PLEASE HELP ME!!!!!! ITS FOR 100 POINTS AND BRAINLIEST!!!!!!!! NO ONE EVER WANTS TO ANSWER MY QUESTION!!! I JUST NEED SOMEONE TO EXPLAIN WHAT THEY'RE ASKING ME TO DO!!!!!!!!
Step 1: Read the Scenario
Because of the great work you’ve been doing for your department at running shoe company Runner Rush, your vice president has elected you to join an innovative cross-departmental team in your organization. The company is looking to launch a new shoe that enhances any runner’s speed. Management wants this new team to create an idea within a month. All the members of the team are alleviated of some of their regular job duties in order to join several meetings a week to brainstorm and design the new product.

Step 2: Develop a Month Plan
You have been appointed as the team leader. Develop a month plan that you will present to your teammates at the initial meeting. Focus on developing a strong team dynamic, setting goals, expectations, deadlines, and other elements that will lead the team to success. Make sure that your plan is easy to follow and clearly outlines all the required information.

Answers

Answer 1

Answer:

be creative

Explanation:

being creative helps you and our time brainstorm some good ideas that will help you succeed and allow your team mates to have a voice too if you follow these you will be a good team leader

i dont know if  if this the answer that your looking for but i hope it help

Answer 2

Answer:

Do what you do best

Explanation:

Thats all i can say just do what you are good at and you can go places


Related Questions

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

My sister told me an extremely funny joke. what is the direct object for this sentence ?

Answers

Answer:

Explanation:

in healthcare, regulations often dictate that important systems remain unpatched to maintain compliance. which kind of vulnerability does this introduce? answer inherent vulnerabilities weak passwords misconfigurations application flaws

Answers

Application defects are problems with user authentication and authorization. The biggest risk to security in full development comes from these issues.

What does the term "vulnerability" mean?

the attribute of being weak or an object that is weak: the capacity to be easily harmed, swayed, or attacked: A doctor who recognizes the patient's vulnerability is what you want. Attack planners took advantage of weak spots in the country's defenses.

Why is it so frightening to be exposed?

Why do we worry about being exposed? We worry that if someone learns the truth about who we actually are, they won't accept us. In actuality, pretense frequently has the inverse result from what we intend, even if we may strive to appear flawless, powerful, or clever in order to communicate with others.

To know more about vulnerability visit:

https://brainly.com/question/15593733

#SPJ4

Look at the image. A man wearing casual clothes is sitting down on the surface of the Moon, reading a book. The Earth can be seen in the sky. If this image were on a book cover, what kind of story would the book most likely be? a romantic adventure a tense horror story a futuristic travel story a wartime epic

Answers

Answer:

a futuristic travel story

Explanation:

Answer:

C. a futuristic travel story

Explanation:

Edge 2020

Choose the term that best matches the definition.
v rules used by a computer network.

A. Network protocol
B. Hierarchy protocol
C. Procedure

Answers

Answer: it’s network protocol

Explanation:

Answer:

A. Network protocol

Explanation:

On Edge, it states that network protocol are, "rules used by computers in a network." Therefore, it's confirmed.

I hope this helped!

Good luck <3

TB MC Qu. 01-119 (Static) The following information relates... The following information relates to the manufacturing operations of the JNR Compary for the year: The raw materials used in manufacturing during the year totaled \$118.000. Raw materials purchased during the year amount to Multiple Choice 5107,000 5115.000 5118.000 $121000 $126000

Answers

The raw materials used in manufacturing by JNR Company during the year amounted to $118,000. The raw materials purchased during the year totaled $121,000.

In the manufacturing operations of JNR Company for the year, the total cost of raw materials used was $118,000. This cost represents the value of raw materials consumed in the production process. It includes materials that were transformed and incorporated into the final products. These raw materials could include components, parts, or ingredients required for the manufacturing process.

Additionally, the company purchased raw materials worth $121,000 during the year. This amount reflects the total expenditure made by the company on acquiring new raw materials to support its manufacturing operations. Purchased raw materials are typically added to the company's inventory and are available for use in future production cycles.

The difference between the cost of raw materials used ($118,000) and the raw materials purchased ($121,000) suggests that the company may have utilized some of its existing inventory from previous periods. This could be due to factors such as efficient inventory management, optimization of production processes, or the use of recycled materials.

Overall, the JNR Company used $118,000 worth of raw materials in its manufacturing operations for the year, while purchasing raw materials worth $121,000 to replenish its inventory and support future production needs.

To learn more about JNR company visit:

brainly.com/question/15261370

#SPJ11

What was your learning target for today

Answers

Answer:

explain

Explanation:

My learning target for today are the follows :

I learn at least 2 words meaning that I don't know.I learn coding daily at least 10minsSome quotes

9.3.2 cmu Spongebob meme. Does anyone know the code?

9.3.2 cmu Spongebob meme. Does anyone know the code?

Answers

There are a few problems with the code, including incorrect variable names, undefined variables, and incorrect use of the range() function. The following modified code should fix these issues.

What is the explanation for the above response?


The provided code defines a function memefy() that takes an input sentence from a label widget inputLabe1 and converts it into a "meme" by alternating between uppercase and lowercase letters based on the index of the letter in the sentence. The converted sentence is then displayed in another label widget memeLabe1. There are a few problems with the code, including incorrect variable names, undefined variables, and incorrect use of the range() function. The following modified code should fix these issues:


from appJar import gui

# Defines the labels that keep track of the meme text.

inputLabel = gui.Label('Enter a sentence:', row=0, column=0, bg='white', fg='black', font={'size':20, 'bold':True})

memeLabel = gui.Label('', row=1, column=0, bg='white', fg='black', font={'size':35, 'bold':True})

def memefy():

   memeText = ''

   # Loop over each character in the input sentence.

   for index in range(len(inputLabel.value)):

       # If the index is even, convert the character to lowercase.

       # Otherwise, convert it to uppercase.

       if (index % 2 == 0):

           memeText += inputLabel.value[index].lower()

       else:

           memeText += inputLabel.value[index].upper()

   # Update the meme label with the converted sentence.

   memeLabel.value = memeText

# Create the GUI window and add a text input field and button.

app = gui()

app.addLabelEntry('input', row=0, column=1)

app.addButton('Memefy', memefy, row=1, column=1)

# Start the GUI event loop.

app.go()

This modified code uses correct variable names and properly defines the memeText variable. It also correctly loops over each character in the input sentence using range(len()), and it properly checks whether the index is even using the modulus operator (%). Finally, it updates the memeLabe1 label with the converted sentence.

Learn more about code at:

https://brainly.com/question/14461424

#SPJ1

It is the ornamentation of textiles and other material with needle work
for personal use and decoration.
a. Embroidery
b. Handicraft
c. Recycling
d. Sewing

Answers

A! Embroidery is the ornamentation of textiles using needle work
It is the ornamentation of textiles and other material with needle workfor personal use and decoration.a.

what happens to an object used for a clipping mask when the clipping mask is released? choose two answers
A) the background is gone
B) The stroke is gone
C) The fill is gone
D) The object is gone

Answers

The correct answer is (a) The background is gone, and The object is gone.

What is Background?

Background is a term used to describe the overall appearance of a document or presentation. It typically includes colours, images, text, and shapes. The background of a document or presentation can influence how users view its content. For example, a bright and colourful background can be more engaging and eye-catching, while a dark background may be more calming and relaxing. Backgrounds can also be used to create a certain mood or atmosphere. For example, a beach scene can create a sense of relaxation, while a mountain range can evoke a sense of adventure. The choice of background can also help to create a sense of professionalism or casualness.

To know more about Background

brainly.com/question/30114468

#SPJ4

the mouse on a desktop computer has stopped operating. which of thefollowing would be the best next troubleshooting step?

Answers

The best next troubleshooting step when the mouse on a desktop computer has stopped operating would be to check the physical connections and ensure that the mouse is properly connected to the computer.

In the explanation, a faulty or loose connection between the mouse and the computer can often be the cause of the issue. Start by inspecting the cable connecting the mouse to the computer and ensuring it is securely plugged into the appropriate port, which is usually a USB port. If the mouse uses a wireless connection, ensure that the batteries are not depleted and the receiver is properly connected to the computer.

By checking the physical connections, you can rule out any connection-related issues and determine if the mouse is properly connected to the computer, which is often the first step in troubleshooting mouse-related problems.

learn more about troubleshoot here; brainly.com/question/14102193

#SPJ11

A convened IRB Committee approved a protocol as a more than minimal risk study on February 15, 2019. In 2020, the study remains open to enrollment with 14 subjects currently enrolled and receiving the intervention. Which of the following best describes IRB continuation review requirements for this study?
O The research must be re-reviewed by the convened IRB on or before February 14, 2020.O The research must be re-reviewed by the convened IRB on or before February 14, 2018.O The research must be re-reviewed by the convened IRB on or after February 14, 2020.

Answers

The right response is: The convened IRB must reevaluate the research on or before February 14, 2020.

When should IRB ongoing review take place? What is it?

What does Ongoing Review entail? You must submit a study to the IRB for continuing review permission if you want to keep working on it after its expiration date. The IRB conducts a fresh evaluation of the trial to decide whether it should proceed unaltered or with changes.

What day did the IRB approve?

The date of IRB approval is the day the requested revisions are confirmed by the Chair, Vice Chair, or his/her designee when the research study is approved subject to amendments at a convened meeting.

To know more about response visit:-

https://brainly.com/question/28563302

#SPJ1

is a popular blogging tool that allows users to post anything from their browsers, phones, desktops, e-mail programs, and so forth. a. chrome b. mozilla firefox c. wikipedia d. tumblr

Answers

Tumblr is a popular blogging tool that allows users to post anything from their browsers, phones, desktops, e-mail programs, and so forth. Option d is correct.

Tumblr is a free microblogging and social networking site that allows users to post text, pictures, GIFs, videos, live videos, and audio. You can reblog other people's posts and add comments or likes to them. Users can also customize their blog's theme and appearance.

Blogging tools are software or web-based tools that assist bloggers in creating, editing, and publishing blog content. They help bloggers optimize their content, create a blog calendar, design custom graphics, and track their blog's traffic.

Blogging tools have various functionalities that include social sharing, content marketing, email marketing, and analytics. Blogging tools help bloggers save time and stay organized by streamlining their blogging process. Some popular blogging tools include HubSpot, WordPress, and Squarespace.

Learn more about blogging tool https://brainly.com/question/5006962

#SPJ11

DNA sequences are strings made of combinations of four letters: A, C, G, and T. A substring refers to a string that is a continuous segment of a larger string; in the context of DNA, this would be a fragment of our DNA sequence.

Write a program that asks the user for two input strings:

a complete DNA sequence

a DNA fragment whose occurrence is to be found in our complete DNA sequence.

The program must display the number of matches as the output. Make sure to validate that your sequence is a DNA sequence -- i.e., that it contains no letters aside from A, C, G, and T.

Sample run 1:

Enter the DNA sequence:
ACGTGCGT
Enter the DNA fragment to be searched:
GT
Number of occurrences: 2
Sample run 2:

Enter the search string:
ACGTGCGT
Enter the substring to be searched:
AC
Number of occurrences: 1
Sample run 3:

Enter the search string:
ACGTGuCGT
This is not a valid DNA sequence.

Answers

The program's objective is to ask the user to input two strings: a complete DNA sequence and a DNA fragment to be found in the DNA sequence.

Then, the program will display the number of occurrences. Below is the solution of the program.

Explanation:

A DNA sequence comprises combinations of four letters: A, C, G, and T. In this context, a substring refers to a fragment of a DNA sequence that is a continuous segment of a larger string.

The solution for the program can be obtained by following these steps:

Step 1: Ask the user to input the complete DNA sequence and DNA fragment that is to be searched.

Step 2: Validate whether the sequence is a valid DNA sequence or not by checking that it contains only the letters A, C, G, and T.

Step 3: The program will iterate through the DNA sequence to find the number of times that the DNA fragment appears in the DNA sequence. This will be accomplished by using the `count()` method of the string.

Step 4: The output will be displayed in the form of the number of occurrences of the DNA fragment in the complete DNA sequence.

Code:

dna_sequence = input("Enter the DNA sequence: ")

dna_fragment = input("Enter the DNA fragment to be searched: ")

# Check if the sequence is a valid DNA sequence

valid_dna = all(c in "ACGT" for c in dna_sequence)

if not valid_dna:

   print("This is not a valid DNA sequence.")

else:

   num_matches = dna_sequence.count(dna_fragment)

   print("Number of occurrences:", num_matches)


Sample Output:

Enter the DNA sequence: ACGTGCGT
Enter the DNA fragment to be searched: GT
Number of occurrences: 2

Enter the DNA sequence: ACGTGCGT
Enter the DNA fragment to be searched: AC
Number of occurrences: 1

Enter the DNA sequence: ACGTGuCGT
This is not a valid DNA sequence.

To know more about DNA visit:

https://brainly.com/question/30993611

#SPJ11

Who is the father of computer​

Answers

Charles Babbage
Xxxxxxxx

Answer:

Charles Babbage is known as the father of computer.

Explanation:

hope it is helpful to you

please answer correctly,
Python Project Worksheet
Print | Save
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

Answers

Answer:

import sys

import time

from time import sleep

hello_user = "Hello what is your name\n"

for char in hello_user:

time.sleep(0.05)

sys.stdout.write(char)

sys.stdout.flush()

Explanation:

What are the pros and cons for E-trade?

Answers

Answer:

Pros                                            Cons

• Free stock and ETF trading • Higher fees for non-free mutual funds

• Some mutual funds and bonds are free

• Low non-trading fees

Answer:

Pros-Quick, easy purchases, ability to know what's available, access to limitless products.

Cons-Potential to get hacked, get scammed by false advertising, amount of time to receive product

Explanation:

Its not a great list but I really hope this helps

The instructions in a program, when expressed in Python, ...

-can only be carried out by humans, as long as they understand Python
-can only be carried out by computers
-can be carried out by humans, as long as they understand Python, and computers, as long as an
interpreter is available.
-can only be carried out by computers, as long as an interpreter is available which one is it? ​

Answers

Answer:

can only be carried out by computers, as long as an interpreter is available which one is it?

Explanation:

The interperetor needed is called CPython, this is the standard C implementation of the language.

You work as the IT administrator for a growing corporate network. You are in the process of creating an iSCSI storage area network (SAN) on the CorpisCSI server. The server is currently connected to the network using an Ethernet cable. To increase the server's performance, yoru have decided to replace the existing Ethernet connection with a fiber optic connection. In this lab, your task is to complete the following: . Connect the CorpisCSI server to the switch using the appropriate fiber optic cable. . Examine the port types on the switch. Examine the server's fiber optic NIC. . When connecting the server, use the color coding on the end of the fiber optic cable to identify the Tx and Rx connection ends Connector A (red) Tx. - Connector B (black) is Rx. . Remove the server's previous Ethernet network connection and place the Ethernet cable on the Shelf. . Verify that the server is connected to the network through the fiber optic connection. C When connecting fiber optic cables, the transmit (T) port on one device is connected to the receive (Rx) port on the other device. The fiber cables in this lab have already had their Rx and Tx connectors switched as necessary. You can view component information in the Details window on the Specification tab

Answers

The steps in the above scenario are:

Connect to an iSCSI target:Then  Create a volume:

How do you Connect to an iSCSI target?

This can be done by:

Select CORPSERVER from Hyper-V Manager, Make sure to Maximize the window to view all virtual machines.Then Right-click CorpFiles16 and select Connect.Use the Server Manager on CorpFiles16 to select Tools > iSCSI Initiator.Via the Target field, enter the server name of the target server.Then click.Select Quick Connect and then Done and then OK.

Note that the steps in the above scenario are:

Connect to an iSCSI target:Then  Create a volume:

Learn more about IT admin from

https://brainly.com/question/26096799

#SPJ2

A _____________ is a piece of information sent to a function.

Answers

Answer:

argument

Explanation:

 

Technician A states that in a brake-by-wire system, the computer detects a
panic stop if the driver quickly releases the accelerator. Technician B states
that brake-by-wire systems are not efficient in detecting panic stops. Who is
correct?
O a. Technician A
O b. Technician B
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

The brake-by-wire system can detect panic stops if the driver abruptly releases the accelerator, so Technician A is only partly accurate. Technician B is mistaken because panic stops can be accurately detected by brake-by-wire devices.

How well do brake-by-wire devices work at spotting panic stops?

That period of time and distance can be cut down in a brake-by-wire device. The driver's abrupt release of the accelerator can be detected by the computer, which could be a sign of a panic halt.

What does an anti-lock braking device (MCQ) do?

In order to keep tractive contact with the road surface and give the driver more control over the car, ABS works by preventing the wheels from locking up when braking.

To know more about panic stops visit:

https://brainly.com/question/28779956

#SPJ9

widely used in the areas of business-to-business (b2b) electronic commerce and supply chain management (scm), what term is used to describe a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the internet using virtual private networks (vpns)?

Answers

The term used to describe this network is a Virtual Extranet.

What is network?

Network is a system of computers or other devices connected to each other, usually via cables or wireless technology, that can communicate and share data. It allows users to access, store and exchange information, resources and services. Networks can be local or wide area, private or public, and can range from a single connection between two computers to millions of connected devices spanning the globe. Networks are used for a variety of purposes, including file sharing, streaming audio and video, video conferencing, online gaming and more.

To learn more about network
https://brainly.com/question/29506804
#SPJ4

The
indicates where the next text that you type will
appear.​

Answers

Answer: insertion point/Cursor

Explanation:

The cursor can also be referred to as the insertion point and it refers to the flashing vertical bar that can be seen on the screen and used to show where the texts that are entered will be placed.

The insertion point indicates where the next text that you type will appear. It refers to the location that can be found on the screen and here, the next character that's typed will be inserted.

Which of these is a way that a doctor can examine a patient?

Which of these is a way that a doctor can examine a patient?

Answers

Answer:

D. all the above

Explanation:

because doctor uses stethoscope to listen patients heart, he also used hammer to check patients reflexes and also doctor has to listen to the patient.

In Word, you can format the font, size, and alignment but not the color of text.

Answers

Answer:

You can change color of text as well.

Explanation:

It is false that in word one can format the font, size, and alignment but not the color of text.

What is text formatting?

In computing, formatted text, styled text, or rich text, as opposed to plain text, is digital text that contains styling information in addition to the bare minimum of semantic elements: colors, styles, sizes, and special HTML features.

Formatted text is text that is displayed in a specific manner. Formatting data may be associated with text data in computer applications to generate formatted text.

The operating system and application software used on the computer determine how formatted text is created and displayed.

In Word, you can change the font, size, alignment, and even the color of the text.

Thus, the given statement is false.

For more details regarding text formatting, visit:

https://brainly.com/question/766378

#SPJ2

Features that keep you safe from rotating parts are known as guards.


False

True

Answers

Answer:

true

Explanation:

Unlike other programming languages, Python has no command for declaring a _____.

Answers

Answer:

data type

Explanation:

In Python and most other interpreted programming languages, a variable is automatically assigned a data type based on what it is set to.

For example, the variable declaration:

\(\tt x = 3\)

automatically sets the variable \(\tt x\) to an integer value of 3.

Or, this declaration:

\(\tt xExists = True\)

automatically sets the variable \(\tt xExists\) to a boolean value of True.

And this declaration after the first two:

\(\mathtt{ x = } \ \textsf{"}\mathtt{Happy}\ \mathtt{days}\textsf{"}\)

automatically changes the variable \(\tt x\) to a string with the text "Happy days".

__________

This is different from most compiled languages, where it is often needed to specify a primitive data type, such as int, boolean, or double.

For example, here is a variable declaration in Java:

\(\tt char \ c = \ 'a'\)

that explicitly sets the variable \(\tt c\) to a char data type of value 97 (the ASCII value of 'a').

An office building has two floors. A computer program is used to control an elevator that travels between the two floors. Physical sensors are used to set the following Boolean variables.
The elevator moves when the door is closed and the elevator is called to the floor that it is not currently on.
Which of the following Boolean expressions can be used in a selection statement to cause the elevator to move?

answer choices
(onFloor1 AND callTo2) AND (onFloor2 AND callTo1)
(onFloor1 AND callTo2) OR (onFloor2 AND callTo1)
(onFloor1 OR callTo2) AND (onFloor2 OR callTo1)
(onFloor1 OR callTo2) OR (onFloor2 OR callTo1)

Answers

The following Boolean expressions, "onFloor1 AND callTo2" or "onFloor2 AND callTo1," can be used in a selection statement to move the elevator.

The commands to move the lift may be simply determined based on the other commands designed to be provided and received by the lift, which indicate what operation it is engaged in.

When the elevator is on the first floor and has to be taken to the second floor, the order "onFloor1 AND callTo2" can be used. The order "onFloor2 AND callTo1" would serve as the reverse of the previously given instruction and cause the lift to operate in the exact opposite manner.

To know more about elevator visit:-

https://brainly.com/question/2168570

#SPJ4

The intersection of column D and row 6 is a cell with a cell address of
Select one:
a. D:6
b. D6
c. 6:D
d. 6D

Answers

Answer:

C. 6:D

Explanation:

Answer:

6:D

Explanation:

This works for plato but as for any other testing site I am unaware of.

Which command is used to detect os on a target?

Answers

To detect the operating system (OS) on a target, you can use the "nmap" command with the "-O" option. The Nmap (Network Mapper) tool is a popular and powerful network scanning tool that can provide information about various aspects of a target system, including its operating system.

The "-O" option in Nmap enables operating system detection. When you run the command with this option followed by the target's IP address or hostname, nmap sends a series of network probes and analyzes the responses to determine the underlying operating system. It uses a combination of techniques, including analyzing TCP/IP fingerprinting, network behavior analysis, and other indicators, to make an educated guess about the OS. By running the nmap command with the "-O" option, you can gather valuable information about the target's operating system, which can be useful for network administrators, security professionals, or anyone interested in understanding the systems they are working with. However, it's important to note that the accuracy of OS detection may vary depending on factors such as network configuration, security measures, and the target system's response behavior.

Learn more about Operating system here ; brainly.com/question/29532405

#SPJ11

Other Questions
Why is the yea or nay important count that day lost Help with a thesis for my research paper: My research paper is on wind farms and their threat to wildlife. How can I adjust my thesis to support my research? Thesis so far: Wind farms spare the air from carbon emissions, provide jobs, and provide electricity for millions of homes; however, they place many animals that live near them in jeopardy. Week 3 Date Transaction description 15 Turbo Tech paid $700 in partial payment of their account. 15 Paid sales staff wages of $5,323 for the two weeks up to and including yesterday, Cheque No. 607. 17 when using the cochrane library, which difference would the nurse find between systematic review articles and meta-analyses of clinical trials? Which development would most likely cause the supply of a product todecrease?A. New technology allows the product to be made more quickly.B. Businesses expect the product to start selling at a higher price.C. Government regulations increase the cost of making the product.D. More workers receive the education needed to create the product. The economic condition that results from a continual rise in prices, or what some people call "too much money chasing too few goods" is do you think it is good to bring torches into the cave Which council was designed to streamline the processing of information regarding issues of national security?. The general molecular formula for alkanes is cnh2n 2. what is the general molecular formula for cycloalkanes with two rings? Explain the figurative language in the title, Translating Grandfathers House. What does the speaker mean by saying that he has translated his grandfathers house? Find the area of the rhombus shown. Read the excerpt from "The Storyteller." A dissentient opinion came from the aunt. A most improper story to tell to young children! You have undermined the effect of years of careful teaching. Which statement best explains the aunt's reaction to the bachelor in the excerpt? The aunt disapproves of the bachelor's story because the children like it better than the stories she tells. The aunt is displeased with the bachelor's story because it fails to entertain the children. The aunt is pleased with the bachelor's story because it entertains the children, but she disapproves of the story's message. The aunt disapproves of the bachelor's story because she disagrees with the moral message it gives to the children. explain economics in your own words 1. Which statement about this triangular prism is NOT true?8 ft8 ft6.9 ft23 ft8 ftO a. The area of the base is 27.6 square feetO b. The height of the prism is 6.9 feet.c. You can use the equation, V = (276)(23) to determine the volumed. The volume of the prism is 634.8 cubic feet there is a limit to the amount of fiber reinforcement that can be added to a fiber reinforced polymer because From the Reading Night By Ellie Wiesel Lines 80-83 What does the author notice about Mengele, and why is this significant? The function f is given in three equivalent forms.Which form most quickly reveals the zeros (or "roots") of the function?Choose 1 answer:f(x) = 1/2(x-5)^2-2f(x)= 1/2(x -3) (x -7)f(x) = 1/2x^2-5x+21/2 Write one of the zeros The ___ matter of the spinal cord contains the synapses and therefore is the site of synaptic integration Does Scout have a duty to act in any particular way? Use evidence from the text to explain your answer .Book-to kill a mockingbird 1. A weather balloon with a volume of 2000L at a pressure of 96.3 kPa rises and the pressuredecreases to 60.8kPa. Assuming there is no change in the temperature or the amount of gas,calculate the weather balloon's final volume.