Chose the devices you think you should use in order to…

Go to my friend’s house and watch some movies.

A. DVD
B.CD
C.Memory card
D. USB flash memory

Listen to music while I’m running..

A. DVD
B.CD
C.Memory card
D. USB flash memory

Save photos to my computer ..

A. DVD
B.CD
C.Memory card
D. USB flash memory


Answers

Answer 1

Answer:

I think it's B, D, C

Explanation:

Cd for movies

Usb for the phone music and

Memory card to be inserted into the computer

Answer 2

Answer:

USB flash memory is the answer of all these question.

Explanation:

USB flash memory is the answer of all these question because it is small in size so you can easily carry it anywhere in your pocket. Below is the photo of USB flash drive

Chose The Devices You Think You Should Use In Order ToGo To My Friends House And Watch Some Movies.A.

Related Questions

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

A mixed reality application detects the spatial layout of a room and is able to overlap or hide a virtual object based on its position in the image. what effect makes this possible?
modeling
occlusion
tethering
virtualization

Answers

The effect that makes it possible for a mixed reality application to detect the spatial layout of a room and overlap or hide a virtual object based on its position in the image is called occlusion.

In computer vision, occlusion is the act of hiding or obstructing an item or object from view. Occlusion is used in augmented and mixed reality systems to conceal virtual objects that are obstructed by real objects in the environment. It gives the appearance that virtual objects are interacting with the real world by obscuring objects behind or in front of them.

A mixed reality application is an application that allows users to experience a combination of the real and virtual worlds. It detects and maps the physical world to construct a mixed reality environment. Mixed reality applications can overlay digital images, videos, and animations onto real-world objects, as well as provide interactive experiences for users.

Learn more about Computer Vision: https://brainly.com/question/14471845

#SPJ11

what is 38 - -93 + 2 x 4.6?
and what’s 9,220 - -2.3 x U

Answers

Answer:

the first equation is 140.2

what's the last eqaution U???

Explanation:

What happens when your browser cache becomes full?

Answers

The browser automatically deletes old cached files as you continue to browse the Web.

What is browser cache?

The World Wide Web can be optimized with a Web cache. It is put into use on both the client and the server.

Multimedia and other items can be cached to reduce overall loading times when browsing the Web.

Browser cache is kept on the end-side user's of the system rather than the server. A user's browser downloads the page's data each time they load a website page in order to display it.

As you explore the Web, the browser automatically deletes outdated cached files.

Thus, this can be the step when your browser cache becomes full.

For more details regarding browser cache, visit:

https://brainly.com/question/17898582

#SPJ1

In 10 sentences, describe Parallel Processing in computing, how it works and different types. You may add other relevant information about Parallel Processing.

Answers

In computing, parallel processing refers to the use of two or more processors (CPUs) to handle different components of a larger operation.

Through its use, the amount of time it takes to run a program can be decreased by splitting up a task's various components among a lot of processors.

What are parallel processing types?

They include:

SIMD computers MIMD computers

They  are the most often utilized computer architectures in parallel processing systems.

SISD computers cannot operate in parallel on their own, but a cluster can be built by linking a number of them.

The central processing unit (CPU) of each computer can serve as a processor in a more extended parallel system.

Learn more about parallel processing from

https://brainly.com/question/14500336
#SPJ1

What percentage of STEM-related degrees awarded in the 2002-2003 academic year were doctorates?

16.7 percent

0 34.8 percent

O 14.6 percent

O 12.9 percent

Answers

Answer:

34.8

Explanation:

I just took the test!

What is the danger of open-source software when it comes to military robotics?

Answers

Answer:

The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.

Explanation:

Open source software is available to the general public.

Feel free to copy and paste this or put it into your own wording. Have a nice day!

que es la felicidad??​

Answers

Se feliz el amor es nada

T/F The tag < i > informs a browser that the text that follows the tag should be italicized.

Answers

The statement given "The tag < i > informs a browser that the text that follows the tag should be italicized." is true because in HTML, the <i> tag is used to indicate that the text enclosed within the tag should be rendered in italic style by the browser.

The <i> tag is a formatting tag that is commonly used to emphasize text or indicate a different tone or voice in the content. When the browser encounters the <i> tag, it applies the appropriate styling to italicize the text that follows the tag. It is important to note that the <i> tag is a presentational tag, and it is recommended to use semantic tags like <em> for emphasizing text with meaningful importance.

You can learn more about formatting tag at

https://brainly.com/question/17048701

#SPJ11

Part A - The method printNums has two parameters: value and numRounds. The method will iterate for numRounds rounds. In each round, random integers between 0 and 9, inclusive, are generated and printed on a single line until value is generated. At that time, value is printed and the round stops. Values for the next round are printed on the next line of output.
For example, a call to printNums(5, 4) could result in the following output. Each round stops when 5 is printed for a total of four rounds.
325
7884465
06165
9678971145
public static void printNums( int value, int numRounds ) {}

Answers

Using the codes in computational language in JAVA it is possible to write a code that method printNums has two parameters: value and numRounds.

Writting the code:

import java.util.Random;

public class PartA {

public static void main(String[] args) {

 

 printNums(5, 4);

 

}

public static void printNums( int value, int numRounds ) {

 

 Random random = new Random();

 for(int i=0 ; i<numRounds ; i++) {

  while(true) {

   int number = random.nextInt(10);

   System.out.print(number);

   if(number == 5)

    break;

  }

  System.out.println();

 }

 

}

}

See more about  JAVA at brainly.com/question/18502436

#SPJ1

Part A - The method printNums has two parameters: value and numRounds. The method will iterate for numRounds

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

which of the following statements about browser security settings are true

which of the following statements about browser security settings are true

Answers

The options that are true regarding browser security settings are options:

A. You can choose which sites run pop-ups.

C. You can deny cookies and

D. Sites can be allowed or blocked from running scripts

How can you check browser security settings?

To inspect your security settings, pull down the notification bar and press the gear symbol. Scroll down to the security and location section. The screen lock setting may be found under device security.

Option B is incorrect. Web history is not always saved indefinitely and can be erased manually or automatically depending on the browser settings.

Never submit your password or credit card information on sites that display this warning. If you must use the site, contact its owner or administrator and inform them that it is not secure.

Learn more about browser security settings  at:

https://brainly.com/question/25014794

#SPJ1

Full Question:

Which of the following statements about browser security settings are true? Select all that apply. A. You can choose which sites run pop-ups. B. Your accumulated web history is stored forever. C. You can deny cookies. D. Sites can-- be allowed or blocked from running scripts

which function could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters?

Answers

A function which could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters include the following: C. length.

What is a function?

In Computer programming and technology, a function can be defined as a set of statements that comprises executable codes and can be used in a software program to calculate a value or perform a specific task on a computer.

In Computer programming, there are two (2) things that must be included in a function definition and these include the following:

A function name.Function variables.

In this context, we can reasonably infer and logically deduce that function length is a criterion that can be used to validate an entry for an end user's chosen name that should be between 4 and 12 characters.

Read more on a function here: brainly.com/question/19181382

#SPJ1

Complete Question:

Which function could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters?

O isString

O random

O length

O toUpper

Adam has decided to add a table in a Word doc to organize the information better.
Where will he find this option?
Insert tab, Illustrations group
Insert tab, Symbols group
O Insert tab, Tables group
Design tab, Page Layout group

Answers

Answer:

no. 1 is the answer is the answer

Which program runs on a computer when the computer boots up?

Answers

Operating System

An operating system runs on a computer when the computer boots up.

Basically, operating systems are used to run programs like browsers and video players.

Some examples of operating systems:

Windows LinuxAndroidmacOS

Hope this helps :)

Answer:

Operating system

Explanation:

What are the characteristics of:
Master file
Transaction file
Reference file

Answers

Master File :-Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Transaction File :-Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

Reference File :-Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information. Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

Hope it helps you!

Before you add a picture to a webpage, what do you need to do?
Change the picture to HTML.
Change the picture to CSS
Upload the picture to REPL.it.
Upload the picture to html.it.

Answers

Answer:

Upload the picture to REPL (dot) it.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

A website refers to the collective name used to describe series of web pages linked together with the same domain name while a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

Before you add a picture to a webpage, you need to upload the picture to REPL (dot) it.

REPL is a free integrated development environment (IDE) which avails developers (users) the ability to write software codes or programs in various programming languages while providing the required resources. Also, REPL is an acronym for read, evaluate, print and loop.

The mechanical computer that included mechanisms that provided memory and an arithmetic processing unit was the:_____.

Answers

The mechanical computer that included mechanisms that provided memory and an arithmetic processing unit was the difference engine.

Established in the year 1822, the difference engine was formed as a mechanical calculator which along with performing arithmetic functions could also provide memory. This stored data could be printed out if needed.

The difference engine was established by  Charles Babbage. The difference engine also had the potential to do a series of calculations to solve a difficult arithmetical problem.

The difference engine worked on the principle of repeated additions to solve a problem. The formation of this mechanical computer was the beginning of the revolution in the computers that we see today. It was the basis following which the revolution in the technology industry began.

To learn more about mechanical computers, click here:

https://brainly.com/question/14667239

#SPJ4

You are running algorithm with squared complexity on data with 100 elements and it takes 10 seconds. How much time do you expect the algorithm will take when executed on data with 1000 elements

Answers

An algorithm is a set of instructions or rules used to solve a computational problem. An algorithm with squared complexity on data means that the time required to execute the algorithm grows quadratically as the input size increases

If the algorithm has squared complexity, then we can expect that its runtime will increase quadratically as the size of the input data increases. In other words, if the algorithm takes 10 seconds to process 100 elements, we can estimate that it will take 100 times longer to process 1000 elements (since 1000 is 10 times larger than 100).

Using this logic, we can calculate the expected runtime as follows:

10 seconds x (1000/100)^2 = 1000 seconds

Therefore, we can expect the algorithm to take approximately 1000 seconds (or 16.67 minutes) to process 1000 elements. However, this is just an estimate and the actual runtime may vary depending on factors such as the specific implementation of the algorithm, the hardware used to run it, and the characteristics of the input data.
Hi! I'd be happy to help with your question. To determine the time it would take for an algorithm with squared complexity to process 1000 elements, we can use the following steps:

1. Identify the algorithm's complexity, which is O(n^2) or squared complexity in this case.
2. Determine the time it takes to process 100 elements (10 seconds).
3. Calculate the scaling factor for processing 1000 elements compared to 100 elements: (1000 elements / 100 elements)^2 = (10)^2 = 100.
4. Multiply the original time (10 seconds) by the scaling factor (100) to estimate the time for processing 1000 elements: 10 seconds * 100 = 1000 seconds.

So, you can expect the algorithm to take approximately 1000 seconds when executed on data with 1000 elements.

To know more about algorithm visit:

https://brainly.com/question/22984934

#SPJ11

Creates a table in MS Excel with each of the following accounts and indicates their effect on the expanded accounting equation The 1. in February 2020, Miguel Toro established a home rental business under the name Miguel's Rentals. During the month of March, the following transactions were recorded: o To open the business, he deposited $70,000 of his personal funds as an investment. He bought equipment for $5,000 in cash. O Purchased office supplies for $1,500 on credit. He received income from renting a property for $3,500 in cash. He paid for utilities for $800.00. He paid $1,200 of the equipment purchased on credit from the third transaction. O He received income from managing the rent of a building for $4,000 in cash. He provided a rental counseling service to a client for $3,000 on credit. He paid salaries of $1,500 to his secretary. He made a withdrawal of $500.00 for his personal use. O 0 0 O O 0 00

Answers

To create a table in MS Excel and indicate the effect of each account on the expanded accounting equation, you can follow these steps:

1. Open Microsoft Excel and create a new worksheet.

2. Label the columns as follows: Account, Assets, Liabilities, Owner's Equity.

3. Enter the following accounts in the "Account" column: Cash, Equipment, Office Supplies, Rental Income, Utilities Expense, Accounts Payable, Rental Counseling Service, Salaries Expense, Owner's Withdrawals.

4. Leave the Assets, Liabilities, and Owner's Equity columns blank for now.

Next, we will analyze each transaction and update the table accordingly:

Transaction 1: Miguel deposited $70,000 of his personal funds as an investment.

- Increase the Cash account by $70,000.

- Increase the Owner's Equity account by $70,000.

Transaction 2: Miguel bought equipment for $5,000 in cash.

- Increase the Equipment account by $5,000.

- Decrease the Cash account by $5,000.

Transaction 3: Miguel purchased office supplies for $1,500 on credit.

- Increase the Office Supplies account by $1,500.

- Increase the Accounts Payable (Liabilities) account by $1,500.

Transaction 4: Miguel received income from renting a property for $3,500 in cash.

- Increase the Cash account by $3,500.

- Increase the Rental Income account by $3,500.

Transaction 5: Miguel paid $800 for utilities.

- Decrease the Cash account by $800.

- Decrease the Utilities Expense account by $800.

Transaction 6: Miguel paid $1,200 of the equipment purchased on credit.

- Decrease the Accounts Payable (Liabilities) account by $1,200.

- Decrease the Equipment account by $1,200.

Transaction 7: Miguel received income from managing the rent of a building for $4,000 in cash.

- Increase the Cash account by $4,000.

- Increase the Rental Income account by $4,000.

Transaction 8: Miguel provided a rental counseling service to a client for $3,000 on credit.

- Increase the Rental Counseling Service account by $3,000.

- Increase the Accounts Payable (Liabilities) account by $3,000.

Transaction 9: Miguel paid $1,500 salaries to his secretary.

- Decrease the Cash account by $1,500.

- Decrease the Salaries Expense account by $1,500.

Transaction 10: Miguel made a withdrawal of $500 for his personal use.

- Decrease the Cash account by $500.

- Decrease the Owner's Equity account by $500.

Now, you can calculate the totals for the Assets, Liabilities, and Owner's Equity columns by summing the respective account values. The Assets column should include the totals of Cash, Equipment, and Office Supplies. The Liabilities column should include the total of Accounts Payable. The Owner's Equity column should include the total of Owner's Equity minus Owner's Withdrawals.

By creating this table and updating it with the effects of each transaction, you can track the changes in the expanded accounting equation (Assets = Liabilities + Owner's Equity) for Miguel's Rentals during the month of March.

To know more about MS Excel, visit

https://brainly.com/question/30465081

#SPJ11

modern local-area networks are most likely to be question 18 options: 1) switched ethernet. 2) ethernet with passive hubs. 3) exclusively tcp/ip networks. 4) ring-configured optical networks.

Answers

Modern local-area networks are most likely to be switched Ethernet networks.

Ethernet is a widely used standard for connecting devices in a network, and switched Ethernet refers to a network topology in which devices are connected to a switch that manages the communication between them.

This type of network is more efficient and reliable than Ethernet with passive hubs or ring-configured optical networks, and TCP/IP is a common protocol used on top of Ethernet for communication between devices.

What is Ethernet?

Ethernet is a family of wired computer networking technologies that is commonly used for local area networks (LANs). It is a physical and data link layer protocol that defines the way data is transmitted over a network using a wired connection.

Learn more about Ethernet: https://brainly.com/question/29351780

#SPJ11

what is meant by versatility in terms of features of computer?​

Answers

Answer:

Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.

Explanation:

thank me later

Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.

What is versatility in computer?

Computer is known to be a machine that is said to be versatile machine as it is made up of a lot of field and also involves in Multi-tasking.

Therefore, Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.

Learn more about Versatility from

https://brainly.com/question/26285269

#SPJ2

Which of the following increases or decreases how crisp the objects in a photo appear?
a. brightness
b. sharpness
c. crispness
d. contrast

Answers

the answer is b. sharpness

Where are methods listed in a UML class diagram showing three parts?
in the top third of the diagram
in the middle third of the diagram
in the bottom third of the diagram
anywhere in the diagram a lowercase m is shown

Answers

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

Where are methods listed in a UML class diagram showing three parts?in the top third of the diagramin

what is a password attack?

Answers

Answer:

A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.

Answer:

A hacker trying to hack into your accounts/systems by cracking your password.

which of the following is nota reason to use functions?group of answer choicesto make the code run fasterto improve code readabilityto avoid writing redundant codeto support modular development

Answers

The answer is "to make the code run faster". While functions can improve code efficiency, their primary purposes are to improve code readability and maintainability, avoid redundancy, and support modular development.

As a method of software design, modular programming places an emphasis on breaking down a program's functionality into independent, swappable modules, each of which is equipped with the tools needed to carry out just one particular function.

The components that the module offers and needs are expressed in the module interface. Other modules are capable of detecting the items defined in the interface. The functional code corresponding to the interface elements declared in the implementation is present. Programmes that are organised and object-oriented are closely related to modular programmes. all of which date back to the 1960s and have the common objective of making it easier to build huge software programmes and systems by dividing them into smaller bits.

learn more about modular development here:

https://brainly.com/question/28114556

#SPJ11

What behavior do elements in a stack follow?

Answers

A stack operates on the LIFO (Last In First Out) principle, which states that the element inserted last is the first element to be removed. Inserting an element into the stack is known as a push operation, and removing an element from the stack is known as a pop operation.

Answer:

last in, first out, or LIFO behavior

Explanation:

B

The auditors would be least likely to use software to:a) access client data filesb) prepare spreadsheetsc) assess computer control riskd) construct parallel simulations

Answers

The auditors would be least likely to use software to c) assess computer control risk


Auditors are professionals who check a company's financial records to ensure that they are accurate and follow the rules. They use different methods to evaluate risks and find errors. One of the methods is to use computer software to help them analyze the company's financial data.

Assessing computer control risk is one of those tasks. This can be further explained by the following steps:


a) Accessing client data files and

b) preparing spreadsheets are common tasks that auditors perform using software, such as Excel or specialized audit software.
d) Constructing parallel simulations can also be done using software to test the accuracy and effectiveness of a client's system.

However, c) assessing computer control risk typically involves evaluating the design and implementation of the client's IT systems and processes.

While software can aid in this process, it requires the auditors' professional judgment and understanding of the client's specific IT environment to properly assess the risk.

To know more about auditors visit: https://brainly.com/question/30090807

#SPJ11

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

Select the correct answer.
Pedro has started an online food-ordering website. What should Pedro ask his customers to do to prevent fraudulent actions?
A
B.
Ask customers to opt for cash on delivery only.
Ask customers to avoid uploading anything about his website on social media.
Ask customers to use strong passwords to protect their accounts.
C.
D.
Ask customers to order only for the minimum value.
Reset
Next​

Answers

Answer:

ask customers to use strong passwords to protect their accounts

The answer is B, for sure
Other Questions
First change the given pattern into a vector w of zeros and ones by turning each shaded square into a 1 and each unshaded square into a 0 and then lining up each column below the column before it. Then find a matrix M so that w'Mw=0 but u Mu #0 for all other nonzero vectors u of zeros and ones. a 0 0 0 W= 0 1 M= : va More Enter un The demand and supply curves show how buyers and sellers ________; the interaction of buyers and sellers ________. a corporation has lower taxes and less paperwork relative to sole-proprietorships and partnerships. true false gene Xgain-of-functiongene Alikelygene Bgene Yloss-of-functionpreventsunlikelydirectsIf a mutant Drosophila strain has no wings, and a transgene containing wild- type gene A restores wings to the mutant, then likely a_____mutation in_____ exists in the wingless strainIf a mutant Drosophila strain has no eyes, and a transgene containing wild-type gene B does not restore eyes, then gene B is________ to be the mutant gene in the eyeless strain.A mutant mouse strain with big ears has a chromosomal deletion that includes genes X and Y. A transgene containing gene Y restores ears to the mutant strain. The conclusion is that______ is required for normal ear size.Am XX mouse that has an SRY transgene on an autosome will be morphologically male. This result means that SRY______male morphological development. Note that the following sub-questions are not related to each other. (1) Suppose that y is a function of x satisfying the equation 5x + 10y + 3xy + 5y + 6x = 0. Use the implicit differentiation rule to find dy/dx (show the necessary steps).(2) Assume that we have a Cobb-Douglas production function for a certain industry: Q=cL K, where c is a constant, and L and K represent labor input and capital input, respectively. Assume that the production is fixed at Q = Qo, and at this fixed level of production, K is a function of L defined by Qo=cL K. Use the implicit differentiation rule to find the "rate of substitution of capital for labor", which is measured by aK/aL when the production is fixed at Q = Qo (show the necessary steps). (3) For x > 0 and y > 0, the equation y/x - (x + 2)(y + 3) = 0 defines y as an implicit function of x. Find the elasticity of y with respect to x at the point (xo, yo), where and Yo are some known values. According to the well-known equation, energy equals mass times the speed of light squared,a. mass and energy travel at the speed of light squaredb. energy is actually mass traveling at the speed of light squaredc. mass and energy travel at twice the speed of lightd. mass and energy are relatede. none of these If the government taxes car producers, that will happen in the market for cars?Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer.a The supply curve will shift to the left.bThe demand curve will shift to the right.C There will be a movement along the supply curve to the left.dThere will be a movement along the demand curve to the right. staring with the election of president andrew jackson( 1828 ) , voter participation increases due to the quiziz What is the volume of a hemisphere with a diameter of 7.6 m, rounded to the nearest tenth of a cubic meter? Solve for a side in right triangles A description of a sediment sample, stating that it contains large, angular fragments that are mostly red in color would represent what type of data? why did theodore roosevelt choose to leave the republican party and run as an independent? how would the formationd of the progressive "Bull Moose" party help democratic canditeplz help Prove using the axioms of betweenness and incidence geometry that given an angle CAB and a point D lying on line BC, then D is in the interiorof CAB if and only if B * D * C Cellular respiration extracts energy from food and takes place in the organelle called a:____________ A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added, deleted or replaced in the sequence, but rather the order in which the elements appear in the sequence is changed.Group of answer choicesstream Mr. Alegria went to Chick-fil-A to buy lunch for the math teachers. One week, he purchased 3 chicken sandwiches and 2 orders of chicken nuggets for $17.96. The following week, he purchased 2 chicken sandwiches and 4 orders of chicken nuggets for $19.92. How much does he pay for one order of chicken nuggets and one chicken sandwich? Write the systematic position of silkworm. 6. What happens to a substance at critical temperatures?O A. The substance can't change its state, only its temperature.O B. The substance changes its state if it continues gaining or losing thermal energy.O C. The substance can't lose any more thermal energy.O D. The substance changes its state only if it gains thermal energy. Anyone help me out would mean a lot thank you What is lcm of 3,6,9