(In QuickBooks Online)

To record the payment of a vendor bill which 3 cases would you use the "Add funds to this deposit" grid in a bank deposit?

I(Select all that apply)


When an employee reimburses the company


When you receive a tax refund from the IRS


When you need to record an ACH payment of a customer invoice


When a company doesn't need to record sales details

Answers

Answer 1

When recording the payment of a vendor bill in QuickBooks Online, the "Add funds to this deposit" grid in a bank deposit is used in three cases. They are as follows:When an employee reimburses the companyWhen you receive a tax refund from the IRSWhen you need to record an ACH payment of a customer invoice.

The “Add funds to this deposit” is an optional field available in the “Record Deposits” feature in QuickBooks Online. It allows you to add other transactions to a deposit in order to match your bank statement.A deposit represents the amount of money your business has received and intends to deposit into your bank account. It could be from sales receipts, customer payments, or other transactions.

A deposit record is created to match this deposit to the actual amount received in your bank account. When you use the "Add funds to this deposit" grid in a bank deposit, you will be able to group related transactions together. This way, they will show up together on your bank statement, making it easier to reconcile.

To know more about payment visit:

https://brainly.com/question/32320091

#SPJ11


Related Questions

Uploading Your Work
Assignment Upload: Using PowerPoint
Active
Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your
file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network
folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
Documents
Uploading Your Work Directions
Clip Art and Media Clips Student Guide
Animations and Photo Albums Student Guide
Customizing SmartArt Graphics and Tables Student Guide

Don’t know how to do this and could really use some help please!!!!!!!

Answers

Answer:

Easy all you have to do is upload one assignment at a time and follow all the other directions!

Explanation:

_Hope_this_helps! >O<

Consider the following class definitions.
public class A
{
private int al;
public void methodA()
{
methodB(); // Statement I
}
}
public class B extends A
{
public void methodB()
{
methodaA(); // Statement II
al = 0; // Statement III
}
}
Which of the labeled statements in the methods shown above will cause a compile-time error?
I only
I only
A
III only
III only
B
I and II
I and II
C
I and III
I and III
D
II and III
II and III
E

Answers

The statement which will cause a compile-time error in the given class definitions is "II only". Hence, option A is correct.Explanation:The given classes are used to test the hierarchical inheritance concept in Java programming language.

The class B is a subclass of class A and it inherits the methods of class A including methodA().The methodA() in class A calls the methodB() of the same class A. Whereas, the methodB() of class B calls the methodA() of class A.The methodB() of class B also contains two other statements labeled as statement II and statement III. In statement II, it tries to call the methodA() again, which may cause infinite recursion.

Whereas, in statement III, it initializes the value of a private integer field "al" to 0.However, the given statement II in the methodB() of class B, "methodaA()" is not spelled correctly, it should be "methodA()". Hence, the statement II will cause a compile-time error. Thus, option A is correct.

To know more about hierarchical visit:

https://brainly.com/question/29620982

#SPJ11

what html tag that you were required to use for images on abp3 provides accessable descriptions of the images to jaws?

Answers

The ALT tag is known to be one of the HTML attribute used in HTML and XHTML documents. The html tag that you were required to use for images on abp3 provides accessable descriptions of the images to jaws is called an ALT tag

ALT tag is often used to bring out or soecify an alternative text that is to be used when the element to which it is applied cannot be used.

It is also known as ALT attribute and ALT description.

As an HTML attribute, it is often applied to image tags to provide a text alternative for search engines.

Learn more from

https://brainly.com/question/9068937

Keith has been using a software application for a year on his home computer. A new version of the application was recently released. Keith’s license has a term of two years and entitles Keith to upgrade his application to a new version within the term. What type of license does the application have? A.  perpetual license B.  site license C.  Creative Commons Attribution (CC BY) license D.  license with maintenance​

Answers

Answer:

D license with maintenance.

Explanation:

I just took the test :))

Answer:

D :)

Explanation:

In its more intrusive form, adware can track browsing habits in order to serve better targeted ads based on user interests.- True- False

Answers

The statement "In its more intrusive form, adware can track browsing habits in order to serve better targeted ads based on user interests." is true, because adware can track user browsing habits to collect data on their interests and preferences, which can be used to display more relevant and targeted ads.

Adware (or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device. Adware has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.

Intrusive adware can collect data on users' browsing habits, which allows it to display ads that are more relevant to their interests. This is often done through the use of cookies or other tracking technologies.

To learn more about adware visit : https://brainly.com/question/17283834

#SPJ11

Comprehensive Problem
1. Start up Integrated Accounting 8e.
2. Go to File and click New.
3. Enter your name in the User Name text box and click OK.
4. Save the file to your disk and folder with the file name (your name Business
Solutions.
5. Go to setup and fill out the Company Info.
6. Go to Accounts and create Chart of Accounts. For Capital and Drawing
Account, enter your name.
7. Go to Journal and post the following transactions:
After graduating from college, Ina Labandera opened Labandera Ko in San
Mateo with initial capital composed of following:
Cash P 100,000
Laundry equipment 75,000
Office furniture 15,000
Transactions during the month of May are as follows:
2 Paid business tax to the municipal treasurer, P 4,000.
3 Paid print advertisement in a local newspaper amounting to P2,000.
3 Paid three month rent amounting to P18,000.
4 Paid temporary helper to clean the premises amounting to P1,500.
4 Purchased laundry supplies for cash amounting to P5,000.
5 Cash collection for the day for the laundry services rendered P8,000.
5 XOXO Inn delivered bedsheets and curtains for laundry.
6 Paid P1,500 for repair of rented premises.
8 Received P2,000 from customer for laundry services.
10 Another client, Rainbow Inn, delivered bed sheets and pillow cases for
laundry.
11 Purchased laundry supplies amounting to P6,000 on account.
12 Received P 4,000 from customers for laundry services rendered.
13 Rendered services on account amounting to P6,500.
14 Paid salary of two helpers amounting to P10,000.
15 Ina withdrew P10,000 for personal use.
17 Received telephone bill amounting to P2,500.
19 Billed XOXO P 9,000 for services rendered.
20 Received payment from Rainbow Inn for services rendered amounting to
P 12,000.
21 Paid miscellaneous services for electrical repair P600.
22 Cash collection for the day for services rendered amounting to P7,000.
24 Received and paid electric bill amounting to P3,500.
25 Paid suppliers for laundry supplies purchased on July 11.
26 Cash collection from customer for services rendered last July 13.
27 Received water bill amounting to P2,500.00
27 Cash collection for the day amounts to P7,500 for services rendered.
27 Gasoline cost for the week P1,500.
28 Paid car maintenance amounting to P2,500.
28 Received payment from XOXO.
28 Paid P1,800 for printing of company flyers.
29 Paid salary of employees including overtime P 15,000.
29 Withdrew P 10,000 for personal use.
29 Purchased laundry supplies on account amounting to P3,500.
29 Purchased additional laundry equipment on account amounting to P 36,000.
29 Paid telephone bill and water bill.
29 Cash collection for the day amounts to P8,500 for services rendered.
29 Charged customers for dry cleaning services amounting to P 12,000 to
be received next month.
31 Paid additional expenses for office maintenance amounting to P2,500.
31 Paid travelling expenses for trip to Boracay on a weekend vacation
amounting to P18,000.
31 Paid P1,000 to business association for annual membership dues.
8. Display, print screen, save and submit the Chart of Accounts.
9. Display, print screen, save and submit the General Journal Report.
10.Display,print screen, save and submit the Trial Balance
11.Record expired insurance and rent for the month and Office supplies on hand
amounts to P2,500.
12. Display, print screen, save and submit the;
a. General Journal after adjustments,
b. Trial Balance,
c. Income Statement, and
d. Balance Sheet

Answers

Comprehensive problem is a term used in accounting for more complex problems that require advanced knowledge of accounting principles and procedures.

Comprehensive problem is an exercise given in accounting to evaluate the student's comprehension and mastery of various accounting principles and procedures. The instructions for a comprehensive problem are usually more complex and detailed than those for simpler exercises, and they usually cover a longer period of time.

Students are required to use their knowledge of various accounting concepts and procedures to analyze a scenario or series of events, identify relevant information, prepare journal entries, record transactions, create financial statements, and make adjustments and corrections as necessary.

To know more about account visit:

https://brainly.com/question/33631694

#SPJ11

write a program that squares an integer and prints the result.

Answers

Computer programming is the process of creating instructions and coding to enable certain tasks in a computer, application, or software program.

Is programming for computers difficult?

Although it might seem challenging at first, learning to code is not tough. It could be challenging to learn something new at first. Coding gets easier with experience, perseverance, and patience. If you're considering learning to code, it's easy to become overwhelmed by the difficulty.

import java.util.Scanner;

class Main

{

public static void main(String[] args)  

{

  System.out.println(" Enter the the two numbers:");

   Scanner input = new Scanner(System.in);

    int a = input.nextInt();

    int b = input.nextInt();

    int c = sumsquareFunction(a, b);

    }

sumsquareFunction(int n1, int n2) is a public static int.

    int c= n1*n1 + n2*n2;

    return c;  

 }

}

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ4

an employee sets up apache http server. he types in the browser to check that the content is there. what is the next step in the setup process?

Answers

The next step in the setup process would typically involve configuring the server to serve the content correctly and securely.

Here are some key steps that may follow:

1. Virtual Host Configuration: If the Apache server is hosting multiple websites or applications, the employee would configure virtual hosts to ensure proper routing of requests to the correct content directories.

2. SSL/TLS Configuration: If the employee intends to enable secure connections using HTTPS, they would need to set up SSL/TLS certificates for the server. This involves generating or obtaining SSL certificates and configuring the server to use them for encrypted communication.

3. Fine-tuning Server Settings: The employee might adjust various server settings based on specific requirements, such as performance optimization, caching, access controls, logging, or error handling.

4. Testing and Monitoring: Once the initial configuration is complete, the employee would conduct thorough testing to ensure all desired functionalities, including dynamic content, server-side scripting, and any additional modules or extensions, are working correctly. They would also set up monitoring tools to track server performance and address any issues that may arise.

Learn more about SSL certificates :

https://brainly.com/question/32251706

#SPJ11

Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Answers

Coding:

def main():

 name = input("Enter your name: ")

 age = input("Enter your age: ")

 color = input("Enter you favorite color: ")

 birth = input("Enter your birthday: ")

 print(name + " is "+age+" year(s) old.")

 print(name + "'s favorite color is "+color)

 print(name + " was born on "+ birth)

main()

Explanation:

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Part 1: Plan and Write the PseudocodeUse the following guidelines to write your pseudocode for a fill-in

A program unit is said to contain ____ when it includes references to database objects that in turn references other database objects.

Answers

When a program unit include references to database objects that serves as references other database objects, the program unit is considered to contain: indirect dependencies.

A program unit can be defined as a computer subprogram with executable algorithms and packages that references a larger (main) computer program.

This ultimately implies that, a program unit is a constituent part or subunit of a larger (main) computer program.

In database management system (DBMS), there exist some form of relationship between a database object with respect to other database objects such as:

Direct dependencies.Remote dependencies.User dependencies.Indirect dependencies.

For indirect dependencies, the program unit references database objects that in turn serves as references other database objects.

Read more: https://brainly.com/question/19089364

how was kapilvastu named​

Answers

Answer:  Kapilvastu was named after Vedic sage Kapilamuni

Which of the following is based on the visibility and location of an object’s features?


arch

lines

prisms

curves

Answers

Answer:

The answer is Lines.

Explanation:

A visible line, or object line is a thick continuous line, used to outline the visible edges or contours of an object. A hidden line, also known as a hidden object line is a medium weight line, made of short dashes about 1/8” long with 1/16”gaps, to show edges, surfaces and corners which cannot be seen.

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a "____".
a. black box c. gray box
b. white box d. tiger box

Answers

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a d) tiger box.

A tiger box is a comprehensive toolkit that contains various hardware and software tools designed to assist security professionals in identifying, assessing, and exploiting security vulnerabilities in a target system or network. These tools can include scanners, password crackers, exploit frameworks, and other utilities.

Tiger teams, which are groups of ethical hackers or penetration testers, often use these tiger boxes to simulate real-world attacks and assess the security of a system. The goal is to identify vulnerabilities and weaknesses in the system's security measures before malicious hackers can exploit them.

By using a tiger box, security professionals can conduct white box (knowledge of internal system workings), black box (no prior knowledge of the system), and gray box (limited knowledge of the system) testing, depending on the information available and the desired level of thoroughness in the assessment.

Therefore, the correct answer is d. tiger box.

Learn more about security here: https://brainly.com/question/27960062

#SPJ11

Switch on your light make sure it is shining onto the wall hold your largest plastic shopping bag square between the light and the wall

Answers

Explanation:

As light travels through matter, different amounts of that light penetrate through the matter. Transparent objects allow nearly all the light shined on it to pass through the object. Glass, air, and clear plastic are transparent objects.

Please please help ASAP it’s timed

Please please help ASAP its timed

Answers

Answer:By pressing the Control key and the “C” key

Explanation:

Hopefully it could help you

Please answer in Java:
a) Identify duplicate numbers and count of their occurrences in a given array. e.g. [1,2,3,2,4,5,1,2] will yield 1:2, 2:3
b) Identify an element in an array that is present more than half of the size of the array. e.g. [1,3,3,5,3,6,3,7,3] will yield 3 as that number occurred 5 times which is more than half of the size of this sample array
c) Write a program that identifies if a given string is actually a number. Acceptable numbers are positive integers (e.g. +20), negative integers (e.g. -20) and floats. (e.g. 1.04)

Answers

Here, we provided Java code snippets to solve three different problems such as duplicate numbers and their occurence etc.

a) Here is a Java code snippet to identify duplicate numbers and count their occurrences in a given array:

java

import java.util.HashMap;

import java.util.Map;

public class DuplicateNumbers {

   public static void main(String[] args) {

       int[] array = {1, 2, 3, 2, 4, 5, 1, 2};

       // Create a map to store number-count pairs

       Map<Integer, Integer> numberCountMap = new HashMap<>();

       // Iterate over the array

       for (int number : array) {

           // Check if the number already exists in the map

           if (numberCountMap.containsKey(number)) {

               // If it exists, increment the count by 1

               int count = numberCountMap.get(number);

               numberCountMap.put(number, count + 1);

           } else {

               // If it doesn't exist, add the number to the map with count 1

               numberCountMap.put(number, 1);

           }

       }

       // Print the duplicate numbers and their occurrences

       for (Map.Entry<Integer, Integer> entry : numberCountMap.entrySet()) {

           if (entry.getValue() > 1) {

               System.out.println(entry.getKey() + ":" + entry.getValue());

           }

       }

   }

}

b) Here is a Java code snippet to identify an element in an array that is present more than half of the size of the array:

java

public class MajorityElement {

   public static void main(String[] args) {

       int[] array = {1, 3, 3, 5, 3, 6, 3, 7, 3};

       int majorityElement = findMajorityElement(array);

       System.out.println("Majority Element: " + majorityElement);

   }

   private static int findMajorityElement(int[] array) {

       int majorityCount = array.length / 2;

       // Create a map to store number-count pairs

       Map<Integer, Integer> numberCountMap = new HashMap<>();

       // Iterate over the array

       for (int number : array) {

           // Check if the number already exists in the map

           if (numberCountMap.containsKey(number)) {

               // If it exists, increment the count by 1

               int count = numberCountMap.get(number);

               count++;

               numberCountMap.put(number, count);

               // Check if the count is greater than the majority count

               if (count > majorityCount) {

                   return number;

               }

           } else {

               // If it doesn't exist, add the number to the map with count 1

               numberCountMap.put(number, 1);

           }

       }

       return -1; // No majority element found

   }

}

c) Here is a Java program to identify if a given string is actually a number:

java

public class NumberChecker {

   public static void main(String[] args) {

       String input = "-20.5";

       if (isNumber(input)) {

           System.out.println("The input string is a valid number.");

       } else {

           System.out.println("The input string is not a valid number.");

       }

   }

   private static boolean isNumber(String input) {

       try {

           // Try parsing the input as a float

           Float.parseFloat(input);

           return true;

       } catch (NumberFormatException e) {

           return false;

       }

   }

}

The first code snippet identifies duplicate numbers and counts their occurrences in a given array. The second code snippet finds an element in an array that is present more than half of the size of the array.

To know more about Java Code, visit

https://brainly.com/question/5326314

#SPJ11

File Explorer opens by default in a view called______ in Windows 11.

Answers

File Explorer launches by default to Quick access, which Windows 11 Version 22H2 replaced to File Explorer Home.

Windows 10 or 11: Which is superior?

Windows 11 makes it simpler than Windows 10 to setup and switch between various virtual desktops. Similar to Mac, Windows 11 allows you to set up virtual desktops. You can switch between numerous PCs for business, school, and personal use at simultaneously.

Does Windows 11 still merit purchase?

For most users, Windows 11 is worthwhile. Although it initially appears to be Windows 10-like, there are a lot of new features. You may download Android apps with Windows 11, which also offers voice and face recognition technology and improved security protections to safeguard your computer.

To know more about Windows 11 visit:

https://brainly.com/question/30278424

#SPJ1

Use Spreadsheet Functions and Formulas Upload Assignment Please send link

Answers

Then choose File > Share > People (or select Share in the top right). Enter the email addresses of the people you wish to share within the Enter a name or email address box. As you start entering, the search bar may already contain the email address if you've used it before.

What is the file?

In a computer system, a file is a container for information storage. Computer files have many characteristics with paper documents kept in the office and library files.

The system can identify three different file types: ordinary, directory, and special. The operating system, however, employs numerous modifications of these fundamental categories. All file types that the system recognizes fit into one of these groups. The operating system, however, employs numerous modifications of these fundamental categories.

Therefore, Then choose File > Share > People (or select Share in the top right). Enter the email addresses

Learn more about the file here:

https://brainly.com/question/22729959

#SPJ1

Which filter gives a “squeezed” effect to an image?

Answers

Explanation:

When using the pinch filter, you simply select a percentage from -100 to 100 to pinch or squeeze your image. The Pinch filter squeezes a selection or layer inward or outward.

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

The SQL​ ________ statement allows you to combine two different tables.
A. SELECT
B. GROUP BY
C. JOIN
D. COMBINE
E. ORDER BY

Answers

The JOIN statement in SQL allows you to combine two different tables based on a common column or key. The correct option is C. JOIN.

This is a powerful feature in SQL that allows you to work with data from multiple tables as if it were in a single table. It is particularly useful for analyzing large datasets and performing complex queries that require data from multiple sources. The other answer options, such as SELECT, GROUP BY, and ORDER BY, are also important SQL statements, but they do not specifically allow for the combination of tables. The correct option is C. JOIN.

Learn more about SQL visit:

https://brainly.com/question/31663284

#SPJ11

assume we are in the process of entering data into an excel worksheet, and instead of typing the number 726, we type the number 762. this is what type of error?

Answers

A transposition error occurs when entering data into such an Excel worksheet by typing the number 762 instead of the number 726.

What exactly is an Excel worksheet?

A worksheet, often known as a spreadsheet, can be utilized to enter data and do calculations in the cells. The cells have been set up in columns and rows. A workbooks is always kept in a workbook. A workbook typically has a lot of worksheets.

Where is the Excel worksheet?

When you see a double arrow, move the mouse pointer to the scrollbar's edge (see the figure). Once you see the full tab name and all other tabs, click and drag the arrows to the right. The worksheet is not visible. To reveal a worksheet, use a right-click on any open tab and select Unhide.

To know more about worksheet visit:

https://brainly.com/question/13129393

#SPJ4

plsss helppp me with thisss plsss

plsss helppp me with thisss plsss

Answers

Answer:

Here is an example of what you're asking in Python.

import random

def buildList(x):

   # Create an empty list to store the random integers

   random_list = []

   # Use a for loop to generate x random integers

   for i in range(x):

       # Append a random integer between 100 and 199 to the list

       random_list.append(random.randint(100, 199))

   return random_list

# Get the number of random integers from the user

x = int(input("Enter the number of random integers to generate: "))

# Call the buildList function to generate the random integers

random_integers = buildList(x)

# Print the list of random integers

print(random_integers)

Explanation:

This script uses the 'random.randint()' function from the built-in 'random' module to generate a random integer between 100 and 199, and then it saves the generated random integers in a list. The script also prompts the user for the number of random integers to generate and calls the buildList function with the user input. Finally, it prints the list of random integers.

Encapsulation is a fundamental concept of Object-Oriented design. What type of function is used to obtain the value of a class variable, but not modify it?
a. accessor
b. retriever
c. mutator
d. constructor

Answers

Answer: a

Explanation:

Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?

Answers

Answer:

"Redirector " is the correct response.

Explanation:

Technology that routing desktop computers (clients) demand information to the computer within a LAN. The redirector software is introduced to the Computer in something like a Windows network that intercepts or captures requests for documents as well as printers, however if necessary, direct those to just the correct connected system.

MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check this.

Answers

Answer:

This is not a normal situation. Go to Apple Support!!!

1,000 battery cycles

Most current Macs (MacBooks, MacBook Airs, and MacBook Pros) use batteries assessed as having 1,000 battery cycles. That's pretty much good enough for at least three years of regular use.

Your battery might drain fast when you're working on your Mac because, for one reason or another, you're running one-too-many apps at the same time. ... To do this, simply click on the battery icon on the top right corner of your screen, or run the activity monitor app.

Use this website for more ways to fix your computer:

https://pdf.wondershare.com/macos-10-14/fix-battery-issue-on-macos-10-14.html

I say it depends if you got the computer at the beginning of the year. If you got it later in 2019, go to the apple store and ask.

what is robotic technology

Answers

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:

Which organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal?

Answers

The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law enforcement.

What is Law enforcement?

Law enforcement is said to be activity of a given members of government and they are said to often act in an organized manner to enforce law by knowing , deterring people who violate the rules and regulations that are governing that society.

hence, The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law enforcement.

Learn more about law enforcement from

https://brainly.com/question/21082629

#SPJ1

Other Questions
I am sure she isn't African Consider a piece of wire with uniform density. It is the quarter of a circle in the first quadrant. The circle is centered at the origin and has radius 3. Find the center of gravity Which of the following survey methods will allow the library to make a valid conclusion about which book the young adults who use their library would prefer? Pablo's engineering team has developed a new material that is strong enough to withstand major impacts, including bullets, without breaking or deforming. He plans to design a new type of motorcycle helmet using the material as its outside covering. A prototype of the helmet is shown below. Pablo knows that other types of motorcycle helmets have outside coverings that bend and deform slightly on impact. So if Pablo's new helmet is going to be as effective at protecting people's heads as existing helmets, he'll need toA. slightly reduce the total mass of the new helmet by reducing the amount of internal cushioning. B. maximize the total mass of the helmet by adding flexible steel to the outside covering. C. increase the amount of cushioning on the inside of the new helmet to help it absorb impacts. D. use a thicker outside covering than other helmets to help prevent deformation even further. PLEASE ANSWER 15 POINTS!!!!If anything gets in the way of our good eating, its lifestyle. When you get home from work late, why spend an hour in front of the stove when you can spend two minutes at the microwave? And doesnt that oatmeal box claim to be a good source of calcium for our kids, never mind the small print listing 14 grams of sugar? A small soda at the movies could satisfy a family of four. Even schools have vending machines.What would make the author's argument more effective?offering a reason to support her opinionproviding a quotation from a credible sourcerecognizing and refuting a counterclaimmotivating readers with a call to action How does a waxing crescent moon affect us? 100 g of oxygen gas is distilled into an evacuated 600 cm^3 container. a) What is the gas pressure at a temperature of 150C? b) Estimate the root-square-velocity of the gas at 150C? 82, 62, 95, 81, 89, 51, 72, 56, 97, 98, 79, 85The median is .The median of the lower half of the data is .The median of the upper half of the data is .Question 2 Why was the 18th century called the Age of Reason? (7 x 1) + (4 x 1/10) + (6 x 1/1,000) in standard form anybody help please Mhm is 2, 344 a natural number ,integer, irrational number, or a real numberPLEASE HELP ME Fill in with the correct for of the appropriate possessive adjective.1. My perros2. Our armario3. Your (tu) carpetas4. Their mesa5. His ventanas6. Our clases7. Our computadora8. Your calculadora9. My cartel10. My zapatillas de tenis : Which of these is not an affordance of a brick Supporting objects Grabbing Scratching your back Rolling Question 2 (1 point) The concept of Affordances refers to: The price you may pay for the object's use The things the object suggest you may do with it The ability to pay for an object Things you can do with an object Question 3 (1 point) A door with a handle to pull and a plate to push is a good example of: Affordances in practice neither affordances nor conventions in practice. Conventions in practice Afordances and conventions in practice Which of these is not an affordance of a bar of soap Grabbing Sliding Support for heavier objects Rolling uestion 5 ( 1 point) In HTML, an underlined word has the perceived affordance of: Being dragged to the side of the website A word that is misspelled Emphasizing an important point of the text Indicating a hyperlink that can be clicked to arrive to another page. 2uestion 6 (1 point) The mother of all demos refers to: A 1968 demo of hyperlinked text and video conferencing by Douglas Engelbart. A 1968 demo of a design software by Douglas Engelbart A 1968 demo of Sketchpad, by Ivan Sutherland A 1968 demo of hyperlinks and video conferencing at Stanford, by Ivan Sutherland Which of these disciplines DOES NOT play a role in human computer interaction generally. Computer Science Interaction design Earth Sciences Cognitive Psychology Question 8 (1 point) When performing task analysis one must look for aspects such as: User experience, Multiplexing and solarplexing User input, output, task difficulty and time consumption Generalizations, integration and user control Generalizations, User input, user output In APQR, the measure of ZR=90, RQ = 55, PR = 48, and QP = 73. What ratio represents the sine of ZQ? 7. Give me an atom with the following characteristics.a. Halogenb. ChalogenC. Alkali metald. Borone. Lanthanide seriesf. Alkaline Earth metalg.Transition metalh. Nobel gas what is to this: Describe what happens to population growth in the following phase. filgrastim 5 mcg/kg/day by injection is prescribed for a client who weighs 132 lb (60 kg). the vial label reads filgrastim 300 mcg/ml. how many milliliters will the nurse administer? A census was conducted at a school. All of the students were asked howmany cars their family owns. The results are below.Number of Cars 0 1 2 3Probability 0.005 0.120 0.125 0.500 0.250For the questions below enter the value only. Round to the nearest hundredth, if necessary. 1. What is the expected number of cars?2. What is the standard deviation? Where and when was Geoffrey Chaucer born?