What is the device used for the calculations of payment and balancing the accounts record s​

Answers

Answer 1
A calculator or bank? Maybe an atm
Answer 2
I have the answer for you

Related Questions

a security expert paid to try and gain unauthorized access to a computer system or network to find security holes is known as a

Answers

A security expert paid to try and gain unauthorized access to a computer system or network to find security holes is known as a Penetration Tester.

A security expert paid to try and gain unauthorized access to a computer system or network to find security holes is known as a penetration tester or ethical hacker. They are professionals who test computer systems or networks to find security holes that an attacker could exploit.

They use the same techniques as black hat hackers, but they do so with permission and for the purpose of improving security measures.Penetration testers typically begin by gathering information about the system they are testing. This can include information about the operating system, the software that is installed, the network topology, and any known vulnerabilities.

They may also use social engineering tactics, such as phishing, to try to gain access to sensitive information.Once they have gathered information about the system, they will attempt to gain access to it. This can involve trying to guess passwords, exploiting vulnerabilities in software, or using malware to gain access. Once they have gained access to the system, they will try to escalate their privileges to gain access to more sensitive information or to take control of the system.

Once the penetration tester has completed their testing, they will provide a report to the organization that hired them. This report will detail the vulnerabilities that were discovered and the steps that can be taken to fix them. The organization can then use this information to improve their security measures and prevent unauthorized access to their systems or networks.

Penetration testing is an important part of maintaining the security of computer systems and networks. By identifying vulnerabilities and providing recommendations for improvement, penetration testers help organizations to stay ahead of potential attackers and keep their data safe.

For more question on "Penetration Tester" :

https://brainly.com/question/28502225

#SPJ11

3. How are you able to create photographs differently than 100 years ago?

Answers

Answer:

it willbe black and white

Explanation:

Answer:

Yes, of course!

Explanation:

Digital Cameras can create photographs very different than 100 years ago, which means the answer is yes.

the biggest disadvantage to using the internet as a source of research, rather than business databases and other sources available at the library, is that

Answers

One of the biggest disadvantages of using the Internet as a source of research, instead of business databases and other available sources at the library, is that 'information provided on the Internet is less reliable than information gathered in business databases and library sources'.

Following are some reasons that make the Internet a less reliable information source as compared to other sources:

Anyone can post anything, thus, no concept of quality assurance. Most information has not been checked for accuracy.The information provided on different websites differs in purpose, quality, and bias.Some websites are old and the information existing there is outdated.

As a resercher you your are responsible for collecting reliable data for your research work. So, you should collect the data and information from more reliable sources such as databases and library.

You can leran more about Internet at

https://brainly.com/question/2780939

#SPJ4

what family of technology helps us gather, store, and share information?

Answers

Answer:

ITC’s are the family of technology

Explanation:

:)

A filter is used to create a temporary subset of data from a database.
a. True
b. False

Answers

It is true that a filter is used to create a temporary subset of data from a database.

A temporary subset of data from a database is made using a filter. A data mine is a small portion of a data warehouse. Data warehouses only store information from one period of time. Records are uniquely identified by a primary key.

We have access to a variety of instruments for data collection, including surveys, focus groups, interviews, and questionnaires. We can use charts and graphs, such as bar graphs, frequency charts, image graphs, and line graphs, to help organise data and help us perceive what is happening.

Data redundancy is the term for data duplication. Data redundancy eats up the free space in the computer's memory, so it should always be checked for.

Know more about database here:

https://brainly.com/question/29412324

#SPJ4

You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives

Answers

Answer:

thunderbold proly

Explanation:

a radio frequency identification (rfid) tag provides a generic identification for a credit or debit card carrying the tag.

Answers

Using radio waves, Radio Frequency Identification (RFID) technology can identify individuals or things.

What is Radio Frequency Identification?Using radio waves, Radio Frequency Identification (RFID) technology can identify individuals or things. It is possible to read data from a wireless device or "tag" from a distance without making physical contact or needing a clear line of sight using certain devices.Since the 1970s, various forms of RFID technology have been made commercially available. Car keys, employee identification, medical billing and history, toll road tags, and security access cards all contain it today and are now a common part of our daily lives. The proximity and vicinity types of RFID technology are both used by the US government for border management:Documents with proximity RFID capability can be securely and precisely read by authorized readers up to 20 to 30 feet away.Documents with proximity RFID capability can only be read from a few inches away and must be scanned close to an authorized reader.Only a number pointing to the data kept in secure databases is stored on the RFID card instead of any personal information.

To Learn more About Radio Frequency  refer to:

https://brainly.com/question/254161

#SPJ4

Consider the program snippet, what will be the output when the input grade is 74?

Answers

Without the actual program Snippet, I can't provide a specific output, but these steps give you an idea of how the program will process the input grade of 74 and produce the output accordingly.

I understand that you need help with a program snippet involving the input grade of 74. I will explain the expected output,


1. When the input grade is 74, the program snippet will first evaluate any conditions related to the grade.

2. If there are conditional statements, like if-else or switch-case, the program will check which condition 74 meets. For example, it might check if the grade falls within specific grade brackets (A, B, C, etc.).

3. Once the program identifies the condition that 74 meets, it will execute the corresponding block of code. This could involve printing a message or performing additional calculations.

4. Finally, the output will be displayed, depending on what the code block instructs. For instance, if the program is designed to display the letter grade, it might output "C" for a grade of 74.

To Learn More About Snippet

https://brainly.com/question/30727432

SPJ11

Identify the correct statement for defining an integer array named numarray of ten elements.
int [ 10 ] numarray;
int [ ] numarray = new int [ 10 ];
int [ ] numarray = new int [ 9 ];
int numarray [ 10 ];
Complete the following code with the correct enhanced for loop so it iterates over the array without using an index variable.
String[] arr = { "abc", "def", "ghi", "jkl" };

Answers

The correct statement for defining an integer array is b) int[] numarray = new int[10]. The declaration does not actually construct an array, it only instructs the compiler that the variable in question will store an array of the designated kind.

A container object called an array carries a predetermined number of values of a single kind. When an array is constructed, its length is predetermined. Each component of an array is referred to as an element, and each element may be retrieved by its unique integer index. Numbering starts at 0, so the index 8 would be used to retrieve the ninth element.

The following piece of code in the preceding program declares an array with the name an Array:

// declares an array of integers

int[] anArray;

The type of the array and the array's name are the two parts of an array declaration, just like declarations for variables of other types. The type of an array is represented as type[], where type is the data type of the elements it contains. The braces are special symbols that signify the variable is an array. The array's size is not a component of its type (which is why the brackets are empty).

To learn more about array click here:

brainly.com/question/26104158

#SPJ4

What are some real-life situations where multi-dimensional arrays might be useful?

Answers

If you think, there are many game application where you can use a Multi-dimensional array. If we talk about a game then chess is the first game where rows and columns are used. The Second is the tic-tac-toe game and other board games are there too.

Calculate goodman bee's net working capital. use the data provided in the problem.

Answers

The correct answer is $1,800,000. The gap between a company's current assets and current liabilities on its balance sheet is known as net working capital (NWC).

To calculate the net working capital of Goodman Bees’, you need to subtract the current liabilities from the current assets.

Current assets = cash and marketable securities + accounts receivable + inventory = $400,000 + $1,200,000 + $2,100,000 = $3,700,000

Current liabilities = accrued wages and taxes + accounts payable + notes payable = $500,000 + $800,000 + $600,000 = $1,900,000

Net working capital = Current assets - Current liabilities = $3,700,000 - $1,900,000 = $1,800,000

Learn more about net working capital:

https://brainly.com/question/14817672

#SPJ11

complete question is.

The question is asking you to calculate Goodman Bees’ net working capital. The following balances are given in the balance sheet: cash and marketable securities = $400,000, accounts receivable = $1,200,000, inventory = $2,100,000, accrued wages and taxes = $500,000, accounts payable = $800,000, and notes payable = $600,000.

What are the motivations of hackers?

Answers

Revenge is a frequent motivation for hacking, with financial benefit or disruption being a byproduct of their anger.

This is especially true when dealing with disgruntled employees because their intimate information of their modern or former enterprise gives them a leg up in opposition to protection systems.

What are the types of hackers and motivation?

White hat hackers probe cybersecurity weaknesses to assist groups improve more desirable security; black hat hackers are motivated through malicious intent; and Gray hat hackers operate in the nebulous place in between — they're now not malicious, but they're no longer constantly ethical either.

What motivates hackers to do cyber crime?

For instance, all cybercrimes linked to ransomware, phishing, on-line economic crimes, on line fraud, password cracking, malware, hacking, sextortion are generally motivated via economic attain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware).

Learn more about motivations of hackers here;

brainly.com/question/24108528

#SPJ4

Help me please with this

Help me please with this

Answers

Answer:

Explanation:

QUestion 2 is A

QUestion 1 is A i think

so about computers can you tell me about bit coins and giga watts

Answers

Bitcoin is a decentralized digital money that may be purchased, sold, and exchanged whereas gigawatt hour is a measure of energy that equals one million kilowatt hours.

What is a Bitcoin?

Bitcoin's creator, Satoshi Nakamoto, originally described the need for “an electronic payment system based on cryptographic proof instead of trust.” Digital currency known as Bitcoin is completely decentralized and not subject to bank or governmental regulation. Instead, cryptography and peer-to-peer software are employed. A public ledger, a copy of which is stored on servers throughout the world, records every bitcoin transaction.

What is a Giga Watts?

1 Kilowatt hour [kWh] = 0.000 001 Gigawatt hour [GWh]

1,449 kilowatt hours (kWh) of energy to mine a single bitcoin.

0.001449 GWh

To know more about Cryptography visit:

https://brainly.com/question/88001

#SPJ1

According to the _______________ Theory, particles must collide together with enough energy and the proper orientation in order for a reaction to occur. The rate of a reaction can be affected by changing factors such as temperature, particle size, concentration of reactants, or adding a catalyst. The purpose of this lab is to determine how the ___________________ of reactants affects the _________ of a reaction. Using the following reaction:

Answers

According to the Collision Theory, particles must collide together with enough energy and the proper orientation in order for a reaction to occur.

This means that not every collision between particles will result in a reaction, as the particles must have enough energy to break the existing bonds and form new ones in the proper orientation. The rate of a reaction can be affected by changing factors such as temperature, particle size, concentration of reactants, or adding a catalyst. Increasing the temperature or concentration of reactants will increase the rate of the reaction, as there will be more collisions occurring with enough energy and orientation to result in a reaction.

However, decreasing the particle size will also increase the rate of the reaction, as smaller particles have a larger surface area, allowing for more collisions to occur. Adding a catalyst will also increase the rate of the reaction by lowering the activation energy required for the reaction to occur. The purpose of this lab is to determine how the concentration of reactants affects the rate of a reaction. Using the following reaction:

To know more about energy visit:-

https://brainly.com/question/1932868

#SPJ11

Write a program that asks the user to enter the name of an input file. If the file does not exist, the program should prompt the user to enter the file name again. If the user types QUIT in any uppercase/lowercase combinations, then the program should exit without any further output.

Answers

Answer:

I can help you with that inbox me

Complete the missing part of the line to allow you to read the contents of the file.
inFile = ____ ('pets.txt','r')

Answers

Answer: Sorry I’m late but the answer is open

Explanation: Edge 2021

The missing part of the line allows you to read the contents of the file. inFile = Open ('pets.txt','r').

What is the file format?

The term file format refers to that, A standard way the information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.

The file format is the structure of that file, Which runs a program and displays the contents. As there are many examples like a Microsoft Word document saved in the. DOC file format is best viewed in Microsoft Word. Even if another program can open the file.

Therefore, By the File format allows you to read content and can open up the file format.

Learn more about  file format here:

https://brainly.com/question/1856005

#SPJ2

Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode variable. Store within the variable the following text:




Movie Description Score




Open the list10-2.js file and directly below your previous code create a for loop with a counter variable i that goes from 0 to 9. Each time through the for loop add the following text to the htmlCode variable:


titles_i
summaries_i
ratings_i


where i is the value of the counter variable, and links_i, titles_i, summaries_i, and ratings_i are the values from the links, titles, summaries, and ratings array with index number i.

After the for loop add the following text to the htmlCode variable:



Store the value of the htmlCode variable in the inner HTML of the element with the ID list.

Answers

Answer:

Sure, here is the code you requested:

```

```

// Declare the htmlCode variable

var htmlCode = `

Movie Description Score

`;

// Create a for loop with a counter variable i that goes from 0 to 9

for (var i = 0; i < 10; i++) {

 // Add the following text to the htmlCode variable

 htmlCode += `

 <div class="movie">

   <h3>${titles[i]}</h3>

   <p>${summaries[i]}</p>

   <p>${ratings[i]}</p>

 </div>

 `;

}

// Store the value of the htmlCode variable in the inner HTML of the element with the ID list

document.getElementById("list").innerHTML = htmlCode;

```

I hope this is what you were looking for!

Explanation:

the range of values that is allowed to be inserted into the tree is between 0 and 100, inclusive. only whole numbers are allowed. no duplicates are allowed! if you were to add a single node, what range of values should the node contain that would result in just a single, left rotation (if no new node could cause this, then say none)?'

Answers

To perform a single left rotation in a binary search tree, we need a specific arrangement of nodes.

Considering the range of values allowed (0 to 100, inclusive) and the requirement of no duplicates, let's assume the initial tree structure contains nodes with values in the range of 0 to 100, distributed in a balanced manner. In such a case, we can add a single node with a value of 101 to trigger a left rotation.

Here's an example to illustrate the scenario:

Initial tree (balanced):

```

       50

      /  \

    25    75

   / \   / \

 10  40 60  90

```

After adding a node with a value of 101:

```

       50

      /  \

    25    75

   / \   / \

 10  40 60  90

            \

            101

```

By adding the node with the value 101, the tree becomes unbalanced, and a single left rotation can be performed to restore balance. In this case, the left rotation would involve the nodes 90, 101, and 75.

It's important to note that this scenario assumes the initial tree is already balanced. If the initial tree is not balanced or contains different nodes/values, the specific value to trigger a single left rotation might differ.

To know more about Binary related question visit:

https://brainly.com/question/28222245

#SPJ11



Which of the following is typically an advantage of configuring your own hosting server over using an ISP or a cloud service provider?
А
o
You do not need to purchase software.
B
Configuring your own servers will take less time.
С
You do not need to purchase hardware.
D
You have more choices in the configuration

Answers

Answer:

D that's the answer it has to be

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

\(\frac{1}{3}\ m/s\)

Explanation:

The computation of the velocity by using the following formula is

As we know that

\(Velocity = \frac{Displacement}{Total\ time\ taken}\)

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

\(= \frac{10\ meters}{30\ seconds}\)

\(= \frac{1}{3}\ m/s\)

We simply applied the above formula so that we can get the velocity and the same is to be considered

You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation

Answers

To configure your network adapter using VMware Workstation and avoid interference with your current network while testing a new DHCP server, you can use the "Host-only" option.

Here are the steps to configure your network adapter using VMware Workstation:

Open the VMware Workstation software.

Select the virtual machine you want to configure.

Click on "Edit virtual machine settings".

In the "Hardware" tab, select "Network Adapter".

In the "Network Connection" section, select "Host-only: A private network shared with the host".

Click "OK" to save the changes.

With this configuration, the virtual machine will be able to communicate with the host system, but it will not have access to the external network, which will prevent interference with your current network while testing the new DHCP server.

Learn more about DHCP here:

https://brainly.com/question/30279851

#SPJ11

xzy corp. developed an early-stage ui model for its customer-facing application using only a few simple elements to show the location of text blocks, images, and major controls on the screen. the models did not include any data nor any details of the controls. which type of a ui model xzy had developed?

Answers

Xzy Corp. developed a wireframe UI model.

About  wireframe UI model

Wireframe UI model is a graphical representation of a user interface that is used to create a blueprint for a website or mobile application. It typically consists of basic shapes and lines to represent the page layout, navigation, and functional elements such as buttons, menus, and text boxes. This model helps designers to create a visual structure and flow to create a better user experience. It can also help developers to understand the functional requirements of the project.

To know more about wireframe UI model
https://brainly.com/question/12108117
#SPJ4

Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.

Answers

#include <iostream>

#include <vector>

#include <numeric>

int main() {

   

   std::vector<int> store(3);

   

   for(int i=0;i<3;i++){

       std::cout << i+1 << ". test result: ";

       std::cin>>store[i];

   }

   

   for(int i=0;i<3;i++) {

       std::cout << i+1 << ". test score: " << store[i] << std::endl;

   }

   

   std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;

   return 0;

}

What is the value of sum after the code segment is executed?

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

A hacker wants to gain illegal Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next to Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next passwords for a popular online website. Where should they direct their attack? A. a bank B. a server C. a removable USB drive D. a laptop

Answers

Since  Elizabeth says that it is impossible for Macs to get viruses because the operating system is sandboxed. The response is D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine.

The place that they should direct their attack is option B. a server.

What is Mac's server name?

Go to Apple menu > System Settings, select General from the sidebar, and then select About from the right-hand menu on your Mac. The name of your Mac's computer can be found at the top of the About settings page (you might need to scroll down).

Malware can infect a Mac computer. Macs are susceptible to malware and viruses. Even while Mac infections are less frequent than PC malware, Mac machines aren't completely shielded from online dangers by the security mechanisms built into macOS.

Note that Sandboxing is widely used to analyze untested or untrusted code and is intended to stop dangers from entering the network. In order to prevent infection or damage to the host computer or operating system, sandboxing keeps the code confined to a test environment.



Learn more about viruses  from

https://brainly.com/question/26128220
#SPJ1





what information does the public terraform module registry automatically expose about published modules?

Answers

The public Terraform Module Registry automatically exposes information about published modules such as module name, version number, and brief description.

What is the Terraform Module Registry?Terraform modules are the reusable components that let you compose infrastructure in a more compact and efficient way. Terraform Module Registry is a registry of community-published Terraform modules. The Terraform Module Registry aims to serve as the primary registry for finding and sharing modules built with Terraform.

In the Terraform Module Registry, you may search for modules that have already been published, as well as view module data such as the module name, version number, brief description, and documentation. The Terraform Module Registry includes both officially supported and community-contributed modules.

They could be used as is or customized to meet the specific needs of your organization. You may also discover modules in the Terraform Module Registry that have been classified as verified modules, indicating that they have been rigorously tested by HashiCorp and adhere to strict best practices.The Terraform Module Registry makes it simple to publish and share Terraform modules.

In the Terraform Module Registry, you may contribute modules or manage existing modules that you've already released to the community. The Terraform Module Registry offers an excellent platform for sharing and discovering Terraform modules. It makes it simple to create, find, and utilize modules, allowing users to focus on other important tasks.

You can read more about Terraform Module Registry at https://brainly.com/question/28621373

#SPJ11

which program pays medicare part a and b or medicare part c premiums, deductibles, coinsurance, and copayments?

Answers

Program that pays medicare part a and b or medicare part c premiums, deductibles, coinsurance, and copayments is Qualified Medicare Beneficiary (QMB) Program.

What is Qualified Medicare Beneficiary Program?

The Qualified Medicare Beneficiary (QMB) Program is one of the 4 Medicare Savings Programs that lets in you to get assist out of your nation to pay your Medicare premiums. This Program facilitates pay for Part A premiums, Part B premiums, and deductibles, coinsurance, and copayments.

In order to qualify for QMB  benefits we need to meet the subsequent earnings requirements,:

Individual monthly earnings limit $1,060Married couple monthly earnings limit $1,430Individual resource limit $7,730Married couple useful resource limit $11,600

Learn more about Qualified Medicare Beneficiary https://brainly.com/question/29818786

#SPJ4

briefly explain what side channel attacks are. explain in simple terms, at-least three different types of information that can enable hardware based side channel attacks. are side channel attacks active or passive in general? g

Answers

An effort to steal information from a chip or system is called a side-channel attack (SCA). To do this, numerous physical parameters can be measured or analyzed. Examples include electromagnetic radiation, execution time, and supply current. Modules that combine cryptographic systems are in grave danger from these assaults. In fact, a variety of side-channel analysis approaches have succeeded in decrypting the secret key and breaking algorithmically secure cryptographic operations.

Attack using electromagnetic (EM) radiation: Analyzes the electromagnetic radiation that a device emits and measures it.During operation, a cryptographic system's power and electromagnetic (EM) fluctuations are directly seen using simple power analysis (SPA).Differential power analysis (DPA) is the process of collecting and analyzing specific statistical data from a variety of operations.

Side-channel attacks are passive in general.

Define electromagnetic attack.

Electromagnetic attacks in cryptography are side-channel attacks that are carried out by measuring the electromagnetic radiation that a device emits and analyzing the resulting signal. These attacks, which often go by the name Van Eck phreaking, are a more targeted variation with the aim of obtaining encryption keys.

Since electromagnetic attacks are often passive and non-intrusive, they can be carried out by observing the target device's regular operation without really harming it. Depackaging the chip and gathering the signal closer to the source, on the other hand, would allow an attacker to acquire a better signal with less noise.

To learn more about electromagnetic attacks, use the link given
https://brainly.com/question/29060492
#SPJ4

Who is known as the "father of computing"?
Mention his contributions?​

Answers

Answer: Charles Babbage

Explanation:

He was named father of computing because of the invention of the Analytical Engine in 1837. This machine contained an integrated memory, a ALU (arithmetic logic unit) and a basic flow control. This machine gave birth to the notion of computer. Unfortunately, the machine wasn't built when Babbage was alive due to some funding issues.

Who is known as the "father of computing"?Mention his contributions?

Answer:

Charles Babbage is known as the father of computer...

Who is known as the "father of computing"?Mention his contributions?
Other Questions
cow-nose, manta, eagle, butterfly, and bat are all varieties of what largest group of cartilaginous fishes? Which types of cells are NOT created through the cell cycle and mitosis? A blacksmith is in the process of making iron horse shoes. each shoe, mass of 255.15g heated to a bright red (816 degrees * c) hammered into shapeand then dropped into water to cool . the bucket contains 4l of water (4000g) initally at room temperature (23 degrees * c) what will the final temperature of the iron be? - specific heat of cast iron: 0.461 j/g c - specific heat of water : 4.18 j/g c Obet has to wrap 25 gifts for the party. He has wrapped 10 gifts already. What percentage of the task has he done?with solution please :D Graph the line y = x + 6.To graph a line, plot any two points on the line. It is sometimes said that "extraordinary claims and theories require extraordinary evidence". (What's meant by "extraordinary evidence" is a great deal of evidence, and what's meant by "extraordinary claims" is claims that are strange or out-of-the-ordinary. So in other words, the claim is that very strange or out-of-the-ordinary claims or theories require a great deal of evidence before we believe them.)Explain how this idea fits our framework of updating and evaluating theories, using all of the following four concepts: prior probability, strength factor, coherence, and simplicity. Select the correct answer from each drop-down menu._________ clue provides words with opposite, or near opposite, meaning.Options:A synonymAn exampleAn antonymAn inference What are two main groups of forces A small heater has a rectangular filter that has a width of 16.0 in. and a length of 20.0 in. Another larger heater requires a similar filter that has a 56 in. width. What is the length (in inches) of this larger filter? (Round your answer using the rules for working with measurements.) Question 1In about hundred words, describe the elements in a customercentric approach to Web design. A chemist needs to create a series of standard Cu2+(aq) solutions for an absorbance experiment. For the first standard, he uses a pipet to transfer 10.00 mL of a 2.61 M Cu2+(aq) stock solution to a 250.0 mL volumetric flask, and he adds enough water to dilute to the mark. He then uses a second pipet to transfer 10.00 mL of the second solution to a 100.0 mL volumetric flask, and he adds enough water to dilute to the mark. Calculate the concentration of the Cu2+(aq) solution in the 100.0 mL volumetric flask. concentration: M What is the slope of the line that passes through the points ( 8 , 6 ) (8,6) and ( 8 , 9 ) (8,9)? Write your answer in simplest form Which is less, 3 or 30? Explain how you know can u help me to write speech about our lifestyle in future please as fast as possible BRAINLIEST TO CORRECT ANSWER What statements are correct? Check all that apply.Write the mixed numbers as improper fractions.Multiply the numerators to get 24.Multiply the denominators to get 6.Write the improper fraction as a mixed number.The product is 4.2The product is 25273 What was Black Hawks role in the War of 1812? On Monday, 414 students went on a trip to the zoo. All 9 buses were filled and 9 students had to travel in cars. Write an equation to find the number of students on each bus. Use b for your variable. Do not solve for b." Question 2 of 10Which of these questions contains a negative?A. "Name all nine of the planets in the solar system."B. "How many planets are in the solar system."C. "Why do most planets have satellites?"D. "Which of these statements about planets is not true?" Who was Thales In geometry? The concept of hiring employees for an indefinite period of time and discharging them without cause at anytime is called the __________.a.) Workers Termination Policyb.) Worker Adjustment and Retraining Notification (WARN) Actc.) Fair Labor Standards Actd.) Labor-Management Relations Acte.) Employment-At-Will Doctrine