how can parents be health educators in family​

Answers

Answer 1

Answer:

They can be health educators in family because they are your parents.

Explanation:

The reason why is because since they are your parents that means they have kids, so they probably know the ins and outs of parenting and running a family.


Related Questions

A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionally or unintentionally unintentionally or accidentally intentionally recklessly

Answers

Answer:

intentionally or unintentionally

Explanation:

Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting from that number "What is the hailstone sequence?" you might ask. Well, there are two rules: • If n is even, then divide it by 2 • If n is odd, then multiply it by 3 and add 1 Continue this sequence until you hit the number 1.​

Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting

Answers

n=int(input("Enter number: "))

while n != 1:

   print(n)

   if n%2==0:

       n//= 2

   else:

       n = (n*3)+1

print(n)

I wrote my code in python 3.8. If you want to print the 1, keep the last line of code otherwise delete it.

Where do you create hierarchies in the data model?
A. In Excel on the PivotTable - Design ribbon.
B. By right-clicking on the column name in the Data View.
C. From the Diagram View, by selecting the Hierarchy icon on the table list.
D. By selecting the measure in the calculation area.

Answers

To create hierarchies in the data model, you can create it (C) from the Diagram View, by selecting the Hierarchy icon on the table list.

What is hierarchies in the data model?

Hierarchical data is a data structure when items data are linked to one another in parent-child relationships in the overall tree structure. The item data could be  fields, records, characters, number, files and so on.

The hierarchical data model was created by IBM in the 1960s and used in  mainframe DBMS (DataBase Management System) on that time. In the first model hierarchies, Records relationships pattern is like a tree-like model. The structure is simple but has disadvantage in flexibility. The relationship on this model is confined to a one-to-many relationship which is inflexible.

Learn more about DBMS here

https://brainly.com/question/24027204

#SPJ4

What is one of the ways that video games of the 1960s were different from video games of later decades?

Video games of the 1960s were entirely electronic, while many modern videos games have a mechanical component.

The only major difference between video games of the 1960s and modern video games is the quality of the graphics.

Video games of the 1960s were completely mechanical, while modern video games are all partially mechanical and partially electronic.

Many video games of the 1960s were partly mechanical, while modern video games are completely electronic.

Answers

Many video games of the 1960s were partly mechanical, while modern video games are completely electronic which is the correct answer would be an option (D).

What are electronic games?

Any interactive game that is controlled by computer hardware is referred to as an electronic game. General-purpose shared and personal computers, arcade consoles, video consoles connected to home television sets, portable gaming machines, mobile devices such as cellular phones, and server-based networks are examples of machines, or "platforms," on which electronic games are played.

One of the ways in which 1960s video games differed from subsequent decades' video games many 1960s video games were partially mechanical, but current video games are entirely electrical.

Thus, Many video games of the 1960s were partly mechanical, while modern video games are completely electronic

Hence, the correct answer would be option (D).

To learn more about the electronic game here :

https://brainly.com/question/8910338

#SPJ1

what kind of tag will give additional info about your webpage​

Answers

Answer:

The LINK tag

Explanation:

Answer:

The LINK tag

Instead of producing a clickable link, the <link> tag tells the browser that there is some additional information about this page located in a different file.

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

Given what you know about the formation of photochemical smog, in which of the following situations is it most likely to occur?
Rural area in a low-sunshine location
Rural area in a high-sunshine location
Urban area in a high-sunshine location
Urban area in a low-sunshine location

Answers

Photochemical smog is formed when sunlight interacts with certain air pollutants, such as nitrogen oxides (NOx) and volatile organic compounds (VOCs), in the presence of sunlight.

Therefore, it is most likely to occur in an urban area in a high-sunshine location.

In an urban area, there are typically higher concentrations of vehicles, industrial emissions, and other human activities that release NOx and VOCs into the air. These pollutants can accumulate in the urban atmosphere, and when exposed to sunlight, they can undergo photochemical reactions that result in the formation of photochemical smog.

High levels of sunlight are necessary for the formation of photochemical smog because the reactions that produce smog require energy from sunlight to occur. In rural areas or low-sunshine locations, the availability of sunlight may be limited, which reduces the likelihood of photochemical smog formation. However, in urban areas with high levels of sunlight, combined with significant emissions of NOx and VOCs, the conditions for photochemical smog formation are more favorable.

learn more about    photochemical smog  here:

https://brainly.com/question/15728274

#SPJ11

A website you can visit
online is an example
of?

Answers

Answer:

A website you can visit online is an example of a digital media.

Explanation:

Which of the following statements is true about file storage on a FAT file system?the clusters are organized as a linked-lista backup of the FAT table is kept for each partitionFAT32 can be converted to NTFS using the convert command

Answers

FAT32 can be converted to NTFS using the convert command.

The File Allocation Table (FAT) file system is a simple and widely used file system format for organizing and managing files on storage devices. However, the other two statements are not true for the FAT file system. The clusters in a FAT file system are not organized as a linked-list. Instead, the FAT file system uses a table called the File Allocation Table to keep track of the allocation status of clusters. Each entry in the FAT table corresponds to a cluster and indicates whether it is free, allocated, or the location of the next cluster in a file. A backup of the FAT table is not typically kept for each partition in the FAT file system. The FAT table is a critical component of the file system, and its integrity is important. However, backup copies are not maintained automatically by the file system itself.

Learn more about file systems here:

https://brainly.com/question/31822574

#SPJ11

How does a client’s use of a graphic (on printed material or on the Internet) change its file type?

Answers

Number a graphic file that has changed to a non graphic file cannot be previewed before signature analysis.

What is file signature?

A file signature analysis is a process whereby file extensions and file headers are compared with a known database of file extensions and headers in an attempt to verify all files on the storage media and identify those that may be hidden.

Based on the given case where a file extension is changed to a non-graphic file type, such as fromjpg totxt, the file will not be displayed in the gallery view before a signature analysis.

Therefore, Number a graphic file that has changed to a nongraphic file cannot be previewed before signature analysis.

Learn more about graphic file on:

https://brainly.com/question/9759991

#SPJ1

Which of the following is NOT true about high-level programming
languages?

Answers

Answer:

this can't be answered because you didn't show the "following" answers

Answer:

u did't write the question

then how will we answer u

and people behind brainly don't try to delete my answer

because only if he show the question then only i can answer him

Why should data anaylst should learn about computer arichtecture.

Answers

The knowledge serves as good foundation for me to understand how technology works behind the scene as well. So I must say a good understanding of computer architecture gives the data scientist the ability to propose feasible solution in capturing and maintaining data, implementing models and algorithms in IT systems.

describe the simulation game
and i need proper explantion

Answers

Simulation games are games that offer players the opportunity to experience various aspects of real life in a simulated environment.

They are a popular type of video game that is designed to provide a realistic experience by simulating real-world situations and activities such as managing a business, flying a plane, or even caring for a pet. Simulation games have been around for decades and have become increasingly popular in recent years as technology has advanced and gaming platforms have become more sophisticated.

In simulation games, players typically control a character or avatar that represents them in the game world. They interact with other characters, make decisions, and carry out actions that affect the game's outcome. The goal of most simulation games is to successfully manage resources, solve problems, and achieve specific objectives.

Learn more about Simulation games: https://brainly.com/question/2166921

#SPJ11

You have just connected a Windows workstation to the network. The workstation can communicate with all devices on the same subnet, but can't communicate with other devices on other subnets. You use the ipconfig command on the workstation and see the following:C:\ipconfigWindows IP ConfigurationEthernet adapter Local Area Connection:IP Address . . . . . . . . . . : 192.168.1.100Subnet Mask. . . . . . . . . . : 255.255.255.0Default Gateway. . . . . . . . : 192.168.1.1No other devices seem to have an issue. What is the most probable cause of the problem?

Answers

if no other devices have an issue then its just with yours but that does happen to me often

Explanation:

Maybe try to restart windows workstation or disconnect and reconnect that happened to me too I just restarted it and it worked if that doesnt work I would contact a professional or something like that this is more of a system problem you wont be able to find much on here that will be helpful

If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions. True or False?

Answers

The statement "If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions" is false because a rollback is a feature that allows a transaction to be undone or reverted to a previous state.

It is not designed to recover a destroyed database. If a database has been destroyed, recovery procedures such as restoring from backups or using other disaster recovery techniques would need to be employed. Rollback is used to undo problematic transactions that may have been committed to the database, bringing the database to a valid state before the problem occurred.

Learn more about database https://brainly.com/question/30634903

#SPJ11

After the results of an experiment, a scientist decides that a long-held scientific theory must be revised. The scientist modifies the theory and tells other scientists. Predict the scientists' reaction, and explain why they might react that way. Your answer:

Answers

Answer:

Other scientists will be surprised at him/her

Explanation:

Science is totally empirical in its approach to knowledge. Models and theories are proposed and revised based on the available mass of experimental evidence.

However, all scientific findings must go through a rigorous process of verification and replication by other scientists in other parts of the world before they become  widely accepted in the world of science.

The scientist ought not to have modified the existing theory based on his findings as an individual. His findings ought to go through rigorous verification because other extraneous factors that he may not have controlled adequately may have led to the results he obtained.

Other scientists will be surprised and disregard his claims about the long held scientific theory until his findings are satisfactorily verified by other scientists working in different parts of the world.

codes.com student/2087800/section/148661/assignment/5896092/ My See Practice 10 Exercise 5.1.4: Access for DNA Class Let's Go! For this exerce, you are going to create 2 instance variables and the structure of the constructor for the DNA dess. DNA objects contain two strings, and and a mnotype. Create the instance variables with the appropriate privacy settings. Then create the structure of the constructor to take two parameters to match the instance variables. Make sure you set the privacy settings on the constructor correctly. (You do not need to complete the constructor Note: Because there is no main method, your code will not execute (that's ok). Use the autograde to verify that you have the correct code. - Sand My Section Practice Sa Sub Continue RUN CODE Status: Not Submitted E 5.1.4: Access for DNA Class 1 public class DNA 2. 3 4) 5 FILES ONA

Answers

Make two instance variables and the DNA dess constructor's structure. There are two strings, a mnotype, and DNA objects.

Program:

private int calcSequenceSubs(int length, boolean prevFollEqual)

if (prevFollEqual){

   if (length == 1) return 3;

   else return 3 * calcSequenceSubs(length-1, false);

} else {

   if (length == 1) return 2;

   else return 2 * calcSequenceSubs(length-1, false) + calcSequenceSubs(length-1, true);

}

public static int DNAChains(String base) {

if (base == null || base.length() == 0) {

   return 0;

}

int curSequence = 0;

int totalSolutions = 1;

boolean inSequence = false;

//flag to check whether there are any sequences present.

//if not, there is one solution rather than 0

char prevChar = 'x';

char follChar = 'y';

int i = 0;

char[] chars = base.toCharArray();

//handle starting sequence if present

while (i < chars.length && chars[i] == '?') {

   curSequence++;

   i++;

}

if (curSequence > 0) {

   //exclusively ?'s needs to be treated even differently

   if (i < chars.length)

       totalSolutions *= (curSequence > 1) ? 3 * solveSequence(curSequence - 1, false) + solveSequence(curSequence - 1, true) : 3;

       curSequence = 0;

   } else {

       //result is 4*3^(length-1)

       totalSolutions = 4* ((int) Math.pow(3, chars.length-1));

   }

}

//check for sequences of question marks

for (; i < chars.length; i++) {

   if (chars[i] == '?') {

       if (!inSequence) {

           inSequence = true;

           prevChar = chars[i - 1];

           //there is at least one sequence -> set flag

       }

       curSequence++;

   } else if (inSequence) {

       inSequence = false;

       follChar = chars[i];

       totalSolutions *= solveSequence(curSequence, prevChar == follChar);

       curSequence = 0;

   }

}

//if it does, handle edge case like in the beginning

if (inSequence) {

   //if length is 1 though, there are just 3 solutions

   totalSolutions *= (curSequence > 1) ? 3 * solveSequence(curSequence - 1, false) + solveSequence(curSequence - 1, true) : 3;

}

return totalSolutions;

}//end DNAChains

private static int solveSequence(int length, boolean prevFollEqual) {

if (prevFollEqual) {

   //anchor

   if (length == 1) {

       return 3;

   } else {

       return 3 * solveSequence(length - 1, false);

   }

} else {

   //anchor

   if (length == 1) {

       return 2;

   } else {

       return 2 * solveSequence(length - 1, false) + solveSequence(length - 1, true);

   }

}

}//end solveSequence

An instance method is defined?

A section of code known as an instance method is executed on a particular class instance. A receiver object is used when calling it.

What is a case method? Is a piece of code known as an instance method called on a particular instance of an object of a class?

A piece of code known as an instance method relies only on the generic class and no particular instances (objects). By generating private fields, an instance method enhances a class's capabilities.

To know more about constructor's visit:-

https://brainly.com/question/29999428

#SPJ4

what is technological convergence and why it is significant in the tourism industry context?

Answers

Technological convergence refers to the merging of technologies, products and services into a single, integrated system that is designed to improve the overall efficiency and effectiveness of the technology.

What do you mean by Technological convergence?

Technology convergence refers to the merging of different technological systems, devices, and applications into a single, integrated platform. It occurs when different technologies, such as computing, telecommunications, and entertainment, come together and merge their capabilities to create new and more efficient systems. The result is the creation of new products and services that are more versatile and offer more functionality than the individual technologies could provide on their own

This convergence can occur between different technological domains, such as computing, telecommunications, and entertainment, and it can lead to the creation of new products, services, and applications.

In the context of the tourism industry, technological convergence has significant implications for the way that tourists interact with and experience destinations. For example, the convergence of digital technologies, such as the internet, mobile devices, and social media, has led to the creation of new platforms and services that enable tourists to research, plan, and book their trips more easily and efficiently. This has increased the accessibility of travel information and made it easier for tourists to find and compare options, ultimately leading to more informed travel decisions.

Additionally, technological convergence has also changed the way that tourists experience destinations. For example, the use of augmented and virtual reality technologies is enabling tourists to explore and experience destinations in new ways, providing them with immersive experiences that go beyond traditional tourism offerings. Similarly, the use of smart devices and the internet of things (IoT) is enabling destinations to create more personalized and interactive experiences for tourists, providing them with a more memorable and engaging experience.

In conclusion, technological convergence is significant in the tourism industry because it has revolutionized the way that tourists interact with and experience destinations, providing them with new and more convenient ways to research, plan, and book trips, as well as more personalized and immersive experiences once they arrive at their destinations.

To know more about research visit:

https://brainly.com/question/29782299

#SPJ1

Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
Please someone answer I need the answers urgently.

Answers

Answer:

A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.

LAN stands for Local Area Network. WLAN stands for Wireless Local Area Network. ... WLAN connections are completely wireless. LAN network is a collection of computers or other such network devices in a particular location that are connected together by communication elements or network elements.

Easy and Cheap Communication: Data and messages can easily be shared with the other computer connected to the network. Centralized Data: The data of all network users can be stored on a hard disk of the central/server computer. This help users to use any computer in a network to access the required data.

Explanation:

I don't know if it's correct,

so hope it helps

you receive an email from your bank informing you that their privacy policy has been updated and asking you to review it on their website. what is the safest way to visit your bank's website?

Answers

Here is the safest way that you can follow when visiting your bank's website:

Ensure the bank's website uses an HTTPS web address. Change your password regularly. Use multi-factor authentication. Don't open your bank account on public computers. Use a secured wifi connection.

The safest way when visit a bank's website is to access your bank's official online or mobile banking app using a secured Wi-Fi connection. Banking with unverified or untrusted apps or over unsecured Wi-Fi connections could leave you vulnerable to cyberattacks.

You can learn more about the cyberattacks at https://brainly.com/question/27726629

#SPJ4

what type of fuzzer requires the user to give it predefined inputs? generation fuzzer mutation fuzzer protocol-based fuzzer

Answers

A generation fuzzer requires the user to give it predefined inputs.

In fuzz testing, there are three main types of fuzzers: generation fuzzers, mutation fuzzers, and protocol-based fuzzers. A generation fuzzer creates test data from scratch based on predefined inputs or rules specified by the user. This type of fuzzer is more suitable for situations where the input format is well-defined and understood. On the other hand, mutation fuzzers modify existing test data to create new test cases, while protocol-based fuzzers focus on testing communication protocols.

Among the three types of fuzzers mentioned, it is the generation fuzzer that requires predefined inputs from the user to generate test data.

To know more about fuzzer visit:

https://brainly.com/question/20314591

#SPJ11

When dealing with perspective, _____ lines are used or implied.

Answers

Answer:

I'm pretty sure the answer is vanishing lines.

Explanation:

How many bytes does it take to represent a color in the rgb color model?.

Answers

Answer: 3 bytes

Explanation: Hope this helps if not sorry.

PB Sample Budget Workshops.xlsx - Excel Tell me what you want to do... o x Sign in Share File Home Insert Page Layout Formulas Data Review View X Σ AutoSum - Calibri 11 A E' Wrap Text General HA HA Fill - Paste BIU Merge & Center - $ % 08 Insert Delete Format Clear Conditional Format as Cell Formatting Table Styles Styles Sort & Find & Filter Select Editing Clipboard Font Alignment Number Cells A3 X fo Workshop ID A B с D E F G H 1 J K L M N O P 0 R S T 1 Precision Building 2 Workshop Cost Per Person 3 Workshop ID Type 4 01-KT Kitchen 5 02-BT Bathroom 03-BD Bedroom 7 04-LD Laundry Room 8 05-LR Living Room/Great Room 9 06-GR Game Room 10 07-CL Closet Intervention 11 08-WL Wall Décor Lighting 12 Cost for each participant $ 25 $ 20 $ 20 $ 10 S 25 $ 15 $ 10 $ 15 Number of participants Total cost 41 $ 1,025 33 $ 660 19 $ 380 15 $ 150 25 $ 625 13 $ 195 28 $ 280 14 $ 210 TOTAL COSTS $ 3,315 Task Instructions 13 Add the Sheet Name header element to the left header section, and the text Page_ followed by the Page Number header element to the right header section. Click cell F1 to deselect the header to view the results. Workshops + Ready Ask me anything 0 o ^ * » 10:20 AM 1/1/2020

Answers

For Header in the Excel, Go to the Insert tab > Header & Footer.

What is Microsoft Excel?

Microsoft developed Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS. It has calculation or computation capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language.

For Sheet Name, select the left header section > Select Sheet Name(From header & footer elements)

For Page Number, select the right header section > Select Page Number(From header & footer elements) > write Page_ before & > Then click cell F1 to deselect the header to view the result.

Learn more about Excel on:

https://brainly.com/question/24749457

#SPJ1

people who use a/an ________________ design logic believe that the given context determines what type of communication is appropriate.

Answers

People who use a/an contextual design logic believe that the given context determines what type of communication is appropriate.

Contextual design logic emphasizes the importance of considering the specific situation, environment, and audience when determining the most effective and appropriate means of communication. It recognizes that different contexts require different communication strategies and channels to convey information effectively.

By adopting a contextual design logic, individuals or organizations take into account factors such as cultural norms, social dynamics, communication goals, and the characteristics of the intended recipients. This approach helps ensure that the communication is tailored to the specific context, taking into consideration factors such as language, tone, medium, and level of formality.

Contextual design logic encourages a more nuanced and adaptable approach to communication, recognizing that what may be suitable in one context may not be effective or appropriate in another. It promotes sensitivity and responsiveness to the context in order to achieve clear, meaningful, and impactful communication.

learn more about "communication ":- https://brainly.com/question/28153246

#SPJ11

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

briefly explain the emerging trends in micro computer technology according to size

Answers

Answer:

Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022

you use the read csv() function to import the data from the .csv file. assume that the name of the data frame is flavors df and the .csv file is in the working directory. what code chunk lets you create the data frame?

Answers

The code chunk that lets you create the data frame is flavors_df <-read_csv("flavors_of_cacao.csv").

Here's the complete question:

you use the read csv() function to import the data from the .csv file. assume that the name of the data frame is flavors df and the .csv file is in the working directory. what code chunk lets you create the data frame?

A flavors_df <- "flavors_of_cacao.csv"(read_csv)

B  flavors_df + read_csv("flavors_of_cacao.csv")

C  flavors_df <-read_csv("flavors_of_cacao.csv")

D read_csv("flavors_of_cacao.csv") +  flavors_df

What is a code chunk?

Code chunk refers to a  runable piece of R programming language code that helps to reduce incidents of mismatch pertaining to the commentary in a paper and the results being discussed.

Learn more on code chunk rom:

https://brainly.com/question/28209816?referrer=searchResults

#SPJ4

Classify the following skills: communication, creativity, and independence.

Hard skills
Interpersonal skills
People skills
Soft skills

Answers

Answer:

Communication, creativity, and independence are people skill

Explanation:

Soft skills depict the quality of a person and classify his/her  personality trait or habit.

Communication - Interpersonal skill

Interpersonal skill allows one to interact and communicate with others effortlessly.

Both soft skill and interpersonal skill comes under the umbrella term i.e people skill.

Hence, communication, creativity, and independence are people skill

Answer:

It's not people skills I got it wrong on my test

Explanation:

consider the er diagram in figure 3.24. assume that a course may or may not use a textbook, but that a text by definition is a book that is used in some course. a course may not use more than five books. instructors teach from two to four courses. supply (min, max) constraints on this diagram. state clearly any additional assumptions you make. if we add the relationship adopts, to indicate the textbook(s) that an instructor uses for a course, should it be a binary relationship between instructor and text, or a ternary relationship among all three entity types? what (min, max) constraints would you put on the relationship? why?

Answers

The (min, max) constraints depicted in Figure B will be present in the final ER Diagram.

What is entity relationship model give an example?

Real-world objects are represented by an ER model. In the real world, an entity is a thing or object that stands out from the surrounding environment. An organization's employees, for instance, are distinct entities.

Taking into account the additional following assumptions: - Only one instructor teaches each course. - Only one course makes use of each textbook. - The use of a textbook by an instructor is not required for all courses. If there is a text: - ___ It is utilized in a specific course, so the instructor who teaches that course adopts it. When a text is used in a course taught by an instructor, it is considered adopted.

The constraints (min., max.) depicted in Figure B will be present in the final ER Diagram.

To learn more about ER visit :

https://brainly.com/question/30873853

#SPJ1

Other Questions
4. Which of the following is true about the relationship between the narrator and Roderick?A. They made a point to meet up at least once a year since their schooling days.B. Although they were great boyhood friends, they had not seen each other in years.C. Their friendship was strained after disputing the ownership of the House of Usher.D. Roderick feels fatherly toward his younger friend. Allison has worked these times this week:8:03 am5:13 pm7:58 am4:49 pm7:46 am4:41 pm8:23 am4:50 pm7:31 am 4:32 pmHow many hours did she work?pls help Write the quadratic equation in standard form that corresponds to the graph shown below. Which shows the Identity Property?A. 2 +7=7 +2B. 4 + 0 = 4C. 6+ (4 + 8) = (6 + 8) + 4 1) Dakota has scored 76,85 , and 70 on the first three exams In his math class. If the standard 70,80,90 scale is used for grades of C ,B, and A, and the exams are equally welghted, what is the minimum he can score on the final exam in order to: (3 points each) a) get a C average on exams? b) get a B average on exams? c) get an A average on exams? Questlon 2 2) The following two data sets glve the ages of the first slx and Iast slx (through Barack Obama) U.S. Presidents' ages when they were Inaugurated. (Source: https://en.wiklpedia.org/wikl/List_of_Presidents_of the United States by ade) Need done will give brainliest Dele mandatos informales afirmativos o negativos a su compaera Anita. OJO! Cuidado con los acentos y la posicin de lospronombres.Be right pls To find the arclength of y=4x2+3 from x=0 to x=5, which is the correct integral? L=051+8xdxL=051+64x2dxL=051+64xdxL=051+8x2dx Now that you have the correct integral, use the substitution u=8x to re-write the integrat in terms of u. Which is the correct result? L=810401+u2duL=810401+8uduL=810401+uduL=810401+4u2du What is the value of the integral? Hint: Use a table or technology. You may enter a decimat approximation for your solution. The volume of a rectangular tank, with a square base, is 5408 cubic metres. Its height is 32 metres. Determine the length of an edge of one of the square bases. A box contains 100 colored chips; some are pink and some are blue. Milton chooses a chip at random, records the color, and places it back in the bag. Milton has recorded 12 pink chips and 18 blue chips. Using these results, what is the predicted number of pink chips in the box? (1 point)304082889. (06.02 HC)A box contains 100 colored chips; some are yellow and some are green. John chooses a chip at random, records the color, and places it back in the bag. John has recorded 57 yellow chips and 19 green chips. Using these results, what is the predicted number of green chips in the box? (1 point)2543768110. (06.05 MC)A paper cup is dropped and its landing position is recorded. The cup can land on the side, on the open end, or on the closed end. The results of 20 trials are shown in the table below:A chart shows tally marks. Main title for the chart is Paper Cup Experiment. The title for the second column is Number of times occurred. The tally mark corresponding to open shows a set of 4 vertical lines cut by a slanting line. The tally mark corresponding to closed shows a set of 4 vertical lines cut by a slanting line and a set of 3 vertical lines. The tally mark corresponding to side shows a set of 4 vertical lines cut by a slanting line and a set of 2 vertical lines.Based on the table, which of the following best compares the experimental probability of the cup landing on its open end with the experimental probability of the cup landing on its closed end? (1 point)The probabilities are equal.The probability of landing on the open end is greater.The probability of landing on the closed end is greater.No conclusion can be made.11. (06.05 HC)Ted tossed a coin several times and recorded the number of heads and tails in the following table:Coin ExperimentSide of Coin Number ofTossesHeads 18Tails 22What is the experimental probability of getting heads? (1 point)0.180.220.350.4512. (06.05 MC)Zen rolled a fair six-sided die 12 times. The table below shows the number of times each number was rolled:Number Cube ExperimentNumber onthe Cube Number ofTimesAppeared1 02 33 14 25 26 4According to the results in the chart, what is the experimental probability of getting a number greater than 3 on the die? (1 point)3 over 126 over 129 over 128 over 12 explain how the colors of the rainbow are formed If you attend a play that features a chorus and masked actors and has violence that occurs only offstage, you are probably watching?FlashbackComedia dell' arteGreek TragedyParody why is it difficult to safely dispose of corrosive substances WHATS THE ANGLE MEASUREMENTS ?? & TELL HOW YOU GOT IT !!PLEASE HELP !! ILL GIVE BRAINLIEST!! 100 POINTS !! NO FAKE ANSWERS. Identify the person and number of the verb below.He waits.PluralSingularFirst personSecond personThird person Alison wants to distribute the carnations and roses equally among the6 flower shops. Factor the expression from Part A using 6 as the commonfactor. How does the factored expression help Alison determine how manycarnations and how many roses each flower shop should get? in the photoelectric effect, the higher the frequency of the illuminating light on the metal surface, the greater the Write the equation of the line graphed below. During a camping trip, Ming gathers firewood and arranges it in the firepit. She sets it on fire, and the result is a roaring blaze. Which statementbest shows all the energy transformations that took place? The game contains two games with simultaneous moves. o One of the two games with simultaneous moves have two Nash equilibria in pure strategies. o The other game with simultaneous moves has only one Nash equilibrium in pure strategies. randomly selected