the em – command is used to repeat the last action and to redo copy none of these​

Answers

Answer 1

redo the right answer..


Related Questions

What were two weaknesses of the First New Deal?

A. It failed to end massive unemployment.
B. It created a huge national deficit.
C. It created tension within labor unions.
D. It failed to properly regulate the banks.
E. It caused people to distrust the banks.

Answers

Answer:B. It created a huge national deficit.

Explanation:

B.The New Deal failed because Roosevelt created uncertainty through experimentation, protectionism, regulation, and raising taxes.

The New Deal failed because the NRA, by fixing prices, damaged American business. Folsom explains that the traditional free market system, where businesses compete and innovate to sell products of varying price and quality to choosy customers was overthrown

D. It failed to properly regulate the banks.

.The next day, Roosevelt declared a four-day bank holiday to stop people from withdrawing their money from shaky banks. On March 9, Congress passed Roosevelt’s Emergency Banking Act, which reorganized the banks and closed the ones that were insolvent.

The Great Depression: Causes and Early Events: Mastery Test

-

Hope this helps :)

A computer can be a flexible and powerful tool by using what type of software?

Answers

A computer can be a flexible and powerful tool by using an application software.

What is an application software?

Application software is known to be a type of computer program that is known to often carry out a particular task such as personal, educational, as well as  business function.

Note that all application is set up so that they can be able to assist end-users in carrying out a lot of tasks that are linked to productivity, creativity, etc.

Therefore, A computer can be a flexible and powerful tool by using an application software.

Learn more about application software from

https://brainly.com/question/26954052

#SPJ1

question 3. you'll sometimes want to find the last element of an array. suppose an array has 142 elements. what is the index of its last element? (4 points)

Answers

You'll sometimes want to find the last element of an array. suppose an array has 142 elements. The index of the last element is array[141]. Because array index start at zero.

In different programming languages, the syntax is different to get the last element of an array.

For example, in C++, to get the last element of the array, we use the following program to get the last element of the array:

#include <iostream>

#include <array>

using namespace std;

int main()// main function

{

  array<int,142> myArray {1, 2, 3, 4,..., 142};/*suppose array has 142 elements*/

   int lastElementofArray = myArray.back();/*get the last element of the array*/

  cout<<"last element is: "<<lastElementofArray<<endl;/* print the last element of the array*/

  return 0;

}//end of main function.

While in python to get the last element of array, the following program performs this function.

myArray = [1,2,3,4,5,.....,142] /*assume we have 142 element in it*/

last_element = myArray[-1]/*it will get the last element of the array*/

print(last_element)//print the last element in the array.

You can learn more about arrays in python at

https://brainly.com/question/21723680

#SPJ4  

You can mix ntfs permissions and share permissions on the same system. True or false

Answers

Answer:

true

Explanation:

Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. how could that user navigate to the /home/jim directory?

Answers

Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. the way in which that user can navigate to the /home/jim directory? is cd ../..

What is a Directory?

This refers to the special type of file that has only the information needed to access files.

Hence, we can see that Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. the way in which that user can navigate to the /home/jim directory? is cd ../..

This would take him back to the root directory which is home in the Jim directory and he can start viewing the files in their parent-child order.

Read more about directories here:

https://brainly.com/question/28391587

#SPJ1

in which domain of a typical it infrastructure is the first layer of defense for a layered security strategy?

Answers

The domain of a typical IT infrastructure that is the first layer of defense for a layered security strategy is the firewall.

What is a Firewall?

This refers to the set of protection that determines what external network traffic(internet) should or should not be allowed to pass the internal network.

Hence, we can see that The domain of a typical IT infrastructure that is the first layer of defense for a layered security strategy is the firewall and this is because it protects and filters incoming network.

This firewall helps to act as the first layer of defense for a layered security strategy as it allows or prevents network access.

Read more about firewalls here:

https://brainly.com/question/13693641

#SPJ1

____ work to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network.

Answers

Intrusion prevention systems work to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network.

An intrusion prevention system abbreviated as IPS is a tool that plays a major role in the network security of an organization. This system continuously scans for any activity or viruses that may harm the company network and provides measures to prevent such types of activity.

It is more useful compared to the intrusion detection system as it performs the function of both detecting and blocking the threat to the network while the intrusion detection system can only disclose the threat.

Mostly, the intrusion prevention system works by detecting the threat and reports to the administrator to prevent any harmful activity or automatically blocks the source of threatful activity, or transforms the firewall to stop such further attacks hereafter.

To learn more about intrusion prevention systems, click here:

https://brainly.com/question/18883163

#SPJ4

During which phase of the development of the internet was the domain name system (dns) introduced?

Answers

Institutional phase of the development of the internet was the domain name system (DNS) introduced.  Thus, option B is correct.

What is a domain name system?

Web addresses are converted to email accounts via the Domain Name System (DNS), what computers utilize to view online articles.

In the institutional phase of the development, the major changes are happening in this the DNS or the domain name system is being introduced which helps in connecting the internet address to the IP of the customer or the person who is being accounted for. Therefore, option B is the correct option.

Learn more about the domain name system, here:

https://brainly.com/question/28145453

#SPJ1

The question is incomplete, the complete question will be:

A) Commercialization phase

B) Institutional phase

C) Innovation phase

D) Consolidation phase

A file path is a complete address that describes the exact location of a file. true false

Answers

It is true that a complete address that specifies a file's precise location is known as a file path. That question is related to file system.

A file system stores and arranges files on some type of storage device—typically one or more hard drives—in a way that makes it simple to access and retrieve them. The majority of current file systems store the files in a tree-like (or hierarchical) form.

One or more root nodes can be found at the top of the tree. There are directories and files beneath the root node (folders in Microsoft Windows). Each directory has the ability to hold files and subdirectories, which in turn have the ability to hold files and subdirectories, and so on, potentially indefinitely.

The sample directory tree with a single root node is depicted in the accompanying diagram. Multiple root nodes are supported by Microsoft Windows. Each root node corresponds to a volume, like C: or D: The root node that the Solaris OS supports is identified by the slash (/).

Learn more about file system https://brainly.com/question/11994563

#SPJ4

Which property of a plaintext password is most effective at defeating a brute-force attack?

Answers

The property of a plaintext password is most effective at defeating a brute-force attack is The length of the password.

Which property of a plaintext password is used for defeating a brute-force attack?

The length of the password is known to be very vital in this type of an attack.

Note that when the password is one that do not have any kind of complexity that is of it is just simple dictionary words, it is one that can make a system to  be still be vulnerable but if it is seen as a long password, the system may still be in a vulnerable state but when the output space is small it makes it hard and difficult.

Therefore, The property of a plaintext password is most effective at defeating a brute-force attack is The length of the password.

Learn more about brute-force attack from

https://brainly.com/question/17277433

#SPJ1

you work as the it administrator for a small corporate network. to accommodate specific network communication needs for an upcoming project, you need to upgrade the network connection's speed for the windows workstation located in the executive office.

Answers

We need to upgrade the network connection's speed for the windows workstation located in the executive office for that we will Install the network interface card and configure the Ethernet cable connection between the computer and the LAN network.

The connecting and communication of computer equipment is the function of the computer networking system. An adapter known as a network interface card allows the computer to connect to a network (NIC). The NIC's operations are managed by the operating system.

The speed and port state of the NIC are configured, and it is linked to the LAN using a straight through cable.

To check for LAN network connectivity on the PC, use the ipconfig/all and netstat commands. Another option is to use the ping command.

Launch Start. To open the console, perform a search for "Command Prompt," then select the top result. To check the connection speeds of all the Ethernet and Wi-Fi adapters, use the command after typing it: where netEnabled=true in wmic nic get name and speed.

Learn more about workstation:

https://brainly.com/question/17121112

#SPJ4

What comparison operator is used to test whether an expression does not equal another expression?

Answers

A comparison operator which is used to test whether an expression does not equal another expression is: !=

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

In Computer technology, a comparison operator can be defined as a type of binary operator that is used for comparing the data values in a field (expression) to either the data values in another field (expression) or a constant.

In conclusion, a comparison operator which can be used to test whether an expression does not equal another expression is the != operator.

Read more on comparison operator here: https://brainly.com/question/2647100

#SPJ1

A) Identify and describe your computer or laptop’s hardware, software, and operating system. B) Describe the installation process for printers and scanners. Identify possible malfunctions relating to this installation process. C) Research and describe how you would ensure computer and Internet safety. Describe how you would use ergonomics to minimize the detrimental effects of excess computer usage on your body.

Answers

My computer hardware is Lenovo Ideapad3; to install a printer we must connect it and follow the steps of the automatic software; protection on the pc is guaranteed by using an antivirus; injuries are prevented by taking active breaks and using ergonomic tools.

What is the hardware, software and operating system of my computer?

To know the specific data of our computer we must follow the following steps (Windows):

Hit the WIN+R keys on your computer to open RunA window will open at the bottom left of your monitorType Dxdiag in that windowPress Enter or OK to run it

The first thing that Windows will do is ask us if we want to go ahead and tell us that our computer may be connected to the Internet. Afterwards, it will take a few seconds to scan everything on it. After those seconds, we will be shown a window with the diagnostic tool in which we find a lot of information organized by tabs. In my case the hardware of my computer is:

Lenovo Ideapad 3.

How to install printers and scanners?

To install printers and scanners to our computer we can use different methods, one of them is to insert the CD that comes with our printer; the other process is to connect the device via cable or bluetooth and follow the steps in the automatic installation.

In general, this process is easy and usually has no errors. However, when it has errors and does not work correctly, we must uninstall and reinstall the software.

How to ensure safety when using the computer?

To prevent the security of our computer from being circumvented by a hacker, we must have an updated antivirus and periodically scan our computer to avoid malicious programs or files that harm our security.

How to avoid damage from overuse?

To avoid diseases, injuries or damage to our body due to excessive use of the computer, we must carry out the following actions:

Use filter lenses to protect our eyes.Use an ergonomic mouse and keyboard.Take active breaks during our work on the computer.Have a correct position while using our computer.

Learn more about computers in: https://brainly.com/question/21080395

#SPJ1

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network. True or false

Answers

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

How are LANs connected to each other?

The use of the  peer-to-peer LAN directly is one that tends to link two devices such as workstations or personal computers  as one or  together through the use of an Ethernet cable.

Note that the client-server LAN is made up  of multiple endpoints as well as servers that are linked to a LAN switch.

Therefore, Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

Learn more about ethernet from

https://brainly.com/question/1637942

#SPJ1

What will happen if you attempt to create a scanner for a nonexistent file? what will happen if you attempt to create a printwriter for an existing file?

Answers

If you attempt to create a Scanner for a nonexistent file, an exception will occur. If you attempt to create a PrintWriter for an existing file, the contents of the existing file will be gone.

The question above is part of Java programming language. Java is a programming language that may be used on a variety of computers, including gaming consoles. The current language was initially created by James Gosling when he first joined Sun Microsystems, which at the time was a branch of Oracle and was founded in 1995.

This language adopts a lot of syntax found in C and C++ but with a simpler object model syntax and minimal support for lower-level routines.

Learn more about Java Programming https://brainly.com/question/2266606

#SPJ4

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack.

Answers

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack is a False statement.

What is a rack and what is its purpose?

A rack is known to be a term that is used in computing as well as in an IT (information technology).

The term is known to be one that connote the act that is acting as a supporting framework that tends to holds hardware modules.

In the above context, racks are seen as a kind of  contain servers, hard disk drives as well as  other forms of computing equipment.

The Racks are known to be tools that make it possible to place in a lot of equipment in a little physical footprint without  the need for shelving.

Therefore, in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack is a False statement.

Learn more about consoles  from

https://brainly.com/question/27031409

#SPJ1

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack. True or False. .

define a function calcpyramidvolume with double data type parameters baselength, basewidth, and pyramidheight, that returns as a double the volume of a pyramid with a rectangular base. relevant geometry equations: volume

Answers

The defined function is given below:

The C++ Code

#include <iostream>

using namespace std;

/*

Define a function PyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations:

 Volume = base area x height x 1/3

 Base area = base length x base width.

 (Watch out for integer division).

*/

/* Your solution goes here  */

double PyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

double baseArea = baseLength * baseWidth;

double vol = ((baseArea * pyramidHeight) * 1/3);

return vol;

}

int main() {

 cout << "Volume for 1.0, 1.0, 1.0 is: " << PyramidVolume(1.0, 1.0, 1.0) << endl;

  return 0;

}

Read more about C++ programming here:

https://brainly.com/question/15411348

#SPJ1

1. Why is it important to learn about cybersecurity?
2. What are you most excited to learn more about in the world of
cybersecurity?

Answers

1. To protect your device from getting bugged.

which of the following should go in the place of /* missing line */ to get this input from the user and store it in the variable favoritemeal?

Answers

favoriteMeal = scan.nextLine(); should be used to get an input from the user and store it in the variable favoriteMeal.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two main methods for passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

Based on the given lines of code, favoriteMeal = scan.nextLine(); should be used to get an input from the user and store it in the variable favoriteMeal.

Read more on variable here: brainly.com/question/12978415

#SPJ1

Complete Question:

The following code is to be used to get the favorite meal from the user.

Scanner scan = new Scanner(System.in);

String favoriteMeal;

System.out.println("Enter favorite meal");

/ missing line /

Which of the following should go in the place of /* missing line */ to get this input from the user and store it in the variable favoriteMeal?

an attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.

Answers

An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack is a true statement.

What is security?

Security can be defined as the way where a secure environment or the surrounding are being present, this is basically of danger or threat place. It reduces or a lot of insecurities as well as provides safety to the people are an individual group

A zero-day attack is what happens when a hacker successfully exploits a weakness while software engineers can identify a remedy.

Due to their capacity to present as any type of more general software weakness, zero-day bugs can start taking on nearly any shape which may result in great damage and loss.

Learn more about security, here:

https://brainly.com/question/28070333

#SPJ1

Which document is issued by the state real estate commissioner to help protect purchasers of subdivision plots?

Answers

Public report is a document that the state real estate commissioner issues to assist in protecting buyers of subdivision plots.

The state real estate commissioner issues a public report following application and approval to satisfy the disclosure requirements of the Subdivided Land Laws to stop fraud and misrepresentation when selling subdivided land to buyers.

The Public Report will typically include information about the applicant's name, the subdivision's location and size, utility, school, tax, management, maintenance, and operational costs, as well as any unusual easements, rights of way, setback requirements for vacant land offerings, and restrictions or conditions.

Learn more about public report https://brainly.com/question/28455254

#SPJ4

what are some websites you commonly use​

Answers

Answer:

boredpanda.com

Explanation:

it has fun collections of tweets, stories, photos etc.

operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets.

Answers

An operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets is a false statement.

What are operating systems?

An operating system is known to be one of the most vital software that runs on a computer and it is one that helps you  manages the computer's memory as well as processes.

Note therefore, An operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets is a false statement because the Word processing software does that work.

Learn more about operating systems  from

https://brainly.com/question/22811693

#SPJ1

operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets.True or false

Why is John Von Neumann a remarkable name in the history of the computer?​

Answers

Answer:

John Von Neumann is one of the most famous people in the history of computers because of the fact that he came up with the concept of speedy computers with data, "the storage program technique". He introduced idea to help out with high speed digital data

One of his important contributions in this field was the development of a logical design for computers that paid attention to such concerns as data storage and the processing of instructions. This design, called “von Neumann architecture,” became the basic concept of most computers

Explanation:

Answer: John Von Neumann is one of the most famous people in the history of computers because of the fact that he came up with the concept of speedy computers with data. "the storage program technique".

Explanation:

in this clip, the filmmakers connect each shot using a technique called – . these editing choices are intended to maintain cinematic – and hide the edit.

Answers

The filmmakers connect each shot using a technique called Cutting on action.

These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

What is meant by cutting on action?

Cutting on Action is known to be a term that is said to be used by editor and it is one that implies the  cuts in the middle of a given action to another shot that tends to matches the first shot's  said action.

Note that it is seen as a common editing method that tends to hides the shift from one shot angle  to another shot angle and this is often done  by stopping the first shot in the middle of another continuing action and then beginning the next shot at some distance along in the similar action.

Therefore,  The filmmakers connect each shot using a technique called Cutting on action. These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

Learn more about filmmakers from

https://brainly.com/question/28110104
#SPJ1

A/an _______________ may be required for a position such as information technology consultant, information systems manager, or information security analyst.

Answers

A certification may be required for a position such as information technology consultant, information systems manager, or information security analyst.

What is certification?

Certification can be defined as a process which describes the formal recognition that is given to a graduate student for the successful completion of an academic programme, course of study such as:

FinanceEducationInformation technology consultant.Information systems manager.Information security analyst.Engineering

In this context, we can reasonably infer and logically deduce that a certification may be required for a position such as information technology consultant, information systems manager, or information security analyst.

Read more on certification here: https://brainly.com/question/13412233

#SPJ1

write the header file (.h file) of a class acc2 containing: a data member named sum of type int. a constructor accepting no parameters. a function named getsum that accepts no parameters and returns an int.

Answers

// acc2.h

// c++ class header for acc2
class acc2
{
public:

// getsum()
int getsum()
{
return sum_;
}

// Default constructor
acc2()
{
sum_ = 0;
}

private:
int sum_;
}

__________ software aids architects, engineers, and many others who need to create a digital model of an object.

Answers

CAD software aids architects, engineers, and many others who need to create a digital model of an object.

What is CAD software used for?

CAD design is  known to be a kind of a software that is often used by architects, construction managers, as well as engineers and it is one that has said to have taken over manual drafting.

Note that it is said to be a tool that helps its users to be able to make designs in 2D as well as in 3D form.

Therefore, CAD software aids architects, engineers, and many others who need to create a digital model of an object.

Learn more about CAD software from

https://brainly.com/question/14350050

#SPJ1

Write a program that preprocesses the collection. this preprocessing stage should specifically include a function that tokenizes the text. in doing so, tokenize on whitespace and remove punctuation.

Answers

The code that performs the above results given below:


import java.util.*;

Class Preprocessing

{

   public static void main(String args[])

   {

       StringTokenizer inputText=new StringTokenizer("You! can! enter! input! here!"," ");

       while(inputText.hasMoreTokens())

       {

           System.out.println("Next Token:"+inputText.nextToken("!"));

       }

   }

}

What is a code?

In computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code).

It is also the name given to source code after it has been compiled and is ready to execute on a computer (i.e., the object code).

Coding is the process of directing a computer's behavior using a programming language.

Every line of code in Python instructs the computer to do something, and a document full of lines of code is referred to as a script. Each script is intended to do a certain task.

Learn more about codes:
https://brainly.com/question/25658352
#SPJ1

two routers, r1 and r2, connect using an ethernet over mpls service. the service provides point-to-point service between these two routers only, as a layer 2 ethernet service. which of the following are the most likely to be true about this wan? (choose two answers.)

Answers

a. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2.

b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.

c. R1 will forward data link frames to R2 using an HDLC header/trailer.

d. R1 will forward data link frames to R2 using an Ethernet header/trailer.

B (R1 will link to a physical Ethernet link, with the other end of the cable attached to a device at the WAN service provider point of presence.) and D (R1 will transmit Ethernet header/trailer-encoded data link frames to R2 for transmission).

Each router connects to an SP device in an SP facility known as a point of presence using a physical Ethernet link in the physical installation (POP).

Each customer's device is not connected through an Ethernet link. Both routers employ the same Ethernet standard header and trailer used on LANs from a data link standpoint; HDLC is irrelevant on these Ethernet WAN links.

Learn more on routers here:

https://brainly.com/question/9490122

#SPJ4

Other Questions
Simplify (7y+4)(8y+2) Name some examples of Manifest Destiny that you remember from yesterday. Explain them. Joe, a steel worker in cleveland, ohio, has no aspirations of being rich and successful. nevertheless, he works hard and takes pride in his job. according to merton's theory, this is an example of? when the economy is doing badly ,which of the following workers is NOT likely to have fewer costumers or patients who want their services ? undocumented immigrants who graduate from a texas high school recieve in- state tuition rates for texas public universities and colleges based on? quizlet If lines a and b are perpendicular to line c, what word best describes how lines a and b relate to each other?A.intersecting B. ParallelC. Perpendicular D. Skew Liz and moss disagree over the amount due under their contract. to avoid involving any third party in the resolution of their dispute, liz and moss could resolve their dispute through? Escoge la mejor respuesta.Puedes acampar en el parque de las cataratas de Iguaz. True or Falsei'm giving brainliest Marcy walked 3 7/10 miles on Saturday and Sunday she walked 0.25 more miles than she did on Saturday how many total miles did she walk over the weekend. Pls. Help Its mathB Which is an example of hypothetical evidence?Most politicians hire professional speech writers to prepare what they say.In his latest speech, Mayor Johnson said, It is time for cooperation among our citizens.Two-thirds of American students believe political speeches are difficult to understand.Imagine how politics would change if leaders wrote their own speeches. What is pie? PLS IIIIIII NNNNNEEEEEEEEEEEEEEEEEEEEEEEEDDDDDDDDDDDDD IIIIIIIIIIIIITTTTTTTTTTTTTTTT! What conclusion follows from the finding that emotions are controlled primarily by subcortical brain structures? 1 Answer: HACCP is a program designed to create awareness of potential pointsof contamination in a food-processing facility. a. true b. false2 Answer: A bacteriostatic agent uses static electricity to remove bacteriafrom a surface. a. true b. false3 Answer: The three major sources of contamination in a food processing plantare people, processing equipment, and the plant environment. a. true b. false4 Answer: Water hardness is a measure of the presence of substances in waterthat form insoluble precipitates with soap. a. true b. false5 Answer: The floor of a food processing facility should have an unfinishedconcrete surface for easy cleaning. a. true b. false6 Answer: A _____ hazard is generally a microbe such as a bacterium, virus,or parasite. a. biological c. deleterious b. physical d. chemical7 Answer: In a food processing plant, _____ are probably the biggest sourceof contamination. a. employees' hands b. food preparation surfaces c. tools and equipment used to handle food d. employees' feet and shoes8 Answer: Procedures developed over time to ensure the production of safe andwholesome food and to provide a safe working environment are called_____ practices. a. sanitization c. good manufacturing b. post-production d. facility management9 Answer: A food-preparation surface that will not rust or deteriorate as aresult of continuous applications of water is said to be _____ resistant. a. aquatically c. continually b. corrosion d. sanitizer10 Answer: The maintenance of overall cleanliness and hygiene in the foodprocessing environment is known as food _____. a. safety c. galvanizing b. sanitation d. HACCP Basic Algebraic Inequalities (L3) Sep 07, 2:42:46 PM Watch help video Select the values that make the inequality inequality, in terms of g. (Numbers written in order from least to greatest going across.) 48 63 67 56 64 Submit Answer 0 72 Equivalent Inequality: g g > 8 true. Then write an equivalent 61 65 0 80 attempt 1 out A college baseball stadium has 6,925 seats. During 12 games this season, the stadium sells out and fills every seat.How many tickets were sold for those 12 games? Question 10 of 10Adjusting entries are recorded __ of an accounting period A. in the beginningB. on the third dayC. in the first weekD. at the endof an accounting period.SUBMIT Joseph needs to complete his income taxes for the year. he has already calculated his adjusted gross income. what does he need to do next? 4x - 2x + x - 6 = 15 solve for x and show steps! The half-life of the isotope br3574 is 25.4 minutes. if a 4.0-mg sample is given to a patient, how much of the isotope remains after 90.0 minutes? What does Mrs. Whitaker have Galaad do for her?