what emotionally charged language did richard nixon use to persuade people that going into cambodia was the right thing to do?

Answers

Answer 1

The emotionally charged language that richard nixon use to persuade people that going into cambodia was the right thing to do is that Nixon focus on the threat posed  with regards to the Viet Cong and North Vietnamese troops operating in Cambodi.

What did Nixon do in regards to Cambodia?

He announced his decision to launch American forces into Cambodia with the special objective of capturing COSVN, "the headquarters of the entire communist military operation in South Vietnam."

Nixon's speech on national television on 30 April 1970 was called "vintage Nixon" by Kissinger.

Learn more about nixon  at:

https://brainly.com/question/25946463

#SPJ1


Related Questions

A specialty search engine searches only websites that require a subscription.
(True/False)

Answers

False. Specialty search engines search the internet for websites related to a particular topic or interest, but do not require a subscription to access the websites.

What is engines?

Engine is a machine that converts energy into mechanical work. Engines are typically fueled by combustible substances such as petroleum, coal, and natural gas, although some engines can be powered by electricity, nuclear energy, or solar energy. Engines are used in a wide range of applications, from cars and airplanes to industrial machinery, power plants, and even ships. Engines are found in all kinds of machines, from lawn mowers to tractors to ships. Engines are used to power many tools and machines, providing the energy to make them move. Engines are also used to generate electricity and to power pumps, compressors, and other machines.

To learn more about engines

https://brainly.com/question/512733

#SPJ

What is the name of the function below?

function go(){
alert("hello everybody");
}

Answers

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

clamwin identified that the targetwindows04 machine was infected with the back orifice (bo) exploit. explain how this virus was named and why it can still be dangerous.

Answers

Clam Win is an antivirus software that detected the presence of the Back Orifice (BO) exploit on the targetwindows04 machine. The Back Orifice exploit was named based on its ability to create a "backdoor" into a computer system, allowing unauthorized remote access. The term "Orifice" refers to an opening or passage, highlighting how this exploit provides an entry point for malicious individuals.

The Back Orifice exploit can still be dangerous for a few reasons. Firstly, it allows attackers to gain unauthorized access to a computer system, enabling them to steal sensitive information, install additional malware, or even control the system remotely. This can lead to privacy breaches, financial loss, or disruption of critical systems.

Additionally, the Back Orifice exploit can be difficult to detect and remove. It can hide within the system, making it challenging for antivirus software to identify and eliminate it completely. This can leave the infected machine vulnerable to further attacks and compromise the overall security of the network.

To mitigate the risks associated with the Back Orifice exploit, it is essential to regularly update antivirus software, apply security patches to operating systems and applications, and practice safe browsing habits. It is also crucial to educate users about the dangers of opening suspicious attachments or clicking on unknown links, as these are common methods used to spread malware, including the Back Orifice exploit.

To know more about presence visit:

https://brainly.com/question/30031800

#SPJ11

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint.

Group of answer choices

Answers

True. When you use online services or browse the internet, your activities can leave a digital footprint

What does this include?

This encompasses details like your past internet activity, virtual communications, and any other information that might be saved on remote servers or in online storage.

As a person, you possess some authority over the reflection of your online presence. You possess the option to eliminate specific information or accounts, modify your privacy preferences, or restrict the extent of your online disclosures.

Although it may be difficult to completely delete all digital records, being proactive can assist in controlling and reducing your online presence.

Read more about digital footprint here:

https://brainly.com/question/17248896

#SPJ1

Tonya wants to group some messages in his inbox. What are some of the ways that she can do this? Check all that apply. assign messages a color-coded category. Create a rule to move messages to a new folder. Create a new folder, select/ highlight messages, right-click, and choose Move to folder. Highlight messages, right-click, and choose Group Messages.

Tonya wants to group some messages in his inbox. What are some of the ways that she can do this? Check

Answers

Answer: Create a new folder, select/highlight messages, right-click, and choose group messages.

Explanation: answer above!

Tonya wants to group some messages in his inbox. Some ways that she can do this are:

Assign messages to a color-coded category. Create a rule to move messages to a new folder.To create a new folder, select/highlight messages, right-click, and choose group messages.

What is organizing massages?

A list of folders can be found in the left-side menu of Messages. Click the New Folder button under My Folders. A new window with the title "Create New Folder" will open. In the text box, type the name you want for the new folder.

Touch Conversation categories > Add category, then tap Done to create a category. To view the newly added tab or label, return to the app's home screen. Tap Conversation categories to rename a category. Rename can be selected in the bottom men after selecting the desired category.

Therefore, the correct options are A, B, and C.

To learn more about organizing massages, refer to the link:

https://brainly.com/question/28212253

#SPJ2

write a query to determine supplier number, part number, project number and weight shipped of the maximum weight shipped. be sure to consider the quantity ordered when calculating weight shipped.

Answers

The HAVING clause is used to select only the rows that have the maximum weight_shipped. The subquery in the HAVING clause is used to calculate the maximum weight_shipped.

The SQL query to determine supplier number, part number, project number, and weight shipped of the maximum weight shipped is shown below:SELECT supplier_number, part_number, project_number, SUM(quantity_ordered) * weight_per_unit AS weight_shippedFROM ordersGROUP BY supplier_number, part_number, project_numberHAVING SUM(quantity_ordered) * weight_per_unit = (SELECT MAX(SUM(quantity_ordered) * weight_per_unit)FROM ordersGROUP BY supplier_number, part_number, project_number)Explanation:In the SQL query, the SELECT statement is used to select supplier_number, part_number, project_number, and weight_shipped columns from the orders table. The weight_shipped column is calculated using the formula SUM(quantity_ordered) * weight_per_unit, where quantity_ordered is the number of parts ordered and weight_per_unit is the weight of each part. The FROM clause is used to specify the orders table.The GROUP BY clause is used to group the results by supplier_number, part_number, and project_number columns.

Learn more about query here:

https://brainly.com/question/30881914

#SPJ11

A user acquired a new workstation and is attempting to open multiple large Excel files simultaneously. The user is not experiencing the expected performance when executing such large requests. Which of the following should a technician do FIRST? A. Increase the swap partition.B. Upgrade the CPU in the workstation. C. Upgrade the power supply in the workstation. D. Upgrade the RAM in the workstation.

Answers

A user acquired a new workstation and is attempting to open multiple large Excel files simultaneously but the user is not experiencing the expected performance when executing such large requests. The first action that the technician should take in such a case is to upgrade the RAM in the workstation.

RAM is the abbreviation for Random Access Memory, a type of computer memory that is vital for processing data quickly. A computer can store data temporarily in RAM. The type of RAM utilized in a PC or workstation is known as DRAM. When a user loads an application into RAM, it remains there until they exit the application. The computer transfers data into the RAM when the application is running. As a result, the RAM is utilized to access data, and it is significantly faster than reading data from a hard drive. It would significantly enhance the computer's performance when upgrading the RAM to a higher capacity.So, in conclusion, the technician should upgrade the RAM in the workstation first, to improve its performance.

To know more about workstation visit:

https://brainly.com/question/13085870

#SPJ11

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give the first person brainliest!

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give

Answers

Answer:

what question is this ?? can you be more specific i need more details on the question

Explanation:

The program written in Python programming language that performs the required computations is:

n = int(input("n: "))

while n != 1:

   if n%2 == 0:

       n = int(n/2)

   else:

       n = int(3 * n + 1)

   print(n)

How to write the program in Python programming language?

The program written in Python programming language, where comments are used to explain each line is as follows:

#This gets input for n

n = int(input("n: "))

#The following loop is repeated until the value of n is 1

while n != 1:

#This checks if n is an even number; n is halved, if this condition is true

   if n%2 == 0:

       n = int(n/2)

#If n is an odd number; n is tripled and increased by 1

   else:

       n = int(3 * n + 1)

#This prints the sequence of numbers generated

   print(n)

The above program generates the sequence of numbers for n

Read more about python programs at

https://brainly.com/question/26497128

#SPJ1

Find the cost of 2m 20cm at 25p per metre​

Answers

Answer: 55 meters.

Explanation:

First convert the 20 cm to meters so the entire number is in meters.

1 meter = 100 cm

20 in cm is:

= 20/100

= 0.2 meters.

2.2 meters.

One meter costs 25p so 2.2 meters will cost:

= 2.2 * 25

= 55 meters

Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.

security

what time of day you are online

protection of sensitive information

from which location you are accessing the site

Answers

Answer:

protection of sensitive information

Explanation:

Answer:

a c baka baddies

Explanation:

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus

Answers

There are different kinds of virus. The  issue with the client’s computer is Computer virus.

What is computer virus?

A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.

The Examples of computer viruses are:

Worms Trojans , etc.

The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.

Learn more about Computer virus from

https://brainly.com/question/20407534

Why would you expect CRC to detect more errors than simply using a parity bit?

Answers

CRC (Cyclic Redundancy Check) is expected to detect more errors than simply using a parity bit due to its mathematical properties and the size of the check sequence it generates.

CRC is a more robust error-detection technique compared to a simple parity bit because of the following reasons:

Check Sequence Size: CRC generates a longer check sequence than a parity bit. A parity bit only adds one additional bit to the data, while CRC appends a check sequence that is typically several bits long. The larger check sequence increases the likelihood of error detection since it provides more possible error patterns to detect.

Polynomial Division: CRC uses polynomial division to generate the check sequence. This process introduces a more complex mathematical calculation that spreads the error-detection capability throughout the data. It can detect burst errors, which are consecutive errors that are more likely to occur in real-world transmission scenarios.

Error Detection Efficiency: CRC has a higher probability of detecting errors than a simple parity bit due to its mathematical properties. It can detect a broader range of errors, including both single-bit errors and some multiple-bit errors. The specific CRC polynomial used and its properties influence the error-detection efficiency.

Overall, CRC is designed to provide better error detection capabilities by generating a larger check sequence and employing more sophisticated mathematical techniques. It is widely used in communication protocols, storage systems, and digital networks to ensure data integrity.

Learn more about CRC and error detection techniques here: brainly.com/question/33326994

#SPJ11

Which is an automatic start action you can choose for a virtual machine?

Answers

 Power on  is an automatic start action you can choose for a virtual machine.

What is the action?

A virtual machine's automatic start action often refers to the step the virtualization platform takes when the host computer is turned on or restarted. Depending on the virtualization software being utilized, the specific settings could change.

When the host computer starts up or is restarted, the virtual machine turns on automatically. For the majority of virtualization platforms, this is the default setting.

Learn more about virtual machine:https://brainly.com/question/31674424

#SPJ1

application of computer in the field of hotel management?​

Answers

Answer:

1) Computers are used extensively by lodging managers and their assistants to keep track of guests' bills, reservations, room assignments, meetings, and special events. In addition, computers are used to order food, beverages, and supplies, as well as to prepare reports for hotel owners and top-level managers.

Explanation:

Simplest Technologies developed a complete Hotel Management System application, designed for multiple computers via LAN. It features a whole range of integrated modules including front desk, housekeeping, restaurant management, statistics, and MIS reports.

This innovative Hotel Management System offers you unmatched flexibility in managing your day-to-day business operations. Starting from the interactive system of effectively managing hotel rooms with multiple rates like individual rates and the corporate rate to preparing review reports and MIS reports and all kinds of sales reports with a wide range of statistics, this Complete Hotel Management System is worth in the business proposition.

There are many different uses for computers in hotels. The first would be at the front desk. These computers have intricate software called the Property Management System (PMS) to do all the check-ins, guest accounting, etc. The most famous is Opera or Sabre.

Second, in the restaurant, lounge, or bar is a new computer entirely called a Point of Sale System (POS). This will collaborate with a PMS to bill guests for a meal, etc, but can also be used as a cash register. The third is the computer in the sales office, which software is most likely Delphi which is a booking terminal.

To learn more about the application of computer visit the link:

https://brainly.com/question/15226105

During which phase of system development would you acquire any necessary hardware and software?

Answers

During the design phase of system development, you would acquire all the necessary hardware and software.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

Also, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).

In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.

Read more on phases here: brainly.com/question/7112675

#SPJ1

Anybody know the answer to this question?

Answers

Answer:

sorry i need pointssssss

ball.setSize(25, 75);
What does 25 represent in the example above?
1. The SPEED of the ball
2. The WIDTH of the ball
3. The HEIGHT of the ball
4. The 'X' coordinate of the ball

Answers

Answer:

2

Explanation:

. WAP in c to Rotate the elements of 2D array by 90:
eg [1 2 3 4 5 6 7 8 9] [7 4 1 8 5 2 9 6 3]

Answers

Here's a C program that rotates the elements of a 2D array by 90 degrees:

#include <stdio.h>

#define N 3

void rotateArray(int arr[N][N]) {

   // Transpose the array

   for (int i = 0; i < N; i++) {

       for (int j = i + 1; j < N; j++) {

           int temp = arr[i][j];

           arr[i][j] = arr[j][i];

           arr[j][i] = temp;

       }

   }

   // Reverse each row of the transposed array

   for (int i = 0; i < N; i++) {

       int start = 0;

       int end = N - 1;

       while (start < end) {

           int temp = arr[i][start];

           arr[i][start] = arr[i][end];

           arr[i][end] = temp;      

           start++;

           end--;

       }

   }

}

void displayArray(int arr[N][N]) {

   for (int i = 0; i < N; i++) {

       for (int j = 0; j < N; j++) {

           printf("%d ", arr[i][j]);

       }

       printf("\n");

   }

}

int main() {

   int arr[N][N] = {{1, 2, 3}, {4, 5, 6}, {7, 8, 9}};

   printf("Original Array:\n");

   displayArray(arr);  

   rotateArray(arr);

   printf("\nArray after rotation:\n");

   displayArray(arr);

   return 0;

}

The rotateArray function takes a 2D array as input and rotates it by 90 degrees. It achieves this by first transposing the array (swapping elements across the diagonal) and then reversing each row. The displayArray function is used to print the elements of the array.

In the main function, we initialize the array with the given values [1 2 3 4 5 6 7 8 9]. We then display the original array, call the rotateArray function to rotate it, and finally display the rotated array [7 4 1 8 5 2 9 6 3].

Original Array:

1 2 3

4 5 6

7 8 9

Array after rotation:

7 4 1

8 5 2

9 6 3

The elements of the array have been successfully rotated by 90 degrees.

For more questions on program

https://brainly.com/question/26134656

#SPJ11

help i dont know answer

help i dont know answer

Answers

Answer:

Selenium - Web browser automation tool

JMeter - Load testing tool

QTP - Functional testing tool

Quality Center - test management tool

Bugzilla - Defect - Tracking tool

Explanation:

Write the steps for viewing tab stops in a word document. Hurry pleasee!!

Answers

Click the home tab> paragraph group > paragraph setting
Then click tabs button
Set the tab stops position> chose alignment and leader options and the click set and ok

Tom wants to send some songs to one of his friends by short-range wireless connection in his home. Which technology would suit this task?

a. Wifi
b. WLAN
c. Bluetooth
d. PAN

Answers

Answer:

a

Explanation:

pls help IM BEGGING U ITS 10 POINTS PLS

For months, Aida and her three closest friends hod been waiting for a new movie to come out. The movie was
based on one of their fovorite books, ond they promised they would see it all together and then go out fpr
plzza. On the movie's opening weekend, Aida had a lost minute emergency ond wasn't able to go. The others
decided to go anyway becouse they had really been looking forwad to it. That night they posted costantly
about their fun ond new inside jokes. Aida wonted to keep connected, but seeing the constant posts bummed
her out. She felt like no one even cared that she had missed out on their plans.


Imagine: Imagine how the situation could be handled. Come up with as many ideas as
possible: There's no one "right" answer! Then, highlight which option might lead to the most
positive outcome, where most people feel good or taken care of.

Answers

Answer:

It's your Opinion/Decision.

Explanation:

In general, her group of friends could've been considerate people, and should have remembered that she couldn't go and NOT posted about it, and tell her about it the next time they met up.

2. Why do you think the order of operations still applies in Java? Give an example to show what could happen if you didn't use order of operations? 3. Why is it important to know the type of a variable?​

Answers

The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

Does order of operations apply in Java?

Yes, Java is known to be one that tends to adhere as well as follows the standard arithmetic order that is made for their operations.

In Java, the order of an operator are seen to always examine themselves from left-to-right and the argument lists are always examined from left-to-right.

An example is seen in the expression of : A() + B() * C(D(), E()), where the given subexpressions are said to be examined in the order of: A(), B(), D(), E(), and C()

Therefore, The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

Learn more about Java from

https://brainly.com/question/25458754

#SPJ1

if you add a hashtag channel in a slack message does the message go to that group

Answers

Answer:

YES IT DOES                                                                                                                            

Explanation:

......

Write an inheritance hierarchy that models sports players. Create a common superclass to store information common to any player regardless of sport, such as name, number, and salary. Then create subclasses for players of your favorite sports, such as basketball, soccer or tennis. Place sport-specific information and behavior (such as kicking or vertical jump height) into subclasses whenever possible. All athletes need to have at least 2 specific attributes that are added on in the subclass

Answers

To model an inheritance hierarchy for sports players, we'll start by creating a common superclass named Player. This superclass will store information that applies to any player, regardless of their sport. Then, we'll create subclasses for specific sports like BasketballPlayer, SoccerPlayer, and TennisPlayer. These subclasses will include sport-specific attributes and behavior.

Here's the hierarchy:

1. Player (superclass)
  - Attributes: name, number, salary
  - Methods: None

2. BasketballPlayer (subclass of Player)
  - Attributes: verticalJumpHeight, threePointAccuracy
  - Methods: shoot(), dribble()

3. SoccerPlayer (subclass of Player)
  - Attributes: kickingPower, dribblingSkill
  - Methods: kick(), pass()

4. TennisPlayer (subclass of Player)
  - Attributes: serveSpeed, forehandAccuracy
  - Methods: serve(), hit()

In this hierarchy, the superclass Player includes common attributes such as name, number, and salary. Subclasses for specific sports then inherit these attributes and add their own sport-specific attributes (e.g., verticalJumpHeight for BasketballPlayer) and behaviors (e.g., shoot() method for BasketballPlayer).

Know more about the hierarchy click here:

https://brainly.com/question/30076090

#SPJ11

An example of a technological innovation that increased the country’s natural resource base is.

Answers

The oil drill is an illustration of a technological advancement that enhanced the nation's natural resource base.

What does the term "technology innovation" mean?A new or enhanced product or procedure with considerably better technological features is referred to as a technological innovation. New products (product innovations) or processes (process innovations) that have been commercialized constitute technologically implemented product innovations.An expanded definition of innovation is technological innovation. Although innovation is a fairly well-defined notion, many people—especially those in the academic and corporate worlds—understand it to mean different things. Technological breakthroughs including wind turbines, photovoltaic cells, concentrated solar power, geothermal energy, ocean wave power, and many other recent innovations are included in the innovations. Innovation in technology benefits society. By bringing new, better products and services to the populace, it raises productivity and raises the level of living for everyone. Innovation's advantages sometimes take time to manifest. They frequently affect the entire population in a wide sense.

To learn more about technological innovation, refer to:

https://brainly.com/question/19969274

#SPJ4

which identifier represents the unique 15-digit number of a mobile device?

Answers

The identifier that represents the unique 15-digit number of a mobile device is the IMEI (International Mobile Equipment Identity).

IMEI is a unique identifier assigned to each mobile device, including smartphones and tablets. It consists of a 15-digit number that serves as a unique identifier for a specific device globally. IMEI numbers are typically used by mobile network operators and manufacturers to track and identify devices, facilitate device registration, and prevent device theft or fraud. To find the IMEI number of a mobile device, you can usually dial *#06# on the device's dialer, and the IMEI number will be displayed on the screen. Additionally, the IMEI number is often printed on the packaging or can be found in the device's settings. It's worth noting that the IMEI number is different from the SIM card number or the mobile phone number, as it specifically identifies the hardware of the device itself.

learn more about IMEI here:

https://brainly.com/question/14374873

#SPJ11

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

I need to learn c++ program . can someone please help me With this​

Answers

Answer:

sure i can help

Explanation:

What’s the work???? Or problem ?

Which of the following are considered types of data? Select three options.
interpretation
numbers
text
Ophotographs
statistics

Answers

It's not only that this particular information might be considered to be more private or sensitive. These particular categories of personal data warrant special protection, according to the UK GDPR's recitals.

What are the four categories of data gathering?

Based on the methods used to acquire them, data can be divided into four basic categories: observational, experimental, simulational, and generated. The nature of the research data you gather could have an impact on how you manage that data.

What are the three categories of data gathering?

Different techniques can be employed to collect data under the main three core groupings of research methods (quantitative, qualitative, and mixed). Interviews can be conducted over the phone or in person.

To know more about data gathering here:

brainly.com/question/17538970

#SPJ1

Other Questions
which chemical is used in alcohol.which chemical is used in alcohol Which expression shows the area of a rectangle whose measurements are width = 5x + 9 length = 7 tax cuts will likely affect aggregate demand and aggregate supply. does it matter which is affected more? explain in terms of the ad-as framework. whom do jainas revere as the most recent of the jinas in this time cycle, sometimes considered the "founder" of present jainism? For a RISC style of CPU, if we want to divide X by Y while they are both residing in memory, we need to bring:A. Only X into a registerB. Only Y into a registerC. None of them into register. It can be done while they are in memoryD. Both X and Y into register Wriite an equation of the line containing the given point and parallel to the given line.(6,3);3x5y=8 The equation of the line is y= ____(Simplify your answer. Type your answer in slope-intercept form. Use integers or fractions for any numbers in the expression.) At a certain time, Janice notices that her digital watch reads a minutes after two o'clock. Fifteen minutes later, it reads b minutes after three o'clock. She is amused to note that a is six times b. What time was it when she looked at her watch for the second time? ANSWER ASAP PLEASE how many atoms do you see? Riley, Inc. produces a single product and has the capacityto produce 70,000 units of this product each month. The perunit costs of this product when 70,000 units are producedare shown below:direct materials $26.90direct labor $ 5.80variable overhead $ 2.50fixed overhead $17.20variable selling costs $ 1.80fixed selling costs $ 6.70The normal selling price of the product is $65.40 per unit.Riley is currently selling 68,400 units of this product toregular customers.Riley, Inc. has just obtained a request for a special orderof 4,000 units to be shipped at the end of the current monthat a discounted price of $57 per unit. The variable sellingcosts would only be $1.40 per unit on the special order. Calculate the increase in Riley, Inc.'s net income if theyaccept the special order. Plot each point. 11) (-1, -4,-1) 12) 3.-1.-1) Compare and contrast lifestyle choices that positively affect physical fitness with those that negatively affect physical fitness. plsss helppppp i rlly need this 4.2. The following information relates to Machine Productive at 31 December 2020: Historic Carrying amount Fair value less cost to sell Value in Use Tax Base Remaining useful life R 400 000 340 000 32 The relation R is defined on set A = {23, 51, 36, 75, 35, 11,102, 9, 10, 29}, and aRb means a b (mod 3)Explain and Draw R in Digraph Notation Look at the picture for each of the following extracts from advertisements identify and explain how ethos pathos or logos is being used the easiest way to check to make sure you are walking or running with enough intensity to improve cardiorespiratory fitness is to group of answer choices use the talk test. judge by the amount of perspiration. use a device to confirm your speed. check your breathing rate. An experiment is conducted examining the effects of a new type of toothpaste on reducing cavities. Individuals in the treatment condition are given the new toothpaste; individuals in the control condition are given the standard toothpaste, but are told that they're receiving the new toothpaste. At the end of the experiment, the control group participants demonstrate a slightly higher decline in cavities. This is an example of a(n):____.a. Wording bias.b. Voluntary response bias.c. Over-sampling effect.d. Placebo effect.d. Hawthorne effect. Which statement best explains why hydrogen's atomic number is equal to its mass? (1 point)O Hydrogen is in the first row and the first column of the periodic table.O Hydrogen has one electron and one proton.O Hydrogen does not have any neutrons.O Hydrogen is stable, with two electrons in its outer shell. Drag each tile to the correct box. Arrange the steps in the correct order to solve the equation. Simplify: . Use the Exponential Property and write in decimal form: . Divide each side by log 2: . Divide both sides of the equation by 3: . Add 5 to each side of the equation: . Take the log of each side: . Add 4 to each side of the equation: . Find the value of and substitute: . My sibling, an experienced runner, gives the best advice "There comes a moment forevery athlete when you can give up or keep going. How you handle that momentmakes all the difference."Which punctuation mark belongs after the word"advice" in the sentence?O 1. period (.)O 2. comma (,)O 3. semicolon (ci)0 4. colon (;)