stephen's supervisor wants to create a system repair disc for windows 10. where should steven navigate to in the control panel to create a system repair disc in windows 10?

Answers

Answer 1

To create a system repair disc in Windows 10, Stephen should navigate to the Control Panel. Within the Control Panel, he should follow these steps to create the system repair disc.

First, Stephen needs to open the Control Panel. He can do this by clicking on the Start button and typing "Control Panel" in the search bar. Once the Control Panel appears in the search results, he can click on it to open it.

Next, within the Control Panel, Stephen should look for the "Backup and Restore (Windows 7)" option. It may be located under the "System and Security" category. He can click on this option to proceed.

In the next window, Stephen should find the "Create a system repair disc" link on the left-hand side of the screen. By clicking on this link, he will initiate the process of creating a system repair disc.

Finally, Stephen needs to follow the prompts provided by the system to complete the creation of the system repair disc. The prompts will guide him through selecting the disc burner drive (if multiple drives are available) and initiating the burning process. Once the disc is created, he will have a system repair disc for Windows 10 that can be used for troubleshooting and fixing system issues.

To know more about control panel click here: brainly.com/question/32215335

#SPJ11


Related Questions

Which of the following statements correctly creates a Scanner object for keyboard input? Scanner kbd new Scanner(System.keyboard: Scanner mykeyboard - new Scanner(System.ink Scanner keyboard(System.in: Keyboard scanner = new Keyboard(System.ink Question 71

Answers

The correct statement that creates a Scanner object for keyboard input is "Scanner kbd = new Scanner(System.in);"The Scanner class in Java is a simple text scanner that can parse primitive types and strings using regular expressions.

It allows users to read the input from various sources such as a keyboard, a file, or a string literal. For this question, we need to identify the statement that creates a Scanner object for keyboard input. Let's examine each option given below:Scanner kbd new Scanner(System.keyboard: Scanner mykeyboard - new Scanner(System.ink Scanner keyboard(System.in: Keyboard scanner = new Keyboard(System.inkOut of the given options, only the statement "Scanner kbd = new Scanner(System.in);" creates a Scanner object for keyboard input. Therefore, the correct option is "Scanner kbd = new Scanner(System.in);".

Learn more about Java here:

https://brainly.com/question/24065854

#SPJ11

Word indicates the size of the table by ____ at the top of the grid when dragging the pointer across a selection

Answers

When dragging the pointer across a selection in Word, the size of the table is indicated by a highlight box at the top of the grid.

The box shows the number of rows and columns that are being selected as the pointer moves over the cells. Once the desired size of the table is highlighted, the user can release the mouse button to create the table with the selected dimensions. This feature is useful for creating tables with specific sizes quickly and accurately. Additionally, Word provides options to adjust the size of the table after it has been created, such as adding or removing rows and columns or changing the width and height of individual cells.

Find out more about Words

brainly.com/question/14905545

#SPJ4

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

WHAT DOES THE SCRATCH CODE BELOW DO?

WHAT DOES THE SCRATCH CODE BELOW DO?

Answers

I think it’s b vertically

Answer:

It is horizontal by 10.

Explanation:

The x axis is horizontal which is left and right. On the other hand, the y axis is up and down which is vertical.

________ operating systems are used to control and coordinate computers that are linked together. group of answer choices embedded stand-alone network real-time

Answers

Network operating systems are used to control and coordinate computers that are linked together.

Network operating systems are specifically designed to control and coordinate computers that are interconnected within a network.

These operating systems provide features and functionalities that facilitate sharing resources, such as files, printers, and applications, among multiple computers in the network.

Network operating systems also handle network communication protocols, security, user authentication, and centralized management of network resources.

Learn more about Operating system here:

https://brainly.com/question/33634948

#SPJ4

in a database context, what are homonyms and synonyms and why should they be avoided?

Answers

In a database context, homonyms are words that are spelled the same but have different meanings, while synonyms are words that have the same meaning but are spelled differently. These can cause confusion and lead to inaccurate data retrieval, which is why they should be avoided in a database.

For example, if a database has a field for "State" and another field for "State of mind," these could be considered homonyms because they are spelled the same but have different meanings. Similarly, if a database has a field for "Color" and another field for "Colour," these could be considered synonyms because they have the same meaning but are spelled differently.

To avoid confusion and ensure accurate data retrieval, it is important to use consistent terminology and spelling in a database. This can be achieved by creating a data dictionary or glossary that defines the terms used in the database and provides guidelines for their use.

Learn more about database:

https://brainly.com/question/518894

#SPJ4

In a database context, homonyms are words that are spelled the same but have different meanings, while synonyms are words that have the same meaning but are spelled differently. These can cause confusion and lead to inaccurate data retrieval, which is why they should be avoided in a database.

For example, if a database has a field for "State" and another field for "State of mind," these could be considered homonyms because they are spelled the same but have different meanings. Similarly, if a database has a field for "Color" and another field for "Colour," these could be considered synonyms because they have the same meaning but are spelled differently.

To avoid confusion and ensure accurate data retrieval, it is important to use consistent terminology and spelling in a database. This can be achieved by creating a data dictionary or glossary that defines the terms used in the database and provides guidelines for their use.

Learn more about database:

brainly.com/question/518894

#SPJ11

how to install windows 11 on unsupported processor

Answers

Answer: You can't, if you anyway bypass the system, your device will run on risk.

Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.

(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)

what jtids/mids protocol dictates that platforms take turns transmitting and receiving data according to time?

Answers

Link 16 JTIDS/MIDS protocol dictates that platforms take turns transmitting and receiving data according to time. Link 16 is a standard military tactical data exchange network that allows military platforms to share data on a common network.

What is Link 16?

Link 16 is a time-division multiplexing (TDM) network that allows many users to share the same radio frequency band. The TDM method permits each user to transmit its data within its own time slot. This guarantees that the radios' messages do not collide with one another. The Link 16 terminals do this using the Time Division Multiple Access (TDMA) method.

This method ensures that platforms transmit their data at precise, prearranged intervals. Link 16 is also a secure radio that prevents eavesdropping by encrypting the information.

To know more about time-division multiplexing (TDM) visit:

https://brainly.com/question/31666197

#SPJ11

You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applications. To which unit is the salesperson referring?


a) computer case

b) peripherals

c) output devices

d) input devices

Answers

You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applications. The unit to which the salesperson is referring is: "output devices" (Option C)

What are Output Units?

The CPU is sometimes referred to as a processor or a microprocessor. The CPU is in charge of executing a program, which is a sequence of stored instructions. This application will accept input from an input device, process the input, and output the results to an output device.

In summary, a computer peripheral is any device that connects to the computing unit but is not part of the computing unit's fundamental design. Input devices, output devices, and storage devices, including dual input/output devices, are the three types of peripherals.

An input device in computing is a piece of hardware used to give data and control impulses to an information processing system, such as a computer or information device. Instances of input devices include keyboards, mice, scanners, cameras, joysticks, and microphones.

Learn more about Peripheral Units:
https://brainly.com/question/18994224

#SPJ1

Anusha wants to use her computer,rather than handwriting the information on her notepad,to analyze her monthly expenses to make the job easier.Which of the following apps should she use?
A) A word processor app to keep a record of her expenses and make calculations
B) A personal interest app to keep a track of all the expenses based on her personal interests
C) A device management app to track all the expenses she makes using her credit and debit cards
D) A spreadsheet app to keep a record of her expenses,sort data,and make calculations

Answers

Answer:

C. A device management app to track all the expenses she makes using her credit and debit cards

Explanation:

It'd be smart to use a developed app that was programmed to store expenses.

Anusha wants to use her computer, rather than handwriting the information on her notepad. The following app should she use is a spreadsheet app to keep a record of her expenses, sort data, and make calculations. D is the correct option.

What is a spreadsheet?

The spreadsheet is a sheet with many cells, it is a function of Microsoft Excel. It is used to store information, and numbers, and it is also used to calculate large calculations and to store large amounts of information.

Spreadsheets are of many uses, all the data of the students or employees can be stored in the spreadsheet with their numbers and with their salary expenses. It also contains many functions that can be used to do heavy calculations.

Therefore, the correct option is D) A spreadsheet app to keep a record of her expenses, sort data, and make calculations.

To learn more about spreadsheets, refer to the below link:

https://brainly.com/question/14630899

#SPJ2

andrew is researching a new operating system for the computers at his workplace. his boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. what version of windows 8.1 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop?

Answers

Windows 8.1 Core is the version of Windows 8.1 that does not provide the ability to lock a hard drive to make it unusable in case the hard drive is removed from a laptop.

To password-protect, a hard drive on Windows 8.1 computer is really simple. BitLocker is Windows's 8.1 built-in hard drive encryption software. However, this hard drive password-protection feature does not work on the Windows 8.1 Core which is a version of Windows 8.1.

According to the given scenario, Andrew should avoid using Windows 8.1 Core version because his boss wants such an operating system that is highly secure because of having a feature of connectivity with the cloud to lock a hard drive; so in case, the laptop is stolen the hard drive of the laptop could make it unsuable via the cloud connectivity feature.

You can learn more about Windows 8.1 Core at

https://brainly.com/question/28343583

#SPJ4

How do you code a website?

Answers

Answer:

Learn the basics of HTML.

Understand HTML document structure.

Get to know CSS selectors.

Put a CSS stylesheet together.

Get Bootstrap.

Pick a design.

Customize your website with HTML and CSS.

Add content and images.

Explanation:

the famous case of h.m. demonstrated ________ amnesia, a condition in which a person can remember previously encoded memories but cannot encode new ones.

Answers

The famous case of H.M. demonstrated "Anterograde, " amnesia, a condition in which a person can remember previously encoded memories but cannot encode new ones.

H.M is initials for Henry Molaison, the American man who suffered memory loss during a seizure operation conducted on him in Hartford, August 1953.

Before the operation, H.M. was suffering from constant seizures, and retrograde memory loss (for 11 years)

However, after the neurosurgical operation that led to the removal of his hippocampus by William Beecher Scoville, H.M began demonstrating Anterograde.

H.M. (Henry Molaison) died at the age of 82 years in 2008.

Hence, in this case, it is concluded that the correct answer is "Anterograde."

Learn more here: https://brainly.com/question/13708958

Answer: anterograde

Explanation: took a quiz :)

Recycling one glass jar saves enough energy to watch television for 3 hours

Answers

Answer:

Cool

Explanation:

Thanks for the info

wait what jajaja this is kinda confusing

Workbook and worksheet are synonymous, where each workbook will contain only one worksheet

True or false

Answers

False a Brainiest would be appreciated if I’m right
This is a false statement

Demonstrate an understanding of net neutrality (pages 327-328) and how it affects the home, education, and work environment. Your post should contain a reflection of these topics.

Answers

Net neutrality is a principle of the internet that states that all data transmitted over the internet should be treated equally by Internet Service Providers (ISPs).

The home environment is where the debate around net neutrality began, and it is also the most affected environment. Since the home is where the majority of people access the internet, net neutrality can have a significant impact on their internet experience.


Finally, the work environment has also been affected by the net neutrality debate. Companies that rely on the internet to conduct their business may be affected if net neutrality is not respected.


In conclusion, net neutrality is a crucial principle that must be respected to ensure that the internet remains an open and free space where everyone can communicate with each other.

To know more about debate visit:

https://brainly.com/question/13308791

#SPJ11

JAVA
Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
Hint - you will need to use the substring method inside a loop to get at every other character in the String. You can use the length method on the String
to work out when this loop should end.
Sample run:
Input a word:
domain
dmi

Answers

import java.util.Scanner;

public class JavaApplication42 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input a word:");

       String word = scan.nextLine();

       for (int i = 0; i < word.length(); i+=2){

           System.out.print(word.substring(i,i+1));

           

       }

   }

   

}

I hope this helps!

The program is an illustration of loops.

Loops are used to carry out repetition operations; examples are the for-loop and the while-loop.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

public static void main(String args[]) {

//This creates a Scanner object

Scanner input = new Scanner(System.in);

//This prompts user for input

System.out.print("Input a word: ");

//This gets input from the user

String userinput = input.nextLine();

//The following iterates through every other character of userinput  

      for(int i =0;i<userinput.length();i+=2) {

//This prints every other characters

          System.out.print(userinput.charAt(i));

}

  }

}

The above program is implemented using a for loop

Read more about similar programs at:

https://brainly.com/question/19104397

i need help with computer science
im on Write Password Evaluator

Answers

Answer: Password Evaluator is designed to examine passwords and tentative passwords to look for dictionary words and patterns that a password cracking tool might exploit. It looks for reversed, rotated, keyboard shifted, truncated, dropped letters, substituted characters and other variations on dictionary words both singly and in many combinations.

Explanation:

Find dy/dx and d2y/dx2. x = t2 + 5, y = t2 + 5t dy dx = Correct: Your answer is correct. d2y dx2 = Correct: Your answer is correct. For which values of t is the curve concave upward? (Enter your answer using interval notation.) Changed: Your submitted answer was incorrect. Your current answer has not been submitted.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Given value:

\(x = t^2 + 5......(1)\\\\ y = t^2 + 5t........(2)\)

To find:

\(\bold {\frac{dy}{dx} \ \ \ and\ \ \ \frac{d^2y}{dx^2} = ?}\)

Differentiate the above equation:

equation 1:

\(\frac{dx}{dt}= 2t.......(1)\\\)

equation 2:

\(\frac{dy}{dt}= 2t+5\)

Formula:

\(\frac{dy}{dx}= \frac{\frac{dy}{dt}}{\frac{dx}{dt}}\\\\\)

\(\boxed{\bold{\frac{dy}{dx}=\frac{2t+5}{2t}}}\)

To calculate the \(\bold{\frac{d^2y}{dx^2}}\) we Differentiate the above equation but before that first solve the equation:

Equation:

\(\frac{dy}{dx}=\frac{2t+5}{2t}\)

    \(=\frac{2t}{2t}+\frac{5}{2t}\\\\= 1+\frac{5}{2t}\\\\=1+\frac{5}{2} t^{-1} \\\)

Formula:

\(\bold{\frac{d}{dx} \ x^n = nx^{n-1}}\)

\(\frac{dy^2}{dx^2}= 0+\frac{5}{2} (-1 t^{-2})\\\\\)

      \(= -\frac{5}{2} t^{-2}\\\\= -\frac{5}{2 t^2} \\\\\)

\(\boxed{\bold{\frac{d^2y}{dx^2}=-\frac{5}{2t^2}}}\)

Answer:

d2y dx2

Explanation:

When do you use a while loop instead of a for loop? (Select multiple answers)
1. You do not know how many times a loop will need to run
2. To do number calculations
3. When using a count variable
4. To repeat code.

Answers

Answer:

1. You do not know how many times a loop will need to run

4. To repeat code.

Explanation:

Required

When to use while loop instead of for loop?

Option 1 and 4 answer the question

1. You do not know how many times a loop will need to run

Using while loop in this case is suitable to the for loop.

Take for instance

You want a set of instruction to be repeated until the user enters 1

e.g.

while a != 1:

    print("abc")

    print("def")

    a = int(input("Input: "))

The above is written in Python

The print instructions will be repeated until the user enter 1.

Now, you do not know if the user will enter 1 the first time or the 100th time or the 10000th time.

In other words, you don't know how many times the loop will be executed.

In this case, while loop is preferred to for loop

4. To repeat code:

The same analysis as used in (1) above is applicable in (4).

The print statements in

while a != 1:

    print("abc")

    print("def")

    a = int(input("Input: "))

will be repeated until the user enters 1

The for loop isn't preferable in this case

Other options (2) and (3) can be implemented using both the for loops and the while loops

The while loops allows the execution of a block of code over and over again until a condition or certain conditions are met. The while lop are used instead of the for loop in the following circumstances :

You do not know how many times a loop will need to runWhen using a count variable

Certain loops requires that a condition is met before the loop terminates. While some loops have a clear and predictable number of runs, some do not. Hence, due to this unpredictability, while loops are preferred :

Code snippet in python :

num = int(input())

while num < 5 :

print('invalid')

num = int(input())

Also, when using a count variable, the while loops is more appropriate as also more appropriate ;

Code snippet in python :

count = 20

while count > 0 :

print('available')

count -= 1

Therefore, the while loop is more appropriate for a loop with an unknown number of runs and when using the count variable.

Learn more :https://brainly.com/question/15745784

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

you have decided to use bitlocker as your whole disk encryption solution for the hard drive on your laptop. the laptop includes a tpm chip. what happens if you store the startup key required to unlock the hard drive in the tpm chip?

Answers

If you store the startup key required to unlock the hard drive in the TPM chip, you can ensure the security of your data on the hard drive.


When you enable BitLocker encryption on your laptop, the TPM chip is used to securely store the encryption key, which is required to start the operating system and unlock the hard drive.

By storing the startup key in the TPM chip, you can prevent unauthorized access to your data, even if someone physically removes the hard drive from your laptop.

If the laptop is lost or stolen, the data on the hard drive remains protected because the encryption key is stored on the TPM chip and cannot be accessed without the proper credentials. This helps to ensure that your sensitive data remains secure, even if your laptop is lost or stolen.

For more questions like TPM chip click the link below:

https://brainly.com/question/29857045

#SPJ4

Chief technology officers, with their experience, have the oppertunity to be a _______ speaker at events and forums.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer in this question (fill in the blank) is technologist.

Chief technology officers, with their experience, have the oppertunity to be a _technologist______ speaker at events and forums.

Chief technology officer is an expert person in the relevant technology. For example, cloud computing technology, biotechnology, etc. So such type of person knows as a technologist in their respective field/domain.

What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.​

Answers

Answer:

Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.

Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.

Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

B. Direction: Choose the letter of the correct answer.
11. Filler comes from silex, raw linseed oil, and turpentine.
A. Shellac
b paste filler C. Varnish
d. paint
12. A kind of varnish that is not waterproof.
A Paint
b. Shellac c. Enamel
d. Lacquer
13. What kind of varnish that dries up easily and is not waterproof? It comes from lac gum
diluted in alcohol
A Varnish
b. stains c. Enamel d. Shellac
14. A kind of stain that is easiest to apply on wood.
a. Spirit stain b. fillers c Oil stain
d. paint
15. It prevents moisture on the wood that causes decay.
a. Enamel
b. paint
c. Varnish
d. lacquer​

Answers

That the whole paper bro

which is true? a. a program must import java.io.system to use system.out b. system.output.print() only outputs objects of type string c. the output of println() for an object reference includes all data stored in the object d. data written to system.out are placed in a buffer and eventually output

Answers

Data written to System.out are initially stored in a buffer before being output.

What use do Java's System in and System out functions serve?

Similar to how System.out is the console's connected output stream, System.in is its connected input stream. System.in can be forwarded from a shell in the same way as stdin can be in Unix or C terms. Java's static in field is called System.in.

In Java, what does System out Println () mean?

System. out. println() is a Java statement that prints the argument that was supplied to it. Results are shown on the monitor through the println() technique. A method is often called by an objectname.

To know more about  System.out visit :-

https://brainly.com/question/14686510

#SPJ4

Please help me on this

Please help me on this

Answers

Answer:

Phishing

Explanation:

the other answers are just random stuff.

Answer:

It is Phishin

Explanation:

the act of seding out bait aka the fake emails and trying to get people to bite or aka get scammed.

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

"Jon is a DJ and he spends a lot of time traveling around the country to perform at concerts and festivals. He has a large music collection which he must be able to easily transport with him wherever he goes.” What is the best storage device for him?

Answers

Answer:

hard disk

Explanation:

it is used to store information

true or false. the digital ramp adc has a constant sample time.

Answers

The given statement "The digital ramp ADC has a constant sample time" is True because it is due to counter-based design and the relationship between the clock frequency and resolution.

A digital ramp Analog-to-Digital Converter (ADC), also known as a counter-based ADC, works by counting up and comparing the input analog voltage to a reference voltage. This comparison process involves incrementing the digital output and increasing the reference voltage until the reference voltage surpasses the input voltage. At this point, the digital output represents the approximate value of the input voltage.

One of the primary characteristics of the digital ramp ADC is its constant sample time. This means that the time it takes to process and convert each sample remains consistent throughout the conversion process. The constant sample time is primarily determined by the clock frequency and the resolution of the ADC. With a higher clock frequency, the digital ramp ADC can perform the comparisons more quickly, leading to faster conversions. Similarly, a lower-resolution ADC requires fewer comparisons to find the corresponding digital output, resulting in a shorter sample time.

In summary, the digital ramp ADC has a constant sample time due to its counter-based design and the relationship between the clock frequency and resolution. This constant sample time ensures a stable and predictable conversion process, which is essential for accurate analog-to-digital conversion in various applications.

Know more about Analog-to-Digital Converter (ADC) here:

https://brainly.com/question/31779927

#SPJ11

Other Questions
Which of these numbers equals -6 times (-1/2)?A. -3B. -2C. 2D. 3 The short- and long-term goals that an employee sets based on his or her self-assessment usually involve which of the following?1) Desired positions2) Level of skill to apply3) Work setting4) Skill acquisition Find the distance between the two points in simplest radical form (0,-7)(-9,5) Which of the following is an example of a primary function of human resource information system? More than one answer may be correct. a. A small company selects employees who should be considered for promotion by determining which employees have received the top 10% of performance evaluation scores over a three-year period.b. A large corporation changes which insurance carrier will offer health insurance to its employees. Each employee receives an email denoting which of the new insurance carriers plans is most similar to the plan they are currently signed up for.c. An independent bookstore wants to open a new store in a neighboring city and needs to determine how many employees it should hire based on the characteristics and square footage of the new store.d. A large corporation is switching to an open floor plan and needs to determine where each employee will sit. In the figure below, a man who is biologically male but considers himself a woman and would like to live as a woman is: 1. which task might the nurse delegate to nursing assistive personnel (nap) caring for a patient receiving iv medication via mini-infusion pump? Today, two neighbors water their lawns. One neighbor waters her lawn every four days. The other neighbor waters his lawn every three days. In how many days will they water their lawns on the same day again? Which of the following are ways in which people can get an aptitude?D born with itbuy itO acquire itborrow it Rewrite the expression as a single exponent sam left a 18% tip on a 55$ dinner bill. A- how much was the tip? B- what was the total bill? Which equation represents a graph with a vertex at ("3, 2)? y = 4x2 24x 38 y = 4x2 " 24x 38 y = 4x2 12x 2 y = 4x2 16x 13. Suppose that the relation G is defined as follows.= {(3,9), (6,9), (4,0)}Give the domain and range of G.Write your answers using set notation. Please solve this as quick as possible, Ill give brainliest for it, thank you so much if u do it According to Wikipedia, the average weight of an adult male in the U.S. is 197.7 pounds with a standard deviation of 18 pounds, while the average adult female weighs 168.7 pounds with a standard deviation of 15 pounds. Both weights vary according to a Normal distribution.7.) If you randomly selected one adult woman, what is the probability that her weight exceeds (is higher than) 130 pounds?Suppose you randomly selected one adult male and one adult female from the entire U.S. population. Let the variable D = the difference in their weights (male female).8.) Calculate and interpret the mean of D.9.) Interpret your answer from #8 in context.10.) Calculate the standard deviation of D.11.) Calculate the probability that the randomly selected male would weigh less than the randomly selected female. Outline the attributes of the legislative branch which make it unique to the other two branches of government. Question 4 of 13if v = (-2,5) and V2 = (4,-3), then the angle between the two vectors isRound your answer to two decimal places. please i need help asap how much simple interest will be earned in 3 years on $2500 in an account that pays 1.5% Is water an element or compound what is the difference between the intercrater plains and the smooth plains that are found on mercury in terms of time of formation?