Explain the difference between SLR cameras’ and point-and-shoot cameras’ viewfinders. Which viewfinder do you think would be easier to use? Why?

Answers

Answer 1

Answer: A point-and-shoot digital camera estimates the light that will reach the sensor on an LCD screen. A SLR camera is a single lens reflex camera. As an SLR camera has a reflex mirror, it allows you to see through the viewfinder the real image that the film will see.

Explanation:

Optical viewfinders show you a true image. Which means that there's no lag; you're simply looking at a scene through a lens. Cameras using electronic viewfinders, on the other hand, have to convert the light into a digital image and then display it via the EVF. And that can take time, which manifests as viewfinder lag.

Answer 2
SLR cameras' viewfinders allow the user to preview the exact image that will be captured due to its direct optical connection with the lens. Point-and-shoot cameras' viewfinders, on the other hand, provide a digital representation of what the camera sees and are typically constructed from LCD screens. I think point-and-shoot cameras' viewfinders would be easier to use because of their more user-friendly design, as well as their convenience in providing an easy-to-view display of the image being taken.

Related Questions

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

What is the use of an NDP?

A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address

Answers

Answer:

Taking an IP address from a network layer and identifying the associated MAC address

Explanation:

Option D

It is used to measure the total economic output of a country, taking into account depreciation and capital consumption.

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

Construct pseudocode for a program that prints ‘Hello World’ on the screen.

Answers

Answer:

Declare a class with name A.

Declare the main method public static void main(String args[]){

Now Type the System. out. println("Hello World"); which displays the text Hello World.

Explanation:

google

A is the answer!!! good luck

Which type of peripheral device allows a human to store data processed by the computer? (5 points) Input Output Storage Storehouse

Answers

Answer:

The peripheral devices that can be used for both input and output is touch screen on a tablet computer.

Storage peripherals are used to store and record data, and include internal and external hard drives, CD-ROM and DVD drives, and flash memory drives.

How do I write on top of this!? Please tell me I need to know how to write on top of this. Not anything else I just need to know how to write on what I have highlighted

How do I write on top of this!? Please tell me I need to know how to write on top of this. Not anything

Answers

Answer:

what software are you running ?

Hope my answer helped somewhat :D!

Explanation:

just go to the top left on settings and convert the file into a pdf if it isnt already one , go to files and select edit. You should be able to write ontop of the print already there.

Answer:

First make sure you can type on the document. If not, you should download the document so you have a copy to edit on. If you can edit, great! I would suggest using the drawing tool which should be in the section labeled "Draw." You can also add in a textbox instead, which I would recommend since it is much easier.

Explanation:

Hope this helped somewhat :)

PLEASE HURRY TODAY IS THE LAST DAY FOR THIS ASSIGNMENT.
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.
Online Content: Site 1
Describe the abilities of someone with analytical/research skills.

Answers

Explanation:-

Analytical skills are kind of problem-solving skill. They allow you to evaluate problems, both simple and complex. This skill incorporates many skills like attention to detail, critical thinking ability, decision-making, and researching skills in order to analyze a question or problem and reach a solution

i think this is the answer

hope it helped !!

But I think that lean it okay, therefore it is: analytical/research skills!

Which of the following lines of code would begin a loop that would give the user five tries to open a safe?

A.
while tries = 6:

B.
while tries < 6:

C.
while tries == 6:

D.
while tries > 6:

Answers

Answer: A

Explanation:

A first equation

Explain:

Your brother used your computer to complete his homework last night, and now your login password no longer works. What question frames your problem into a question to help reach a solution? What is wrong with my brother? Did this computer get a virus? Why is this computer broken? Did my brother change the password? IF CORRECT 5 STARS AND A THANKS

Answers

Answer:

Chances are your brother probably changed the password to mess with you. so i would recommend to interrogate the heck out of him and hope for the best.

Explanation:

Answer:

Did my brother change the password?

hope this helps  :)

who has a relationship like this quote?

who has a relationship like this quote?

Answers

Answer:

me

Explanation:

still single though

Using an example, explain the term 'Ergonomics' and why it is important.
(6 mark question)

Answers

Ergonomics is the study of how humans interact with manmade objects. The goal of ergonomics is to create an environment that is well-suited to a user's physical needs. For example, an ergonomic chair may help support your lower back and prevent you from slouching.

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

Consider a mind map and an outline. Which of the following terms describes the format of an outline?

flexible
visual
hierarchical
graphical

Answers

Visual?
Maybe I’m not sure

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

A bicycle is probably not a computer because it does not

have a screen
require electricity
use information to solve a problem
use the internet


Pls anwser quick

Answers

use info to solve a problem
use information to solve a problem

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

pleas help and hury
_____ can be lost or stolen by cybercriminals. Select 2 options.

Computer devices

Portable devices

Antivirus software

Computer networks

Free WiFi

Answers

Answer:

It is D and A

Explanation:

Free WiFi and portable devices

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

Ok guys weird question so I have a project due on Thursday next week and I need an idea for an object to use for my commercial. I need to be able to access it and film with it while being school appropriate. Any ideas?

Answers

you can possibly add a commercial about masks 2x protected and they can protect you from way more germs than an ordinary mask. hope this helps you goodluck on your project

Answer:

I have an idea you don't have to use it but what if you used something that you like for example a lego set. It could really be anything you want just look around your room for things you like

Explanation:

I hope that helped!

Why is it important for schools and organizations to have an Acceptable Use Policy?
A. It prohibits people from using the Internet.
B. It lets people know what is considered to be acceptable use of the Internet.
C. It makes it mandatory for people to use the Internet.
D. It provides the acceptable use rules for the country.

Answers

A. Is the correct answer I’m pretty sure.

Answer:

B. It lets people know what is considered to be acceptable use of the Internet.

Explanation:

An Acceptable Use Policy (AUP) is a set of guidelines and rules that outline the acceptable and appropriate use of technology, particularly the internet and digital resources, within schools and organizations. The primary purpose of an AUP is to provide clear expectations and guidelines to users regarding the appropriate and responsible use of technology resources. Some of the reasons why it is important for schools and organizations to have an AUP are:

Establishing Boundaries: An AUP helps set clear boundaries and expectations for the use of technology resources. It defines what is considered acceptable and appropriate behavior, ensuring that users understand the rules and guidelines that need to be followed.Promoting Responsible Use: By outlining acceptable use, an AUP encourages responsible and ethical behavior when using technology. It emphasizes the importance of respecting the rights of others, protecting privacy, and adhering to legal and ethical standards.Protecting Users and Systems: An AUP helps protect users and the organization's technology infrastructure. It provides guidelines to prevent the misuse of resources, such as engaging in cyberbullying, accessing inappropriate content, or engaging in illegal activities. By promoting safe and responsible use, an AUP helps maintain a secure and productive technology environment.Educating Users: An AUP serves as an educational tool, informing users about digital citizenship, online safety, and responsible use of technology. It helps users understand the potential risks and consequences of inappropriate or irresponsible behavior, fostering digital literacy and responsible digital citizenship.Legal and Compliance Requirements: Having an AUP ensures that organizations comply with legal obligations and regulatory requirements. It helps protect the organization from potential legal liabilities by setting guidelines for appropriate use and making users aware of their responsibilities.

Overall, an AUP plays a vital role in promoting responsible, safe, and ethical use of technology resources within schools and organizations. It helps create a positive and secure digital environment and ensures that users are aware of the expectations and guidelines for using technology appropriately.

PLEASE HELP I NEED HELP QUICK

PLEASE HELP I NEED HELP QUICK

Answers

Answer:

um the picture is really blurry can't see anything

yo ion know but good luck

Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is considering showing a message that says “Game Over” or perhaps showing a scoreboard at the end. Which of the four elements is Armando working on in his GDD? operation obstacles outcome objective

Answers

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

Answer:

D. outcome

Explanation:

Choose an efficient method of saving electricity. Briefly present the advantages and disadvantages of applying the chosen method in everyday life.

Answers

One method of saving electricity that is both efficient and easy to implement in everyday life is using energy-efficient light bulbs.

Advantages:

Energy-efficient light bulbs use significantly less energy compared to traditional incandescent bulbs, resulting in lower electricity bills.

They have a much longer lifespan, which means they need to be replaced less frequently, leading to additional savings and reduced waste.

Energy-efficient light bulbs come in a variety of styles and colors, making it easy to find one that fits your needs and preferences.

Disadvantages:

Energy-efficient light bulbs can be more expensive to purchase initially compared to traditional incandescent bulbs.

Some energy-efficient light bulbs, such as compact fluorescent bulbs, contain small amounts of mercury, which can be harmful to the environment if not disposed of properly.

Energy-efficient light bulbs may not work with certain types of dimmer switches, so it's important to check compatibility before purchasing.

Overall, switching to energy-efficient light bulbs is a simple and effective way to save electricity and reduce your carbon footprint. While there may be some initial costs and limitations, the long-term benefits of reduced energy consumption and reduced waste make it a smart choice for those looking to be more environmentally conscious.

An efficient method of saving electricity is by using LED light bulbs instead of traditional incandescent or fluorescent bulbs. LED stands for Light Emitting Diode and they are designed to be highly energy-efficient.

Advantages of using LED light bulbs:

1. Energy Efficiency: LED bulbs consume significantly less energy compared to traditional bulbs. They convert a higher percentage of electrical energy into light and produce less heat as a byproduct, making them more efficient and cost-effective in the long run.

2. Long Lifespan: LED bulbs have a much longer lifespan than traditional bulbs. They can last up to 25 times longer, reducing the frequency of replacement and saving money on replacement costs.

3. Environmental Friendly: LED bulbs do not contain harmful substances like mercury, which is commonly found in fluorescent bulbs. By using LED bulbs, you can contribute to reducing hazardous waste in landfills.

4. Durability: LED bulbs are more durable and resistant to shocks, vibrations, and temperature changes compared to traditional bulbs. This makes them suitable for various environments, including outdoor lighting.

Disadvantages of using LED light bulbs:

1. Higher Initial Cost: LED bulbs are generally more expensive to purchase upfront compared to traditional bulbs. However, the cost is offset by their longer lifespan and lower energy consumption over time.

2. Limited Color Options: While LED bulbs offer a wide range of color options, the selection might not be as extensive as traditional bulbs. However, advancements in LED technology have expanded the available color choices.

3. Sensitivity to Temperature: Extreme temperatures can affect the performance of LED bulbs. In very cold temperatures, LED lights might take longer to reach their full brightness, and in very hot temperatures, their lifespan might be reduced.

Overall, using LED light bulbs is an efficient method of saving electricity due to their energy efficiency, long lifespan, environmental friendliness, and durability. Though they may have a higher initial cost and limited color options, these drawbacks are outweighed by the long-term benefits they provide. By adopting LED bulbs, individuals can contribute to energy conservation and reduce their electricity bills.

Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit, our buying preferences, and so on. Do you think that this is ethical? If not, can you suggest ways to stop this activity? If yes, explain the context in which it is important to us.

Answers

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:

a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:

Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age

Date: [Insert Date]

Byline: [Your Name]

[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.

The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.

In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.

One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.

According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.

During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.

On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.

After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.

The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.

As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.

In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.

I hope this helps. Cheers! ^^

i need a essay 3-5 sentences on volleyball

Answers

Answer:Volleyball is a team sport that involves two teams of six players, one of which plays offense and the other defense. Each player has a specific role to play on the court:

Setter – The setter positions herself in front of her teammates, and sets up the ball for them to hit. She also controls the pace at which points are played, as well as how long each point lasts. The setter’s job is to make sure that every point goes smoothly without any errors or mistakes by her teammates.

– The setter positions herself in front of her teammates and sets up the ball

Explanation:

pick and choose the sentences from there

Volleyball is a sport played by many. The sport dates back to 1985, and has since grown in terms of popularity. The creator is a man by the name of William G. Morgan. The sport garnered international popularity in 1913. It is a fun team sport that many enjoy, and continues to grow.

reasons phone doesnt charge

Answers

Here are 5 reasons possibly why:

1.) Faulty lightning or micro USB port

2.) The lightning or USB port could be dirty

3.) Damaged charging port or cable

4.) Water Damage

5.) Software problems

One example could be that the charging hole is full of dirt and dust.

Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?

Answers

Answer:

I think they should show one subject per month so students are more prepared

Answer: some changes that should be made are  dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .

Explanation:

(50pts but don't look it up be honest) What was the bestselling videogame console of all time?

Answers

Answer: Down!

Explanation:

I think that the answer is play station.

either its play station 2 or play station 4

answer

the answer is PlayStation 2

explanation

Other Questions
Yesterday, you entered into a futures contract to sell 75,000 at $1.79 per . Your initial performance bond is $1,500 and your maintenance level is $500. At what settle price will you get a demand for additional funds to be posted? A. $1.7767 per . B. $1.2084 per . C. $1.6676 per . D. $1.1840 per . const x = 0;while(x < 5) { alert(x); x = x + 1;}In the above while loop, which line is responsible for checking the condition for whether or not the code within the while loop should execute?const x = 0;while(x < 5) {alert(x);x = x + 1; Which sentence or sentences provide minor details? Helium is to be compressed from 105 kPa and 295 K to 700 kPa and 460 K. A heat loss of 15 kJ/kg occurs during the compression process. Neglecting kinetic energy changes, determine the power input required for a mass flow rate of 60 kg/min. Replace the word in bold by a direct and/or indirect object pronoun (le, la, les, l, lui, leur) 1. Jai regard la fleur.2. Je parle mon amie.3. Je veux les cadeaux.4. Je veux donner les cadeaux mon amie5. Je veux donner les cadeaux mon amie6. Elle a crit sa soeur.7. Tu peux telephoner ton pre.8. Je ne veux pas voir le film demain.9. Je ne vais pas manger la pomme maintenant.10. Jai mang les 3 croissants hier.11. Jai tlphon mes enfants.12. La prof a donn une bonne note mon ami.13. Je veux acheter les fleurs.14. Jai achet les fleurs pour ma soeur.15. Jai fini lexercice. A bicycle store costs $2450 per month to operate. The store pays an average of $50 per bike. The average selling price of each bicycle is $120. How many bicycles. Must the store sell each month to break even what is meant by french academic art? how did the works of the realists factor into french academic standards? 1. A 40 kg football player going through the air at 4 m/s tackles a 60 kgplayer who is heading toward him at -3m/s, in the air. What is the velocityof the combined players? *-0.20 m/s100. m/s-20.0 m/s2.86 m/s What is the MOST likely reason that music came to occupy a greater position in society during the Renaissance period?A. The Catholic Church required most people to attend Mass and sing along with the music.B. The Protestant Reformation of 1517 inspired more people to create secular music.C. The middle and upper classes were spending more time and money on leisure activities.D. Lower-class citizens were prohibited from attending any dances or concerts in towns. what types of winds blow constantly, predictably and over long distances?A. land breezesB. global winds C. mountain breezes To what degree did Reagan and conservative policies reshape American society and politics, and to what degree did the legacy of 1960s reform continue despite these efforts? What were the greatest foreign policy successes and failures of the Reagan administration? Did Reagan's foreign policies alter Soviet behavior, or were other factors responsible for winding down the Cold War? there is a high incidence of injuries and deaths for motorcyclists because motorcycles provide little or no protection What is the sum of the two amounts of money shown?Enter your answer in the box.$ The growth rate of real GDP per hour of work and the growth rate of capital per hour of work are each 3 percent per year What is the growth rate of technology? Which statement is true?Select one:a. Warm-ups are optional.O b. Warm-ups should last a minimum of 30 minutes.O c. You must be an athlete to be physically fit.O d. Warm-ups usually last 5-10 minutes. NO LINKS!!! URGENT HELP PLEASE!!!! NO MULTIPLE-CHOICE!!!!!!1. Find the maximum area for a rectangle perimeter of 120 meters. Make your answer convincing by including these things: a. Sketches of rectangles with a perimeter of 120 meters (Include rectangles that do not have the maximum area and the rectangle you think does have the maximum area.) b. A table of lengths and areas for rectangles with a perimeter of 120 meters (Use increments of 5 meters for the lengths.)c. A graph of the relationship between length and area. Explain how each piece of evidence supports your answer. solve the proportion x-4/6=x/8 The net of a solid figure is shown below: Four squares are shown side by side in a row. The second square has a square above it and a square below it. All the squares have side length equal to 4 inches Which calculation will give the total surface area of the solid figure? (1 point) a 6 4 4 square inches b 4 6 6 square inches c 6 4 4 4 square inches d 4 6 6 6 square inches Between the same two atoms, the strongest covalent bond is the ___ bond and the weakest is the ___ bond. Explain the societal and cultural factors that may contribute to the high childhood and maternal mortality rates in sub- Saharan Africa.