how many grams of nacl would be needed to prepare 11.16 l of a 8.49 m nacl solution?

Answers

Answer 1

To calculate the number of grams of NaCl needed to prepare 11.16 L of an 8.49 M NaCl solution, we can use the following formula:

mass (in grams) = molarity x volume (in liters) x molar mass

Explanation:

First, we need to calculate the molar mass of NaCl, which is 58.44 g/mol.

Next, we can substitute the given values into the formula:

mass = 8.49 mol/L x 11.16 L x 58.44 g/mol

mass = 5,566.47 g

Therefore, we would need 5,566.47 grams of NaCl to prepare 11.16 L of an 8.49 M NaCl solution.

To get a similar answer on NaCl :

https://brainly.com/question/4487559

#SPJ11


Related Questions

How will you apply the different wiring devices according to its main purposes and functions?

Answers

Answer:Wiring devices are current-carrying electrical or electronic products that serve primarily as a connection or control point for electrical circuits within a range of 0–400 amperes, 0–600 volts (AC and DC), and AC/DC (660 watts, 1,000 volts AC fluorescent) as well as certain non-current-carrying wiring devices and supplies.

Wiring devices include:

Convenience plugs and power outlets (plugs and receptacles)

Connector bodies and flanged outlets

Cover plates

General-use switches and dimmers

Lampholders (incandescent, fluorescent, cold cathode, neon, quartz lamps, and others)

Lighting control devices

Motion sensing and timer switches

Receptacles

Switch, outlet, FM/TV, blank, and telephone plates

Undercarpet premise wiring systems

Products include receptacle-type arc-fault circuit interrupters (AFCIs), protection devices that can detect an unintended electrical arc and disconnect the power before the arc starts a fire. AFCI technology in residential and commercial buildings is an important electrical safety device.

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working

Answers

Answer:

Physical layer

Explanation:

The physical layer is responsible for the physical cable or wireless connection.

Susan is troubleshooting a problem with a computer's network cabling. She is working at physical  layer of the Open Systems Interconnection (OSI) Reference Model.

what is Open Systems Interconnection?

The Open Systems Interconnection Model (OSI Model) is a model of the  product, Interconnection effort at the International Organization for Standardization.

The OSI model is a sub-dividing a communications system which is divided into smaller parts called layers, if Similar communication functions are grouped called as  logical layers.

The OSI system has seven layers which provide services to its upper layer where as receiving services from the below layer.

The layer that provides error-free communications across a network are  needed by applications, while the next lower layer  send and receive packets that make up the contents of that path, The physical layer involved for providing physical cable or wireless connection.

Learn more about Open Systems Interconnection, on:

https://brainly.com/question/11037861

#SPJ2

how to select today's file with a script in linux and upload to ftp

Answers

Answer:

look on yt

Explanation:

or iinternet

Write a program that calculates the amount of money a person would earn over a period of time if his or her salary is on one penny the first day, two pennies the second day and continues to double each day. The program should ask the user for the number of days. Display a table showing what the salary was for each day, then show the total pay at the end of the period. The output should bd displayed in a dollar amount, not the number of pennies. Must use for loop statement. Need to check the input value is correct, otherwise an error message is displayed. Display a nicely formatted table. Display the salary in dollar and cents

Answers

The program that calculates the amount of money a person would earn over a period of time if his or her salary as well as other factors inclusive is written below.

What is the program about?

The raw form of the program is:

#include <iostream>

using namespace std;

int main(){

   const int increment=2;

   int day;

   float penny=.01,

          total=0.0;

   cout <<"How many days have you worked? ";

   cin  >>day;

   while (day<1){

       cout<<"The number must be greater than 1.\n";

       cout<<"Enter again: ";

       cin >> day;

   }

   for (int i=1; i<=day;i++){

       total+=penny;

       cout <<" Day "<< i <<" "<< " $"<<penny<<endl;

       penny*=increment;

   }

    cout<<"Total salary for  "<<day <<" days = $" <<total<<endl;

Learn more about program from

https://brainly.com/question/23275071

#SPJ1

Using "Bird Dogs", when "PROSPECTING" for clients refers to:
You may mark only one answer
1. Free give-a-aways or add ons to your product or service.
2. Direct mail gimmicks.
3. Anyone who can help refer you to new leads.
4. Telemarketers or phone sales qualifiers.
5. Pyramid or multi-level chain letters.

Answers

"Bird Dogs" in the context of prospecting for clients refers to option 3: Anyone who can help refer you to new leads.

In the context of prospecting for clients, "Bird Dogs" are individuals or contacts who can help refer you to new leads or potential clients. They are people who have knowledge of your target market or have connections within the industry and can provide valuable referrals or introductions.

Bird Dogs act as scouts or intermediaries who help identify potential clients and facilitate the process of acquiring new leads. They can be individuals from various backgrounds, such as existing clients, business associates, industry experts, or even friends and family members. By leveraging their network and relationships, Bird Dogs can provide valuable information about potential clients and help expand your customer base.

Unlike options 1, 2, 4, and 5, which refer to different marketing tactics or strategies, the concept of Bird Dogs focuses on the idea of utilizing individuals who can act as referral sources and provide valuable leads for your business. Building relationships with Bird Dogs and encouraging them to refer potential clients can be an effective way to expand your client base and generate new business opportunities.

Learn more about   marketing here: https://brainly.com/question/30699183

#SPJ11

Students have the freedom to design the brochure in a way that helps the general public understand the specific issue. The easiest thing to do is create a new document in Microsoft Word and select a tri-fold brochure. Please remember that a brochure is twosided. The point of the brochures is to highlight an economic issue with solid data and economic reasoning to raise public awareness. Students must clearly favor or oppose the policy in the brochure in a compelling way with strong economic reasoning. A grading rubric has been loaded in Canvas. Policy Issue #1 - President Joe Biden has proposed to increase the federal minimum wage to $15.00 per hour to help underpaid workers. Due Sunday by 11:59pm.

Answers

In this task, students have the freedom to design a brochure to help the general public understand a specific economic issue. The brochure should be two-sided and created using Microsoft Word's tri-fold brochure template. The purpose of the brochure is to raise public awareness about the economic issue by presenting solid data and economic reasoning.

The specific policy issue for this task is President Joe Biden's proposal to increase the federal minimum wage to $15.00 per hour in order to assist underpaid workers. To create a compelling brochure, students must clearly favor or oppose this policy using strong economic reasoning.

Remember to consult the grading rubric provided in Canvas to ensure that you meet all the requirements and criteria for this task.I hope this explanation helps you create a successful and informative brochure. If you have any more questions or need further assistance, feel free to ask!

TO know more about that freedom visit:

https://brainly.com/question/7723076

#SPJ11

The culture of the Internet is interlinked in dependence between technological advances and the way in which ____.


humans increased personal capacity by using these advances

humans have become entirely dependent on digital technology

humans increased their processing knowledge with technology

humans have become interdependent on various technologies

Answers

Answer: humans increased personal capacity by using these advances.

Explanation:

The culture of the Internet is interlinked in dependence between technological advances and the way in which humans increased personal capacity by using these advances.

Technological advancement has to do with how information is being generated which brings about the improvement and inventions regarding technology.

Answer:

C) humans increased personal capacity by using these advances

Which of the following is true concerning derivative classification? Select one: a. Only appointed individuals may perform derivative classification. b. Derivative classifiers are responsible for analyzing and evaluating information to identify elements that require classification. c. Consulting the Original Classification Authority (OCA) is the first step in the derivative classification process. d. Photocopying a Secret document is an example of derivative classification.

Answers

The true statement about concerning derivative classification is ---Derivative classifiers are responsible for analyzing and evaluating information to identify elements that require classification.

Option B is correct.

What is Derived Classification?

“Derivative classification” means incorporating, paraphrasing, rephrasing, or creating in a new form information that has already been classified and marking newly developed material in accordance with the classification markings applied to the source information. increase.

What is the significance of derivative classification?

Readers can infer classified information by performing additional interpretations or analyses. Derivative Classifiers are responsible for forwarding classification guidance and applicable downgrade and declassification instructions.

Who can be a derived classifier?

A person authorized to certify that an unmarked document or material is unclassified or to determine that it has been classified as acceptable according to the authority's designation.

Learn more about derivative classification:

brainly.com/question/14294203

#SPJ4


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

you want to address the issues that are inherent in your claim because select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a inherency provides many options for how to argue a claim. b your audience will be more convinced if you address all the issues they need answered. c every claim has at least two inherent issues. d your audience is hard to convince.

Answers

you want to address the issues that are inherent in your claim because your audience will be more convinced if you address all the issues they need answered(Option B).

What is Inherency?

According to the idea of inherentness, earlier art may, in some cases, be relied upon for both what it teaches as well as what is inherent in it, or what logically follows from those teachings. The subject matter of a patent claim must be both new and obscure. some  prior art reference that explicitly or implicitly discloses every aspect of a claimed invention qualifies as anticipating the claim. The reasoning behind the theory of inherency is that a claim shouldn't pass the anticipation test only because one of its features isn't revealed or acknowledged in the earlier art reference.

to know more about Claims, visit

https://brainly.com/question/29619194

#SPJ4

T/F. In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu.

Answers

False. Disk arrays cannot be created by right-clicking on a disk and selecting the array type from the context menu in the Windows Disk Management utility.

The statement is false. In the Windows Disk Management utility, the option to create disk arrays is not available through the right-click context menu on a disk. The Disk Management utility provides basic disk management functions such as creating partitions, formatting disks, and assigning drive letters. However, it does not have built-in functionality to create disk arrays or manage complex RAID configurations. To create disk arrays, such as RAID arrays, specialized RAID management software or hardware controllers are typically required. These software or hardware solutions offer more advanced features and configuration options for creating and managing disk arrays. It is important to consult the documentation or user guides of the specific RAID management software or hardware being used for detailed instructions on how to create disk arrays.

To learn more about Disk arrays visit:

brainly.com/question/31193953

#SPJ11

A ________ enables your computer to connect to other computers or to the internet.

Answers

Answer:

ADSL modem

Explanation:

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain.

Answers

Digital vs Analog Audio is completely personal preference and there is no clear winner on which is better.

But there are some pros and cons about both, Analog sometimes distorts when playing and can be easily scratched and ruins the grooves. Analog is believed to be the true representation of the sound when it was recorded. Digital is not the actual recording of the sound, it's actually a combination of binary code. It is also sometimes mixed or remastered in Digital and sounds a bit different to make it sound better. It also depends on the system you are listening it from. You could have a horrible Digital system its playing through and an amazing Analog system playing, of course the Analog system will sound better in that case. Some believe that Digital is on par to overtake Analog in the "true picture of sound" category but some also say Analog will forever be the best at playing sound and Digital will always be the alternative.

But, in the end it's all personal preference and the pros and cons don't overweigh to make one better than the other.

Which of these is the best option for a file name to be linked to on the web?
A At the Concert.pdf
B REMIND theConcert.pdf
C At-the-Concert.pdf
D At+the+Concert.pdf

Answers

The best option for a file name to be linked to on the web is C At-the-Concert.pdf

What is the definition of HTML?

A web page's structure and content are organized using HTML (HyperText Markup Language) code. For instance, content could be organized using paragraphs, a list of bullet points, images, and data tables.

Note that the index. HTML is the text and images that visitors see when they first visit your website are typically contained in this file. One can make a new index file in your text editor. Save it as HTML only, in the test-site folder such as At-the-Concert.pdf.

Learn more about file name from

https://brainly.com/question/26960102
#SPJ1

free!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Answers

Answer:

thank you so much

Explanation:

foe the free really apreciatwd

Types of information systems are either operational level, tactical level, or strategical level systems. which would be classified as an operational or tactical level information system?

Answers

An inventory management system that tracks the movement and quantity of goods in a warehouse would be classified as an operational level information system.

Operational level information systems are designed to support the day-to-day operational activities of an organization, such as transaction processing, data entry, and record-keeping. Examples of operational level systems include inventory management systems, payroll systems, and customer relationship management systems.Tactical level information systems, on the other hand, are designed to support middle management in making decisions that affect the short-term performance of the organization. Examples of tactical level systems include sales forecasting systems, production planning systems, and budgeting systems.An inventory management system that tracks the movement and quantity of goods in a warehouse would be classified as an operational level information system, as it supports the day-to-day operations of the organization.

Learn more about inventory management system here.

https://brainly.com/question/26666452

#SPJ11

What is the memory limitation with the 32-bit operating system?.

Answers

Answer:

4 gigs

Explanation:

mary wants to send a message to sam in such a way that only sam can read it. which key should be used to encrypt the message? answer sam's public key mary's public key sam's private key mary's private key

Answers

Sam"s public key is the correct option. A type of encryption known as symmetric encryption uses a single secret key to both encrypt and decrypt digital data.

Symmetric cryptography is one type of encryption (also known as secret key cryptography or private key cryptography). Symmetric cryptography is best suited for bulk encryption because it is much faster than asymmetric cryptography. Symmetric cryptography uses a shared key between both parties (which is kept secret). Asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating, as opposed to symmetric encryption, which uses a single key that must be shared among the individuals who need to receive the message.

Learn more about encryption here-

https://brainly.com/question/17017885

#SPJ4

which benefits can a company gain by deploying a relational database on amazon rds instead of amazon ec2? (select two.)

Answers

When operating relational databases on AWS, the advantages of utilizing Amazon RDS over Amazon EC2 are:

A. Automated backups

D. Software patching

What does the phrase "relational database" mean?

When data is stored in one or so more tables (or "relations") of rows and columns it is simple to see and understand how distinct information structures relate to one another. A relational database is a repository of data that organises data in predefined relationships.

What are the uses of relational databases?

Relational databases are the best choice for sophisticated data processing and analysis. Tables can contain the same data in a non-relational database, but they cannot'relate' to one another. They may do so using a relational database. A relational database can be used to connect tables for client information and transactional data.

To know more about relational databases  visit:

https://brainly.com/question/14274747

#SPJ4

I understand that the question you are looking for is:

Which are benefits of using Amazon RDS over Amazon EC2 when running relational databases on AWS? (Choose two.)

A. Automated backups

B. Schema management

C. Indexing of tables

D. Software patching

E. Extract, transform, and load (ETL) management

The _____ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible

Answers

The conceptual stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.

Data modeling is the process of creating a conceptual representation of data and its relationships to support the design, organization, and management of databases. It involves identifying the key entities, attributes, relationships, and constraints within a domain and representing them using standardized notations.

It helps in understanding the structure and behavior of data within an organization or system. It provides a visual and conceptual framework for designing databases that accurately capture the requirements and constraints of the real-world domain.

Learn more about data modeling, here:

https://brainly.com/question/31576173

#SPJ4

Tuan is a network administrator for a large organization. The company currently has 4 T-1 lines providing Internet access at a manufacturing facility but is seeing issues with the newly deployed Voice over IP (VoIP) system. Which of the following might Tuan want to consider that will not require additional bandwidth?
a. Convert the network from RIPv2 to OSPF b. Open port 53 on the perimeter firewall c. Implement QoS d. Implement PoE

Answers

Convert the network from RIPv2 to OSPF

What is network?Servers and workstations are the two primary categories of computers that are networked. In most cases, servers are not directly used by people; instead, they run continually to offer "services" to the other computers on the network and their human users. Printing and faxing, hosting of software, file sharing and storage, messaging, data storage and retrieval, complete access control (security) for network resources, and many other services can be given.Workstations are so named because normally a human user uses them to communicate with the network. Traditionally, workstations were either desktop computers with a keyboard, display, and mouse or laptop computers with a keyboard, display, and touchpad built in.

To learn more about network, refer to

https://brainly.com/question/1326000

#SPJ4

Answer: The answer is a. to convert the network from RIPv2 to OSPF

A(n) _______________ is a series of commands sent to a CPU in a specific order for the CPU to perform work

Answers

An instruction set is a series of commands sent to a CPU in a specific order for it to perform tasks.

An instruction set, also known as a machine language, is a set of commands that dictate the specific operations a CPU (Central Processing Unit) should perform. These commands are designed to be understood and executed by the CPU. They are typically represented as binary code, consisting of a sequence of 0s and 1s that the CPU can interpret. Each command in the instruction set corresponds to a specific operation, such as arithmetic calculations, data movement, logical operations, and control flow instructions. The instructions are executed sequentially, following the order specified by the program. This sequential execution allows the CPU to perform complex tasks by breaking them down into simpler steps. The instruction set architecture (ISA) defines the set of commands supported by a particular CPU architecture, providing a standardized interface between software and hardware. By organizing commands in a specific order, an instruction set enables the CPU to carry out various tasks, from basic arithmetic operations to complex computations and program execution.

Learn more about CPU here:

https://brainly.com/question/21477287

#SPJ11

A "pick 2" lottery game involves drawing 2 numbered balls from separate bins each containing balls labeled
from 0 to 9. so there are 100 possible selections in total: 00, 01, 02, ..., 98, 99.
players can choose to play a "straight" bet, where the player wins if they choose both digits in the correct
order. since there are 100 possible selections, the probability a player wins a straight bet is 1/100. the
lottery pays $50 on a successful $1 straight bet, so a player's net gain if they win this bet is $49.
let x represent a player's net gain on a $1 straight bet.
calculate the expected net gain e(x).
hint: the expected net gain can be negative.
e(x) =
dollars
report a problem

Answers

The expected net gain for a player in the "pick 2" lottery game with a $1 straight bet is -$0.50, indicating an average loss of $0.50 for every $1 bet made.

What is the expected net gain for a player in the "pick 2" lottery game with a $1 straight bet?

The expected net gain, E(x), can be calculated by multiplying each possible outcome by its corresponding probability and summing them up.

In this case, the player's net gain on a successful $1 straight bet is $49. Since there are 100 possible selections and the probability of winning is 1/100, the probability of losing is 99/100.

Therefore, the expected net gain can be calculated as follows:

E(x) = ($49 * 1/100) + (-$1 * 99/100)

     = $0.49 - $0.99

     = -$0.50

Hence, the expected net gain, E(x), is -$0.50. This means that, on average, a player can expect to lose $0.50 for every $1 straight bet they make in the long run.

Learn more about lottery game

brainly.com/question/15739211

#SPJ11

any part of a computer which you are able to touch is called​

Answers

You can touch the key board and screen at any time
The Physical Part of the Computer That You Can See and Touch Are Called Hardware

the actual use and implementation of computer started after third generation justify this statement in your own words.​

Answers

Answer:

BLACK LIVES DONT MATTER

Explanation:

>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

&gt;What is the output of the following code:list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]print (list1[1]

Identify the reaction type for each generic chemical equation. a b → ab: ab → a b: hydrocarbon o2 → co2 h2o: ab cd → ad cb:

Answers

The type for each generic chemical equation is:

A + B → AB is synthesis.AB → A + B is decomposition.Hydrocarbon + O₂ → CO₂ + H₂O is combustion.AB + CD → AD + CB is double displacement.

A chemical equation refers to the symbolic that perform of a chemical reaction in the form of symbols and chemical formulas. A chemical equation can also be meant by equations that is use to show chemical formula and symbols to show chemical reactions. The reactants in the chemical equation is located in the left hand side. The products in the chemical equations is located in the right-hand side. The example of chemical equation is 2H₂ + O₂ → 2H₂O.

The missing part in the question is shown below:

Identify the reaction type for each generic chemical equation.

1. A + B → AB:

2. AB → A + B:

3. Hydrocarbon + O₂ → CO₂ + H₂O:

4. AB + CD → AD + CB:

Learn more about chemical reaction here https://brainly.com/question/29039149

#SPJ4

a ux designer wants to quickly mock up salesforce user interface experiences using a collection of prebuilt components. the designers needed salesforce lighting design systems(slds) resources for their designs and prototypes such as base components tokens and designs patterns which tool or installation should best support their needs?

Answers

The best tool for a UX designer looking to quickly mock up Salesforce user interface experiences using prebuilt components from Salesforce Lightning Design System (SLDS) resources would be the Salesforce Lightning Design System (SLDS) website itself. The SLDS website provides a comprehensive collection of base components, tokens, and design patterns specifically designed for Salesforce user interfaces.

The Salesforce Lightning Design System (SLDS) website serves as a centralized hub for all SLDS resources. Designers can access a wide range of prebuilt components, including buttons, forms, navigation elements, and more. These components come with predefined styles, layouts, and behaviours that adhere to Salesforce's design standards, ensuring a consistent and professional user experience. The SLDS website also provides access to design tokens, which are variables representing visual attributes such as colours, spacing, and typography. By utilizing these tokens, designers can easily maintain design consistency and make global style changes throughout their prototypes.

To learn more about UX, click here:

brainly.com/question/31562446

#SPJ11

A PIN is easier for the account owner to use and remember because it is shorter than a password. However, a PIN can only be used once. However, it is also easier for hackers to steal. However, a password can safely be stored. However, it is more difficult for hackers to steal.

Answers

Answer:

Pin

Explanation:

Pin number works for me.

HELP

AUDIO AND VIDEO

Which camera setting does this statement describe? The __________ of the camera determines the brightness or darkness of an image​

Answers

Answer:

Aperture

Explanation:

The Aperture of the camera determines the brightness or darkness of an image

Other Questions
Write an equation in slope-intercept form for the line thatpasses through (-4, 2) and is parallel to y = x + 3 The first significant digit in any number must be 1, 2, 3, 4,5, 6, 7, 8, or 9. It was discovered that first digits do not occur with equal frequency. Probabilities of occurrence to the first digit in a number are shown in the accompanying table. The probability distribution is now known as Benford's Law. Forexample, the following distribution represents the first digits in 187 allegedly fraudulent checks written to a bogus company by an employee attempting to embezzle funds from his employer. a.) Using the level of significance alpha 0.10, test whether the first digits in the allegedly fraudulent checks obeyBenford's Law. What is the null hypothesis? b.) What is the alternative hypothesis? c.) What is the test statistic? d.) What is the p-value? e.) Using the P-value approach, compare the P-value with the given alpha = 0.10, level of significance. Based on theresults, do the first digits obey the Benford's Law? f.) (b) Based on the results of part (a),could one think that the employee is guilty of embezzlement? Digit Probability Frequency 1 0.301 36 2 0.176 25 3 0.125 28 4 0.097 26 5 0.079 23 6 0.067 17 7 0.058 9 8 0.051 16 9 0.046 7 Luna Brennan's is depositing $320 in currency,$1.55 In coins, a check for $213.40, and a check for$400.25 What is the total deposit? Workman Dentistry has issued straight bonds at an interest rate of 7%, preferred stock at a dividend rate of 9%, and common stock at a price that suggested a 12% rate of return. If Workman decided to issue convertible bonds, you would expect the interest rate to be ________ percent. Emily sold 56 of the 145 bracelets. What percent of the bracelets did she sell? Show your strategy. Both the Jumanos and Apache were well known for hunting _____.A. wild hogsB. buffaloC. deerD. elk2. Both the karankawa and apache relied heavily on which resources?A. rival groupsB. fish and shellfishC. settlersD. trees and nuts Why must advertiser pay attention to the latest technology being used by the customers? Q6) (8 marks) Draw the Instantaneous centre (IC) of the following figures The End ( 2 The standard deviation of win percentage for the 32 teams in the NBA in 20052006 was 0.134. The NBA plays an 82 game season. The standard deviation of win percentage for the 20 teams in the English Premier League in 20052006 was 0.158. The EPL plays a 38 game season. The idealized win percentages for the NBA and EPL are0.055 (NBA) and 0.081 (EPL)1.672 (NBA) and 1.580 (EPL)2.427 (NBA) and 1.948 (EPL)0.078 (NBA) and 0.115 (EPL) Can someone plzzz helppp meeeee. Help again lololololol Which statement is true for early civilizations in Egypt, India, and China?O A. They believed in only one god.O B. They had a strict caste system.C. They started near large rivers.O D. They established a dynastic cycle. Elaborate rules regarding food and drink for followers of hinduism are meant to lead to? **Suppose the unit step response of a feedback control system is given as \( y(t)=\left(0.8-e^{-t}(0.8 \cos (t)-3 \sin (t))\right) u(t) \). Answer the following five questions(Q1-Q6). Q1. The first ov What is the slope of a line Y 3x 5? Solve for b, c and d take a minute to check your understanding of the american people's perception of a standing army. what were the anti-federalists' views on a standing army? A water ample i found to contain the pollutant chlorobenzene with a concentration of 15 ppb (by ma). What i the volume of thi water contain 5. 00 x 10^2 of cholorbenze? (Aume a denity of 1. 00 g/mL. ) What changes were wanted during the Mexican revolution Staying warm in the old days) During the early 20th century, many houses were heated with a central pot-belly stove. Bedrooms far from the stove were cold so people would heat a large rock and take the rock wrapped in a towel back to bed with them to stay warm. Assume that the rock is a perfect sphere with p = 2630 kg/m, k = 2.79 W/m-K, and c =775 J/kg-K. The towel and convection provide a combined U = 6.667 W/m-K between the surface of the rock and the surrounding air at 5C. If the rock is heated to a uniform temperature of 55C.Determine the diameter of the rock that would be needed to provide a minimum heat transfer rate of 10 W for a 6-hour period.