yolanda says she can use a sphere to model the surface area of the boulders on this beach. explain whether yolanda is correct. photograph of a beach with six boulders, in a line, of different sizes. boulders have curved and round surface. yolanda is . since the boulders have , the best shape to model the surface area is a

Answers

Answer 1

Yolanda is correct using a sphere is an appropriate model for estimating the surface area of the boulders on the beach.

How can a sphere be used to approximate the surface area of the boulders on the beach?

A sphere is a three-dimensional shape with a curved and round surface, just like the boulders. When it comes to modeling the surface area of objects, a sphere is often a good approximation for objects with smooth and curved surfaces.

While the boulders on the beach may not be perfect spheres, using a sphere as a model provides a reasonable estimation of their surface area. By assuming the boulders have a spherical shape, one can calculate the surface area using the formula for the surface area of a sphere.

It's important to note that this modeling approach assumes that the boulders are symmetrical and have a consistent shape throughout. If the boulders have irregularities or protrusions that significantly deviate from a spherical shape, then using a sphere as a model may introduce some degree of error.

In such cases, alternative modeling techniques or more complex shapes may be more appropriate to accurately estimate the surface area of the boulders.

Learn more about sphere

brainly.com/question/15044609

#SPJ11


Related Questions

Write a program that reads the content of a text file called text.txt. the program should create a dictionary in which the keys are individual words found in the file and the values are the amount of times the word appears in the file. For example, if the word 'the' appears in the file 128 times, the dictionary would contain an element with the key as 'the' and the value as 128. Write in Python

Answers

Answer:

python

Copy code

# Open the text file for reading

with open('text.txt', 'r') as file:

# Initialize an empty dictionary to store word counts

word_counts = {}

# Loop through each line in the file

for line in file:

# Split the line into individual words

words = line.split()

# Loop through each word in the line

for word in words:

# Remove any punctuation from the word

word = word.strip('.,;:?!')

# Convert the word to lowercase

word = word.lower()

# If the word is already in the dictionary, increment its count

if word in word_counts:

word_counts[word] += 1

# If the word is not yet in the dictionary, add it with a count of 1

else:

word_counts[word] = 1

# Print the resulting word count dictionary

print(word_counts)

Explanation:

This code uses the open() function to open the "text.txt" file for reading, and then reads each line of the file using a for loop. Each line is split into individual words using the split() method, and then each word is cleaned up by removing any punctuation and converting it to lowercase. The code then adds each word to a dictionary and counts the number of occurrences of each word. Finally, the resulting dictionary of word counts is printed to the console.

What do presentation and spreadsheet software have in common?

a. Both analyze numeric data.
b. Both calculate numeric formulas.
c. Both convey numeric and/or text data.
d. Both illustrate animations.

Answers

Answer:

C

Explanation:

They both analyze numeric data and convert numeric and/or text data

Directions: In at least 10 complete sentences, persuade me into believing your favorite movie is the best movie ever. (No more than 15 sentences)

Answers

Explanation:

In my personal opinion, the movie called " Soul Surfers " one of the most inspiring movies out there. Why, you may ask? First of all, Bethany Hamilton has found such a joy and thrill for surfer. Sadly, every surfers worst nightmare was a reality to Bethany. While her and a couple others we surfing, a shark obruptly bit Bethany Hamilton's arm off. You would think her carrier would be over, but she simply denied the odds of that happening. She got on her surf board and started practicing again! She began just as good as she was before the accident. And that is why " Soul Surfer " is the best movie ever!

you may be able to bypass dns outages by changing your dns server. T/F

Answers

It is TRUE to state that you may be able to bypass DNS outages by changing your DNS  server.

Why is this so ?

Changing your DNS (Domain Name System   server can potentially help bypass DNSoutages.

When you encounter a DNS outage, it means that the DNS server you typically use to resolve domain names into IP addresses is unavailable or experiencing issues.

By switching to a different DNS server, such as a public DNS server like Go. ogle DNS or Cloudflare DNS, you can bypass the problematic DNS server and continue accessing websites and services using the alternative DNS server's functionality.

Learn more about DNS server at:

https://brainly.com/question/27960126

#SPJ4

Using complete sentences post a detailed response to the following.

Why do you think coding languages generally include the ability to create comments? What would those comments be used for? Include both how they can help a single developer and how they would help multiple developers working together on a single project.

Answers

Answer:

java or python

Explanation:

Question #2
In what way can an employee demonstrate commitment?
O By performing a task half-heartedly
O By getting to work late every day
O By staying late to help a co-worker finish a difficult task
OBy reminding a co-worker that they have to finish a task

Answers

Explanation:

by staying late to help people aswell as being their and putting full effort into it

because the others arent helping they are only only just reminding

The employee can demonstrate commitment by staying late to help a co-worker finish a difficult task

What do network executives blame for the superficiality in media reporting?

Answers

Network executives often express concern about the superficiality in media reporting, which refers to the lack of depth and quality in news stories, leading to a limited understanding of important issues.

There are several factors that network executives typically blame for superficiality in media reporting:

Sensationalism: News organizations sometimes prioritize attention-grabbing headlines and stories over more in-depth and informative pieces, as they attract higher ratings and ad revenue.Deadline pressures: Reporters face constant pressure to deliver news quickly, which may lead to less thorough research and a focus on shorter, less informative pieces.Limited resources: Many news outlets have reduced their budgets, leading to fewer investigative journalists and a reliance on easy-to-produce stories.Audience preferences: Some network executives believe that audiences prefer shorter, more easily digestible news stories, and therefore cater their content to meet these preferences.Social media: The rapid spread of information through social media platforms can result in a shallow understanding of complex issues, as users may only read headlines or short summaries.

In conclusion, network executives attribute the superficiality in media reporting to factors such as sensationalism, deadline pressures, limited resources, audience preferences, and the influence of social media. This can result in a lack of in-depth and informative news coverage, which may limit the public's understanding of important issues.

To learn more about Network, visit:

https://brainly.com/question/30456221

#SPJ11

Check the devices that are external peripheral devices:

Check the devices that are external peripheral devices:

Answers

Answer:

Mouse, and keyboard

Explanation:

Common Sense

A company can provision a new EC2 instance at the click of a button, which reduces the time to make those resources available to their development team from weeks to just minutes. Which benefit of cloud computing does this demonstrate?

Answers

The benefit of cloud computing that this scenario demonstrate is an increase in speed and agility.

What is cloud computing?

Cloud computing can be defined as a type of computing that requires the use of shared computing resources over the Internet rather than the use of local servers and hard drives.

The features of cloud computing.

In Computer technology, the features of cloud computing include the following:

ElasticityOn-Demand self-service.MultitenancyPooled resources

In this scenario, the benefit of a cloud computing that reduces the time to make resources available to EC2's development team from weeks to just minutes is increased speed and agility.

Read more on cloud computing here: https://brainly.com/question/19057393

A ___ valve is a full-way valve used to regulate fluid flow in which a threaded stem raises and lowers a wedge-shaped disk which fits against a valve seat within the volve body.

Answers

A gate valve is a full-way valve used to regulate fluid flow. It consists of a threaded stem that raises and lowers a wedge-shaped disk. This disk fits against a valve seat within the valve body.

Here is a step-by-step explanation of how a gate valve works:

1. When the gate valve is in the closed position, the disk is lowered to create a seal against the valve seat. This prevents any fluid from passing through the valve.

2. To open the gate valve, the threaded stem is rotated, causing the disk to rise. As the disk lifts, the fluid can flow through the gap between the disk and the valve seat.

3. The gate valve allows for full-way flow regulation, meaning that it can provide unrestricted flow when fully open. This makes it suitable for applications where high flow rates are required.

4. By rotating the threaded stem in the opposite direction, the disk is lowered back onto the valve seat, closing the valve and stopping the flow of fluid.

Gate valves are commonly used in industrial settings, such as oil refineries and water treatment plants, where precise control of fluid flow is essential. They are known for their ability to provide a tight seal and handle high-pressure applications.

In summary, a gate valve is a type of valve that uses a threaded stem to raise and lower a wedge-shaped disk, allowing for precise regulation of fluid flow.

To know more about wedge-shaped disk visit:

https://brainly.com/question/4360031

#SPJ11

The act of color balancing in film is known as

A:Blue
B:white
C:Black
D:Gray

Answers

The answer is: color White.
B, Really just the most neutral color possible, which in most cases is white.

A ________ examines each part of a message and determines whether to let that part pass.

Answers

Answer:

packet-filtering firewall

Explanation:

A packet-filtering firewall examines each part of a message and determines whether to let that part pass.

When is a for loop used in a Java Program?

A. When you already know how many times to perform an action.
B. When you want to test how many times to perform an action.
C. When you don't know how many times to perform an action.
D. When you want to define the name of an action.

Answers

Answer:

A

Explanation

Use "for loop" when size/length is pre-defined/know, such as

int[] numbers = new int[]{ 1,2,3,4,5,6,7,8,9,10 };

length : 10

snippet:

numbers.forEach(int num in numbers){

}

// or

for(int i=0; i < numbers.length ; i++){

}

Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack, you discover some rope, a pocket knife, a roll of duct tape, and three modern technological devices. Where are you? What is the time period? What tech devices are in your backpack? Write a diary or journal entry about how you survive for 24 hours with the help of the items you have on hand. Describe in detail and write a story about what you did those 24 hours.

Answers

Answer:

Day 1:Today I time traveled. it was pretty crazy, hope nothing goes bad.

1 hour in: Went asking around to see who is the king around here is. Everyone seems to look at me weird, I don't know why.

2nd hour: while asking around this dude came up to me and asked for silver. I said I didn't have any so then he walked away. He was an older man with a scrawny figure. Most people I see are a little bigger.

3rd hour: I finally found out who the king was

but I cant remember his name right now so I'll pit it in a different entry.

here u can start out with this if u want me to finish it just ask.

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

study the example database tables. table a and table b share the common field named aircraft. which type of key is the aircraft field in table b?

Answers

It is Group ID in our situation. This is a field that may be readily customized for every use. There could be additional groups with the same name in the Group name.

Field, record, table, and database are the order that represents the hierarchy of terms, from least to greatest. Describe a database. An organized collection of structured data, also known as information, is known as a database and is often stored in a computer system. Field, record, table, and database are the order that represents the hierarchy of terminology, going from smallest to greatest. When working with databases, selecting a primary key for each table is necessary. The table's primary key serves as an individual identifier for each piece of data. It implies that the primary key can only exist once in that table and that it is unique for each piece of data.

Learn more about Database here:

https://brainly.com/question/22536427

#SPJ4

what is the use of <input> tag ?​

Answers

Answer: The input tag is used within form element to declare input controls that allow users to input data. An input field can be of various types depending upon the attribute type. The Input tag is an empty element which only contains attributes.

Explanation:

The HTML <input> tag is used within a form to declare an input element − a control that allows the user to input data. Three ATTRIBUTES are :

form

list

readonly

Explanation:

An input field can vary in many ways, depending on the type attribute.

<input> elements are used within a <form> element to declare input controls that allow users to input data

The <input> tag specifies an input field where the user can enter data. <input> elements are used within a <form> element to declare input controls that allow users to input data.

The 3 attributes are :

<input form=""> :  The value of this attribute must be the id attribute of a <form> element in the same document.

<input list="datalist_id"> : Specifies the id of the datalist to bind the <input> element to a specific list.

<input readonly> : The readonly attribute is a boolean attribute.  When present, it specifies that an input field is read-only.  The readonly attribute can be set to keep a user from changing the value until some other conditions have been met

One day you tap your smartphone screen to turn it on, and nothing happens. It appears to be turned off and will not turn on. What should you try first to fix it?

perform a soft reset

plug it into a charger for an hour
submerge it in a bag of rice for 24 hours
perform a hard reset

Answers

Answer:

B) Plug it in

Explanation:

Though the other answer would be helpful in a real life situation, the correct choice on ed g e is b) :)

plug it into a charger for an hour

__________ is the amount of time an individual activity in a network can be delayed without delaying the entire project.

Answers

Slack is the amount of time an individual activity in a network can be delayed without delaying the entire project.

What is slack?

Slack is the amount of time an individual activity in a network can be delayed without delaying the entire project. A network diagram is used to display interdependent project activities, which are graphically represented as nodes or circles. The nodes are linked with arrows that represent the sequence of activities. In project management, slack refers to the length of time an activity can be postponed without jeopardizing the project's deadline.

The slack time calculation can be done using the critical path method (CPM), which determines the earliest and latest start and end times for project activities that cannot be postponed without affecting the project's deadline. The amount of slack time available determines how much an activity can be delayed before it becomes critical.

Learn more about  slack time :https://brainly.com/question/15393592

#SPJ11

Different algorithms can be made to complete the same task in different ways.
options:
True
False

Answers

Answer:

True hope this helps you and everyone!

Answer:

as long as it's the same problem

What are the importance of rules in the computer lab Pleaee list them ?​

Answers

Answer:

Never eat or drink in the computer lab. Stay on task and dont go to other webstites unless the teacher says so.

Explanation:

Passwords shall not be transmitted in the clear outside the secure domain
True
False

Answers

True. Passwords should never be transmitted in the clear outside the secure domain. The transmission of passwords in clear text is a major security risk and can lead to unauthorized access and compromise of sensitive information.

When a password is transmitted in clear text, it means that it is not encrypted or protected in any way during the transmission process. This allows anyone who intercepts the communication to easily read and capture the password, exposing it to potential misuse.

To ensure the security of passwords during transmission, it is essential to use secure protocols such as HTTPS or other encrypted communication channels. These protocols employ encryption techniques to protect the sensitive information, including passwords, from unauthorized access.

Additionally, it is crucial to follow best practices such as password hashing and salting on the server-side to store and handle passwords securely. Hashing transforms the password into an irreversible string of characters, making it extremely difficult for attackers to retrieve the original password even if they gain access to the stored data.

By adhering to these security measures, organizations can protect the confidentiality and integrity of user passwords, reducing the risk of unauthorized access and potential security breaches.

For more such questions domain,Click on

https://brainly.com/question/218832

#SPJ8

How to fix error occurred during initialization of vm could not reserve enough space for object heap?

Answers

Answer:

To fix the error "Could not reserve enough space for object heap", add the options "-Xmx<size>m" to set the maximum size for the object heap memory allocation. This must be set large enough to accommodate loading your application into memory, but smaller than your requested total memory allocation by 2GB.

Explanation:

Which process is responsible for the availability confidentiality and integrity of data?

Answers

A process which is responsible for the availability, confidentiality and integrity of data is: D. Information security management.

What is the C-I-A security triad?

The C-I-A security triad is an abbreviation for confidentiality, integrity and availability. Also, it can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in a business firm, in order to effectively and efficiently protect and make their data available to all authorized end users.

In this context, we can infer and logically deduce that Information security management is a process which is typically responsible for the confidentiality, integrity and availability of data at all times.

Read more on C-I-A security triad here: https://brainly.com/question/13384270

#SPJ1

Complete Question:

Which process is responsible for the availability, confidentiality and integrity of data?

A. Service catalogue management

B. Service asset and configuration management

C. Change management

D. Information security management

1. Symbols commonly seen on pictorial and line diagram.
2. What is the device used to protect against over-current and short circuit
conditions that may result in potential fire hazards and explosion?
3. A mark or character used as a conventional representation of an object,
function, or process.
4. It is performed at the end of the wire that allows connecting to the
device.
5. What kind of diagram uses slash to indicate the number of conductors
in a line?

Answers

Answer:

4. It is performed at the end of the wire that allows connecting to the

device.

Explanation:

hope this helps

before completing a photoshop project which three things should be reviewed

Answers

Before completing a photoshop project, the three things that should be necessarily reviewed are as follows:

Color mode.Dimensions and resolution.Metadata.

What is a Photoshop project?

A photoshop project may be defined as a type of project that involves the creation of images, graphic designing, photo editing, etc. with the help of numerous software. Such software provides numerous image editing features for pixel-based images, raster graphics, and vector graphics.

In photoshop projects, the resolution of the picture and graphic matters a lot. Apart from this, the color mode and metadata also play an essential role in the feature of a series of projects in order to facilitate the accuracy and quality of the project.

Therefore, before completing a photoshop project, the three things that should be necessarily reviewed are well mentioned above.

To learn more about Photoshop projects, refer to the link:

https://brainly.com/question/29371449

#SPJ1

Exercise 8. 2. 6: AverageWrite a function called average that prints out the average of two numbers. Then in your start function, make several calls to the triple function to test it out.


For example, if you made a call like


average(10,4)

it should print out 7.


Your function must be named average

Answers

The "average" function calculates the average of two numbers and prints the result. The function takes two parameters representing the numbers to be averaged. In the "start" function, multiple calls to the "average" function are made to test its functionality.

The "average" function takes two parameters, let's say "num1" and "num2". It calculates the average by adding the two numbers and dividing the sum by 2. The result is then printed using a print statement. Here's an example implementation in Python:

```

def average(num1, num2):

   avg = (num1 + num2) / 2

   print(avg)

def start():

   average(10, 4)

   average(5, 7)

   average(2, 8)

start()

```

In the "start" function, we make multiple calls to the "average" function with different number pairs. Each call calculates the average and prints it. For example, the call "average(10, 4)" would output 7 since (10 + 4) / 2 equals 7. The other calls would produce the respective averages of the provided number pairs.

To learn more about "average" function click here : brainly.com/question/31577801

#SPJ11

the linear program that results from dropping the integer requirements for the variables in an integer linear program is known as

Answers

The linear program that results from dropping the integer requirements for the variables in an integer linear program is known as a relaxation or a linear relaxation.

Integer linear programming (ILP) problems are optimization problems where some or all of the decision variables are required to take integer values. However, finding optimal solutions to ILP problems is generally computationally hard. Linear programming (LP) problems, on the other hand, are optimization problems where all the decision variables are allowed to take any real value. Solving an LP problem is relatively easier than solving an ILP problem.

In the relaxation process, the constraint that requires the variables to be integers is relaxed, allowing the variables to take any real value. This process transforms the original ILP problem into a relaxed LP problem that can be solved using standard LP techniques. The solution obtained from the relaxation process is an upper bound on the optimal solution to the original ILP problem.

In practice, the relaxation process is often used as a first step in solving an ILP problem. If the optimal solution to the relaxed LP problem is an integer solution, then this solution is also optimal for the original ILP problem. If not, then additional techniques such as branch and bound or cutting planes are used to solve the original ILP problem.

To know more about  linear program click this link -

brainly.com/question/30763902

#SPJ11

Some organizations and individuals, such as patent trolls, abuse intellectual property laws .



computer science

Answers

Answer:

False.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Patent trolls buy up patents in order to collect royalties and sue other companies. This ultimately implies that, patent trolls are individuals or companies that are mainly focused on enforcing patent infringement claims against accused or potential infringers in order to win litigations for profits or competitive advantage.

Hence, some organizations and individuals, such as patent trolls, do not abuse intellectual property laws.

Answer:

the answer is intentionally

Explanation:

i took the test

Which storage types does SAP HANA support for data? There are 2 correct answers to this question.
A . Column storage
B . File storage
C . Sheet storage
D . Row storage

Answers

SAP HANA is a high-performance in-memory database that processes massive amounts of data in real-time. It supports various storage types for data. These storage types are:Column storage: This storage type in SAP HANA stores data in columns rather than rows.

Column storage compresses data in a better way than row storage, resulting in increased query performance and reduced I/O time.

Row storage: Row storage in SAP HANA stores data in rows. This storage type is useful for storing small amounts of data or metadata in a table.

File storage: SAP HANA can also store data in a file format. This storage type is commonly used to store data that does not fit in memory or when the data needs to be accessed externally.

Sheet storage: This storage type is not a valid option in SAP HANA. Hence, it is not supported for data storage purposes.

In conclusion, the two correct storage types that are supported by SAP HANA for data storage are Column storage and File storage.

To know more about SAP HANA  visit :

https://brainly.com/question/27979424

#SPJ11

Other Questions
Can someone pleaseeee help if youre correct Ill give u brainlist for what visible wavelengths of light do the reflected waves interfere constructively? the range of wavelength of visible light is from 380 Write an equation for the line whose slope is -1/5and whose y-intercept is 5. you would like to implement a group counseling session for students who came up as high risk on a depression screener. what tier is this targeting? How do you prove you cant do sedentary work? ahhh brainly broke for me :dies: Within plant cells, ____ contain enzymes, chlorophyll, and othermolecules necessary for photosynthesis Write the negation of the conditional statement. 7)lf it isred, then itis not an egg. B) It is not red and it is an egg D) It is red and it is not an egg A) It is red and it is an egg. C) It is not red and it is not an egg. Write the contrapositive of the statement 8) If the electricity is out, then I cannot use the computer. A) If the electricity is not out, then I can use the computer B) If I cannot use the computer, then the electricity is out C) If the electricity is not out, then I cannot use the computer. D) If I can use the computer, then the electricity is not out Construct a truth table for the statement. What do most birds do in the wintertime? Circle classprivate membersdouble radiusdouble xPosdouble yPospublic membersdouble diameter()get the diameter of the Circle. It returns a value, diameter.double area()calculate the area of the Circledouble circumference()calculate the circumference of the circledouble getRadius()returns the radiusdouble getX()returns the xPos valuedouble getY()returns the yPos valuevoid setX(double x)sets xPos, no requirementsvoid setY(double y)sets yPos, no requirementsdouble distanceToOrigin()returns the distance from the center of the circle to the originHINT: Find out how to calculate the distance between two points and recall the origin is at (0,0)bool insersect(const Circle& otherCircle)Take another Circle by const reference (see more notes below)Returns true if the other Circle intersects with it, false otherwisebool setRadius(double r)sets the radius to r and returns true if r is greater than zero, otherwise sets the radius to zero and returns falseRemember, you will need a header file (.h) and an implementation file (.cpp)You'll also need to update your MakefileNOTE: The Circle class should not do any input or output.CircleDriver classprivate membersCircle circ1;Circle circ2;void obtainCircles()Talk with the user to obtain the positions and radii for two Circles from the user. Repeats prompts until the user gives valid values for the radiiIt does not validate the values, but rather checks the return value from a call to Circle's setRadius methodvoid printCircleInfo()Prints the following information about each of the Circles to the screen:The location of the Circle's center (xPos, yPos), the distance from the origin, each area, circumference, diameterLastly print whether or not the two circles intersectSample output from printCircleInfo().Information for Circle 1:location: (0, 50.0)diameter: 200.0area: 31415.9circumference: 628.318distance from the origin: 50.0Information for Circle 2:location: (50.0, 0)diameter: 200.0area: 31415.9circumference: 628.318distance from the origin: 50.0The circles intersect.public membersvoid run()run merely calls all the other methods. Here's your definition for run()//This will go in your CircleDriver.cppvoid CircleDriver::run(){ obtainCircles(); printCircleInfo();}mainMain does very little. In fact, here is your main:int main(){ CircleDriver myDriver; myDriver.run(); return(0);} Someone plz help me A.aB.bC.cOrD.d What type of cartilage forms the other eight laryngeal cartilages. Why did many people move to the city around the 1890s to 1910s? One beaker contains pure water and the other beaker contains pure methanol at the same temperature. Which liquid has the higher surface tension and viscosity?A. Water has the higher surface tension. B. Methanol has the higher surface tension. C. Surface tension cannot be predicted. D. Water has the higher viscosity. E. Methanol has the higher viscosity. F. Viscosity cannot be predicted. Find the midpoint of the segment whose endpoints are (8,6) and (10.4) Which of the following actions by the Clintonadministration best reflects the ideas about thescope of government expressed in the excerpt?(A) The decision to pursue militarypeacekeeping interventions in theBalkans and Somalia(B) The enactment of welfare reform to restrictbenefits and encourage self-reliance(C) The negotiation of new free tradeagreements among North Americancountries(D) The effort to enact universal health carelegislation How did Theodore Roosevelts Corollary influence US foreign policy? A. It showed that the United States was becoming more passive internationally. B. It highlighted how the United States needed to work within the United Nations. C. It proposed that all nations have stronger diplomatic relations with one another. D. It displayed how the United States would take a more aggressive role in the world. E. It presented a direct threat to the Soviet Union for any action taken in Europe Polynomial functions need help on questions 4 6 8 10 *answer below*Which component of blood protects us from invading foreign material? -plasma -erythrocytes -thrombocytes -LEUKOCYTES (correct answer) Use rounding to decide if the answer is reasonable.Then find the answer to see if you were right.1. 136-87 = 492.94-56 = 833.165+28 = 163