which is the keyboard shortcut for deleting with a rectangular selection while using the eraser tool?

Answers

Answer 1

Ctrl + x and command + x are the keyboard shortcut for deleting with a rectangular selection while using the eraser tool in Windows and MacOS respectively in photoshop.

What is photoshop?

Photoshop is a photo editing and raster graphic design programme that enables users to produce, edit, and work with a variety of graphics and digital art. Additionally, it enables the import of images in different file formats as well as the creation and editing of multi-layered raster images.

The Windows and MacOS versions of Photoshop are created by Adobe Systems. Thomas Knoll and John Knoll developed Photoshop in 1988, and Adobe Systems bought the official distribution rights to the software. Numerous updates to Photoshop have been released since then.

Learn more about Photoshop

https://brainly.com/question/16859761

#SPJ4


Related Questions

Computers that are close to one another are connected to form a LAN

Answers

Explanation:

different computer are connected to a LAN by a cable and an interface card

Answer:

network is a group of computers (or a group of smaller networks) that are connected to each other by various means, so that they may communicate with each other. The internet is the largest network in the world.

Question 1 of 10
Which step happens first after a switch receives a message that includes a
MAC address?
OA. The switch receives a reply from the message's receiving device.
B. The switch sends the message to a random device on the
network.
OC. The switch looks up the receiving device's MAC address in a
switching table.
OD. The switch forwards the message to the port of the receiving
device.
SUBMIT

Answers

The step that happens first after a switch receives a message that includes a MAC address is that "The switch looks up the receiving device's MAC address in a switching table." (Option C)

What is a MAC Address?

A media access control (MAC) address is a one-of-a-kind identifier assigned to a network interface controller for use as a network address in intra-network communications. This is a widespread use in most IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth.

What is a switch?

A network switch is a piece of networking gear that links devices on a computer network by receiving and forwarding data to the target device using packet switching.

Learn more about MAC Addresses:
https://brainly.com/question/24812654
#SPJ1

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

Cynthia is concerned about attacks against an application programming interface (api) that her company provides for its customers. What should she recommend to ensure that the api is only used by customers who have paid for the service?

Answers

Answer:

The simplest way to ensure that APIs are only used by legitimate users is to require the

use of authentication. API keys are one of the most frequently used methods for this. If an

API key is lost or stolen, the key can be invalidated and reissued, and since API keys can be

matched to usage, Cynthia's company can also bill customers based on their usage patterns

if they want to. A firewall or IP restrictions may be able to help, but they can be fragile;

customer IP addresses may change. An intrusion prevention system (IPS) can detect and prevent

attacks, but legitimate usage would be hard to tell from those who are not customers

using an IPS.

A. Require authentication.

B. Install and configure a firewall.

Explanation:

What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.

Messages can be right-clicked, flagged as Junk, and moved to a folder.

Configuring a safe sender ensures that emails are not identified as spam.

The default configuration of junk email options is No Automatic Filtering.

No matter what configuration, messages can still be blocked on the network

Moving messages to the Junk Email folder will reduce the size of the mailbox.

Answers

Answer:

Messages can be right-clicked, flagged as Junk, and moved to a folder.

Configuring a safe sender ensures that emails are not identified as spam.

The default configuration of junk email options is No Automatic Filtering.

No matter what configuration, messages can still be blocked on the network.

Explanation:

People often sent mail. The answers to the question of Junk email is below.

Messages can be right-clicked, flagged as Junk, and moved to a folder.Configuring a safe sender ensures that emails are not identified as spam.The default configuration of junk email options is No Automatic Filtering.No matter what configuration, messages can still be blocked on the network.

How does Outlook junk email filter work?

The Junk Email Filter is known to look into all the incoming message to known if  it might be spam, based on different factors.

These often include the time when the message was said to be sent and the content of the sent message. By default, the Junk Email Filter is always turned on and the protection level is set to minimum.

Learn more about Junk email from

https://brainly.com/question/14568877

When planning a table, what step comes first: "define the column headers" or "calculate the number of columns/rows"?.

Answers

When planning a table, the first step is to "define the column headers."

What is table?

A table is a collection of information or data that is commonly organised in rows and columns, but can sometimes have a more sophisticated structure. Tables are common in communication, research, and data analysis. Tables can be found in a variety of media, including print media, handwritten notes, computer software, architectural ornamentation, traffic signs, and many more locations. The specific conventions and vocabulary used to describe tables differ depending on the situation. Tabular format refers to information or data provided in table form (adjective). Tables are often displayed separately from the main text in numbered and labelled floating chunks in books and technical papers.

To learn more about table
https://brainly.com/question/28001581

#SPJ4

What do you understand by memory word?​

Answers

Answer:

Explanation:

a 5-bit memory in which the individual memory bits are content5_4 , content5_3 , content5_2 , content5_1 , and content5_0

Input/output devices provide data and instructions to the computer and receive results from it.
a. True
b. False

Answers

The computer receives data and instructions from true input/output devices, which also deliver results.

What system is utilised to receive information or commands from the user?

Devices known as input devices provide data to a computer so it can carry out a task. Data and instructions are entered into a computer via input devices such a keyboard, mouse, light pen, etc.

How do input and output devices function in a computer system?

Computer input and output devices: An output device is a device that receives data from a computer system and then reproduces or displays the results of that processing, whereas an input device is a device that delivers data to a computer system for processing.

To know more about input/output visit:-

https://brainly.com/question/30160104

#SPJ1

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n) __________ attack.

Answers

Answer:

"Advanced persistent threat " is the right one.

Explanation:

APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period. They represent compound channel assaults that use different components including various approaches of attack.

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

When this logic block is included in a control structure, what must be the
case for the entire condition to be met?
and
OA. One or both of the conditions must be true.
OB. Only one of the conditions must be true.
C. Both conditions must be true.
OD. Neither condition must be true.
CUR

Answers

When this logic block is included in a control structure, for the entire condition to be met, " One or both of the conditions must be true." (Option A)

What is a Control Structure?

The sequence in which individual statements, instructions, or function calls in an imperative program are performed or evaluated is referred to as control flow in computer science. An imperative programming language is distinguished from a descriptive programming language by its emphasis on explicit control flow.

In structured programming, there are three basic control structures. Structure of Sequence Control: This refers to line-by-line execution, in which statements are run in the same sequence as they occur in the script.

In C, there are four types of control statements:

Statements of decision-making (if, if-else)Statements of choice (switch-case)Statements of iteration (for, while, do-while)jump  Statements (break, continue, goto)

In other words, control statements allow users to determine the sequence in which instructions in a program are executed. These enable the computer to make certain decisions, do particular activities repeatedly, or even go from one piece of code to another.

Learn more about Control Structure:
https://brainly.com/question/28144773
#SPJ1

Answer:

I think your asking the and one

the answer to that is

both conditions must be true

i just did it

Explanation:

What do you like least about coding in python?​

Answers

Something I dislike is it emphatically controverts decades of programming experience with its syntax.

Will mark BRAINLIST only if correct answer
Please need help ASAP only answer if u know the correct answer without plagiarism please (plus 15 points!)

Q1.illustrate the ways to creat human design with good impact to others. (5 ways at least)

Q2.( in the pic)

Will mark BRAINLIST only if correct answer Please need help ASAP only answer if u know the correct answer

Answers

Answer:

Yes, because it adds meaning to Sam life by providing him ways to calm himself and sooth his mind and also helps him deal with stress in his life

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

Problem:
A VGA controller has its memory. The CPU can write to it bit by bit. A refresh input
to the controller causes the controller to sequentially output all its bits on the screen.
You are to design such a controller for 32x32 bit screen. It should have 5-bit X and Y
inputs with an enable and set input. It means to set the bit at X, Y to the set input
when enable is high. From the cycle when the refresh input was high it outputs all bits
from 0,0-31,31 one by one every clock cycle. During refresh it neither sees any
further refresh signal nor any input to set data.

Inputs:
Clock Pulse CP
Input Available IA
Set bit S
X position X0…X4
Y position Y0…Y4
Refresh input REFRESH

Outputs:
Output Available OA
Output Data OD

How do I make this?

Answers

To design the VGA controller, implement a 32x32 bit memory array to store pixel data, and input logic to write data to the memory based on X/Y coordinates and Set input.

How to implement the logic

Implement output logic to sequentially output all bits on the screen during Refresh, starting from 0,0 and ending at 31,31, ignoring further input during Refresh.

Output data on each clock cycle with an Output Available signal. The controller can be built using digital logic components such as flip-flops, counters, and multiplexers.

Read more about VGA here:

https://brainly.com/question/1590202

#SPJ1

Answer:

ExplanatiTo design the VGA controller, implement a 32x32 bit memory array to store pixel data, and input logic to write data to the memory based on X/Y coordinates and Set input.

How to implement the logic

Implement output logic to sequentially output all bits on the screen during Refresh, starting from 0,0 and ending at 31,31, ignoring further input during Refresh.

Output data on each clock cycle with an Output Available signal. The controller can be built using digital logic components such as flip-flops, counters, and multiplexers.

on:

Which is the best example of a strong topic sentence?

Answers

With six classes a day, middle school is challenging.

Answer:

b

Explanation:

Which term is used to describe audiences who regularly watch cnn, home shopping network (hsn) and the weather channel?

Answers

The word is used to tell audiences who regularly watch CNN, home shopping network (HSN), and the weather channel to revisit the channel often.

What does channel mean in CNN?

In CNN this signifies that individually your filters get used to each of your tracks. Why? Because it might be that your filters get additional details from each of the media. And maybe they converge to different filters after each comprehending step as well. Follow this answer to receive notifications.

CNN has 36 units around the world and approximately 4,000 workers worldwide. CNN's range is grown and maintained by more than 900 affiliates worldwide.

To learn more about CNN, refer to:

https://brainly.com/question/17263283

#SPJ4

20 POINTS!!!!!!!! ANSWER THE QUESTION DOWN BELOW. IF YOU ANSWER SOMETHING INCOMPLETE OR WRONG, I WILL TAKE IT DOWN. GIVING BRAINLIEST TO WHOEVER DOES IT RIGHT. PLEASE HELP THANKS!!!!!

20 POINTS!!!!!!!! ANSWER THE QUESTION DOWN BELOW. IF YOU ANSWER SOMETHING INCOMPLETE OR WRONG, I WILL

Answers

Answer:

The missing tags have been added below.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The complete code for the web page is written below;

<! DOCTYPE html>

<head>

< title > My Favorite Fruits </ title >

</head>

<body>

<h1> My Favorite Fruits </h1>

<p1> I really love fruit. My absolute favorites are in the list below. </p1>

<ol>

<li> Bananas </li>

<li> Strawberries </li>

<li> Watermelon </li>

</ol>

</body>

</html >

Note: The code isn't indented because i'm not using an appropriate code editor.

You should ensure your html document contains a header and a body while using the appropriate tags.

The <head> is the opening tag for the header and it should be closed with the </head> while the <title> </title > tag indicates the title of the page at the top of a web browser.

The body of the document starts with the <body> and </body>.

Also, the <h> and </h> tag is used to hold the text in the body while the <p> and </p> tag is used for paragraphs.

Lastly, since we are creating a document with an ordered list, we would use the <ol> and </ol> patent tag while the child tag <li> and </li> sorts the list numerically.

Which of the following correctly describes the reason for quality customer service?

Answers

The correct answer is C. Keep existing customers and clients
Explanation:
Customer service refers to the interaction with customers and support employees in a company provide to customer to guarantee he or she has the best experience when buying one product or service. A high-quality customer service implies providing complete information to customers, and helping them before, during, and even after their process in buying or looking for information in a company. The main purpose of this is that customers feel the support from employees, and are loyal to the company which means they will go back if they need the same service or products. Thus, the reason for quality customer service is "Keep existing customers and clients".

what should be chosen as x in the given series of clicks to calculate formulas automatically except for data tables: file < options < x < automatic?

Answers

In order to calculate formulas automatically in Excel except for data tables, "Workbook Calculation" should be chosen as x in the given series of clicks.

What is "Workbook Calculation"?

The mode in which Excel formulas are recalculated, whether manually or automatically. Iteration is the number of times a formula is recalculated until a particular numerical condition is met.

The steps to select "Workbook Calculation" are:

Click on the "File" tab in the ribbon.Click on "Options" in the menu on the left-hand side.In the Excel Options dialog box, click on "Formulas" in the menu on the left-hand side.Under "Calculation options", select "Workbook Calculation" from the drop-down menu next to "Calculation options".Click "OK" to save the changes.

Thus, by selecting "Workbook Calculation" as the calculation option, Excel will automatically recalculate formulas whenever a change is made to the worksheet.

For more details regarding workbook, visit:

https://brainly.com/question/18273392

#SPJ1

Which of the following can be assumed as the simplest form a physical network topology? (1 point)
O the tree topology
O the mesh topology
O the star topology
the bus topology

Answers

This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.

What is Topology?

The full bandwidth is set aside between the two nodes because there are only two in this network.

Topology is the study of the characteristics of spaces that are unaffected by continuous deformation. Because the objects may be stretched and contracted like rubber sheets yet cannot be broken, it is frequently referred to as "rubber-sheet geometry."

Analysis and general topology are closely connected fields that often take into account local features of spaces. The definition of topological spaces, in which limits of sequences can be taken into consideration, generalizes the idea of continuity.

Therefore, This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.

To learn more about Topology, refer to the link:

https://brainly.com/question/10536701

#SPJ1

1. The best penetration strategy for a company composed of two employees
a) White Box
b) Black Box
c) Grey Box
d) none of the above

Answers

The best penetration strategy for a company composed of two employees is Grey Box.Penetration testing is a simulated attack on the computer system that reveals the safety and security weaknesses that a hacker might exploit.

It entails scanning the organization's networks, systems, and applications for known vulnerabilities and subsequently attempting to exploit them.Penetration Testing Techniques:Penetration testing can be done using various techniques. Some of them are listed below:

White box penetration testingBlack box penetration testingGrey box penetration testingThe three techniques mentioned above are the most widely used penetration testing strategies. A white box penetration test allows the tester to have complete access to the system, whereas a black box penetration test does not allow the tester to have any prior knowledge of the system. In contrast, a grey box penetration test allows the tester to have limited access to the system's workings and vulnerabilities.

Therefore, the best penetration strategy for a company composed of two employees is Grey Box.

To know more about penetration strategy visit:

https://brainly.com/question/33457760

#SPJ11

can someone helppp!!!!

send the answers!

20 points for u!

can someone helppp!!!! send the answers! 20 points for u!

Answers

Answer: You can use thisWhat is internet?the Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.What dangers can we find on the internet?On the Internet, cyberbullying takes various forms. Cyberbullying includes sending hateful messages or even death threats to children, spreading lies about them online, making nasty comments on their social networking profiles, or creating a website to bash their looks or reputation.The online world opens the door for trusting young people to interact with virtual strangers - even people they'd normally cross the street to avoid in real life. About 1 in 7 kids have been sexually solicited online.Software filters aren't a perfect solution; some nasty sites can slip through, while educational or family-rated sites may be blocked. So while some parents may wonder whether monitoring means they're spying on their kids, the safety factor often wins out.How do we stay safe on the internet?Follow the family rules, and those set by the Internet service provider. Never post or trade personal pictures. Never reveal personal information, such as address, phone number, or school name or location. Use only a screen name and don't share passwords (other than with parents).
Definitely you can use it

planning constraints are similar to which aspects of the clientele network?

Answers

Planning constraints are similar to security protocols and policies within the clientele network. They are designed to limit the resources, activities, and access of users within the network in order to protect.

What is network ?

Network is a system of interconnected nodes that communicate with each other to exchange data and information. It is composed of computers, servers, switches, routers, and other components that allow communication between nodes. Networks are used in various forms such as local area networks (LANs), wide area networks (WANs), wireless networks, and the Internet. Networking enables users to access resources, share data, and communicate with each other. It also provides a platform for access, storage, and retrieval of data and information.

To learn more about network

https://brainly.com/question/1326000

#SPJ4

You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP

Answers

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.

What is data in programming?

A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.

An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.

type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.

Reference the object and the field as such in order to assign a value to the type field of the object myShoe;

Therefore, the correct option is C. sneaker" in myShoe.type.

To learn more about data in programming, refer to the link:

https://brainly.com/question/14581918

#SPJ2

Question 2 of 10
Priscilla wants to learn her grandmother's native language after seeing social
media highlighting her family's homeland. What type of impact is this?
A. Social and economic
B. Economic and personal
C. Personal and cultural
D. Ethical and personal

Question 2 of 10Priscilla wants to learn her grandmother's native language after seeing socialmedia highlighting

Answers


i thinkkkkkkkkkkkkkkkk D

Priscilla wants to learn her grandmother's native language after seeing social media highlighting her family's homeland.  Thos is ype of impact is this D. Ethical and personal.

What is the cultural impact?

Ethics are critical to people due to the fact they serve as (1) requirements of conduct for figuring out an accurate route of action, (2) pointers for decision-making and warfare resolution, and (3) impacts on worker motivation.

Changes that have an effect on people's surroundings (architecture, arts, customs, rituals etc.) because of influxes of travelers represent cultural impacts.

Read more about the  Ethical and personal:

https://brainly.com/question/1031443

#SPJ2

the cpu stores the results of computations in ________.

Answers

Answer:

Main memory

Explanation:

_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning

Answers

Answer: it’s A, social media

Explanation:

Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.

What is Social Media?

Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.

Social media includes the technologies used to support virtual communities and the sharing of content.

Hence, the correct option is 1.

Learn more about Social Media:

https://brainly.com/question/18958181

#SPJ2

When it comes to the morals and ethics of programming a car, does a correct or wrong response to a situation exist?

Answers

I'll go over the reasons why it is morally acceptable to develop self-driving automobiles as well as the reasons why it is unethical.

what is ethics of programming a car?

Self-driving vehicles already exist, and people travel on our motorways and roads alongside them. They are among the most cutting-edge inventions ever made by humanity in terms of technology. As with any new technology, it will raise fresh ethical concerns. Is it moral to create self-driving cars whose decisions would impact the driver's lifestyle and the environment?

I'll go over the reasons why it is morally acceptable to develop self-driving automobiles as well as the reasons why it is unethical. I'll come to a conclusion with the most moral response to the aforementioned dilemma after using an utilitarians approach to examine both sides.

To know more about ethics of programming a car visit:

https://brainly.com/question/28016237

#SPJ1

what is an information technology? ​

Answers

Answer:

PLEASE BRAINLIEST

Explanation:

Information Technology means the use of hardware, software, services, and supporting infrastructure to manage and deliver information using voice, data, and video.

Answer:

Information technology is a subject that is the use of computers to store, retrieve, transmit and manipulate data or information, often in the context of business or other enterpise.

Other Questions
Why is important to know the parts of a computer system? Which task most likely involves a calculation that uses moles?measuring a sugar sample on a balancecounting the number of jellybeans in a jardetermining the number of atoms in a jar of liquidfinding the rate of expansion of a gas-filled balloon hey I suck at algebra so some help would be nice HAHA If someone uses a nasty tone of voice when complimenting your boots, then you can safely assume that they are using ___________________ to make fun of you.Group of answer choicesa. Ironyb. Dramatic ironyc. Satired. Sarcasm plz help as many times as i try i still don't get it What superstition does the narrator's wife believe? The black catA. That walking under a ladder is dangerousB. That black cats bring bad luckO C. That cats are witches in disguiseD. That the number 13 is evil decrease 20 in the ratio 4:5 Maria y juan deben realizar el mapamundi en medio pliego de cartulina para la tarea de sociales pero cada uno tiene un cuarto de cartulina maria le dice a su compaero que si unen los cuartos de cada uno obten dran el medio pliego que necesitan . Maria tine razon justifica tu rrespuesta If the gardener grows 500 offspring flowers from these parent flowers, how many should he expect to be red and short? Which expression has a value 48? .A) (4 + 5): 32-9 +3.B) 4+ 5 (32 - 9) + 3.C) 4+ 5.3?(-9+3) .D) 4+53-9= 320 brainly points asap which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? wireless man ring lan peer-to-peer Cissen and Napor are two neighboring countries that actively trade goods and services with each other. Under the gold standard, there will be a net flow of gold from Napor to Cissen whenA. Cissen is in trade deficit with Napor.B. Napor is in balance-of-trade equilibrium with Cissen.C. Cissen is in trade surplus with Napor.D. Cissen imports more than it exports to Napor.E. Napor balance of payment to Cissen is favorable.C. Cissen is in trade surplus with Napor. A trail runner gets a new map of her favorite mountain. Her old map has a scale of 1 cm to 100 m. Her new map has a scale of 1 cm to 500 m. She ran a trail that was 40 cm long on her old map. How long is this trail on her new map?PLEASE ANSWER Solve the following system mathematically. Place the solution in the ordered pair set provided belowy = 4x - 11- 4x - y = -5 WAR CAN DESTROY HUMAN VALUES AND CHALLENGE A PERSON'S COURAGE. This statement is an example of what? A.theme B.plotC.Main ideaD.Fiction How did World War I military bases such as the Charleston Naval Shipyard, Camp Jackson, and Parris Island influence South Carolina's economy? O They provided jobs for thousands of civilian workers. O They provided housing for thousands of workers after the conflict. O They caused a large increase in state income taxes. O They caused textiles to become more important than agriculture. A hydro-electric turbine is directly coupled to a 24-pole, 60 Hz alternator. It develops 2,000 hp with a specific speed of 60 rpm. Compute for the required turbine diameter in feet.4.45 ft4.54 ft5.44 ft5.53 ft Show all work please!Solve the initial value problem dy dt = -5/7, y(1) = 1. (Use symbolic notation and fractions where needed.) y = help (decimals) = = 13 find: (1 point) Given that f"(x) = cos(2), f'(7/2) = 5 and f(1/ Multiple the polynomial by monomial. (Simplify) 6q^3( q^2 - 2q + 6) catatonia is characterized by: hyperactive, wildly optimistic states of emotion. delusions of persecution. periods of immobility or excessive, purposeless movement. offensive and unwanted thoughts that persistently preoccupy a person.