3. Why are binary and decimal called positional numbering systems?

Answers

Answer 1

Binary and decimal are called positional numbering systems because they use the position of the digits to determine their value. In decimal, each digit represents a value 10 times greater than the digit to its right, based on the powers of 10.

In binary, each digit represents a value 2 times greater than the digit to its right, based on the powers of 2. This allows us to represent large numbers efficiently and accurately by using a combination of digits in different positions.

"Entropy" is a thermodynamic function that describes the number of arrangements (positions and/or energy levels) that are available to a system.

positional numbering systems a measure of the disorder or randomness of a system, and it is related to the number of microstates that are accessible to a system at a given temperature and pressure. The greater the number of microstates, the higher the entropy. In thermodynamics, entropy is a fundamental concept that plays a key role in understanding the behavior of energy and matter in physical and chemical systems. It is important in many areas of science and engineering, including physics, chemistry, biology, and materials science.

Learn more about positional numbering systems here

https://brainly.com/question/31563391

#SPJ11


Related Questions

The Internet is a(n) ______
made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network.

A. Physical network
B. Virtual network
C. Multimedia interface
D. Domain name

Answers

Answer:

The Internet is a(n) B. Virtual network made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network.

Explanation:

you need to compute the total salary amount for all employees in department 10. which group function will you use?

Answers

To compute the total salary amount for all employees in department 10, the group function that will be used is SUM().

SUM() is an SQL aggregate function that allows us to calculate the sum of numeric values. It is frequently used to compute the total sum of values, which is essential in financial applications that need to know the sum of values from tables.

SYNTAX:

SELECT SUM(column_name) FROM table_name WHERE condition;

Example: Suppose you have an employees table with different columns like employee_id, employee_name, salary, department_id, and so on. The following example demonstrates how to use SUM() to calculate the total salary of all employees in department 10: SELECT SUM(salary)FROM employees WHERE department_id = 10;

Output: It will output the sum of all salaries for employees in department 10.

Learn more about SQL visit:

https://brainly.com/question/30456711

#SPJ11

Serial loading into a register is faster than parallel loading.
-True/False

Answers

False.

Parallel loading is faster than serial loading. In parallel loading, multiple bits or the entire data word are loaded simultaneously into a register. This takes advantage of parallelism and allows for a faster loading process. Each bit or data element is loaded in parallel, reducing the overall loading time. On the other hand, serial loading involves loading data bit by bit or sequentially, one after another. This sequential process takes more time as each bit needs to be loaded individually, leading to a slower loading speed compared to parallel loading.

Learn more about loading techniques here:

https://brainly.com/question/32322121

#SPJ11

Can you recommend me a movie? ​

Answers

Ice age definitely……….

Caroline is building an expert system for wartime defense. Which of these is true about the system she is building?
A. The expert system can demonstrate an attack to test the defense mechanism.
B. The expert system can make autonomous decisions with no human intervention.
C. The expert system can rebuild its knowledge base based on new defense technology.
D. The expert system can diagnose a new threat with any existing information.

Answers

Answer:

The true statement about the system she is building is;

B. The expert system can make autonomous decisions with no human intervention

Explanation:

A computer program known as an expert system is a system that emulates the human or organizational, decision making, judgement and behavior that has gained the knowledge and experience of an expert by analyzing information categories using if then rules of artificial intelligence technologies and not procedural code

Therefore, an expert system of wartime defense can make decisions on its own without the input of a human administrator

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

Three(3) methods available for processing traffic identified only as: unknown-tcp
unknown-udp
unknown-p2p
web-browsing

Answers

It is important to note that these methods can be used in combination to achieve greater accuracy and reliability in traffic identification and classification.

The three methods available for processing traffic identified as unknown-tcp, unknown-udp, unknown-p2p, and web-browsing are:

Deep packet inspection (DPI): This method involves analyzing the contents of packets in real-time to identify the application generating the traffic. DPI can identify and classify traffic based on application-level protocols, including unknown protocols, which allows the administrator to enforce appropriate policies.

Port-based filtering: This method involves blocking or allowing traffic based on the TCP/UDP ports used by the applications. However, some applications can use non-standard ports or even dynamic ports, which makes it difficult to classify traffic based on port numbers.

Behavioral analysis: This method involves analyzing the traffic behavior of applications to identify and classify them. Behavioral analysis can identify patterns such as the size of packets, timing, frequency, and protocol structure, to accurately identify unknown protocols. This method is especially useful for identifying unknown-p2p traffic, which can be challenging to classify using other methods.

To know more about TCP/IP,

https://brainly.com/question/30114641

#SPJ11

a stored program that is attached to a table or view is called ________.

Answers

The stored program that is attached to a table or view is called a database trigger. It is a type of stored procedure in a database management system that automatically initiates a specific action when a particular event or transaction occurs.

The trigger can be used to enforce business rules, perform data validation, maintain data integrity, or synchronize related tables.

A trigger is defined with a specific event, such as INSERT, UPDATE, or DELETE, that occurs on a table or view. When the event occurs, the trigger's code is executed, which can include SQL statements or calls to other stored procedures. A trigger can be either a row-level trigger, which is executed once for each affected row, or a statement-level trigger, which is executed once for each affected statement.

Triggers are commonly used in database applications to enforce complex data constraints that cannot be achieved with simple constraints or referential integrity. They can also be used to automate database maintenance tasks, such as updating summary tables, generating audit records, or sending notifications. Overall, triggers provide a powerful mechanism for customizing database behavior and ensuring data consistency.

Learn more about database management system here:-

https://brainly.com/question/13467952

#SPJ11

How might a company gain followers on Twitter?

Answers

By sending persuasive / informable and interesting posts to gain followers.

How does air gap networking seek to keep a system secure? by taking extra steps to ensure the DMZ server is fully patched to deal with the latest exploits by physically isolating it from all unsecured networks, such as the internet or a LAN by focusing on the security of the system through detection devices and incident reports

Answers

Air gap networking seeks to keep a system secure by physically isolating it from all unsecured networks, such as the internet or a LAN  Thus, the correct option for this question is B.

What do you mean by the Air gap in networking?

The air gap in network security may be defined as a type of measure that is utilized in order to ensure a computer network is physically isolated in order to prevent it from establishing an external connection, specifically to the Internet.

According to the context of this question, this process is used in order to ensure the security of the computer and computer network by physically isolating it from unsecured networks such as the internet or a LAN.

Therefore, the correct option for this question is B.

To learn more about Air gap networking, refer to the link:

https://brainly.com/question/14752856

#SPJ1

what permission must be granted for a user to run procedures within a database?

Answers

Answer:

To grant permissions on a stored procedure

From Stored Procedure Properties, select the Permissions page. To grant permissions to a user, database role, or application role, select Search. In Select Users or Roles, select Object Types to add or clear the users and roles you want.

if Z ~N( 0, 1) compute following probabilities:
a. P(Z≤1.45)
b. P( -1.25 ≤ Z ≤ 2.3)

Answers

a. The value of P(Z ≤ 1.45) is 0.9265

b. The value of P(-1.25 ≤ Z ≤ 2.3) is 0.8837.

From the question above, Z ~ N(0, 1)

We need to find the following probabilities:

a. P(Z ≤ 1.45)

From the standard normal distribution table, we can find that P(Z ≤ 1.45) = 0.9265

Therefore, P(Z ≤ 1.45) ≈ 0.9265

b. P(-1.25 ≤ Z ≤ 2.3)

From the standard normal distribution table, we can find that:

P(Z ≤ 2.3) = 0.9893 and P(Z ≤ -1.25) = 0.1056

Now we can calculate the required probability as follows

:P(-1.25 ≤ Z ≤ 2.3) = P(Z ≤ 2.3) - P(Z ≤ -1.25)= 0.9893 - 0.1056= 0.8837

Therefore, P(-1.25 ≤ Z ≤ 2.3) ≈ 0.8837.

Learn more about probability at

https://brainly.com/question/31909306

#SPJ11

What are the two most effective ways to defend against malware?(Choose two.) 1) Implement a VPN.Implement network firewalls. 2) Implement RAID. 3) Implement strong passwords. 4) Update the operating system and other application software. 5) Install and update antivirus software.

Answers

The two most effective ways to defend against malware are to implement network firewalls and to install and update antivirus software.

Network firewalls serve as a barrier between your network and the internet, blocking any unauthorized access and potentially harmful traffic. Antivirus software, on the other hand, scans your system for any suspicious activity or files and quarantines or removes them. It is important to keep both the firewall and antivirus software updated regularly to ensure they are able to detect and protect against the latest threats. Additionally, implementing strong passwords and updating the operating system and other application software can also help to defend against malware attacks. However, these methods are not as effective as network firewalls and antivirus software in preventing malware infections.

learn more about network firewalls here:

https://brainly.com/question/29929224

#SPJ11

write the java code for a class called "point3d" that specifies a point in 3 dimensions (i.e. x, y, and z).

Answers

Sure, here's an example Java code for a class called Point3D that represents a point in 3D space with x, y, and z coordinates:

public class Point3D {

   private double x;

   private double y;

   private double z;

   

   // Constructor that takes in the x, y, and z coordinates of the point

   public Point3D(double x, double y, double z) {

       this.x = x;

       this.y = y;

       this.z = z;

   }

   

   // Getters and setters for the x, y, and z coordinates

   public double getX() {

       return x;

   }

   

   public void setX(double x) {

       this.x = x;

   }

   

   public double getY() {

       return y;

   }

   

   public void setY(double y) {

       this.y = y;

   }

   

   public double getZ() {

       return z;

   }

   

   public void setZ(double z) {

       this.z = z;

   }

   

   // Method that calculates the distance between two Point3D objects

   public double distanceTo(Point3D other) {

       double dx = this.x - other.x;

       double dy = this.y - other.y;

       double dz = this.z - other.z;

       return Math.sqrt(dx*dx + dy*dy + dz*dz);

   }

}

This class defines three private instance variables (x, y, and z) that represent the coordinates of the point, a constructor that takes in the x, y, and z coordinates of the point, getters and setters for the x, y, and z coordinates, and a method called distance To that calculates the distance between two Point3D objects using the distance formula.

Learn more about Java here:

https://brainly.com/question/30479363

#SPJ11

In early 2020 due to COVID, the videoconferencing providers such as Zoom, had to rapidly adapt not only to increased volume but also to widely varying uses of their technologies. To successfully fulfill demand for the critical virtual communication channels required, the providers engaged in a(n) portfolio analysis diversification divestiture strategic pivot

Answers

In early 2020, videoconferencing providers like Zoom had to rapidly adapt to increased demand and varying uses of their technologies. To meet these challenges, the providers engaged in a strategic pivot.

A strategic pivot refers to a deliberate shift in business strategy to address new market conditions or challenges. In the context of videoconferencing providers during the COVID-19 pandemic, a strategic pivot would involve adapting their services and offerings to meet the increased demand and diverse usage scenarios.

To successfully fulfill the demand for virtual communication channels, videoconferencing providers had to analyze their portfolio of services and make necessary adjustments.

This could include expanding their infrastructure and capacity, enhancing security measures, improving user experience, and introducing new features or integrations to meet the evolving needs of users.

Additionally, providers might have diversified their offerings by exploring new markets or industries, targeting different customer segments, or collaborating with other technology companies to enhance their capabilities.

While divestiture, which refers to selling off parts of the business, may not be the primary approach in this scenario, a strategic pivot encompasses a broader strategic adjustment to ensure the successful delivery of virtual communication channels during the pandemic.

Learn more about videoconferencing here:

https://brainly.com/question/14907398

#SPJ11

suppose a network specialist establishes a fixed long-range wireless device to configure a bridge between two networks and wants to use a specific frequency. what would be the best way for the operator to ensure signal quality?

Answers

The best way for the operator to ensure signal quality when establishing a fixed long-range wireless device to configure a bridge between two networks and wants to use a specific frequency is to perform a site survey.

This can be done using specialized equipment that measures signal strength, interference, and other factors.A site survey is an essential step to ensure a successful wireless installation. It helps to determine the best location for access points and antennas, identify potential sources of interference, and optimize the wireless network's performance. Additionally, it is essential to test the network after installation to ensure that everything is working correctly and signal quality is optimal.

Learn more about signal quality: https://brainly.com/question/30174255

#SPJ11

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

assignee

Explanation:

ffour features of assembler ​

Answers

A program that translates assembly language into machine code is known as an assembler.

Which are the basic features of assembler?It transforms the fundamental commands and operations from assembly code into binary code that a particular kind of processor can understand.Compilers produce executable code, just like assemblers do.Key characteristics of the assembler for ARM and Thumb code, Unified Assembly Language (UAL).ARM and Thumb code NEON Single Instruction Multiple Data (SIMD) instructions.Instructions for Vector Floating Point (VFP) in ARM and Thumb programs.Code assembly instructions for the PXA270 processor using wireless MMX technology.The following list of assembly language characteristics is provided:It allows the use of mnemonic operation codes rather than numerical ones and provides details about any code mistakes.The machine address of the symbolic operand is not required because this language makes it easier to specify it.

To learn more about assembler refer

https://brainly.com/question/13171889

#SPJ9

insert a clustered column pivot chart in the current worksheet

Answers

To insert a clustered column pivot chart in the current worksheet, you can follow these steps:First, ensure that you have the data organized in a pivot table on the current worksheet.

If you haven't created a pivot table yet, create one by selecting the data range and going to the "Insert" tab, then click on "PivotTable" and follow the prompts to set up the pivot table.With the pivot table selected, go to the "Insert" tab in the Excel ribbon.In the "Charts" group, click on the "PivotChart" button. This will open the "Insert Chart" dialog box.In the "Insert Chart" dialog box, select "Column" from the left panel, then choose one of the clustered column chart options.Click on the "OK" button to insert the clustered column pivot chart into the current worksheet.

To know more about pivot click the link below:

brainly.com/question/31384633

#SPJ11

If the primary voltage of a transformer is 230V and the primary coil is 80. Calculate the secondary voltage when the secondary turn is 160. *Ans 460 volts*

Answers

Answer:

\(V_{out} = 460\)

Explanation:

From your question, you already posted the answer

However, I'll give the steps to get the answer

Given

\(Primary\ Voltage = 230V\)

\(Primary\ Coil = 80\)

\(Secondary\ Coil = 160\)

Required

Secondary Voltage

The relationship between the primary voltage, secondary voltage, turns of primary coil and secondary coil is as follows;

\(\frac{V_{out}}{V_{in}} = \frac{N_{s}}{N_{p}}\)

Where

\(V_{in} = Primary\ Voltage = 230V\)

\(V_{out} = Secondary\ Voltage = ??\)

\(N_{p} = Primary\ Coil = 80\)

\(N_{s} = Secondary\ Coil = 160\)

Substitute these values in the formula above;

\(\frac{V_{out}}{V_{in}} = \frac{N_{s}}{N_{p}}\)

becomes

\(\frac{V_{out}}{230} = \frac{160}{80}\)

\(\frac{V_{out}}{230} = 2\)

Multiply both sides by 230

\(230 * \frac{V_{out}}{230} = 2 * 230\)

\(V_{out} = 2 * 230\)

\(V_{out} = 460\)

Hence, the secondary voltage is 460 Volts

Answer:

460 volts

Explanation: hope this helps :)

Lily needs to send a digital version of her poster project to her teacher. She is worried that the formatting might change, impacting the look of her poster. How can Lily ensure that the layout and fonts on her poster do not change? A. Design it using simple layouts and fonts B. Email it using the Firefox web browser C. Convert it to a PDF before sending D. Send it as an email attachment

Answers

To ensure that the layout and fonts on her poster do not change, Lily should convert it to a PDF before sending.

The best way for Lily to ensure that the layout and fonts on her poster do not change when sending it to her teacher is to convert it to a PDF before sending (Option C). By converting the poster to a PDF, the file will retain its formatting and fonts regardless of the device or application used to view it, ensuring that the teacher sees it as Lily intended.

Designing the poster with simple layouts and fonts (Option A) may also help to prevent formatting issues, but it may not be a viable solution if Lily's project requires more complex designs or fonts. Emailing the poster using the Firefox web browser (Option B) or sending it as an email attachment (Option D) may also result in formatting changes or loss of information, depending on the email client and device used. Therefore, converting it to a PDF is the best option to ensure that the poster looks the same regardless of the device or application used to view it.

Learn more about PDF here:

https://brainly.com/question/14863778

#SPJ4

What are the characteristics of:
Master file
Transaction file
Reference file

Answers

Master File :-Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Transaction File :-Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

Reference File :-Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information. Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

Hope it helps you!

!!!!!HELP!!!!! (30PTS)
Suppose you are using a Mac to read your e-mail messages, and your receive an e-mail message with a PowerPoint file attached. PowerPoint is not installed on the Mac you are working with. Which of these could you use to view the file? Choose all answers that are correct.
A. a text editor
B. Keynote
C. PowerPoint Online
D. a photo editor

Answers

Answer:

B. KN

C. PP Online

Explanation:

KN is A's own software for creating slideshow presentations. However, since most people using KN are coming from using MS PP, there is the option to open PPs in KN (albeit with some fonts missing).

You can also view the file from PP Online. Just create a MS account (if you don't already have one), download the email attachment and upload it to your cloud, and you should be able to view it there.

What is the output for the following program?

for numX in [3,5]
for numY in [1,2]
print (numX, numY)

Answer choices:
A. 3 1
5 1
3 2
5 2

B. 31
51
31
52

C. 31
32
51
52

D. 3 1
3 2
5 1
5 2

Answers

3 2

5 2

Explanation:

A. 3 1 moneyA. 3 1

5 1

3 2

5 2

5 1

3 2

5 2

What is network connecting device? Explain ​

Answers

Answer:

Hardware devices that are used to connect computers, printers, fax machines and other electronic devices to a network are called network devices. These devices transfer data in a fast, secure and correct way over same or different networks. Network devices may be inter-network or intra-network.

Explanation:

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which phrase is the best definition of a play?

a story that focuses closely on key details of setting
a story with lots of dialogue and very little description of setting
a story that only makes sense when read aloud by actors
a story told one verse at a time, using lines and sometimes stanza

Answers

A phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

What is a phrase?

In literature, a phrase may be defined as the collection or group of words that significantly work together in a sentence but do not contain a subject or a verb.

According to the dictionary of literature, a play is a work of drama, usually consisting mostly of dialogue between characters and intended for theatrical performance rather than just reading.

Therefore, a phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

To learn more about Phrases, refer to the link;

https://brainly.com/question/27892321

#SPJ1

A(n) ____________________ is a security professional who applies his or her hacking skills for defensive purposes.

Answers

A(n) Ethical Hacker is a security professional who applies his or her hacking skills for defensive purposes.

Who is Ethical Hacker?An ethical hacker, also known as a white hat hacker, is a professional in information security (InfoSec) who breaches a computer system, network, application, or other computing resource on behalf of its owners and with their authority. Simply put, an ethical hacker's job is to act like a malicious hacker at work by approaching a company as if they were a cybercriminal, but without actually carrying out an attack. They will instead report any flaws or issues and seek solutions to strengthen the system's defenses.Ethical hackers apply their knowledge to protect and advance an organization's technology. They provide a critical service to these companies by looking for flaws that could lead to a security breach. An ethical hacker notifies an organization of vulnerabilities discovered.

To learn more about Ethical Hacker, refer

https://brainly.com/question/14526009

#SPJ4

True or false you can add audio from flies on your own pc or record your own audio

Answers

Answer:

True

Explanation:

All you need to do is have the audio file saved, then open it whenever you need to. I hope this helps!

Answer:

True

Explanation:

Cus its and easy asnwer

Recurrance relations
Compute the closest upper bound on the asymptotic running time of the following recurrance:
a) T(n) 3T(n/2) + 3 n^2
b) T(n) 2T(n/2) + 32n

Answers

a) The closest upper bound on the asymptotic running time of the recurrence T(n) = 3T(n/2) + 3n^2 is O(n^log2(3)).

b) The closest upper bound on the asymptotic running time of the recurrence T(n) = 2T(n/2) + 32n is O(\(nlogn\)).

a) To find the closest upper bound on the asymptotic running time of the recurrence T(n) = 3T(n/2) + 3n^2, we can use the Master Theorem.

Comparing the recurrence to the standard form T(n) = aT(n/b) + f(n), we have a = 3, b = 2, and f(n) = 3n^2. Since f(n) = O(n^c) with c = 2, which is less than log_b(a) = log_2(3), we can apply Case 1 of the Master Theorem. Therefore, the closest upper bound on the running time is O(\(n^{log_b\)(a)) = O(\(n^{log\)2(3)).

b) For the recurrence T(n) = 2T(n/2) + 32n, we again use the Master Theorem. In this case, a = 2, b = 2, and f(n) = 32n. The value of f(n) = O(\(n^c\)) with c = 1, which matches \(log_b\)(a) = log_2(2) = 1. According to Case 2 of the Master Theorem, the closest upper bound on the running time is O(\(nlogn\)).

Learn more about Asymptotic.

brainly.com/question/32038756

#SPJ11

Other Questions
The graph shows the relationship between sugar and water in a fruit punch recipe.Write an equation to represent the graph in terms of y and x. (PLEASE HELP ME) could someone fill in this form for me? Section 1 What was the Renaissance?5.How was knowledge of the classical world kept during the Middle Ages? Choose the answer that best completes the sentence.El concierto_____divertido.- fueron- fuimos- fui- fue Please help thank you! Ill also give brainliest Describe the pattern and what is the next number?22, 21, 19, 16, 12,... In what way does the criminal justice system teach morality?Question 8 options:by punishing people who are badby establishing a line between right and wrongby giving preferential treatment to the wealthy or privilegedby allowing people to make their own choices Constitutional law is based on common sense and previous decisions by judgesGroup of answer choicesTrueFalse Assume again that both firms act as Bertrand competitors but that=and AQuestion 5 options:a. Firm 1 and Firm 2 would charge a price equal to A and supply half the market.b. Firm 1 and Firm 2 would both charge B and supply half the market.c. Firm 1 would charge a price equal to A and supply the whole market.d. Firm 1 would charge a price slightly below B and would supply the whole market. What additional information is needed to establish the congruence? after school philipe spent 1 3/4 at baseball practice, 2 1/4 hours on homework and 1/4 hour getting ready for bed. about how many house after school will he be ready for bed? explain How does education level affect the probability of a woman experiencing violence? Which velocity-time graph is equivalent to the given position-time graph? When attempting to identify the authors disciplinary affiliation, you should Group of answer choices Research the authors name and institution to try to find a research agenda or C.V. (academic resume) as this may mention the authors qualifications. Exclude any article where the disciplinary affiliation of the author is unclear. Read the article and make a guess as the disciplinary affiliation based on the dominant perspective in the article. Parliament felt the colonies should set their own taxes.TrueFalse Explain which line must be parallel pllleeeaaaasser hurryyyy what is the answer for 3.7-4.2n-3n+8 why do you think huge progress was made in health and medicine during the Golden Age of Islam?own your own sentence How do you classify vehicle types? What does Ocean Basin mean