what kinds of proximate and macro causes can you see that influence henry to experience his private troubles (seen objectively, from our standpoint)?

Answers

Answer 1

Macro-level sociology is concerned with the characteristics of large-scale, societal-wide social interactions that go beyond the context of individual interactions, such as the dynamics of institutions, class hierarchies, gender relations, or whole populations.

It involves tracing the connections between people's behavioural patterns and broader social dynamics, learning to recognise human behaviour that is created by systems, and recognising the social factors that are influencing an individual's behaviour. Personal issues are problems that affect individuals and that they, along with other members of society, generally attribute to their own moral and personal faults. Examples include a variety of issues including divorce, unemployment, and eating disorders. Theory of Symbolic Interaction. A micro-level theory called symbolic interactionism focuses on the interactions between people inside a society.

To learn more about interactions click the link below:

brainly.com/question/29690903

#SPJ4


Related Questions

It is impossible to _____________ and not _____________ at something unless you live in such a cautiously way that is not worth living

Answers

It is impossible to spend a life without failing at doing something, except you live your life with such caution that it would have been better to not have existed at all, in which case you fail by osmosis.

What does Rowling define as imagination, and what is it's purpose?

She claimed that imagination is the root of all creativity and innovation, not just the unique human ability to picture the unreal."It is the ability that permits us to empathize other others whose experiences you have never lived, and it is undoubtedly the most transforming and enlightening capacity."

Why is it called Excel?

To excel in English implies to be exceptionally good at something and to outperform others.Early in the 1980s, Lotus 1-2-3 rose to prominence as the top spreadsheet application.Multiplan, a spreadsheet tool from Microsoft, fell behind in popularity.

To know more about living visit:

https://brainly.com/question/29153181

#SPJ4

How To Fix 'Unable To Connect To The Login Queue' Error In League of Legends?

Answers

How To Fix The Problem Where You Can't Connect To A Login Queue Try relaunching League of Legends first.Please restart your computer if it doesn't resolve the problem because there might be one there as well.Look into your internet connection.

How can the League of Legends login line be fixed?

Fixes for the League for Legends Registration Queue Error Checking everything should be your initial step.Ensure that all of the wires are properly connected and that your internet access is operational.But when they are, it might be beneficial to detach, then reconnect.

Why am I unable to sign in to League of Legends?

If you are having trouble logging into League of Legacies, we advise double-checking your login information to make sure it is for you LoL/Riot account.If you've forgotten your account's password or are unsure if it's the right one, you can also try to reset it.

To know more about League of Legends visit:

https://brainly.com/question/28440140

#SPJ4

where is the known traveler number on global entry card

Answers

On a Global Entry card, where is a Known Traveler Number located? By scanning the back of your Global Entry card, you can immediately obtain your Known Traveler Number, commonly known as PASSED. This number usually has nine digits and starts with 15.

A Known Traveler Number (KTN) is what, exactly?

Each person cleared for TSA PreCheck® expedited screening receives a Known Traveler Number (KTN). When making airline travel plans, the KTN must be entered in the KTN field in order for the TSA PreCheck® indicator to show up on your boarding pass.

This number is 9 digits long, can contain both numbers and letters, and commonly starts with TT for participants in the TSA PreCheck® Application Program.

To know more about Traveler numbers visit here

https://brainly.com/question/12775270

#SPJ4

other than installing virus and worm control software, what can sls do to prepare for the next incident?

Answers

SLS can help users become more aware of viruses and take precautions. Opening such files would be unethical because they might contain malware and viruses that could cause further system attacks and result in significant financial loss for the organisation.

In what ways can computer viruses be avoided?

Stay away from websites you don't trust. Open no email attachments from unknown senders or businesses. Avoid clicking on links in spam emails. Always check the destination of a link with your mouse before clicking on it (especially one with a short URL).

How do you prevent computer viruses, and what are they?

A malicious piece of computer code created to spread from one device to another is known as a computer virus. These self-copying threats, a subset of malware, are frequently made to harm a device or steal data. Consider a biological virus that causes illness.

To know more about malware visit:-

brainly.com/question/14759860

#SPJ4

a project is due in two days, and the team of testers needs at least three days to finish testing. based on the istqb code of ethics, what should the team of testers do? group of answer choices

Answers

In accordance with the general welfare, testers must uphold the integrity and credibility of their trade. COWORKERS: Testers must treat their coworkers with respect and fairness. Participants in the test must pursue lifelong learning.

Explain about the purpose of testing ISTQB?

The goal of testing is to fully inform the stakeholders about any limitations, risks, or unclear requirements that may exist on a technical or otherwise basis.

Examining a product's documentation and contents to assess how well demands or requirements have been satisfied, to look for flaws, gauge quality and risk, build trust, and stop flaws.

A software product or application is tested in order to determine whether or not it performs as intended. Testing has advantages such as problem elimination, lower development costs, and enhanced functionality.

Identification and subsequent correction of faults is the main advantage of testing. Comparing actual and anticipated results during testing enables developers and testers to enhance quality. It may be worthless or even dangerous for clients if software is produced without being tested.

To learn more about purpose of testing ISTQB refer to:

https://brainly.com/question/29973345

#SPJ4

PLEASE HELP ILL GIVE POINTD AND BRAINLIEST

Joshua forgot to add a heading style to the title of the first journal entry. What will happen in his table of contents without that heading style?


The journal entry title will be in a different color than other entries in the table of contents


The journal entry will be bolded in the table of contents.


the journal entry will not be included in the table of contents


The journal entry will be italicized in the table of contents

Answers

The journal entry won't be included in the table of contents because it lacks that headline style.

How do you format numbered list items in the Heading 1 style?

Open the document with built-in heading styles selected, and then choose Heading Select Multilevel List in the Paragraph group under the Home tab's Home option. The numbering style you want to use in your document can be found under List Library.

How can I insert a new heading into an existing Word table of contents?

To view the table of contents, select References. Choose Create an own table of contents. Use the options to add or modify the tab leader, configure formats, specify, and show, hide, and align page numbers.

To know more about heading style visit:-

https://brainly.com/question/16951777

#SPJ4

wireless wearable fitness devices are authorized within scifs. True or False?

Answers

Within SCIFs, wireless wearable fitness devices are permitted. Banner lines, section marks, and a CUI designation indicator are necessary for controlled unclassified information (CUI).

Why do we hold Siprnet training every year?

This annual SIPRNET refresher training's goal is to make sure that everyone using the MEDCOM SIPRNET is aware of their duties in protecting sensitive information and systems in line with applicable Army rules and MEDCOM policy on SIPRNET Security Procedures.

\What is necessary in order to access classified information?

An individual must have national security eligibility, a need for the information, and have signed a Standard Form 312 (SF-312), Classified Information Nondisclosure Agreement, in order to have allowed access to it.

To know more about devices visit:-

https://brainly.com/question/13870219

#SPJ4

what are examples of potential security breaches that would need to be referred to the local spec territory office? a. loss of computer containing personally identifiable information (pii) b. loss of computer bag containing tax returns c. loss of taxpayer information d. all of the above

Answers

Answer:

Explanation:

D

What is the most advanced warehouse inventory management software?

Answers

Answer:

Warehouse Management System

Top 10 Warehouse Management Systems

WMS Comparison Table

#1) Sortly

#2) NetSuite WMS

#3) Fishbowl Inventory

#4) 3PL Warehouse Manager

#5) Softeon

#6) Infor SCM

#7) HighJump

#8) Manhattan Associates

#9) TECSYS WMS

#10) Astro WMS

#11) Latitude WMS

Explanation:

how long does it take for nintendo switch controllers to charge

Answers

Nintendo switch controllers must be fully charged for the Joy-Con controllers, which takes about three and a half hours.

How can my Switch Controllers be charged quickly?

Simply docking the Nintendo Switch controllers to the edges of the system is a fairly easy way to charge them. The controllers will begin charging the moment you connect them, and it doesn't take long as long as the console's main tablet-like component is on.

Can Joycons be wirelessly charged?

When within two feet of Powercast's PowerSpot wireless transmitter, wireless charging grips for Nintendo Switch Joy-Con Controllers begin to charge without the use of wires, plugs, or charging mats. There is never a need for users to dock their controllers, plug in, or stop playing because of a low battery.

To know more about switch  visit:-

https://brainly.com/question/20595293

#SPJ4

question 9 please help

Answers

Answer:

FileZilla

Explanation:

FileZilla is open-source software that supports multiple FTP protocols that allow file exchange over the network.

Imagine you are a team leader at a mid-sized communications company. One of your fellow team leaders is considering setting up a cloud computing system for their team to store and share files. They have begun to question the wisdom of this move, as someone has told them that security might be an issue. Security concerns aside, what would you say in order to convince them that cloud computing is a good idea? Mention at least three advantages that would benefit their team

Answers

Users can launch their applications rapidly by developing in the cloud. Data security: Because of the networked backups, hardware failures do not cause data loss.

What exactly is cloud computing in simple terms?

Cloud computing can be defined as the provision of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to give scale economies, faster innovation, and flexible resources.

Which of the following encapsulates cloud computing the best?

Instead of purchasing and installing the components on their own computers, organizations and people who use cloud computing rent or lease computing resources and software from third parties across a network, such as the Internet.

To know more about loud computing visit:-

https://brainly.com/question/29737287

#SPJ4

modern network traffic monitoring devices, such as fireeye and palo alto, provide a higher level of security and detection than common firewalls and ids/ipss. describe how these devices function. do they really offer the level of protection that they claim? would you recommend them to a client? why or why not?

Answers

A firewall is essentially the barrier that stands between a private internal network and the open Internet at its most basic level. The basic function of a firewall is to let safe traffic in while blocking harmful traffic.

Two cloud-based security platforms, FireEye and Palo Alto Network's (PAN) Wildfire, are used to quickly aggregate, analyze, and share threat data across all of their respective customer installations and subscriptions. Palo Alto Networks provides superior architecture and advantages: full view and exact control: Based on apps, users, content, and devices, our next-generation firewalls offer total insight into all network traffic. Do not allow unauthorized file and data transfers. Find and stop malware, exploits, and malware communications. Control unauthorized web usage.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ4

what component can be used to reduce the risk of a trojan or rootkit sending information from an attacked computer to a remote host?

Answers

The correct answer is Firewall  component can be used to reduce the risk of a trojan or rootkit sending information from an attacked computer to a remote host.

An organization's previously set security rules are used to monitor and filter incoming and outgoing network traffic through a firewall, a network security device. A firewall is simply the barrier that stands between a private internal network and the open Internet at its most basic level. Internet traffic entering, leaving, or moving within a private network is restricted by a firewall, a computer network security device. By selectively blocking or permitting data packets, this software, or dedicated hardware-software device, performs its purpose. A firewall may be physical or software. Each computer has software firewalls placed on it.

To learn more about Firewall click the link below:

brainly.com/question/13098598

#SPJ4

you are configuring a router for a small office network. the network users should be able to access regular and secure websites and send and receive email. those are the only connections allowed to the internet. which security feature should you configure to prevent additional traffic from coming through the router? group of answer choices port forwarding/mapping mac filtering port security/disabling unused ports content filtering

Answers

To prevent additional traffic from coming through the router and only allowing the specified connections, you should configure content filtering.

Describe router?

It connects multiple devices on a home or office network, allowing them to communicate with each other and with the Internet. Routers use routing tables to determine the best path for forwarding the packets, and they use network address translation (NAT) to share a single Internet connection among multiple devices. They also typically include built-in firewall functionality to protect the network from unauthorized access.

Content filtering is a security feature that controls access to specific types of internet content, such as websites and email. It can be used to block or allow access to specific websites, email addresses, and IP addresses. This can be configured to only allow regular and secure websites, and email traffic, while blocking other types of traffic.

Port forwarding and mapping, MAC filtering, and port security/disabling unused ports are all important security features, but they are not directly related to controlling access to specific types of internet content.

Port forwarding allows incoming traffic to be directed to a specific device on the network based on the destination port, it is useful when you need to allow incoming traffic to access a specific service or application on a device on your network.

MAC filtering allows you to specify which devices are allowed to connect to your network based on their MAC address.

Port security/disabling unused ports, it helps to prevent unauthorized devices from connecting to the network by disabling unused ports or limiting the number of devices that can connect to a specific port.

To know more network visit:;

https://brainly.com/question/13105401

#SPJ4

a data analyst is working with the penguins dataset. what code chunk does the analyst write to make sure all the column names are unique and consistent and contain only letters, numbers, and underscores?

Answers

clean_names (penguins) is the portion of code that analysts write to ensure that all column names are distinct, uniform, and only comprise letters, digits, and underscores.

A data analyst is much more than just a calculator. Analysts examine data to find solutions to issues, get important knowledge about a company's clients, and increase revenue. Key stakeholders, such as the corporate management, are also informed by analysts. Modern businesses rely heavily on data analysts to reflect on their work and client base, assess how these elements have affected earnings, and offer leadership advice on how to expand the company going forward. According to McKenzie, data analysts also need a solid foundation of business knowledge and technical abilities, including problem-solving, communication, and decision-making.

Here you can learn more about data analyst in the link brainly.com/question/28893491

#SPJ4

what are the characteristics of tacacs ? (select 3 answers) group of answer choices combines authentication and authorization encrypts only the password in the access-request packet primarily used for network access separates authentication and authorization encrypts the entire payload of the access-request packet primarily used for device administration

Answers

Tacacs have the characteristics of being primarily used for network access, combining authentication and authorization, and encrypting only the password in the access-request packet.

What is TACACS and how does it function?

A security protocol called TACACS—Terminal Access Controller Access Control System—provides centralized validation of users who attempt to access a router or NAS. TACACS+ provides distinct accounting, authorization, and authentication services. Administrator authorization can be managed with the help of vendor-specific attributes (VSAs) provided by TACACS+. TACACS+ VSAs let you quickly change administrators' roles, access domains, and user groups through your directory rather than changing firewall settings. The process of determining who a user (or entity) is is known as TACACS Authentication. A username and a fixed password are used for traditional authentication. However, there are limitations to fixed passwords. "One-time" passwords or challenge-response queries are two common modern authentication methods.

To learn more about TACACS visit:

https://brainly.com/question/29308796

#SPJ4

WHERE CAN I FIND HOW MANY POINTS I EARNED!
BE SPECIFIC PLS

EXACT LOCATION

Answers

Answer:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Explanation:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Reggie wants to send an audio file to his colleague. However, he is unable to do so as the files are heavy in format. His friend asked him to convert the [BLANK] files to [BLANK] files

Answers

Audio file formats are categorized into three broad categories: raw headerless PCM or uncompressed audio formats like WAV, AIFF, or AU.

What is  [BLANK] files?

A file that does not contain any data is referred to as a "blank document" or "blank file." For instance, beginning with a blank document, creating a new document in Microsoft Word begins.

Right-click the area where you want to create the file in Windows. To start a new text file on the desktop, for instance, right-click the desktop. Select New and Text Document from the available drop-down menu.

Using the right-click menu in File Explorer, Microsoft lets you make a new, blank text file. Navigate to the folder in File Explorer where you want to create the text file. Navigate to New > Text Document by right-clicking on the folder. The default name for the text file is "New Text Document."

Learn more about files:

brainly.com/question/14312868

#SPJ4

Input Sanitisation and SQL injections question.

What is meant by the term ‘Input Sanitisation’ and how can it prevent SQL injections? Explain your answer in full.

Answers

Answer:

Input sanitization refers to the process of ensuring that any data input by a user into a system or application is clean, safe and does not pose a security risk. This process is used to prevent malicious attacks such as SQL injection, which is a type of exploit that allows an attacker to insert malicious SQL statements into a web form input box to gain unauthorized access to a database.

when reconciling a bank account in qbo, where does the value of the register balance come from?

Answers

Learn how to balance your accounts so that they constantly match your bank and credit card bills. similar to keeping your checkbook in order

What does QuickBooks' register balance mean?

The balance in the register of QuickBooks Online will be $900 if, for instance, your bank balance is $1000 and you have an outstanding check for $100. QuickBooks Online will enter the check into the register, making it appear as though it has already cleared the bank and reducing your balance by $100.

How can I compare the balances in my bank account and QuickBooks?

Reconcile can be found under Settings in QuickBooks Online. Select Get started to proceed if this is your first time reconciling. Choose the desired account from the Account menu.

To know more about bank account visit:-

https://brainly.com/question/13242916

#SPJ4

How to report interest income from the Internal Revenue Service?

Answers

The U.S. Individual Income Tax Return Form 1040, the U.S. Tax Return for Seniors Form 1040-SR, and the U.S. Nonresident Alien Income Tax Return Form 1040-NR all allow for the reporting of interest income.

Do you need to notify the IRS of interest you received?

Even if a Form 1099-INT or Form 1099-OID is not sent to you, you are still required to declare any taxable and tax-exempt interest on your federal income tax return. In order to avoid penalties and backup withholding, you must provide the payer of interest income with your accurate taxpayer identification number.

The Internal Revenue Service defines interest income as what?

The income a person earns from certain bank accounts or by lending money to another person is known as interest income. This income is taxable, meaning it is liable for income tax.

To know more about Individual Income visit :-

https://brainly.com/question/17075354

#SPJ4

refer to the exhibit. in what switch mode should port g0/1 be assigned if cisco best practices are being used?

Answers

If Cisco best practices are being used, port G0/1 should be assigned to Access mode. This mode is used when connecting a single host to the switch. In Access mode, the switch will automatically set the port to the correct VLAN and will not allow the host to send or receive tagged frames.

Access mode is used when connecting a single host to a switch and is the recommended mode if Cisco best practices are being followed. In Access mode, the switch will automatically set the port to the correct VLAN and will not allow the host to send or receive tagged frames.

Access mode provides a simple, secure way to connect a host to a switch, as it ensures that only traffic relevant to that host is sent to the port. Additionally, Access mode prevents a host from accidentally sending traffic to other ports on the switch.

Learn more about port switching:

https://brainly.com/question/29035398

#SPJ4

Consider two different implementations of the same instruction set architecture. The instructions can be divided into four classes according to their CPI (class A, B, C, and D). P1 with a clock rate of 2. 5 GHz and CPIs of 1, 2, 3, and 3, and P2 with a clock rate of 3 GHz and CPIs of 2, 2, 2, and 2.



Processor Class A Class B Class C Class D

P1 3 2 1 4

P2 2 2 2 2



Given a program with a dynamic instruction count of 1. 0E6 instructions divided into classes as follows: 10% class A, 20% class B, 50% class C, and 20% class D.


a. Which implementation in faster?

b. What is the global CPI for each implementation?

c. Find the clock cycles required in both cases?

Answers

The metric known as cycles per instruction, or CPI, as it is defined in Fig. 14.2, has been a component of the VTune interface for a long time. It provides information on how many CPU cycles are typically needed to retire an instruction.

How is the global CPI determined?

P1 CPU Time = (2.6 * 106 Clock Cycles) / 2.5 GHz = 1.04 (106/109) = 1.04 * 10-3 = 1.04 ms, where the global CPI is 2.6 cycles per instruction. P2 CPU Time = (2 * 106 Clock Cycles) / 3 GHz = 0.667 (106/109) = 0.667 * 10-3 = 0.667ms, with the global CPI set to 2 cycles per instruction. P2 outpaces P1 in speed.

What factors affect how often instructions are executed?

A useful average is called clocks per instruction (CPI). is calculated as the average of each instruction execution in a program. Instruction complexity has an impact on CPI at the instruction level.

To know more about cycles per instruction visit :-

https://brainly.com/question/14210413

#SPJ4

using the w/b hat model, which hacker is more likely to make up a web site to teach new hackers how to hack a network?

Answers

A white hat hacker, commonly referred to as an ethical hacker, uses hacking methods to discover security holes in hardware, software, or network infrastructure.

In contrast to black hat hackers, or hostile hackers, white hat hackers adhere to the law as it relates to hacking. White hat hacking typically follows black hat hacking. The expressions are inspired by old Western movies where the villains typically wore black hats and the heroes typically wore white hats. When it's legal to do so, white hat hackers will solely search for security holes or exploits. White hat hackers are permitted to do research on systems or programs they own or have been given permission to study in addition to open source software.

Learn more about permission here-

https://brainly.com/question/13146880

#SPJ4

a wireless engineer is comparing the deployment of a network using wpa2 versus wpa3 authentication. how is wpa3 authentication more secure when deployed in an open wlan network in a newly built company-owned cafe shop?

Answers

WPA3 is more secure than WPA2 in open WLAN networks because it uses stronger encryption algorithms, such as AES-256, and also includes additional security features like individualized data encryption (per-device encryption keys).

How is WPA3 more secure than WPA2?

WPA3 improves upon WPA2 by using stronger encryption, such as AES-256, and implementing additional security features like individualized data encryption for each client connected to the network.

Additionally, WPA3 includes a feature called Simultaneous Authentication of Equals (SAE), which provides protection against password-guessing attacks. Overall, WPA3 offers improved security for wireless networks and better protection for user's personal information.

To learn more about WPA3, visit: https://brainly.com/question/30141718

#SPJ4

jane has been asked to investigate a method that would ensure email traffic gets priority on the corporate network. she would need to implement ?

Answers

Trevor should employ NTP technology to make sure that some traffic receives priority over other traffic.

To synchronize with networked computer clock time sources, one uses the Network Time Protocol (NTP) internet protocol. One of the initial parts of the TCP/IP suite, it is a component. NTP is the name of both the protocol and the client-server computer systems. A network of computers is time-synchronized using the Network Time Protocol (NTP) technology. NTP makes use of User Datagram Protocol (UDP), an IP-based protocol. NTP Version 3 documentation can be found in RFC 1305. This module explains how to configure Network Time Protocol on Cisco gear. Trevor should employ NTP technology to make sure that some traffic has precedence over other traffic so that the most crucial traffic gets through even when there is congestion.

Learn more about NTP here:

https://brainly.com/question/29554810

#SPJ4

When working on a selection sort method, what are the things you need to remember about the three methods you need to code?
element in an array from a given element n to the end of the array.
First, you need a method that finds the position of the
Second, you need a method that
the contents of two elements in an array. Third, you need a method that uses the above two
methods to perform the sort.

Answers

First, you need a method that finds the position of the smallest element in an array from a given element n to the end of the array. Second, you need a method that swaps the contents of two elements in an array. Third, you need a method that uses the above two methods to perform the sort.

What is the array  about?

When working on a selection sort method, you need to remember the following about the three methods you need to code:

The first method should be a method that finds the position of the smallest element in an array from a given element n to the end of the array. This method should iterate through the array starting from the given element n and compare each element to the current minimum value. If an element is smaller than the current minimum value, it should update the minimum value and its position.

The second method should be a method that swaps the contents of two elements in an array. This method should take in the array and the positions of the two elements to be swapped as inputs, and should use a temporary variable to store the value of one element before swapping the values of the two elements.

Learn more about array from

https://brainly.com/question/28061186
#SPJ1

she encounters malicious code that was set to carry out its functions when a specific event occurred in the future. what did alice detect?

Answers

Alice detect a logic bomb. An purposeful harmful code insertion into a software to damage a network when specific criteria are satisfied is known as a logic bomb.

A network in information technology is described as a physical or wireless connection between at least two computer systems. A combination of two computers connected by a cable forms the simplest network. Peer-to-peer networks are this kind of network. Both participants in this network have equal privileges; there is no hierarchy. Each computer has access to the other's data and can share resources like storage space, software, or peripherals (printers, etc.).

Today's networks frequently include more than two computers and are a little more complicated. Client-server networks are typically used in systems with more than ten participants. In these networks, a central computer (server) gives network members access to resources.

Here you can learn more about network in the link brainly.com/question/15088389

#SPJ4

the difference between the lower class limits of adjacent classes provides the group of answer choices number of classes. class limits. class midpoint

Answers

The Class Width is determined by the variation between lower class limits of adjacent classes.

Class width in a frequency distribution is the distance between two consecutive lower limits (or two consecutive lower class boundaries). The class width is also the difference between the lower or upper bounds of two classes that follow one another. The distance between the upper and lower class limits in a frequency distribution table is referred to as the class interval's breadth or size. A class interval, for instance, is any of the groups 20–25, 25–30, 30-35, etc. The Class Width is determined by the variation between lower class limits of adjacent classes.

Learn more about frequency here-

https://brainly.com/question/13149415

#SPJ4

Other Questions
The bones of a saber-toothed tiger are found to have an activity per gram of carbon that is 15.0 % of what would be found in a similar live animal. How old are these bones? Give answer in years. Do not enter unit. lowering our stress levels avoiding personal injury avoiding learning about our differences with others contributing to the well-being of the human spirit jared knows that distance his cars travels equals the rate at which he drives multiplied by the time he drives the car on one occasion he drove 15 miles in 0.5 hours what equation can jared use to find the rate at which he drove which of the following are forms of restrictive lung disease are caused by environmental exposure? select all that apply. A new company president is saidto uave causethe company to do180. Before the new president, the company was losing 10,000 per month. What is the company most likely doing under the new president? A group of students was surveyed in a middle school class. They were asked how many hours they work on math homework each week. The results from the survey were recorded. Number of Hours Total Number of Students 0 1 1 3 2 3 3 10 4 9 5 6 6 3 Determine the probability that a student studied for exactly 5 hours. Round to the nearest hundredth. 0.83 0.21 0.17 0.14 Complete the following statement: Oxygen is a reactant of _____(1)_____ while being the product for _____(2)_____. (4 points) a(1) photosynthesis, (2) fermentation b(1) cellular respiration, (2) photosynthesis c(1) fermentation, (2) anaerobic respiration d(1) aerobic respiration, (2) photosynthesisPlease will give brainly!!! Complete the explanation of how you could use the work backward problem-solving strategy to solve the equation x/5 3 = 2.The equation says that a number was divided by 5 and that 3 was then subtracted from the quotient, giving the result 2. So, working backward, first add (blank)to 2, giving (blank). Then multiply that result by (blank), giving x = (blank) TRUE/FALSE. Argument by example examines specific cases in order to identify an actual relationship or correlation between them. As a public school teacher, Molly has accrued 14 days of sick leave, which is a type of ________ compensation. Group of answer choices:A) direct financialB) indirect financialC) nonfinancialD) mandatory Reggie wants to send an audio file to his colleague. However, he is unable to do so as the files are heavy in format. His friend asked him to convert the [BLANK] files to [BLANK] files explain in your own words how, in personal exchanges, altruistic preferences may affect the allocation of coffee and gigabytes between ayanda and bongani. what happens when fishery populations are overharvested? how have some governments curbed this trend? The family will eat together at the table what is the peoper and common noun??? cart 1 of mass m moves with a velocity of v toward cart 2 which has a mass of 9m and is at rest. cart 1 collides elastically with cart 2. what is the velocity of both carts after the collision? History shows us that one of the following is NOT a characteristic of most successful sport managers. For ease of data entry into a university database, 1 denotes that the student is a freshman, 2 indicates a sophomore, 3 indicates a junior, and 4 indicates that the student is a senior. In this case, data are___a cither categorical or quantitative. neither categorical nor quantitative.quantitative categorical Martin's mom has a large box of toys. The box contains 80 different toys. She wants to divide the large box into smaller boxes. She wants each of the smaller boxes to have 10 toys. After she divided the toys, she put 28 more toys into one of the boxes. How many toys are in that box? 90 is 0.6 of what number question 9 please help