A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folder are not currently connected.
Which of the following commands will MOST likely confirm your suspicions?

Answers

Answer 1

In essence, the "Net Use" command is used to confirm if the user is actively connected to the shred folder or not. The net use command is a Command Prompt command that can be used to access, or disable.

How would you browse all networks and shared folders in Windows 10? Which tool?

If you're using Windows 10 or 8.1, File Explorer, or Windows Explorer, if you're using Windows 7, is the easiest way to view the shared folders in Windows. Click or press on the name of your Windows PC after opening it, expanding the Network area from the left side of the window.

Why am I unable to open a shared folder?

The shared folder should be clicked or pressed while holding. On the Sharing tab, click Properties, and then choose Advanced Sharing. Check the box next to Allow for Full Control of Everyone under Permissions, then press Enter.

to know more about computers here:

brainly.com/question/21080395

#SPJ4


Related Questions

the diagram shows a typical use of nat and pat, in which a router (r1) translates addresses from packets flowing between the enterprise network on the left and the internet on the right. consider a packet sent by pc1 toward the web server, while the packet passes the lan to the left of router r1. which of the following statements are true about this packet and the network in general? (select three answers.)

Answers

A network and a single host on that network can be uniquely identified by the Destination Address, a conventional 32-bit IP address.

What is a destination IP address?The gadget is uniquely identified internationally by its internet address, or IP address. Both addresses are required for a network packet to reach its destination.A device is identified by its physical address, also known as its media access control, or MAC, address, to other devices connected to the same local network. Destination ip: An IP address that can react to ICMP packets from the VPN Monitor and is available over the VPN tunnel.The IP address is connected to the domain name. Links refer to the location where the IP address information is stored but do not themselves contain any information. It is useful to consider IP addresses as the real code and domain names as a shorthand for that code.

True statements :

Normally, the source and destination IP addresses would be public addresses.The destination address of the packet is regarded as an internal global address.Both the source and destination IP addresses are public since the packet is presently travelling across the public Internet. Before forwarding the packet inside the Enterprise, R1 converts the destination IP address to PC1's internal local IP address.

Learn more about IP address refer to ;

https://brainly.com/question/14219853

#SPJ4

define the term output devices​

Answers

So a output device is anything that can output info from the computer so

we are read and understand it some are a printer monitor and soundboard

Hope this helped

-scav

1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions

Answers

The next step in the design process will be the design of different potential solutions. The correct option is D.

What is technological design?

Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.

A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.

A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.

Thus, the correct option is D.

For more details regarding technological design, visit:

https://brainly.com/question/26663360

#SPJ1

Which Microsoft software program is useful for uploading documents to be accessed remotely?

Answers

Answer:

Microsoft Remote Desktop

Explanation:

The Microsoft software program that is useful for uploading documents to be accessed remotely is: Microsoft OneDrive.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.  Thus, it offer or avail individuals and businesses a fast, effective and efficient way of providing services to their clients over the internet.

Generally, cloud computing comprises three (3) service models and these are;

Platform as a Service (PaaS).Infrastructure as a Service (IaaS).Software as a Service (SaaS).

Microsoft OneDrive can be defined as a software as a service (SaaS) developed by Microsoft Inc. to be used as a cloud (internet-based) storage service and software application synchronization service. It was officially launched on the 7th of August, 2007 by Microsoft.

Basically, Microsoft OneDrive typically offer to its registered customers or end users a free amount of storage space (at least 5 giga-bytes) that can be used to store various type of documents, remotely share digital files, and synchronize multiple files across different mobile and computer-based platforms.

In conclusion, with Microsoft OneDrive you can upload your documents to the cloud and make it available to be accessed remotely by other users.

For more information visit: https://brainly.com/question/7470854

A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in a stack. Their teacher is looking to see if a specific ID number is included in the stack. Which of the following best describes whether their teacher should use a linear or a binary search?
A. The teacher could use either type of search though the linear search is likely to be faster.
B. The teacher could use either type of search though the binary search is likely to be faster.
C. Neither type of search will work since the data is numeric.
D. Only the linear search will work since the data has not been sorted.

Answers

Answer:

D

Explanation:

For the linear search, the input range doesn't need to be sorted. It works on a both unsorted and sorted array.

For binary search, the input range must be sorted, otherwise, it will fail.

The answer choice which best describes whether their teacher should use a linear or a binary search is:

D. Only the linear search will work since the data has not been sorted.

According to the given question,l we are asked to show the answer choice which best describes whether their teacher should use a linear or a binary search.

As a result of this, we can see that the linear search would help the teacher to input unsorted data into the system and this is the best method, while the binary search would require the input range to be sorted.

Therefore, the correct answer is option D

Read more here:

https://brainly.com/question/24786985

what to write about technology?​

Answers

Answer:

Lt is the moreen way or machine that helps life to be simple and easy

Select the correct answer.
Which of the following can computer maintenance software determine?

A. whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
B.
C.
OD.
D. the amount of dust inside your laptop

Answers

Answer:

Explanation:

It is B, this is because your hard drive is the part of your computer that makes it work, and what helps run the maintenance software. there is no exact way of telling if your hard drive is going to fail.

On the other hand, your maintenance software can correctly determine which apps and widgets are drawing power, including your monitor screen. It can adjust the settings, or you can manually, so it draws less power.

It cannot determine humidity in your laptop or the amount of dust in your laptop, sadly.

Hope this helps!!^^

In addition to explaining the paper’s topic, a thesis statement provides instructions on how to read the paper. explains why the paper was written. determines who will read the paper. serves as the paper’s road map for the reader.

Answers

Answer: I believe it’s explains why the paper was written!

Explanation:

Took edge 2021

Answer:

Explains why the paper was written.

Explanation:

Please give brainliest.

Drag each tile to the correct box.
Match the certifications to the job they best fit.
CompTIA A+
Cisco Certified Internetwork Expert (CCIE)
Microsoft Certified Solutions Developer (MCSD)
help desk technician
network design architect
software developer

Answers

Answer:

software developer- microsoft certified solutions developer

help desk technician- CompTIAA+
network design architect- Cisco certified internetwork expert

Explanation

edmentum

What is cybersecurity? Cybersecurity refers to the protection of hardware?

What is cybersecurity? Cybersecurity refers to the protection of hardware?

Answers

Cybersecurity is the practice of safeguarding computer systems, networks, and mathematical data from unauthorized approach, theft, damage, or additional malicious attacks.

What is cybersecurity?

It involves the use of differing technologies, processes, and practices to secure digital maneuvers, networks, and data from a wide range of dangers, including cybercrime, cyber-spying, cyber-terrorism, and different forms of malicious endeavor.

While cybersecurity does involve protecting fittings, it also involves looking after software, networks, and digital dossier. In addition to protecting against external warnings, etc.

Learn more about cybersecurity from

https://brainly.com/question/28004913

#SPJ1

Need some help with Discrete Mathmatics please help urgent?

Need some help with Discrete Mathmatics please help urgent?

Answers

Answer: 2, 4, 1, 5, 3

Explanation:

P: Arguments are not arranged in regular order like the one I am used to

Q: I cannot understand         ~Q: I can understand

R: I grumble                            ~R: I do not grumble

S: Get a headache

T: Examples are not easy

Here is the logic order of the given sentences:

2)   P

4)   P →  Q

1) ~Q → ~R

5) ~R →  S

3)   S →  T

∴)   T

Precipitation patterns in gulf Mexico

Answers

Is there a diagram for what your asking ?

what is the best way of farming exotics in destiny?

Answers

The best way to get exotics is to maximize doing activities which have a higher chance to drop them. Do these things for maximum chance:

- Do all Powerful Rewards on all characters. Every single Powerful reward has a chance to be an exotic instead of the normal reward. So do all your Crucible/Strikes/Gambit/Heroic Story/Heroic Adventure/Flashpoint/etc... - each day that one of these resets, do it again
- Do all Dreaming City activities every week (Ascendant Challenge, Blind Well/Offering to Queen bounties, featured story mission, bounty for 8 daily bounties).
- On Curse Week, do Shattered Throne on all characters
- If you Raid, do the Raid every week on all characters

Once you exhaust all your powerful rewards (I'm sure there are some I forgot to mention), then you are going to be limited to hoping one drops in the Wild as an engram. Focus on activities that have a lot of enemies - the more enemies you kill, the more chance you might see one drop.

Just doing all my powerful rewards this week, I got Trinity Ghoul, Ursa Furiosa, Shards of Galnor, Geomag Stabilizers and Queenbreaker (my luck this week is not typical but if I had not farmed all my powerful rewards, I would have never gotten them)

The easiest way (but probably the most time consuming) is to buy a bunch of vanguard boons from Zavala and use one at the beginning of a strike. Need 2 people in your fireteam. Quit out and repeat until you get your exotic reward pop up.

Answer:

the best way to farm exotics in destiny is talking to xur and playing nightfall all day but play at least on hero or legend difficulty to get exotics faster because it is very common to get them on those difficulties and more higher difficulties.

Explanation:

true or false. MS access is database application used to create, store and manipulate different types of data​

Answers

The statement that MS access is database application used to create, store and manipulate different types of data​ is true.

What is MS Access used for?

Large volumes of data can be efficiently and effectively stored with MS Access. To handle your data, you can build tables, forms, queries, and reports. A database is a planned grouping of material that has been arranged and is often kept electronically in a computer system.

A database management system often oversees a database. A database in computing is a structured collection of data that is electronically accessible and stored. Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system.

Learn more about  database at;

https://brainly.com/question/518894

#SPJ1

How do I do these? I dont understand.

How do I do these? I dont understand.

Answers

I don’t understand either, I would suggest contacting your teacher or maybe searching up videos or tutorials on how to solve such a problem.

Which type of metal will rust - ferrous or non-ferrous?​

Answers

Explanation:

Ferrous metals contain IRON ...  which will rust (form Iron oxide)

For the equation y = 5 + 6x, what does y equal when x is 4?
A.
29

B.
15

C.
19

D.
23

Answers

Answer:

y = 29

Explanation:

y = 5+6x

What is y when x = 4

Substitute x with 4 :

5 + 6(4)

5 + (6×4)

5 + 24

29

y = 29

Hope this helped and have a good day

Answer:

y=29

Explanation:

y=5+6x

y=5+6(4)

y=5+24

y=29

A user can view
and
in the Reading pane.

Answers

Answer:

sorry,but I can't understand your question.

Answer:

email messaging and attachments

Explanation:

2023 edg 100%

What can quantum computers do more efficiently than regular computers?

Answers

Quantum computers can also efficiently simulate quantum systems, which is not possible on classical computers. This is useful in fields such as quantum chemistry, where simulating the behavior of molecules can help in the discovery of new materials and drugs.

Quantum computers are capable of solving certain problems exponentially faster than classical or regular computers. This is because quantum computers use quantum bits or qubits, which can exist in multiple states simultaneously, allowing for parallel computations. One of the most well-known examples is Shor's algorithm, which is used to factor large numbers, a problem that is currently infeasible for classical computers to solve efficiently. This has significant implications for cryptography and data security.

Quantum computers can also efficiently simulate quantum systems, which is not possible on classical computers. This is useful in fields such as quantum chemistry, where simulating the behavior of molecules can help in the discovery of new materials and drugs.

Quantum computers also have the potential to greatly improve machine learning and optimization algorithms, allowing for faster and more efficient solutions to complex problems. Overall, quantum computers are expected to have a significant impact on various fields such as cryptography, material science, and artificial intelligence.

For more such questions on Quantum computers, click on:

https://brainly.com/question/29576541

#SPJ11

The data science team created a machine learning model to group together customers with similar purchases, and divides those customers based on customer loyalty. How would you describe this machine learning approach?

Answers

Answer: This machine learning approach can be described as a clustering algorithm that groups customers based on their purchasing patterns and then further divides them based on their loyalty.

1.Siguraduhing _______ang mga datos o impormasyong

2.Isaalang- alang ang partikular na _______ o lokasyon ng pinagmulan ng impormasyon

3.Upang matiyak na hindi ______ang mga impormasyon, maaaring magsaliksik at kilalaning mabuti ang awtor at ang kanyang mga artikulo​

Answers

Answer:

1.maayos

2. Lugar

3. mali

Explanation:

im correct if I'm rwong :-)

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

How did early computing device such as Charles Babbage's analytical engine and Ada Lovelace's contributions set the foundation for modern computing

Answers

Early computing devices, such as Charles Babbage's Analytical Engine and Ada Lovelace's contributions, played a crucial role in setting the foundation for modern computing. Here's how their work contributed to computing development:

1. Charles Babbage's Analytical Engine: Babbage designed the Analytical Engine, a mechanical general-purpose computer concept, in the 19th century. Although the Analytical Engine was never fully built, its design and principles laid the groundwork for modern computers. Key features of the analytical engine include:

a. Stored Program: Babbage's Analytical Engine introduced the concept of storing instructions and data in memory, allowing complex calculations and tasks.

b.  Control Flow: The Analytical Engine could make decisions and perform conditional operations based on previous computations, resembling the modern concept of control flow in programming.

c. Loops: Babbage's design incorporated looping mechanisms, enabling repetitive instruction execution, similar to modern programming languages.

2. Ada Lovelace's Contributions: Ada Lovelace, an English mathematician, collaborated with Charles Babbage and made significant contributions to computing. Her work on Babbage's Analytical Engine included writing the first algorithm intended for machine implementation. Lovelace realized the potential of the analytical engine beyond numerical calculations and recognized its capability for processing symbols and creating complex algorithms. Her insights laid the foundation for computer programming and algorithms.

Lovelace's ideas about the analytical engine extended beyond what was initially envisioned. He stressed the importance of machines handling more than just numbers. Her contributions demonstrated computers' potential to perform tasks beyond basic calculations and numerical processing.

Collectively, Babbage's analytical engine and Lovelace's contributions provided early conceptual frameworks for modern computing. Their ideas influenced subsequent pioneers in the field, and the concepts they introduced paved the way for the development of the digital computers we use today.

The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen?

Answers

Question:

The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen?

def is_positive(number):

       if  _____ :

           return _____

Answer:

def is_positive(number):

   if (number > 0):

       return True

  else:

       return "None"

---------------------------------------------------------------------------------

Code Test and Sample Output:

print(is_positive(6))

>> True

print(is_positive(-7))

>> None

----------------------------------------------------------------------------------

Explanation:

The code above has been written in Python.

Now, let's explain each of the lines of the code;

Line 1: defines a function called is_positive which takes in a parameter number. i.e

def is_positive(number):

Line 2: checks if the number, supplied as parameter to the function, is positive. A number is positive if it is greater than zero. i.e

if (number > 0):

Line 3: returns a boolean value True if the number is positive. i.e

return True

Line 4: defines the beginning of the else block that is executed if the number is not positive. i.e

else:

Line 5: returns a string value "None" if the number is not positive. i.e

return "None"

All of these put together gives;

===============================

def is_positive(number):

   if (number > 0):

       return True

   else:

       return "None"

================================

An example test of the code has also been given where the function was been called with an argument value of 6 and -7. The results were True and None respectively. i.e

print(is_positive(6))   = True

print(is_positive(-7))  = None

Following are the python program to check input number is positive or negative:

Program:

def is_positive(n):#defining the method is_positive that takes one variable in parameter

   if (n > 0):#defining if block that check input number is positive

       return True#return boolean value that is True

   else:#else block

      return "None"#return string value

n=int(input("Enter number: "))#defining n variable that input a number

print(is_positive(n))#using print method that calls and prints method return value

Output:

please find the attached file.

Program Explanation:

Defining the method "is_positive" that takes one variable "n" in the parameter.Inside the method, if conditional block is defined that checks the input number is positive, if it's true, it will return a boolean value that is "True". Otherwise, it will go to the else block, where it will return a string value that is "None".Outside the method, the "n" variable is declared to be an input number.After the input value, a print method is used that calls the "is_positive" method and prints its return value.

Find out more about the method here:

brainly.com/question/5082157

The is_positive function should return True if the number received is positive, otherwise it returns

question below in attachment

Answers

You can use basic HTML elements like input, select and textarea to generate an HTML web-form and gather the data for the code table.

What is the program?

The form in this code case is configured to use the "post" method and directs to "insert_item.php", a PHP script that manages the form submissions. The structure comprises of input sections for the "name", "description", and "quantity" cells in the "item" table, as well as a button for submitting the information.

One method of collecting user input from a web-form and adding it to a database table is by utilizing PHP and SQL commands, which enables connectivity to the database and the ability to run the INSERT query.

Learn more about  program from

https://brainly.com/question/26134656

#SPJ1

question below in attachment
question below in attachment
question below in attachment

As a computer science student, how do you assess your vulnerability to information theft in comparison to a famous celebrity?

Answers

Answer:

Explanation:

As a computer science student, you should assess your vulnerability to information theft by analyzing the types of information you have and where you store it, as well as the security measures you have in place to protect that information. This includes things like passwords, two-factor authentication, and encryption.

A famous celebrity, on the other hand, may have a higher level of vulnerability to information theft due to their high-profile status and the fact that they may have more sensitive information such as financial information, personal contacts, and private photos and videos. They may also be targeted more frequently by hackers and scammers who are looking to exploit their fame and popularity.

It is important to note that everyone's vulnerability to information theft is different and it is important to take the necessary steps to protect your personal information, regardless of whether you are a computer science student or a famous celebrity. This includes keeping your software and operating system updated, being cautious when clicking on links or opening email attachments from unknown sources, and not sharing personal information online.

6. This interface uses only commands that you type:​

Answers

That doesn’t make sense just saying

What is one of the main purposes of a topographic map?; What is one of the main purposes of a topographic map ?; How do topographic maps indicate changes in elevation?; What is a topographic map ?

Answers

They employ contour lines to show the contour and elevation of surface features. Contour lines are fictitious (they only exist on paper) lines that link places on the surface of the earth with the same elevation.

What is topographic map?

A topographic map, also known as a topographic sheet, is a form of map used in modern mapping that is distinguished by large-scale detail and quantitative depiction of relief characteristics, historically utilizing a number of techniques but typically contour lines (linking points of equal height).

According to conventional criteria, a topographic map must display both natural and man-made elements.

A topographic survey is normally composed of two or more map sheets that are combined to create the entire map and is released as a map series based on a systematic observation.

A topographic map series employs a standard geodetic framework that specifies the map projection, coordinate system, ellipsoid, and geodetic datum as well as a common specification that covers the range of cartographic symbols used.

Learn more about topographic map click here:

https://brainly.com/question/181146

#SPJ4

Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu

Answers

Answer:

Explanation:

The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.

public static void average () {

                       int num;

                       int sum = 0;

                       Scanner in = new Scanner(System.in);

                       System.out.println("Enter Number");

                       num = in.nextInt();

                       int count = 0;

                       int max = 0;

                       while(num >= 0)

                       {

                               sum+=num;

                               System.out.println("Enter Number");

                               num = in.nextInt();

                               count++;

                               if(num>=max){

                                       max = num;

                               }

                       }

               System.out.println(sum/count);

               System.out.println(max);

               }

Answer:hi

Explanation:

Major stress in your life can cause:
O a. headaches and Insomnia
O b. Fatigue and dry mouth
O c. Muscular and abdominal pain
O d. All of the above

Answers

A IS THE ANSWER HOPE IT HELPS !! :)
answer- (d.) All of the above
explanation- Chronic stress can disrupt every system in your body. For example, your immune system, reproductive system, and can increase the risk of a heart attack.
Other Questions
In the eyes of many Americans, which concept did President Jackson symbolize?A abolitionismB.elitism.feminismoD. populism I NEED HELP MARKING BRAINLIEST At the present time, your Capstone employer conducts business in the U.S. only and is considering a global expansion. Your boss considers the companys status to be similar to Kroger, which also only operates in the U.S. In order to provide your Capstone boss with insight into this subject matter, you will utilize Kroger as a focus company to discuss the global exploration focus of this organization by responding to the following questions:Discuss how Kroger could engage in the global marketplace by addressing the following:Exporting: discuss the types of products that Kroger could export.Licensing & Franchising: discuss how Kroger could license its name or enter into franchise agreements.Contract Manufacturing: discuss how Kroger could utilize a contract manufacturing arrangement.Joint Ventures: give an example of how Kroger could enter into a joint-venture arrangement.Direct Foreign Investment: discuss how Kroger could enter into a global market in this manner.Identify factors which promote Krogers global business participation by addressing the following:World Trade Organization: discuss the purpose of this organization and how it could impact Krogers ability to expand.Antidumping Laws: discuss how these types of laws in the market where Kroger plans to expand would impact its operations.European Union ("EU"): assuming that Kroger expanded into one of the EU member countries, discuss how their future expansion into other nearby countries could benefit from the EUs focus on promoting economic progress of all member countries.Describe the potential threats and opportunities which exist in the global business environment that could impact Kroger by addressing the following:Political considerations: describe two types of considerations that could positively or negatively impact Krogers plans.Cultural differences: describe two examples of cultural differences that could impact Kroger.Economic environment: describe one example of how an economic infrastructure could positively or negatively impact Krogers plans. Ready to go to the movies. We were excited. What type of sentence is this ? what was the fugitive act A line passes through the points (2.6) and (4.9). Move an expression and a number to the blanks to create the equation of the line in standard form Which of the following sets of circumstances is likely to provide the best evidence in support of the theory of efficiency wages? A. Workers in the market are unskilled and not represented by a union, and their wage exceeds both the equilibrium wage and the minimum wage. B. Workers in the market are highly skilled and not represented by a union, and their wage exceeds the minimum wage. C. Workers in the market are highly skilled and represented by a union, and their wage exceeds the equilibrium wage. D. Employers in the market are known for reducing the workers' wage whenever they get an opportunity to do so. plz help Solve the algebraic expression below.(14)(8)+34 Why does the author include excerpts from two versions of the story of "Rapunzel?to show that there are different versions of the same story told in different culturesto show how the Grimms added details to make the story more vivid for readersto show that the last edition was more informative and engaging than the firstto tell the story twice to ensure that readers understand the plot and characters in the story What's the unit rate of cost per bag? (How much does 1 bag cost?)$1.00$1.50$5.00 i will mark brainliesttt! Are the triangles below congruent? If so,describe a series of rigid transformationsthat maps one triangle onto the other.5535 coil converts the excess current drawn by a motor into heat, which is used to determine whether the motor is in danger if it takes 10 people working at the same rate 5 hours to pick 300 apples, how many hours would it take 1 person to pick 300 apples When marketing researchers consider sampling techniques, they are preparing to collect ___________ data.a) censusb) statisticalc) internal secondaryd) external secondarye) primary Which was a likely cause of the Mud Run Disaster of 1888mechanical malfunctionstoo many passengersworker carelessnesspoorly functioning or non-existent signal systems does anyone know the answers to this? 1. 2. How are music and the arts used in East Asian cultures to reinforce cultural identity,nationalism, and notions of authenticity?How are the aesthetics of music in Japan shaped by both Confucianism and Buddhism?How are the types of East Asian theater different from theater and opera in the West?What spiritual role does music play in Tibetan Buddhist ritual?How do East Asian attitudes toward professional musicians and actors contrast with thestatus of amateur music making?3. 4. How do attitudes toward traditionality and modernization affect music differently inChina than they do in Japan and South Korea?5 Write the algebraic expression for twice a number n decreased by seven Choose the answer in which the dependent clauses are correctly punctuated. A. The painting which is one of Leonardos most famous works depicts Jesus and the twelve men, who were Jesus main disciples, known as the apostles. The apostles are gathered for the supper, that will turn out to be Jesus last meal with them. B. The painting, which is one of Leonardos most famous works, depicts Jesus and the twelve men, who were Jesus main disciples, known as the apostles. The apostles are gathered for the supper that will turn out to be Jesus last meal with them. C. The painting which is one of Leonardos most famous works depicts Jesus and the twelve men who were Jesus main disciples, known as the apostles. The apostles are gathered for the supper that will turn out to be Jesus last meal with them. D. The painting, which is one of Leonardos most famous works, depicts Jesus and the twelve men who were Jesus main disciples, known as the apostles. The apostles are gathered for the supper that will turn out to be Jesus last meal with them.