Which MLA web source citations are formatted correctly? Check all that apply.
Wolfson, Elijah. “Newsweek Names a Mars Crater.” Newsweek. Newsweek, 28 Feb. 2014. Web. 1 Mar. 2014.
Herman, Barbara. “Where’s the Fire?” Newsweek. Newsweek, 24 Oct. 2013. Web. 25 Feb. 2014.
Niesen, Joan. “Learning to Cope: Disabled Vet Hunt Finds Freedom as Paralympic Skier.” Sports Illustrated. Web. 27 Feb. 2014.
A Mighty Girl. N.p., n.d. Web. 26 Feb. 2014.
Kloc, Joe. “Kepler Mission Finds Hundreds More Planets.” 2 Feb. 2014. Web. 25 Feb. 2014.

Answers

Answer 1

Answer:

Explanation:

A,B on exp.

Which MLA Web Source Citations Are Formatted Correctly? Check All That Apply. Wolfson, Elijah. Newsweek
Answer 2

The correct MLA web source citations are:

Wolfson, Elijah. “Newsweek Names a Mars Crater.” Newsweek. Newsweek, 28 Feb. 2014. Web. 1 Mar. 2014.

Others are:

Herman, Barbara. “Where’s the Fire?” Newsweek. Newsweek, 24 Oct. 2013. Web. 25 Feb. 2014.

What is MLA citation?

MLA in-text citation style is known to be a citation method that is often used in citing authors. Her one often uses the author's last name and the page number from where the work is taken from.

A good example of this  MLA web source citations is:

Wolfson, Elijah. “Newsweek Names a Mars Crater.” Newsweek. Newsweek, 28 Feb. 2014. Web. 1 Mar. 2014.

Learn more about MLA web source  from

https://brainly.com/question/26110488

#SPJ2


Related Questions

Which panel is used to change the opacity of objects on a layer?

Answers

The panel that is used to change the opacity of objects on a layer is called the Layers panel. The Layers panel can be found in many graphics editing software, including Adobe Photoshop and Illustrator.


In the Layers panel, each layer is represented as a separate box or thumbnail. To change the opacity of an object on a layer, simply select the layer that contains the object and adjust the opacity slider located at the top of the Layers panel. This slider typically ranges from 0% (completely transparent) to 100% (completely opaque), allowing for a range of opacity levels to be set.
Alternatively, some graphics editing software may offer additional controls for changing the opacity of objects, such as a separate Opacity panel or a Transparency panel. These panels may offer more precise control over the transparency of an object, allowing for different levels of transparency to be applied to different areas of the object.
Overall, the Layers panel is an essential tool for managing the various elements in a design project and adjusting the opacity of objects on a layer can be easily done with this panel.

For more such question on thumbnail

https://brainly.com/question/6665379

#SPJ11

How do I make someone "Brainiest".
First person to reply will get "Brainiest"

Answers

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

Answer:

Brainiest

Explanation:

which if the following functions will print the date and time on an excel sheet?

Answers

The function in Excel that will print the date and time on a worksheet is NOW function.

The NOW function is a built-in date and time function in Excel. This function retrieves the current date and time information, which may be updated every time the worksheet is opened or recalculated. Excel's NOW function Syntax of Excel's NOW function: `NOW()`Explanation of the Excel's NOW function The function syntax consists of only one argument: the format for displaying the date and time result in the worksheet. The NOW function is a non-volatile function that is used to print the current time and date each time the worksheet recalculates. In this regard, the NOW function is an excellent tool for marking when worksheet data was last updated or when it is set to expire.

Learn more about the Excel Sheets at https://brainly.com/question/2985666

#SPJ11

Imagine that a you and a friend are exercising together at a gym. Your friend suddenly trips and falls, and it is clear that he or she has suffered an ankle sprain. Luckily you know exactly what has happened. Explain how your friend sustained the injury and, assuming you had the necessary supplies, including a first aid kit and a phone, explain what steps could you take to stabilize your friend's injury.
Name each of the five steps in the PRICE treatment.

Answers

Answer:

The sprain happened when the friend fell and the ligaments (in the ankle)  stretched, twisted or possibly tore. Sprain is manifested by pain, swelling, bruising and inability to move.

Explanation:

Here the appropriate steps to stabilize the injury:

1.       Call for help.

2.       Rest the injured area to avoid further damage.

3.       Put ice ( for 15 to 20 minutes) to help limit the swelling.

4.       Apply compression bandage to prevent more swelling.

5.       Elevate the injured ankle above the heart to limit swelling.

Hope this helps UvU

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

Edhesive 6.7 code practice

Edhesive 6.7 code practice

Answers

For the happy code put a happy face and so on and so forth. There isn't much people,e can do to help with these type of questions. A bit more detail is always appreciated for the people answering questions

List three professional ethical dilemmas that you might face at work and identify your personal ethics that may conflict or align with each ethical dilemma. For each of the three professional ethical dilemmas, describe how would you separate your personal ethics from the professional ethical dilemma? 2. Why are ethical codes important in practicing medicine? 3. Why is it important to study ethics as a health care professional? 4. How do duty-based, utilitarianism, and virtue-based ethical theories differ? How are they the same? 5. Compare how morals and values are developed.

Answers

1. Professional ethical dilemmas that you might face at work and your personal ethics that may conflict or align with each ethical dilemmaProfessional ethical dilemmas are common and you may face them frequently at work. Here are three ethical dilemmas with an explanation of how to align personal ethics with professional ethical dilemmas.

1. Patient ConfidentialityAs a healthcare professional, patient confidentiality is paramount. However, you may face a situation where sharing confidential information about a patient could save another patient's life. The conflict arises between the obligation to protect a patient's information and the duty to prevent harm. Personal ethics aligned with the Hippocratic Oath, which prioritizes the patient's well-being over privacy concerns, can conflict with the obligation to maintain patient confidentiality. Therefore, healthcare providers should consider the severity of the situation and ensure that they comply with the law.

2. Quality of Care vs. Cost ControlHealthcare providers are responsible for providing quality care to patients, but cost control measures can conflict with this obligation. The ethical dilemma arises when healthcare providers have to make choices between controlling the cost of treatment and providing quality care. If the healthcare provider prioritizes patient care, it may increase the cost of care. Personal ethics aligned with the principle of justice, which calls for equal access to healthcare, may conflict with the need to control the cost of care. Healthcare providers should consider the ethical implications of their actions and work with their organizations to improve the quality of care while keeping costs under control.

3. End-of-Life CareDecision-making about end-of-life care is another professional ethical dilemma that healthcare providers face. There is a conflict between the need to preserve life and the patient's autonomy. Personal ethics that support patient autonomy and the right to make end-of-life decisions may conflict with the obligation to preserve life.

To know more about Professional visit:

https://brainly.com/question/3396195

#SPJ11

Python program to display the mark report. If mark is above 90 Graded A+ If mark is between 80 and 90 Graded A If mark is between 60 and 79 Graded B If mark is less than 59 display Practice well

Answers

Answer:

grade = int(input("Enter grade: "))

if grade>90:

print("A+")

elif grade<90 and grade>80:

print("A")

elif grade>60 and grade<79:

print("B")

elif grade<59:

print("Practice well")

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Click the above imageAsk the user to enter two numbers. The first number is for the multiplication table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

the only software component that’s required to run a web application on a client is

Answers

The only software component that’s required to run a web application on a client is a web browser.

A web application is a program or software that runs on a web server and is used by clients over the internet. Web applications are designed to be compatible with multiple platforms, including smartphones, tablets, and computers.

Because they are platform-independent, web applications can be run on a variety of devices without requiring specialized software.

A web browser is a program that displays web pages and content on the internet. It is a client-side software that is installed on a computer or mobile device and is used to access web applications and websites. It provides users with a graphical interface to access web-based content, such as text, images, videos, and multimedia.

Web browsers use HTTP (Hypertext Transfer Protocol) to request and transmit data to and from web servers. Web applications are accessed using web browsers. A web browser is the only software component that’s required to run a web application on a client.

It acts as a user interface that communicates with the web server where the application is hosted. When a user accesses a web application, the web browser sends a request to the web server to retrieve the necessary data and displays the results on the user’s device.

To learn more about software: https://brainly.com/question/28224061

#SPJ11

________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership

Answers

Answer:

a) reverse engineering

What color would be created by the following hexademical value?
FF00FF

Answers

Answer:

Magenta would be the color created.

most of the internal operations in a computer use hexagonal numbering true or false
100 points pls help asap

Answers

Answer:

True

Explanation:

The hexadecimal numbering is the most used numeric system for international operations in a computer, in our daily life we use the decimal system but for the CPU use the byte or octet as a basic unit of memory, we need more than 10 digits, and the hexadecimal system has 16, in addition, the binary system is hard to understand.

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

What is the significance of the scientific method?

Answers

Hello there! The significance of the scientific method is that it ensures accuracy and it ensures that the experiment was done in the right order.

The scientific method is a widely accepted way of revising and rechecking the work of scientists to see if:

1. The answers match up

2. The experiment was performed correctly

3. The results are accurate

Through the scientific method, the probability is very high that things will not go wrong. The significance of this is that if the scientific method is not applied to an experiment, nobody knows the results. If nobody knows the results, there are many possible unintended consequences that could happen. Hope this helps!

The​ ________________ virus was written in visual basic script and transmitted as an attachment to an email.

Answers

The​ ILOVEYOU virus was written in visual basic script and transmitted as an attachment to an email.

What is a virus?

In Computer technology, a virus can be defined as a type of malicious software program that is designed and developed to move through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

This ultimately implies that, it is very important to update one's antivirus software and virus definition on a regular basis, in order to protect your computer from the newest viruses.

Additionally, the ILOVEYOU virus is also referred to as Love Letter for you or Love Bug and it simply refers to a type of virus that was released to infect several Windows personal computers (PC) on the 5th of May, 2000, through email messages.

Read more on a virus here: brainly.com/question/26128220

#SPJ1

A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the user experience and introduce unfair advantages to some players. The application is deployed in every AWS Region it runs on Amazon EC2 instances that are part of Auto Scaling groups configured behind Application Load Balancers (ALBs) A solutions architect needs to implement a mechanism to monitor the health of the application and redirect traffic to healthy endpoints.
Which solution meets these requirements?
A . Configure an accelerator in AWS Global Accelerator Add a listener for the port that the application listens on. and attach it to a Regional endpoint in each Region Add the ALB as the endpoint
B . Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache behavior to use origin cache headers Use AWS Lambda functions to optimize the traffic
C . Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic
D . Configure an Amazon DynamoDB database to serve as the data store for the application Create a DynamoDB Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.

Answers

Yetwywywywywywyyw would

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working.


Required:

What is the MOST likely cause?

Answers

The most likely cause of the LCD screen becoming dark and difficult to read is a faulty backlight inverter or a burned-out backlight bulb.

The fact that the screen suddenly became dark while the user was downloading a large file suggests that the increased power demand from the wireless network card and the downloading process might have caused an electrical surge or overload, resulting in the backlight malfunctioning. The backlight inverter is responsible for supplying power to the backlight bulb, which illuminates the LCD screen. If the inverter fails, it can disrupt the power supply to the backlight, causing it to stop working. Alternatively, the backlight bulb itself may have burned out due to prolonged use or a power surge. In either case, the backlight will need to be replaced to restore proper illumination to the LCD screen.

To learn more about wireless network card click here

brainly.com/question/29762734

#SPJ11

Help I will give brainliest! Critical thinking questions!

Help I will give brainliest! Critical thinking questions!

Answers

\(question - \)

\(the \: picture \: is \: completely\: dark\)

\(it \: will \: be \: very \: help \: full \: if \: you \\ post\: the \: question \: again \: \)

If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80

Answers

Answer: You said 40 Hours. So $40

So, Isn't it $48, Because How Do You Get 80?

Answer:

$80.

Explanation:

Just go with it.

seo traffic requires no direct payment to the search engine, but it is not free becaus

Answers

SEO traffic requires no direct payment to the search engine, but it is not free because it involves investing time, effort, and resources in optimizing a website to rank higher in search results and attract organic traffic.

SEO (Search Engine Optimization) traffic refers to the organic traffic generated from search engine results without requiring direct payment to the search engine itself. However, it is not entirely free because optimizing a website for SEO requires investing time, effort, and resources. This involves conducting keyword research, optimizing website content, improving site architecture, building quality backlinks, and monitoring analytics. These activities demand expertise, ongoing maintenance, and potentially outsourcing services from SEO professionals or agencies. While the actual traffic generated may not incur direct monetary costs, the process of achieving and maintaining SEO traffic involves significant investments to ensure visibility, relevance, and competitiveness in search engine rankings, making it a valuable but not entirely cost-free strategy.

learn more about SEO traffic here:

https://brainly.com/question/26028067

#SPJ11

what do raichle's default mode network and corbetta's ventral attentional network have in common?

Answers

Answer: voluntary deployment of attention and the reorientation to unexpected events

Explanation:

Raichle's Default Mode Network and Corbetta's Ventral Attentional Network both have in common that they are large-scale brain networks involved in cognitive processing and attentional functions.

They are both activated in the human brain when people are at rest and not involved in any specific task. The default mode network is involved in self-reflection, introspection, and mind-wandering. On the other hand, the ventral attentional network is responsible for detecting and reacting to sensory stimuli that have significant emotional, social, or motivational implications.

Both these networks have been associated with cognitive flexibility and creativity. They work together to coordinate human behavior and maintain a balance between internal and external stimuli.

Learn more about brain networks: https://brainly.com/question/29669975

#SPJ11

if bptr is assigned b (the name of an array), then array element b[3] can alternatively be referenced with the pointer expression
a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)

Answers

The correct option is c) b[bPtr + 5)

Given that bptr is assigned b (the name of an array), then array element b[3] can alternatively be referenced with the pointer expression b[bPtr + 5].Step-by-step explanation:Given that,bptr is assigned b (the name of an array).bPtr holds the base address of the array b.The expression `b[bPtr + 5]` is equivalent to *(b+8), because the value of bPtr is the address of b[0].Thus, b[bPtr + 5] is the same as b[3].

The definition of an array in C is a way to group together several items of the same type. These things or things can have data types like int, float, char, double, or user-defined data types like structures. All of the components must, however, be of the same data type in order for them to be stored together in a single array.  The items are kept in order from left to right, with the 0th index on the left and the (n-1)th index on the right.

Know more about array here:

https://brainly.com/question/13261246

#SPJ11

what is your favorite coler and what do you like to do and

Answers

Answer:

Orange

Explanation:

I like orange because its vibrant.

6. relate how windows server active directory and the configuration of access controls achieve cia for departmental lans, departmental folders, and data.

Answers

To relate how Windows Server Active Directory and the configuration of access controls achieve CIA (Confidentiality, Integrity, and Availability) for departmental LANs, departmental folders, and data, follow these steps:

1. Implement Active Directory (AD): AD is a directory service provided by Windows Server for organizing, managing, and securing resources within a network. It centralizes the management of users, computers, and other resources, ensuring consistent security settings and access controls across the entire environment.

2. Organize resources into Organizational Units (OUs): Within AD, create OUs to represent different departments or functional areas. This allows for the efficient application of security policies and access controls based on departmental requirements.

3. Create user accounts and groups: In AD, create user accounts for each employee and assign them to appropriate departmental groups. This allows for the management of access rights and permissions based on group membership, ensuring that users only have access to the resources required for their roles.

4. Configure access controls: Apply access control lists (ACLs) to departmental LANs, folders, and data. ACLs define the permissions that users or groups have on specific resources, ensuring confidentiality by restricting unauthorized access.

5. Implement Group Policy Objects (GPOs): Use GPOs to enforce security policies and settings across the entire network. This ensures consistent security configurations, such as password policies and software restrictions, contributing to the integrity of the environment.

6. Monitor and audit: Regularly review security logs and reports to identify potential security breaches or unauthorized access attempts. This allows for prompt remediation and ensures the ongoing availability of resources to authorized users.

In summary, Windows Server Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data by centralizing the management of resources, implementing access controls based on user roles, and enforcing consistent security policies across the environment.

Learn more about Windows Server: https://brainly.com/question/30985170

#SPJ11

Which game is better? Among us or ROBLOX -

Answers

Answer:

Both are equally good, but Roblox is better for kids

Explanation:

This is because when you are imposter and kill someone it shows a bone and there is a bit of blood!

Answer:

Gud question...

Explanation:

Among us is violent

Roblox is good for kids

so 50 50

Urgent need ASAP
Develop an algorithm which reads a dollar and cent value, and returns the monetary breakdown from that amount. For example:

$155.90 will return:

$100 1
$50 1
$20
$10
$5 1
$2
$1
Half dollar: 1
Quarters: 1
Dimes 1
Nickel 1
Pennies

Answers

Answer:

{3 quarters, 1 dime, 2 nickels, 5 pennies}  or  

 {3 quarters, 2 dimes, 1 nickel, 5 pennies}

Explanation:

You need change for a nickel, so 5 pennies.

You need change for a dime, so 1 more nickel.

You need change for a quarter, so a dime and a nickel, or two dimes more.

You need change for $1, so 3 more quarters.

You need a minimum of 11 coins. You can use 2 nickels and a dime, or 2 dimes and a nickel to get the values between 15¢ and 25¢. The latter gives you the ability to continue up to $1.05.

 pls mark brainliest

The first contact dates have changed to centre align, by default
they will align
a. top left
b. bottom right
c. bottom left
d. top right

Answers

The default alignment for text in most systems, including webpage layouts, documents, and user interfaces, is usually top left. Changing the alignment affects the overall appearance and readability of the content.

In most systems and applications, text and other elements will align to the top left by default. This is due to the left-to-right and top-to-bottom reading patterns in many languages, including English. Therefore, when the contact dates' alignment changes to the centre, it differs from the usual top-left default. This alteration can be beneficial for aesthetics or highlighting the information, but it may also affect how quickly the information is read or understood.

Learn more about webpage layouts here:

https://brainly.com/question/30696274

#SPJ11

how do you use \t using python in coding

Answers

Answer:

Follows are the Python code in which we use "\t":

print('how \t do\t  you \t use \t using \t python \t in \t coding.')#print message

Output:

how   do   you   use   using   python   in   coding.

Explanation:

In the above Python code, a print method is declared, in which it uses the given question as a message and in this, it uses "\t" that provides tab space in the given value. This programming language is general purpose. Therefore, it can be used as a desktop and web applications. It can also be used for the development of complex applications in science and numbers.

What are the tag attributes? give example​

Answers

Tag attributes provide additional information about HTML elements and can be used to modify the behavior, appearance, or content of the element. Here are some examples of tag attr
Other Questions
You have been asked to choose between two office equipment, which will be needed for 6 years of operation. Equipment A will last 3 years, whereas equipment B will last 6 years. Equipment A costs $2800, will enable annual savings of $1200, has no salvage value, and should be replaced with an identical equipment at the end of its life. Equipment B costs $4793, will enable annual savings of $1200, and has no salvage value. Calculate the total present worth of each scenario at 12% interest rate. Then, both cells should be highlighted in yellow. You must use the correct +/- sign for your final answers to earn point. HelpActivity:2x2+2x-312=0 Which countries are threatening Israel? fill in the chart Tons ____Pounds 1187Ounces_____ What are characteristics on which cultural intelligence is built? a) contempt b) respect c) recognition d) disapproval The distance between the two parallel plates is 3 cm and the lower plate is being pulled at a relative velocity of 10 cm/s greater than the top plate. The fluid used is soybean oil with viscosity of 5x10-2Pa.s at 250 K. Calculate shear stress and shear rate. Has social legislation been effective in ending poverty? To keep up with global competition and tap into the abilities of world-class suppliers, companies must put in place sourcing systems. Analyse the four sourcing strategies that can be applied to the laptop industry and the advantages of each strategy. (15 Marks) the consumption of ___ is especially important for women and childbearing age to prevent neural tube defects in infants The cult of relics was not new in the Romanesque era. For centuries, Christians had traveled to sacred shrines housing the body parts of, or objects associated with, the holy family or the saints. The faithful had long believed that bones, clothing, instruments of martyrdom, and the like had the power to heal body and soul. In the 11th and 12th centuries, however, the veneration of relics reached a high point, prompting the devout to undertake often dangerous pilgrimages to hallowed shrines in Jerusalem, in Rome, and throughout western Europe (see "Pilgrimage Roads in France and Spain"). Churches vied with one another not only for the possession of relics but also in the magnificence of the containers (reliquaries) that preserved and protected them. The case of the relics of Saint Faith (Sainte Foy, in French), an early-fourth-century child martyr who refused to pay homage to the Roman gods, is a telling example. A monk from the abbey church at Conques (FIG. 12-6A) stole the saint's skull from the nearby abbey of Agen around 880. The monks justified the act as furta sacra (Latin, "holy theft.") ("holy theft"), claiming that Saint Faith herself wished to move. The reliquary (FIG. 12-2) they provided to house the saint's remains is one of the most sumptuous ever produced. It takes the form of an enthroned statuette of the martyr. Fashioned of gold leaf and silver gilt over a wood core, the reliquary prominently features inset jewels and cameos of various datesthe accumulated donations of pilgrims and church patrons over many years. The saint's oversize head is a reworked ancient Roman parade helmet (A masklike helmet worn by Roman soldiers on special ceremonial occasions.) a masklike helmet worn by soldiers on special ceremonial occasions and not part of standard battle dress. The monks added a martyr's crown to the ancient helmet. The rear of the throne bears an image of Christ on the cross engraved in rock crystal, establishing a parallel between Christ's martyrdom and Saint Faith's. Consider a project to supply Detroit with 28,000 tons of machine screws annually for automobile production. You will need an initial $4,800,000 investment in threading equipment to get the project started; the project will last for 5 years. The accounting department estimates that annual fixed costs will be $1,150,000 and that variable costs should be $215 per ton; accounting will depreciate the initial fixed asset investment straight-line to zero over the 5-year project life. It also estimates a salvage value of $525,000 after dismantling costs. The marketing department estimates that the automakers will let the contract at a selling price of $320 per ton. The engineering department estimates you will need an initial net working capital investment of $460,000. You require a return of 14 percent and face a tax rate of 25 percent on this project. Calculate the accounting, cash, and financial break-even quantities. (Do not round intermediate calculations and round your answers to the nearest whole number, e.g., 32.) Divide using polynomial long division. (Show your work)Hint: dont forget the 0x(x^3-2x^2+4) (x+3) The period of daylight experienced each day on every part of Earth would be shorter if which one of the following changes occurred?A Earth had a greater diameter.B The mass of the Sun was greater.C Earth rotated more quickly on its axis.D The Sun was farther away from Earth. can someone tell me how i find this problem? Francesca us making a scale drawing of the mural on a wall in her schools hallway.the mural is 12 ft high and 135 ft long.she is using a scale of 3 cm for every 4 ft.what is the dimensions of her scale drawing? Solve it....................................... How should the following sentence end? she was smart, responsible, and learning french. Friendly to others. Studying math. Hosting the party. Write ratios in the form 1:n or n:1 6 : 14 Which function has a period of 4 ? (F) y=tan 4 (G) y=tan 2 (H) y=tan 1/2(I) y=tan1/4 Select the correct answer.To stop bleeding, you should apply firm pressure directly to the wound.OA.TrueOB. False