Answers

Answer 1

Answer:

B or C I don't know

so I guessing

Answer 2

Answer:

I think the answer is A

Explanation:


Related Questions

Define the term editing​

Answers

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

Give two reasons why cloud computing could be harmful to an organization?​

Answers

Answer:

Someone else is looking after your data.

Cyberattacks.

Insider threats.

Government intrusion.

Legal liability.

Lack of standardization.

Lack of support.

There's always a risk

Explanation:

Big brain explanation:

A major risk to business continuity in the cloud computing environment is the loss of internet connectivity. Always ask your cloud provider what controls are in place to ensure internet connectivity. If a vulnerability is identified, you may have to terminate all access to the cloud provider until it is rectified.

Other reasons:

~ No longer in control. When moving services to the cloud, you are handing over your data and information.

~ Doesn't mean you should do away with servers.

~ No Redundancy.

~ Bandwidth issues.

Also, may I have Brainliest? :)

Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?

Planning
Filtering
Ordering
Sequencing

Answers

Answer: Sequencing

Explanation: I did test!

Sequencing step does she need to review.

What is Sequencing?

Sequencing is the act of placing a process's phases in order from start to finish. It is a crucial ability that is employed in math, physics, and other subject areas in addition to reading comprehension.

Look at a few sequence structures that can be used to structure instructions in a passage.

Students simply arrange a series of stages in a process or method in the proper order as part of sequencing activities. They might include topics like how to assemble equipment, set up and name a word processing file, or install an electrical switch.

Therefore, Sequencing step does she need to review.

To learn more about Sequencing, refer to the link:

https://brainly.com/question/30586864

#SPJ3

Leroy wants to keep the bride and groom in a picture, but remove the rest of the family. Which photo-editing tool should Leroy use?

Answers

Answer:

He can use Ms paint, Adobe photoshop, Picasa etc.

The photo-editing tool should Leroy use are Ms paint, Adobe photoshop, or Picasa.

What is photo editing tool?

The tool used for editing pictures clicked by the phone or shooting cameras.

Leroy wants to keep the bride and groom in a picture, but remove the rest of the family.

Leroy should use the photo editing tool for the same. The tools popularly used for the purpose are Ms paint, Adobe photoshop, or Picasa.

Thus, the photo-editing tool should Leroy use are Ms paint, Adobe photoshop, or Picasa.

Learn more about photo editing tool.

https://brainly.com/question/14800338

#SPJ2

Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?

Answers

Explanation:

userInput = input("Enter Number")

try:

val = int(userInput)

except ValueError:

print("That's not an int!")

MULTIPLE CHOICE
im confused can someone answer + maybe explain
java

MULTIPLE CHOICEim confused can someone answer + maybe explainjava

Answers

1) Note that the correct statement that correctly determines the sum of ALL the numbers in the list is:

int sum = 0; for(int index = 0; index<10; index++){sum +=numbersList[index];} (Option C)

2) The correct statement that shows the subtotal for chocolate bars is :

double subTotal = numChocs*priceList[3]; (Option A)

What is the rationale for the above response?

Note that the value of subTotal is calculated by multiplying the number of chocolate bars (numChocs) by the price of chocolate bars (priceList[3]).

It is critical to use double rather than int because the priceList is of type double; if you use int, the decimal component will be truncated.

Learn more about statements in programming:
https://brainly.com/question/13735734
#SPJ1

solve the following problem. it may be helpful to draw a chart on scrap paper to organize the information and write the equation. be sure to show all steps (v.e.s.t.) and work in order to receive full credit. a clerk was asked to change a $10 bill. she returned 9 more dimes than nickels and twenty-one more quarters than dimes. how many coins of each did she return?

Answers

A clerk was asked to change a $10 bill. The clerk returned -20/3 nickels, 7 dimes, and 28 quarters.

What do you mean by bill?

A bill is a document that states a specific amount of money that a person owes for goods or services. It may also refer to a legislative document that proposes a law that must be agreed upon by both houses of a legislature before it can become law.

This problem can be solved using the V.E.S.T. approach:

Variables:

N = number of nickels

D = number of dimes

Q = number of quarters

Equation:

N + D + Q = 150

Given Conditions:

D = 9 + N

Q = 21 + D

Substituting the second condition into the first:

N + (9 + N) + (21 + 9 + N) = 150

Simplifying and solving for N:

3N + 30 = 150

3N = 120

N = 40

Substituting the value of N into the second condition:

D = 9 + 40

D = 49

Substituting the values of N and D into the third condition:

Q = 21 + 49

Q = 70

Therefore, the clerk returned 40 nickels, 49 dimes, and 70 quarters.

To learn more about bills refer to:

https://brainly.com/question/30289874

#SPJ4

Can't find the right year for this. (Attachment)

Can't find the right year for this. (Attachment)

Answers

Apple iTunes in 2001 that sheet is wrong

Identifying correction services tasks
what are some tasks commonly performed in correction services jobs? check all that apply.
interviewing law offenders
using weapons, handcuffs, and other tools to control prisoners
transporting people who are sick or injured to hospitals
maintaining order and security in a courtroom
searching prisoners and their belongings
o providing legal advice to inmates
o guarding and counting inmates

Answers

The correction services tasks are:

The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.

What is the role of the corrections?

Corrections is known to be  the aspect of  criminal justice system that helps to handle individuals who have been found to have done or committed  a crime.

Note therefore, that the correction services tasks are:

The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.

Learn more about correction services from

https://brainly.com/question/6705028

#SPJ1

Answer:

a.b.e.g

Explanation:

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

"Pfizer could, he says, have made ‘way more billions. But we
would stay in history as we didn’t offer the world something. Now,
I feel way better than, beyond any doubt, we didn’t try to profi

Answers

We can see that critically evaluating how responsible it is to sacrifice profits for “the reputation of the company”:

The decision to sacrifice profits for the reputation of a company can be seen as a responsible move from an ethical perspective. However, its evaluation depends on various factors and the overall context in which the decision is made.

How responsible is sacrificing profits for “the reputation of the company”?

Prioritizing reputation over short-term profits can demonstrate a company's commitment to ethical values and social responsibility. It signifies a willingness to prioritize the greater good over immediate financial gains.

This can enhance trust and loyalty among customers, employees, and stakeholders, which can have long-term benefits for the company's sustainability and success. It can also contribute to building a positive brand image and attracting socially conscious consumers.

On the other hand, sacrificing profits for reputation must be evaluated in terms of its impact on the stakeholders involved. Companies have a responsibility to their shareholders and employees to generate reasonable profits and ensure financial stability.

The given passage is taken from the article, "Billions at stake, endless waiting, an angry Trump: the Pfizer CEO’s great vax hunt"

Learn more about sentence on https://brainly.com/question/28770553

#SPJ4

The complete question is:

“Pfizer could, he says, have made ‘way more billions. But we would stay in history as, we didn’t offer to the world something. Now, I feel way better that, beyond any doubt, we didn’t try to profit … There is something bigger than making a fair profit here.’ The bigger thing? ‘To change forever the reputation of the company.’”

Critically evaluate how responsible is sacrificing profits for “the reputation of the company”?

You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it from your email server. What email protocol can you use to do that?

Answers

in the case above, the email protocol can you use to do that is known to be POP3.

What are  email protocol?

There are some protocols that are often  used to send or deliver email over the Internet and they are:

The Simple Mail Transfer Protocol (SMTP), The Post Office Protocol (POP), The Internet Message Access Protocol (IMAP).

Hence, in the case above, the email protocol can you use to do that is known to be POP3.

See full question below

You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it from your email server. What email protocol can you use to do that?

HTTP

POP3

IMAP

SMTP

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

TCP is a(n) ____________________ protocol, which means the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender.

Answers

Because TCP is a "reliable" protocol, the sender waits to deliver data to the destination node until the latter confirms that it is indeed listening to it.

Transmission Control Protocol, or TCP for short, is one of the foundational IP (Internet Protocol) protocols. It offers data delivery that is dependable, well-organized, and error-checked between hosts that are executing IP-based applications. TCP ensures that data sent by the sender reaches the target node in the right sequence and error-free. This is made possible via a system of retransmissions and acknowledgments that guarantees the integrity of the data being transmitted. Data is not sent until the sender has confirmation from the recipient that they are prepared to receive it in the form of an acknowledgment. This guarantees that the data is received consistently and correctly, regardless of network failures or congestion.

learn more about data here:

https://brainly.com/question/13650923

#SPJ11

Which science topics would be suited for this organizational aid? Check all that apply.
looking at similarities and differences of certain types of vegetation
persuading someone of the importance of a certain scientific position
writing an analysis on how rocks are formed
listing the events in the life of a famous scientist
comparing two different types of landscapes

Answers

Answer:

A- looking at similarities and differences of certain types of vegetation

and

E- comparing two different types of landscapes

Explanation:

Got it right on edge

The science topics  suited for this organizational aid are:

Looking at similarities and differences of certain types of vegetation.Comparing two different types of landscapes.

What is vegetation?

Vegetation is known to be a term that connote the  life of a plant in a specific region.

Conclusively, Note that it is also seen as the ground area that has been provided by plants, and as thus, its description fits the science topics   that is suited for this organizational aid

Learn more about landscapes from

https://brainly.com/question/7027022

Apex corporation is designing a database for all its employees first of the designer want to see the passport size photograph of each employee to their respective name can you suggest which data type should be used​

Answers

Answer:

Image datatype

Explanation:

Since the image is passport sized, the general assumption is that the passport size won't be large.

So, it's advisable that the designer store the image directly on the database.

To do this, the designer should make use of image data type( or its equivalents in other database type).

What do the blocks in the looks category do?

Answers

Answer:

if u have a question can I see it

Explanation:

so I can know the answer choose

You should periodically perform basic computer maintenance on your computer.
True
False

Answers

Answer:

the answer will be true ......

Give at lesat 3 examples of how is NLG (Natural Language Generation) beneficial and unbeneficial (pls support your points)

Answers

NLG (Natural Language Generation) is beneficial isuch as automating content creation, personalizing user experiences, and generating insights from data but have limitations including potential biases in generated content and difficulties in capturing nuanced human language.

How is NLG beneficial and unbeneficial?

NLG offers numerous benefits including the ability to automate the generation of content across different domains, such as news articles, product descriptions, and weather reports. This helps save time and resources by eliminating the need for manual content creation.

NLG systems may have limitations. One concern is the potential for biased content generation as the models are trained on existing data that may contain biases. This can lead to the generation of discriminatory or misleading content.

Read more about Natural Language

brainly.com/question/14222695

#SPJ1

NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience

NLG, or Natural Language Generation, is the method of generating natural language text using computer algorithms. It is a subfield of artificial intelligence that focuses on creating human-like texts, thereby making it easier for humans to interact with machines. Natural Language Generation is beneficial in many ways, but it also has its limitations. In this response, we will discuss the benefits and drawbacks of NLG in detail. Benefits of Natural Language Generation (NLG):

1. Efficient content creation: NLG algorithms can generate content faster than human writers, making it easier for businesses and publishers to create large amounts of content in less time. This is particularly beneficial for news and sports articles, where quick updates are required.

2. Consistent quality and tone: NLG can ensure that the content is written in a consistent tone and style, maintaining the brand's voice and values. In contrast, human writers can experience mood changes, which may influence the quality of their writing.

3. Personalization: NLG algorithms can create personalized messages and content, providing a better user experience for customers and clients. It can also be used for chatbots to provide human-like interactions with customers, improving customer satisfaction.

Unbeneficial of Natural Language Generation (NLG):1. Limited creativity: NLG algorithms can generate text based on the data it is fed. However, it lacks creativity and may fail to produce the same level of creativity as human writers. NLG cannot replace human writers' creativity, which is required in fields such as literature and poetry.

2. Dependence on data quality: NLG requires high-quality data to generate effective texts. Low-quality data may result in incorrect information and errors in the generated text.

3. Lack of empathy: NLG algorithms lack human empathy and understanding of social and emotional contexts. This may cause problems in situations that require a high level of emotional intelligence, such as counseling, medical diagnosis, and human resources. Therefore, NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience. However, it has its limitations and cannot replace human creativity, empathy, and emotional intelligence.

For more questions on articles

https://brainly.com/question/25276233

#SPJ8

When you accelerate to avoid a collision which step of the IPDE process are you using?

Answers

The step of the IPDE process that should be used When you accelerate to avoid a collision is an execute.

In the term of computer and technology, IPDE stands for Identify, Predict, Decide, and Execute.  IPDE process or IPDE strategy also should be used in off-road driving. IPDE process including several activities, such as Identify any objects or conditions that may cause you trouble while driving and also Predict activity through what results might occur when you encounter the object or condition. IPDE has a function to help us to provides a means of arriving at the diagnosis of major categories.

Here you can learn more about IPDE https://brainly.com/question/2624496

#SPJ4

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

list four pointing devices and describe the four pointing devices ​

Answers

Answer:

Common pointing devices

Mouse.

Trackball.

Joystick.

Pointing stick.

Explanation:

Hope this helps

The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.

That question is for my photography class.

Answers

Answer:

72 dpi

Explanation:

72 DPI is standard for social media posts and others. It is not 300 DPI which is standard for print.

The standard dots per inch (DPI) used for blogs, social media, webpages, and emails can vary depending on the specific platform and device.

A common standard for these digital mediums is 72 DPI.

DPI refers to the resolution or sharpness of an image on a digital display. A higher DPI means more dots or pixels per inch, resulting in a clearer and more detailed image. On the other hand, a lower DPI means fewer dots per inch, resulting in a less sharp image.

For digital content displayed on screens, a DPI of 72 is often used because it strikes a balance between image quality and file size. This resolution is considered sufficient for viewing images online without causing excessive loading times or using excessive bandwidth.

It's important to note that when printing physical copies, a higher DPI is generally recommended to achieve better print quality. In print media, resolutions like 300 DPI are commonly used to ensure sharp and detailed prints.

Know more about dots per inch,

https://brainly.com/question/32108345

#SPJ3

The Event Viewer (Microsoft Windows) or Console (Apple Mac OS X) is used for what purpose?
to view and manage events scheduled in one or more user calendars
to configure system security features such as firewalls and antivirus scanners
to view incidents recorded in the Application, Security , and System logs
to manage user names and passwords on a network

Answers

Answer: Its C

Explanation:

The Event Viewer is a practical heritage feature in Windows 10 that collects event logs from programs and system components into a simple structure that you can then examine to diagnose and repair software or hardware issues with your computer. Thus, option C is correct.

What Event Viewer role in Microsoft and macOS?

A monitoring application called Microsoft Windows Server Event Viewer displays a log of events and can be used to diagnose problems on Windows-based systems. Information concerning application-related, security-related, system-related, and setup events is shown in the Event Viewer.

Crescendo is a real-time event viewer for macOS that leverages the ESF to display process executions and forks, file events, share mounting events, kernel extension loads, and IPC event data.

Therefore, to view incidents recorded in the Application, Security , and System logs is used for purpose.

Learn more about Event Viewer here:

https://brainly.com/question/25675228

#SPJ2

****Please do not copy and paste. I want a unique answer
****Please use the keyboard to answer
Classify the following accounts into the tree sections of cash
flow statement.(4 marks)
No.
Accou

Answers

The statement of cash flows is an essential financial statement that shows how changes in balance sheet accounts affect a company's cash equivalents.






It breaks down the cash inflows and outflows into three sections: operating activities, investing activities, and financing activities.The operating activities section consists of cash inflows and outflows from a company's main business activities. Investing activities include the cash inflows and outflows related to long-term assets, such as property, plant, and equipment, and investments in the securities of other companies. Financing activities involve cash inflows and outflows related to the company's debt and equity financing.
Some examples of each section are:
Operating Activities: Cash received from customers, cash paid to suppliers, salaries paid to employees, and taxes paid to the government.
Investing Activities: Cash received from the sale of long-term assets, cash paid to purchase long-term assets, and cash paid to acquire the securities of other companies.
Financing Activities: Cash received from issuing bonds, cash received from issuing stock, cash paid to pay off debt, and cash paid as dividends.




To learn more about cashflow:
https://brainly.com/question/30086086












#SPJ11

folding domains show how structure relates to function because:

Answers

Folding domains show how structure relates to function because they are compact regions within proteins that fold independently and perform specific functions.

Proteins are complex molecules made up of chains of amino acids. The specific folding of these chains into a three-dimensional structure is critical for their function. Folding domains are compact regions within a protein that can fold independently and maintain their specific shape and function. By studying folding domains, scientists can gain insights into how the structure of a protein directly influences its function. Understanding the relationship between protein structure and function is essential for comprehending various biological processes, such as enzyme activity, receptor binding, and molecular interactions. By examining folding domains, researchers can investigate how changes in protein structure affect its function and ultimately contribute to the understanding of biological systems.

To know more about Folding domains click here,

https://brainly.com/question/29414614

#SPJ11

b)what information is kept in the process table? how many areas of the operating system are using the process table to store data?

Answers

System monitoring utilities and tools also use the process table to show users data about active processes.

What details are stored in an operating system's process table?

Each item in the table, which is frequently referred to as a context block, provides details about a process, including its name, state (described below), priority (discussed below), registers, and any pending semaphores (discussed later). Depending on the operating system, a context block's precise contents will vary.

Which information is kept in the process tables?

The Linux kernel has a data structure called the process table that contains details about every process that is currently active. Process IDs, memory use statistics, and file descriptor usage are all listed in the process table process IDs, memory use, file descriptor usage, and other information are all contained in the process table.

To know more about data visit:-

https://brainly.com/question/29555990

#SPJ4

The Federal Trade Commission FIP principle of Notice/Awareness states that
1) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
2) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
3) there is a mechanism in place to enforce FIP principles.
4) Web sites must disclose their information practices before collecting data.

Answers

Answer:

Option 4) is correct

Explanation:

The Federal Trade Commission is an agency that is headed by 5 Commissioners such that each of the commissioners has served a seven year term.

Missions of the Federal Trade Commission are as follows:

1. Implementation of civil U.S. antitrust law

2. Encouragement  of consumer protection

The Federal Trade Commission FIP principle of Notice/Awareness states that websites must disclose their information practices before collecting data.

So,

Option 4) is correct

What is threat actors who violate computer security for personal gain?

Answers

Threat actors are Mass scammers and hackers, including cybercriminals also, who try to harm computer security for personal gain and financial success.

An individual or organization that engages in an activity with the intent to harm the cyber sphere, including computers, devices, systems, or networks, is referred to as a threat actor or malicious actor. These threat actors use different tools to retrieve the personal data of the victims so that they can get monetary compensation.

Learn more about threat actors here

https://brainly.com/question/14741575

#SPJ4

Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis

Answers

Since Ned is trying to decide how he wants to connect the nodes on the network he created, the  two options that he has are option b and C:

b. Through hard cabling or wireless radio waves.

c. Through ethernet cables or Bluetooth.

What kind of cable does a computer system typically use to connect to a network?

A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.

Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.

Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.

Learn more about ethernet from

https://brainly.com/question/28156384
#SPJ1

A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide your answer in newtons.​

Answers

If the load weighs 350 N, the effort that is required to lift the weight is 70 N

To answer the question, we need to know what mechanical advantage is.

What is mechanical advantage?

The mechanical advantage of the hydraulic lift M.A = L/E where

L = load and E = effort.Effort required to lift the weight

Making E subject of the formula, we have

E = L/M.A

Given that

M.A = 5 and L = 350 N,

substituting the values of the variables into the equation, we have

E = L/M.A

E = 350 N/5

E = 70 N

So, the effort that is required to lift the weight is 70 N

Learn more about mechanical advantage here:

https://brainly.com/question/26440561

#SPJ1

Other Questions
According to the five-factor model of personality, people who score high in ____ tend to besympathetic, trusting, cooperative, and modest.a.neuroticismb.extraversionc.conscientiousnessd.agreeableness What were two foods James Heming popularized ? Describe and analyze the ways in which your languagels have beendeveloped by family, friends and the different communities to which you belong Let G be a group, and let X be a G-set. Show that if the G-action is transitive (i.e., for any x, y X, there is g G such that gx = y), and if it is free (i.e., gx = for some g E G, x E X implies g = e), then there is a (set-theoretic)bijection between G and X. how much energy would be absorbed as heat by 75g of iroin when heated from 295 k to 301 k First Quartering act 1764 how did the colonist react SOLVE FOR N3/2 -1/2n= 2n+3N = Which of these statements is true?1. Dodger fans frequently booed Jackie Robinson for his poor play2. Racist fans taunted Robinson, and racist players sometimes tried to hurt him3. All baseball fans welcomed Jackie Robinson's major league debut4. Jackie Robinson only played on year in the major leagues Pls helppp!!asap Ill give brainliest dont copy off the internet plz ano ang epekto ng paninigarilyo Please help me out with these problems. A reciprocating compressor draws in 500 ft/min. of air whose density is 0.079 lb/ft and discharges it with a density of 0.304 lb/ft. At the suction, p1 = 15 psia; at discharge, p2 = 80 psia. The increase in the specific internal energy is 33.8 Btu/lb, and the heat transferred from the air by cooling is 13 Btu/lb. Determine the horsepower (hp) required to compress (or do work "on") the air. Neglect change in kinetic energy. eory.According to cell theory, which of the following aremade of cells? Check all that apply.O flowersrocksbloodwaterbacteriasugarskinRETRY Turbulence during pouring of the molten metal is undesirable because A. it causes discoloration of the mold B. it increases erosion of the mold C. it increases the mold filling time D. it increases solidification time QUICK!!,Explain what the engineering team should advise in the following scenario.Situation: An engineering team is analyzing a problem with a dam near a large metropolitan area. The dam reservoir has a capacity of 300 billion cubic feet, and it produces hydroelectric power for local municipalities. The dam has developed a severe crack. According to the textbook, all the following were strengths of the Union during the Civil War except ________. Group of answer choices A large population. The luxury to fight defensively, rather than offensively. An extensive railroad. Substantial industry. why did many people from south vietnam flee? what challenges did they face? Resistance is measured inA) ohmsB) voltsC) amperesD) FaradaysE) joules suppose you quit your job, which paid you $50,000 per year, so that you could start your own business. in the first year you received $160,000 in total revenue and spent $40,000 on employee wages, $20,000 on supplies, $40,000 on rent and $5,000 to the government for taxes. you also used $20,000 from your personal savings to buy equipment for your business, which was earning 5 percent interest each year. at the end of the year, the market price for the equipment was $18,000. given only this information, what is your economic profit? rank the following earth materials in order of their most likely occurrence, starting at earth's surface. think about moving from the crust to the mantle, and then to the outer and inner cores.