1, 3) (5, 3) (5, 3) Llena los espacios en blanco.Los hijos de tus tos son tus ____ . I need help- if a ladder is to reach a height of 5.6m, the base must be at least 1.4m from the wall. How long should the ladder be in order to meet this safety regulations? which expression is equivalent to the expression shown below? -1/2(-3/2x + 6x + 1) - 3xA) 3/2x - 1/2B) 6 3/4x - 1/2C) -3/4x + 1/2D) -5 1/4x - 1/2 Liza is playing a game in which she earns 3 points for each correct response but loses 2 points for each incorrect response. She missed the first 3 questions. Right now she just hopes to break even. Which statement is true?To break even, Liza must answer 3 questions correctly to cancel out the 3 she answered incorrectly.To break even, Liza must answer 2 questions correctly to give her 6 points, because she now has 6 points and the result would be a score of 0.To break even, Liza must answer 6 questions correctly to give her 6 points, because she now has 6 points and the result would be a score of 0.To break even, Liza must answer 1 question correctly, because she needs 3 points to cancel out the 3 questions she answered incorrectly. x + y = 8Let x = -1. What is y?Enter the correct answerDONEIl? A ______________ interview is one that has the potential to bring about strong emotional reactions in the respondent. How do the photograph and caption of the paragraph 4 help the reader better understand the selection? If Nell was blocking a defensive lineman for the South Grand Prairie Warriors with a force of 126 Newtons and had a mass of 56.2 kgwhat would his acceleration be equal to? 16a 25?? please help What is the volume of a cube that has a face diagonal of 5 cm? (to the nearest whole number)5 cm318 cm325 cm343 cm3 Steam Workshop Downloader