A manually operated switch that uses a rotating motion for actuating a device is called a ____a-speed switch b-pressure switch c-safety switch d-selector switch

Answers

Answer 1

d-selector switch. A manually operated switch that uses a rotating motion for actuating a device is called a selector switch.

A selector switch is a manually operated switch that uses a rotating motion to select between different options. It is commonly used to control machinery or equipment with multiple operational modes. For example, a selector switch might be used to choose between different speeds or directions of rotation for a motor. Selector switches can have multiple positions and can be designed to lock into place for added safety. They are typically used in industrial and manufacturing settings and are an important component in control systems that require precise and reliable operation.

Learn more about switch here:

https://brainly.com/question/29211725

#SPJ11


Related Questions

PLS HURRY!
Which steps are used to view and delete the macros that have been enabled in a workbook?


Press Alt+F8, select the macro to be deleted, and press Delete.

Under the Developer tab, click the Macros button in the Code group, select the macro to delete, and press Delete.

Press Alt+F11, click Tools, and select Macros; then, select the macro to delete and press Delete.

All of the options listed are correct.

Answers

Answer:

D. All of the options listed are correct.

Explanation:

A macro, in excel sheet, is an action or series of action that repeats the keystrokes or mouse actions as many times as one wants. To view macro, shortcut key is to Pres Alt+F8; to delete, one needs to select the macro one wants to delete and press Delete button.

The another way to view macro is to go to the Developer tab, and select the Macro option in Code group. And, then select macro need to delete, and press Delete button.

Another shortcut is to press Alt+F11, and click  on Tools tab, click on Macros and then select macro need to be deleted, and press Delete.

So, all the options stated above are correct.

Therefore, option D is correct answer.

which element of the cia triad concerns itself with attacks used to gain entry into computer networks to monitor activities

Answers

The Confidentiality element of the CIA triad concerns itself with attacks used to gain entry into computer networks to monitor activities.

What components make up the CIA triad?

A well-liked information security framework is the CIA Triad. It directs an organization's initiatives to guarantee data security. The cornerstone of security infrastructure is composed of the three principles of confidentiality, integrity, and availability, which are also full for the CIA in cybersecurity.

Why is the CIA trio crucial for computer security? What does it entail?

The CIA Triad is built on three words: availability, integrity, and confidentiality. A typical prototype that serves as the foundation for the creation of security systems is the CIA Triad. They are used to identify weaknesses and provide remediation strategies.

Which of the CIA trio is the most crucial?

Integrity: This part of the CIA trinity makes sure the information is accurate, real, and trustworthy. In other words, it guarantees that the data is trustworthy and hasn't been tampered with.

To know more about CIA triad visit:

https://brainly.com/question/13384270

#SPJ4

Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D. way finding​

Answers

Answer:

landmark

Explanation:

How would you describe the relationship between blocks of code and commands?

Answers

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

What is the drawback of the linear model?
A.
communication is only in one direction
B.
too much noise is created
C.
no feedback is sent on receiving the message
D.
long travel between the sender and the receiver

Answers

Answer:

long travel between the sender and the receiver

Explanation:

The drawback of linear model is long travel between the sender and the receiver. The correct option is D.

What is linear model?

Depending on the context, the phrase "linear model" is used differently in statistics.

The word is frequently used interchangeably with a linear regression model since it occurs most frequently in relation to regression models.

The phrase has a different connotation when employed in time series analysis, though.

Something that is linear is related to a line. A line is built using all of the linear equations. A non-linear equation is one that cannot be represented by a straight line. It has a variable slope value and resembles a graphed curve.

The linear model's disadvantage is the distance between the transmitter and the receiver.

Thus, the correct option is D.

For more details regarding linear model, visit:

https://brainly.com/question/29757372

#SPJ2

what does computer graphics mean?​

Answers

Answer:

Computer graphics deals with generating images with the aid of computers

Explanation:

Anyone have any ideas how to work this out x

Anyone have any ideas how to work this out x

Answers

Answer:

1.5 μs

Explanation:

time = distance / speed

if your cabinet is 300 m away, the time it takes is:

300 [m] / 200 000 x 10³ [m/s] = 1.5 x 10⁻⁶ s = 1.5 μs

Do the lengths of 10,4 and 5 form a triangle explain why please I’m confused

Answers

Answer:

no

Explanation:

Imagine having sticks of these lengths. Attach the 4 and 5 to both ends of the 10. No way you can have them touch each other, not even when the triangle is flat.

The 4 and 5 add up to 9, that is less than 10.

The Triangle Inequality Theorem states that the sum of any 2 sides of a triangle must be greater than the measure of the third side.

Amazon describes their web services platform like this: Amazon Web Services (AWS) is a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of enterprise, start-up and public sector business with organizations in over 190 countries around the world. What does it mean for the platform to be scalable? Choose 1 answer: Choose 1 answer: (Choice A) A It is distributed across multiple data centers. (Choice B) B It can process requests for users located anywhere in the world. (Choice C) C It is relatively inexpensive for high amounts of usage. (Choice D) D It continues operating when experiencing traffic surges.

Answers

Answer:

A scalable platform enables organizations to solve large-scale business problems through the high-performance processing of massive data volumes

Explanation:

2. To ________
is to create an image with artistic tools.
3. _______
is the number of pixels an image holds.
4. Typography is the use of text in _____
5. Changing a vector image to a raster image is ____
6. _____
saves the original image.
7. The ___
and _____
determine the look of the object.
8. A vector uses _____
9. The quality of an image is compromised when _______
are stretched.

2. To ________is to create an image with artistic tools.3. _______is the number of pixels an image holds.4.

Answers

Answer:2.render 3.resolution 4.visual communication 5.rasterizing 6.nondestructive 7.stroke&fill 8.lines&path 9.pixels

Explanation:

the main office is planning for more jobs to become remote in nature. the network team is briefing the chief information security officer (ciso) on the use of vpn software and the protocols used for point-to-muiltipoint connections. which protocols should the team brief to the ciso?

Answers

The ideal CISO must exhibit a thorough mastery of the relevant security information and offer practical and strategic leadership insights.

Which protocols ought the team to make the ciso aware of?

CISOs ought to have audits and risk management expertise. Many businesses demand that CISOs hold graduate degrees in business, computer science, or engineering and have years of professional experience in the information technology field.

What is the CISO's top priority?

Executives known as CISOs are in charge of a company's cybersecurity strategy. They are in charge of cybersecurity teams that guarantee the protection of their company's data assets. CISOs are responsible for locating vulnerabilities, removing them, and assuring board members of their security.

To know more about ciso visit:-

https://brainly.com/question/14332228

#SPJ4

susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct statements are correct her error

Answers

The recursive formula of the explicit formula \(A_n = 3 + 2n\) is \(A_n = A_{n-1} + 2\)

The explicit formula is given as:

\(A_n = 3 + 2n\)

When n = 1, we have:

\(A_1 = 3 + 2(1)\)

\(A_1 = 5\)

When n = 2, we have:

\(A_2 = 3 + 2(2)\)

\(A_2 = 7\)

When n = 3, we have:

\(A_3 = 3 + 2(3)\)

\(A_3 = 9\)

So, we have:

\(A_1 = 5\)

\(A_2 = 7\)

\(A_3 = 9\)

Rewrite the functions as follows:

\(A_1 = 5\)

\(A_2 = 5 + 2\)

\(A_3 = 7 + 2\)

So, we have:

\(A_1 = 5\)

\(A_2 = A_1 + 2\)

\(A_3 = A_2 + 2\)

Express 2 as 3 - 1

\(A_3 = A_{3-1} + 2\\\)

Substitute n for 3

\(A_n = A_{n-1} + 2\)

Hence, the recursive formula is \(A_n = A_{n-1} + 2\)

Read more about recursive and explicit formulas at:

https://brainly.com/question/11235928

what is the term for a hybrid environment that normally uses a private cloud to run critical applications but will use public cloud services to meet spikes in resource usage?

Answers

The term for a hybrid cloud environment that normally uses a private cloud to run critical applications but will use public cloud services to meet spikes in resource usage is hybrid cloud.

What is hybrid cloud computing?

A hybrid cloud is a type of cloud computing that combines on-premises, private cloud services with third-party public cloud services, allowing for data and applications to be shared between them. A hybrid cloud strategy allows businesses to make the most of their existing infrastructure while also benefiting from the versatility, scalability, and cost-effectiveness of the public cloud.

A hybrid cloud approach is ideal for companies that want to maximize their investment in IT infrastructure while also reaping the benefits of public cloud services. The hybrid cloud provides businesses with the ability to take advantage of public cloud services' scalability and versatility while still keeping mission-critical applications and data on-premises.

Learn more about cloud computing here:

https://brainly.com/question/29737287

#SPJ11

Language: JAVA Can someone please tell me what the problem to my "main" class is?

I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.

Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris

Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468

Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors
Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors
Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors

Answers

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors
Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors
Language: JAVA Can someone please tell me what the problem to my "main" class is? I included the errors

It is also known as the embryonic stem.
A. radicle
B. hypocotyl
C. epicotyl
D. testa
It is a series of activities carried out in a form management system prior to planting the seed or planting materials.
a. pre-planting operation
b. prior planting operation
c. first planting operation
d. start planting operation

Answers

Answer:

A and B, I really hope.

Explanation:

Answer:

the first one is D and the second one is B

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

There are several categories of utility programs that were discussed in this unit. For this item, list one. In one to three sentences, describe the purpose of this category of utilities. Then provide an example of one such utility program and explain its function.

Answers

Answer:

Antivirus

Explanation:

The antivirus software is a utility program and what it basically does include: (1) detecting of virus on the computer system (2) bring to the notice of the computer user, the presence of virus on the system.

An example is Avast Antivirus.

Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive

Answers

The answer is positive

Answer:

negative

Explanation:

this is because not many people have the skills to operate the machines. In short not everyone is able to operate them

Which person listed below attempted to destroy his fingerprints with corrosive acid? a. James Gotti b. Carlo Gambino c. William West d. John Dillinger.

Answers

The person who attempted to destroy his fingerprints with corrosive acid was John Dillinger.

John Dillinger was a notorious American gangster who was known for his numerous bank robberies and prison escapes in the 1930s. In an attempt to evade capture and identification, Dillinger tried to destroy his fingerprints using corrosive acid. This action demonstrated the extreme measures he was willing to take to avoid being caught and convicted. Although he managed to cause some damage to his prints, experts were still able to identify him by the remaining ridge patterns. He attempted to destroy his fingerprints using a corrosive acid to make it more difficult for law enforcement to identify him. However, this method was not effective and he was eventually apprehended by the FBI. Ultimately, Dillinger's criminal career came to an end when he was shot and killed by federal agents in 1934.

Learn more about John Dillinger: https://brainly.com/question/31423730

#SPJ11

When downloading a large file from the iniernet Alexis interrupted the download by closing ber computer, Later that evening she resumed tbe download and noticed that the file was bowniosding at a constant rate of change. 3 minutes since resaming the download 7440 total MegaBytes (MB) of the file had been downloaded and 6 mintues siace resuming the download 13920 total MesaBytes (MB) of the file had been donstoaded A. From 3 to 6 minutes after she resumed downlooding, how many minutcs elapod? misules b. From 3 to 6 minutes after she resumed downloading, how many total MB of the file were dowaloaded? MB c. What is the consuant rate at which the file downloads? MegaByes per minule d. If the file continues downloadisg for an additional 1.5 minner (after tbe 6 mimutes afts she feramed downloading). 4. How many aditipeal MB of the flie were downloaded? MIB 14. What is the new total number of MB of the file Bhat have been downloaded? MEI

Answers

a) From 3 to 6 minutes after resuming the download, 3 minutes elapsed.

b) From 3 to 6 minutes after resuming the download, 6,480 MB of the file were downloaded.

c) The constant rate at which the file downloads is 2,160 MB per minute.

d) If the file continues downloading for an additional 1.5 minutes, an additional 3,240 MB of the file will be downloaded.

e) The new total number of MB of the file that have been downloaded will be 17,160 MB.

a) From the given information, we can determine the time elapsed by subtracting the starting time (3 minutes) from the ending time (6 minutes), resulting in 3 minutes.

b) To calculate the total MB downloaded, we subtract the initial downloaded amount (7,440 MB) from the final downloaded amount (13,920 MB). Therefore, 13,920 MB - 7,440 MB = 6,480 MB were downloaded from 3 to 6 minutes after resuming the download.

c) The constant rate at which the file downloads can be found by dividing the total MB downloaded (6,480 MB) by the elapsed time (3 minutes). Therefore, 6,480 MB / 3 minutes = 2,160 MB per minute.

d) If the file continues downloading for an additional 1.5 minutes, we can calculate the additional MB downloaded by multiplying the constant rate of download (2,160 MB per minute) by the additional time (1.5 minutes). Hence, 2,160 MB per minute * 1.5 minutes = 3,240 MB.

e) The new total number of MB of the file that have been downloaded can be found by adding the initial downloaded amount (7,440 MB), the MB downloaded from 3 to 6 minutes (6,480 MB), and the additional MB downloaded (3,240 MB). Thus, 7,440 MB + 6,480 MB + 3,240 MB = 17,160 MB.

In summary, Alexis resumed the download and observed a constant rate of download. By analyzing the given information, we determined the time elapsed, the total MB downloaded, the rate of download, the additional MB downloaded, and the new total number of MB downloaded. These calculations provide a clear understanding of the file download progress.

Learn more about constant rate

brainly.com/question/32636092

#SPJ11

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

true or false: each page within a website/domain has a unique url.

Answers

True. Each page within a website/domain typically has a unique URL (Uniform Resource Locator) that identifies its specific location on the internet.

The URL serves as an address for accessing and referencing a specific webpage, allowing users to navigate to different pages within a website or SHARE the URL to direct others to a particular page.A URL (Uniform Resource Locator) is a specific web address that is used to locate and access resources on the internet. It provides a standardized way to identify the location of a web page, file, or any other resource. A URL consists of several components:1. Protocol: The protocol specifies the rules and procedures that determine how data is transferred between the client (web browser) and the server. Common protocols include HTTP (Hypertext Transfer Protocol), HTTPS (HTTP Secure), FTP (File Transfer Protocol), etc.

2. Domain Name: The domain name identifies the specific website or server hosting the resource. For example, in the URL "https://www.example.com," "www.example.com" is the domain name.

3. Path: The path specifies the specific location or directory within the website where the resource is located. It follows the domain name and is separated by slashes (/). For example

Learn more about URLs here:

https://brainly.com/question/32369651

#SPJ11

The one type of function we have learned that violates object oriented programming principles is called a:____.

Answers

A syntax error is a breach of the computer language's rules.

What is object-oriented programming called?

The architecture of the software is organized around data or objects rather than around functions and logic according to the computer programming paradigm known as object-oriented programming (OOP). Data fields with specific properties and behaviors are called objects.

What is object-oriented programming used for?

The concepts of classes and objects serve as the foundation of the object-oriented programming (OOP) paradigm. It is employed to arrange software into simple, repeatable classes of code blueprints, which are subsequently applied to the construction of unique instances of objects.

Learn more about object-oriented programming: https://brainly.com/question/26709198

#SPJ4

nonscalar arrays of function handles are not allowed; use cell arrays instead.

Answers

A scalar array is an array that contains a single value while a non-scalar array contains multiple values. An array that contains function handles is known as a function handle array.


Nonscalar arrays of function handles are not allowed in MATLAB, which means that creating a function handle array is not permitted. Therefore, cell arrays are preferred over non-scalar arrays when creating an array of function handles. Cell arrays enable you to store different types of data, including function handles. The syntax for creating a cell array is similar to that of a regular array, but with the use of curly brackets ({}) instead of square brackets ([]).

The use of cell arrays ensures that each element in the array is a function handle, and not a non-scalar value. This allows for easy manipulation of function handles within the cell array. In conclusion, when working with function handles in MATLAB, it is important to use cell arrays instead of non-scalar arrays to avoid errors and enable easy manipulation of function handles.

To know more about function visit:

https://brainly.com/question/30721594

#SPJ11

when publishing to pinterest from hootsuite, you must include two items, which are:

Answers

When publishing to Pinterest from Hootsuite, you must include two items, which are: a pin image and a destination board. To do this, simply upload the image you'd like to pin, write a description if desired, and select the appropriate Pinterest board for the pin to be saved on.

An image: Pinterest is a highly visual social media platform, so you must include an eye-catching and relevant image to accompany your post. The image should be high-quality and appropriately sized for Pinterest's dimensions, which are typically taller than other social media platforms.

A destination URL: When you click on a pin in Pinterest, it takes you to a destination URL where you can learn more about the content being shared. When publishing to Pinterest from Hootsuite, you must include a destination URL that leads to the relevant page on your website or other online resource.

By including these two items, you can effectively share your content on Pinterest and drive traffic back to your website or other online resources. Hootsuite provides tools to help you easily create and schedule posts to Pinterest, as well as track engagement and analytics to measure your success.

Learn more about Pinterest at:

https://brainly.com/question/14019061

#SPJ11

Why is https used in every link of a website?

Answers

Answer:

As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to communicate with servers.

Customer Service. Is an organization's ability to _______ customers

Answers

Answer:

Serve

Explanation:

Customer Service

Answer:

At its most basic level, customer service is an organization's ability to supply their customers' wants and needs. But this definition leaves out the transactional nature of customer service, and it's this transactional aspect that drives customer loyalty.

Explanation: Hope this helps!

WHO WANTS TO PLAY AMONG THE CODE IS VXPSDF NORTH AMERICA

Answers

I- jaylelyekyeykehdjftgjfjf.
(Rn)

two different e10 teams plotted the same stiffness data on the following graphs. q30 what is the correct stiffness value?

Answers

The correct stiffness value in the provided graphs is q30, which needs to be determined through a careful analysis of the data.

When comparing the two graphs plotted by the different e10 teams, it is crucial to identify the point of interest, which is q30 in this case. To determine the correct stiffness value, we need to examine both graphs and consider factors such as data consistency, reliability of measurements, and any potential sources of error. In the first graph, the data points related to q30 should be carefully analyzed. Look for any outliers or inconsistencies that might affect the stiffness value. Consider the overall trend of the graph and observe if there are any sudden variations or irregular patterns surrounding q30.

Similarly, in the second graph, focus on the data points corresponding to q30. Analyze the consistency of the measurements and evaluate the reliability of the graph. Look for any significant deviations or discrepancies that could impact the stiffness value. After a thorough examination of both graphs, compare the stiffness values associated with q30. If there is a clear consensus between the two graphs, the corresponding stiffness value can be considered correct. However, if there is a discrepancy, further investigation is needed. Consider factors such as measurement techniques, equipment calibration, and experimental procedures to identify any potential sources of error. Ultimately, the correct stiffness value can only be determined by carefully analyzing the data, considering the reliability of the graphs, and accounting for any factors that may affect the measurements.

Learn more about graphs here-

https://brainly.com/question/17267403

#SPJ11

A computer system consists uses usernames with 6 symbols, where the allowable symbols are capital letters (A, B, . . ., Z) and digits (0, 1, . . . , 9). Don’t multiply out. Leave your answers in a form like 7! × 53 × 2.
(a) How many usernames are possible if repetition is not allowed?
(b) How many usernames allow repetition and use only letters?
(c) How many usernames are possible if the first three symbols must be different capital letters (i.e., no repeats), the last symbol must be a nonzero digit, and there are no other restrictions on the symbols?

Answers

The possible usernames if repetition is not allowed is 36⁶.

The usernames that allow repetition is 26⁶

The usernames possible if the first three symbols must be different is 15,600.

How to find possibilities?

(a) There are 36 possible symbols for each of the 6 symbols, so there are 36⁶ possible usernames.

(b) There are 26 possible letters for each of the 6 symbols, so there are 26⁶ possible usernames.

(c) There are 26 possible letters for the first symbol, 25 possible letters for the second symbol, and 24 possible letters for the third symbol. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 = 15,600 possible usernames.

The first three symbols must be different capital letters. There are 26 possible capital letters for the first symbol, 25 possible capital letters for the second symbol, and 24 possible capital letters for the third symbol. So there are 26 × 25 × 24 possible combinations for the first three symbols.

The last symbol must be a nonzero digit. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 possible usernames.

Find out more on computer system here: https://brainly.com/question/30146762

#SPJ4

Other Questions
Im learning surface area today,, could anyone tell me if the answer I put Is right? currently, the asb of the aicpa gaas iiasb of the ifac irs pcaob sas has responsibility for establishing auditing standards for u.s. public companies, while the asb of the aicpa gaas iiasb of the ifac irs pcaob sas establishes auditing standards for u.s. private companies. prior to the creation of the pcaob, the asb gaas iiasb irs had responsibility for establishing auditing standards for both public and private compa find the unit price per can if it costs three dollars for six cans of soda. Round to the nearest hundredth if necessary When Squeaky sees Gretchen and her friends, she is concerned that they willmake fun of George.make fun of her.challenge her to race.challenge her to a fight. You order a glass of lemonade, 150 mL, in a restaurant only to discover that it is warm and too sweet. The sugar concentration of the lemonade is 2.27 M but you would like it to be reduced to a concentration of 1.88 M.How many grams of ice should you add to the lemonade, knowing that only a third of the ice will melt before you take your first sip? (Assume the density of water is 1.00 g/mL) The market consensus is that Post-it Molane Corporation has an ROE of 10% and a beta of 1.85. It plans to maintain indefinitely its traditional plowback ratio of 3/4. This year's earnings were $4.0 per share. The annual dividend was just paid. The consensus estimate of the coming year's market return is 12%, and T-bills currently offer a 6% return.Required:a. Find the price at which Post-it Molane stock should sell. (Do not round intermediate calculations. Round your answer to 2 decimal places.)b. Calculate the P/E ratio. [Leading P/E = P0 / E1, Trailing P/E = P0 / E0](Do not round intermediate calculations. Round your answers to 2 decimal places.)c. Calculate the present value of growth opportunities. (Negative amount should be indicated by a minus sign. Do not round intermediate calculations. Round your answer to 2 decimal places.)d. Suppose your research convinces you Post-it Molane will announce momentarily that it will immediately reduce its plowback ratio to 1/4. Find the intrinsic value of the stock. NOTE: assume that the immediate reduction in plowback ratio will impact next year's earings (i.e., E1). (Do not round intermediate calculations. Round your answer to 2 decimal places.) telling your audience your main ideas before you begin to develop your speech is an example of a which of the following are characteristics of chapter 13 bankruptcy provisions? i. a repayment plan is implemented. ii. the debtor is typically required to relinquish assets. iii. debt payments may be reduced so payments are more manageable for the debtor. iv. generally, chapter 13 bankruptcy is more favorable for creditors than chapter 7 bankruptcy. which of the following are characteristics of chapter 13 bankruptcy provisions? i. a repayment plan is implemented. ii. the debtor is typically required to relinquish assets. iii. debt payments may be reduced so payments are more manageable for the debtor. iv. generally, chapter 13 bankruptcy is more favorable for creditors than chapter 7 bankruptcy. i and ii i , iii, and iv i and iii ii and iv The 199.99 digital camera any purchase was on sale for 15% off what amount did Annie get out the price What important milestone occurred as a result of the Soviets' use of the R-7rocket?A. The first space-based telescope achieved orbit.B. The first artificial satellite orbited Earth.C. The first human traveled to space.D. The first measurements of radiation in space were made. Drugs that increase cortical levels of GABA are often used totreat which major type of psychiatric disorder? Substitute x = (- 1 + 22)/4 in the equation (4x + 1) - 8 = 0 and check whether the value satisfies the given equation. What should the nurse do when cleaning the body of the patient? How would you feel if you were faced with discrimination and problems from others. 3-5 sentences plzzzz Which of the following statements is FALSE? a. After the Adobe Walls Raid, Native Americans were not as organized against U.S. troops, and many of them were forced to move to reservations. b. The Red River Campaign led by Sheridan and Sherman was largely unsuccessful as U.S. troops were cornered into a canyon and slaughtered. c. Quanah Parker and other Native Americans felt that buffalo hunters were a major threat to their life on the plains and formed an alliance among several tribes to attack them. d. Buffalo soldiers were African American soldiers who fought in the Civil War and were a major factor in the U.S. victory over Native American tribes on the frontier. Marc Chagall's self-portrait I and the Village can best be described as a depiction of ________________. Which of the following behaviors should be avoided? Check all of the boxes that apply.keeping someone from using the Internetsending e-mail to your teachersharing private information by posting it publicly on the Internetusing a computer at school to play games when someone else needs it for schoolwork Question 15Which of the following is true of a tyrant? A. A tyrant has no legal right to rule.B. A tyrant has no legal limits on his powers.C. A tyrant's son usually does not inherit his father's power.D. all of the above Advertisements for open positions at a restaurant chain ask candidates to supply references. What is the company most likely expecting to receive fromcandidates? 4/5+1/15-1/3= ? ayuda por favorrr