2) Phát biểu nào sau đây là sai khi gán hiệu ứng cho các đối tượng trên slide?
a) Một đối tượng trên slide chỉ được gán một hiệu ứng
b) Một đối tượng có thể gán nhiều hiệu ứng
c) Nhiều đối tượng có thể gán cùng một loại hiệu ứng
d) Có thể gán âm thanh kèm theo hiệu ứng
3) Thao tác nào sau đây dùng để chọn một hyperlink trong slide khi dang trình chiếu
a) Ctrl +K
b) Ctrl +H
c) Tab
d) Ctrl +L
4) Hiệu ứng đặc biệt được sử dụng để giới thiệu các slide trong một bài thuyết trình này được gọi là
a) Effects
b) Custom animations
c) Transitions
d) Present animations

Answers

Answer 1
Pls translate into english

Related Questions

Security monitoring has detected the presence of a remote access tool classified as commodity malware on an employee workstation. Does this allow you to discount the possibility that an APT is involved in the attack

Answers

Answer:

No it doesn't

Explanation:

Targeted malware can be linked to such high resource threats as APT. Little or nothing can be done to stop such advanced persistent threats. It is necessary to carry out an evaluation on other indicators so that you can know the threat that is involved. And also to know if the malware is isolated or greater than that.

A ___________ consists of a large number of network servers used for the storage, processing, management, distribution, and archiving of data, systems, web traffic, services, and enterprise applications.

Answers

Answer:

Data center

Explanation:

A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to both large and small internet service providers.

Generally, all network service providers, internet service providers and most business organizations have a dedicated building or space which comprises of a large number of computer systems, security devices, network servers, switches, routers, storage systems, firewalls, and other network associated devices (components) typically used for remote storage, processing, management, distribution, and archiving of large amount of data, systems, web traffic, services, and enterprise applications.

Furthermore, there are four (4) main types of data center and these includes;

I. Managed services data centers.

II. Cloud data centers.

III. Colocation data centers.

IV. Enterprise data centers.

Consider the following class definitions.public class Bike{private int numWheels = 2;// No constructor defined}public class EBike extends Bike{private int numBatteries;public EBike(int batteries){numBatteries = batteries;}}The following code segment appears in a method in a class other than Bike or EBike.EBike eB = new EBike(4);Which of the following best describes the effect of executing the code segment?А. An implicit call to the zero-parameter Bike constructor initializes the instance variable numwheels. The instance variable numBatteries is initialized using the value of the parameter batteries.
B. An implicit call to the one-parameter Bike constructor with the parameter passed to the EBike constructor initializes the instance variable numwheels. The instance variable numBatteries is initialized using the value of the parameter batteries. C. Because super is not explicitly called from the EBike constructor, the instance variable numWheels is not initialized. The instance variable numBatteries is initialized using the value of the parameter batteries.
D. The code segment will not execute because the Bike class is a superclass and must have a constructor. E The code segment will not execute because the constructor of the EBike class is missing a second parameter to use to initialize the numWheels instance variable.

Answers

Answer:

The answer is "Option A".

Explanation:

Please find the complete program in the attached file.

The given program includes a super-class Bike having a private integer numWheels parameter. The class EBike inherits the class Bike, EBike comprises one parameter function Object() which utilizes its variable number of the private integer Battery level of the battery parameter and the wrong choice can be defined as follows:

In choice B, it is wrong since there is no constructor with a single argument in the Bike class.

In choice C, it is wrong since there no need to call the base class constructor with the super keyword.

In choice, D is wrong because there no need to create a constructor of the base class.

In choice, E is wrong because it does not require the second EBike constructor parameter.

The statement that best describes the effect of executing the code segment is (a) an implicit call to the zero-parameter Bike constructor initializes the instance variable numwheels. The instance variable numBatteries is initialized using the value of the parameter batteries.

Given that the following object is defined in another class (say the Main class)

EBike eB = new EBike(4);

Also, the class Bike is a super class of the class EBike, where Ebike inherits the properties of class Bike.

It means that:

Option (a) is correct.

This is so, because:

An implicit call of one parameter to class cannot be used, as in option B.It is not necessary to call the Bike class, as in option C.It is not necessary to create a constructor of the EBike class, as in option D.

Read more about classes at:

https://brainly.com/question/24532559

What aspect should you consider before adding pictures to a document?

You should structure the BLANK first before you search for a relevant picture.

Answers

Answer:

You should structure the text first before you search for a relevant picture.

Explanation:

When adding a picture or pictures to a text document, the structure of the text must be considered.

Structure as used in the above sentence means (but is not limited to), the headings, the layouts, the spacing, paragraphs and word formatting in the document.

In other words, the way the document is organized

All these must be put in to place before one adds pictures into the document.

Write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. For example, if the amount is 86 cents, the output would be something like the following:

86 cents can be given as 3 quarters 1 dime and 1 penny

Use coin denominations of 25 cents (quarters), 10 cents (dimes), and 1 cent (pennies). Do not use nickel and half dollar coins. Your program will use the following function (among others):
void computeCoin(int coinValue, int& number, int& amountLeft);

For example, suppose the value of the variable amountleft is 86. Then, after the following call, the value of number will be 3 and the value of amountLeft will be 11 (because if oyu take three quarters from 86cents, that leaves 11 cents):
computecoins (25, number, amountLeft);

Include a loop that lets the user repeat this computation for new input values until the suer says he or she wants to end the program (Hint: use integer division and the % operator to implement this function.)

Answers

Add all numbers up

and you will get your sum

Calculate the boiling point of 3.42 m solution of ethylene glycol, C2H602, in water (Kb =0.51°C/m, the normal boiling point of water is 100°C):​

Answers

Answer:

128.10 degree Celsius

Explanation:

The boiling point is given by

[tex]T_b = \frac{1000*K_b * w}{M*W}[/tex]

Substituting the given values, we get -

[tex]T_b = \frac{1000*0.51 * 3.42}{62.07}\\T_b = 28.10[/tex]

Tb is the change in temperature

T2 -T1 = 28.10

T2 = 28.10 +100

T2 = 128.10 degree Celsius

Write a program that repeatedly shows the user a menu to select the shape form three main shapes or to print the shapes created so far. If the user selects to create a new shape, the program prompts the user to enter the values for the size of the selected shape (How many of the selected shape user wants to create). The shape is then stored in an array. If the user selects to print the current shapes, print the name and the total area of each shape to the console.

Answers

Answer:

Explanation:

The following code is written in Python. It creates a program that keeps printing out a menu allowing the user to create shapes. These shapes are saved in an array called shapes. Once the user decides to exit, it prints all of the shapes in the array along with their total area. The output can be seen in the attached picture below. Due to technical difficulties, I have added the code as a txt file below.

Calculate the total capacity of a disk with 2 platters, 10,000 tracks, an average of
400 sectors per track, and 512 bytes per sector?

Answers

Answer:

[tex]Capacity = 2.048GB[/tex]

Explanation:

Given

[tex]Tracks = 10000[/tex]

[tex]Sectors/Track = 400[/tex]

[tex]Bytes/Sector = 512[/tex]

[tex]Platter =2[/tex]

Required

The capacity

First, calculate the number of Byte/Tract

[tex]Byte/Track = Sectors/Track * Bytes/sector[/tex]

[tex]Byte/Track = 400 * 512[/tex]

[tex]Byte/Track= 204800[/tex]

Calculate the number of capacity

[tex]Capacity = Byte/Track * Track[/tex]

[tex]Capacity= 204800 * 10000[/tex]

[tex]Capacity= 2048000000[/tex]  --- bytes

Convert to gigabyte

[tex]Capacity = 2.048GB[/tex]

Notice that the number of platters is not considered because 10000 represents the number of tracks in both platters

A scheduler needs to determine an order in which a set of processes will be assigned to processor. Theith process requirestiunits of time and has weightwi. For a given schedule, definethe finish time of processito be the time at which processiis completed by the processor. (Assumethat the processor starts processing the tasks at time 0.)

Answers

Answer:

d

Explanation:

The range of a finite nonempty set of $n$ real numbers $S$ is defined as the difference between the largest and smallest elements of $S$. For each representation of $S$ given below, describe an algorithm in pseudo code to compute the range. Indicate the time efficiency classes of these algorithms using Big-$O$.

Answers

Answer: Hello your question is poorly written attached below is the well written question

answer:

a) Determine ( compute ) the difference between the max and minimum value. determine the Min and max values using 1.5n comparisons

  time efficiency = θ( n )

b) A(n-1) - A(0)

  time efficiency = θ( 1 )

Explanation:

a) An unsorted array

To find the maximum and minimum values scan the array of elements , then determine ( compute ) the difference between the max and minimum value. to determine the range. Alternatively determine the Min and max values using 1.5n comparisons

Algorithm's time efficiency = θ( n )

b) A sorted array

To determine the range, we will determine the difference between the first and last element i.e. A(n-1) - A(0)

time efficiency = θ( 1 )

computer __ is any part of the computer that can be seen and touched​

Answers

Hardware
Answer. physical parts of computer which can be seen and touched are called Hardware.

difrent between computer and computer system​

Answers

Answer:

hope it helps..

Explanation:

a computer exists in a single place and does a primitive set of functions. A computer system combines a computer with many other things to perform a complex set of functions. It can also exist in a single place, but it may exist in many places at the same time.

HAVE A NICE DAY

Question Statement: Explain the steps needed to the display all the items in a linked list

Answers

Answer:

A list of linked data structures is a sequence of linked data structures.

The Linked List is an array of links containing items. Each link contains a link to a different link. The second most frequently used array is the Linked List.

Explanation:

Create a node class with 2 attributes: the data and the following. Next is the next node pointer.

Create an additional class with two attributes: head and tail.

AddNode() adds to the list a new node:

Make a new node.

He first examines if the head is equal to zero, meaning that the list is empty.

The head and the tail point to the newly added node when this list is vacant.

If the list isn't empty, the new node will be added at the end of the list to point to the new node of tail. This new node is the new end of the list.

Show() will show the nodes in the list:

Set a node current that first points to the list header.

Cross the list until the current null points.

Show each node by referring to the current in each iteration to the next node.

The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets the user// and multiplies two entered valuesusing System;using static System.Console;class DebugTwo2{static void main(){string name;string firstString, secondSting;int first, second, product;Write("Enter your name >> );name = ReadLine;Write("Hello, {0}! Enter an integer >> ", name);firstString = ReadLine();first = ConvertToInt32(firstString);Write("Enter another integer >> ");secondString = Readline();second = Convert.ToInt(secondString);product = first * second;WriteLine("Thank you, {1}. The product of {2} and {3} is {4}", name, first, second, product);}}

Answers

Answer:

The corrected code is as follows:

using System;

using static System.Console;

class DebugTwo2{

     static void Main(string[] args){

       string name;string firstString, secondString;

       int first, second, product;

       Write("Enter your name >> ");

       name = ReadLine();

       Write("Hello, {0}! Enter an integer >> ", name);

       firstString = ReadLine();

       first = Convert.ToInt32(firstString);

       Write("Enter another integer >> ");

       secondString = ReadLine();

       second = Convert.ToInt32(secondString);

       product = first * second;

       Write("Thank you, {0}. The product of {1} and {2} is {3}", name,first, second, product);

   }

}

Explanation:

       string name;string firstString, secondString; ----- Replace secondSting with secondString,

       int first, second, product;

       Write("Enter your name >> "); --- Here, the quotes must be closed with corresponding quotes "

       name = ReadLine(); The syntax of readLine is incorrect without the () brackets

       Write("Hello, {0}! Enter an integer >> ", name);

       firstString = ReadLine();

       first = Convert.ToInt32(firstString); There is a dot between Convert and ToInt32

       Write("Enter another integer >> ");

       secondString = ReadLine(); --- Readline() should be written as ReadLine()

       second = Convert.ToInt32(secondString);

       product = first * second;

       Write("Thank you, {0}. The product of {1} and {2} is {3}", name,first, second, product); --- The formats in {} should start from 0 because 0 has already been initialized for variable name

   }

}

A notebook computer is set up to take maximum advantage of power saving features including shutting down the display and the hard disk after periods of inactivity. A user sometimes runs UNIX programs in text mode, and at other times uses the X Window System. She is surprised to find that battery life is significantly better when she uses text-only programs. Why

Answers

Answer:

The reason is that the windowing system consumes significantly more memory and virtual memory than the text mode.

Explanation:

The reason behind the occurrence of this is that the windowing system consumes significantly more memory and virtual memory than the text mode. As a result, this reduces the likelihood of the hard disk becoming inactive for long enough for it to be powered down by itself with no direct human control, i.e. automatically.

Both symmetric and asymmetric encryption methods have their places in securing enterprise data. Compare and contrast where each of these are used in real-life applications. Use at least one global example in identifying the differences between applications.

Answers


Symmetric Encryption:

Same key is used for Encryption and Decryption

Both server and client should have same key for encryption

Vulnerable to attack

Examples: Blowfish, AES, RC4, DES, RC5, and RC6

Asymmetric encryption:

Server generates its own public and private key

Client generates its own public and private key

Server and client exchanges their public keys

Server uses client’s public key to encrypt data

Client uses server ‘s public key to encrypt data

Server uses its private key to decrypt data sent by client

Client uses its private key to decrypt data sent by server

example: EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.

Hi there , Hope I helped !

on a client server network clients and servers usually require what to communicate?​

Answers

Answer:

A connectivity device. Your colleague, in describing the benefits of a client/server network, mentions that it's more scalable than a peer-to-peer network.

Explanation:

Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up and needs resetting every 200 hours. On average about 45 minutes is needed to reset this product. What is this product's availability

Answers

Answer:

The answer is "In excess of 0.95 "

Explanation:

[tex]MTBF= 200\ hours (12,000\ minutes)\\\\MTR= 45\ minutes (0.75\ hours)[/tex]

Availability equation [tex]=\frac{ MTBF}{(MTBF+MTR)}[/tex]  

Calculating the minutes as the common units:

[tex]= \frac{12,000}{(12,000+45)}\\\\= \frac{12,000}{(12,045)}\\\\= 0.9962\\\\= In\ excess\ of\ 0.95[/tex]

Calculating the hours as the common units:

 [tex]= \frac{200}{(200+0.75)}\\\\= \frac{200}{200.75}\\\\= 0.9962\\\\= In \ excess\ of\ 0.95[/tex]

Consider the following import statement in Python, where statsmodels module is called in order to use the proportions_ztest method. What are the inputs to proportions_ztest method

Answers

Answer:

a. count of observations that meet a condition (counts), total number of observations (nobs), Hypothesized value of population proportion (value).

Explanation:

In other to use the proportion_ztest method, the need to make import from the statsmodel module ; statsmodels.stats.proportion.proportions_ztest ; this will allow use use the Z test for proportion and once this method is called it will require the following arguments (count, nobs, value=None, alternative='two-sided', prop_var=False)

Where;

nobs = number of observations

count = number of successes in the nobs trial or the number of successes for each independent sample.

Value = hypothesized value of the population proportion.

2- Write aC+ program that calculates the sum of all even numbers from [1000,2000], using the while loop.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {  

 int n = 1000;

 int sum = 0;

 while(n <= 2000) {

   sum += n;

   n += 2;

 }

 cout << "sum of even numbers in [1000..2000] = " << sum << endl;

}

Explanation:

This will output:

sum of even numbers in [1000..2000] = 751500

At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase by 2 percent each year for the next five years. Design a program with a loop that displays the projected semester tuition amount for the next five years.

Answers

Answer:grhgrt

Explanation:

The program is an illustration of loops;

Loops are program statements used to perform repetition

The tuition program

The program written in Python, where comments are used to explain each action is as follows:

#This initializes the fee

fee = 6000

#The following loop is repeated 5 times

for i in range(5):

   #This calculates the fee, each year

   fee *= 1.02

   #This prints the calculated fee

   print(round(fee,2),end=" ")

Read more about loops at:

https://brainly.com/question/24833629

#SPJ6

What is the primary difference between BMPs, JPEGs, and GIFs?

Answers

In simple words,
JPEGs- Images
GIFs- animated images used for messaging

In the properly way to explain,
BMPs- The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows and OS/2 operating systems.

Answer:

BMPs are not compressed; JPEGs and GIFs are compressedExplanation:

How much data do sensors collect?

Answers

Answer:

2,4 terabits (TB) of data every minute. Sensors in one smart-

Mining safety sensors may create up to 2.4 terabits (TB) of data every minute.

What is the significance of sensors?

Sensors can help to improve the world by improving diagnostics in medical applications, the performance of energy sources such as fuel cells, batteries, and safety, solar power, people's health, and security, sensors for exploring space and the known university, and improved environmental monitoring.

Sensors play an important role in industrial applications such as process control, monitoring, and safety. The change in sensor output compared to a unit change in input is measured as sensitivity.

It provides several advantages, including increased sensitivity during data gathering, practically lossless transmission, and continuous, real-time analysis.

Real-time feedback and data analytics services ensure that processes are operational and being carried out optimally. Sensors in a single smart-connected house may generate up to 1 gigabit (GB) of data every week.

Learn more about the sensors, refer to:

https://brainly.com/question/15396411

#SPJ2

When creating a multi-dimensional array dynamically in C/C++ the Memory Manager will go to great pains to make sure the array is completely contiguous with each row followed immediately by another row in the array. The goal is to keep all the data together in memory rather than "wherever it fits." A. True B. False

Answers

Answer:

Here the statement is false.  

Explanation:

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

          Here data_type is valid C/C++ data type

array_name: Name of the array

size1, size2,... ,sizeN: Sizes of the dimensions.

Foe example:

Two dimensional array:

int two_d[10][20];  

Three dimensional array:

int three_d[10][20][30];

Please help im not good at computer class ​

Answers

Answer:

W.

Explanation:

Answer:

Letter K

AANSJXJSJWNDX

Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers This method should: - Create a new ArrayList of Integers - Add only the positive Integers to the new ArrayList - Sum the positive Integers in the new ArrayList and add the Sum as the last element For example, if the incoming ArrayList contains the Integers (4,-6,3,-8,0,4,3), the ArrayList that gets returned should be (4,3,4,3,14), with 14 being the sum of (4,3,4,3). The original ArrayList should remain unchanged.

Answers

Answer:

The method in Java is as follows:

public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {

   int sum = 0;

   ArrayList<Integer> newArr = new ArrayList<>();

   for(int num : nums) {

       if(num>0){

           sum+=num;

           newArr.add(num);        }    }

   newArr.add(sum);

   return newArr;

 }

Explanation:

This defines the method; it receives an integer arraylist as its parameter; nums

public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {

This initializes sum to 0

   int sum = 0;

This declares a new integer arraylist; newArr

   ArrayList<Integer> newArr = new ArrayList<>();

This iterates through nums

   for(int num : nums) {

If current element is greater than 0

       if(num>0){

This sum is taken

           sum+=num;

And the element is added to newArr

           newArr.add(num);        }    }

At the end of the iteration; this adds the calculated sum to newArr  

newArr.add(sum);

This returns newArr

   return newArr;

 }

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?

Answers

Answer:

ipconfig / release command will be used to request new IP configuration information from a DHCP server

Explanation:

The ipconfig /release sends a DHCP release notification to the client so that the client immediately releases the lease henceforth updating the server's status information . This command also mark the old client's id as being available. Thus, the command ipconfig /renew then request a new IP address.

Write a program whose inputs are three integers, and whose output is the smallest of the three values. Ex: If the input is: 7 15 3 the output is: 3

Answers

Answer:

The  program in Python is as follows:

nums = []

for i in range(3):

   num = int(input(""))

   nums.append(num)

   

print(min(nums))

Explanation:

This initializes a list of numbers

nums = []

This loop is repeated 3 times

for i in range(3):

For each repetition, this prompts the user for input

   num = int(input(""))

This appends the input to the list

   nums.append(num)

This gets the smallest of the three inputs using the min() function. The smallest is also printed

print(min(nums))

The Answer is in Bold:

#include <iostream>

using namespace std;

int main() {

 

  int  a, b, c;      //NOTE: you don't have to put a, b, c. you can put it as x, y, z

                                       //or you can make it as num1, num2, num3 etc.

  cin >> a;        

  cin >> b;

  cin >> c;

 

  if (a < b && a < c)   {            

     cout << a <<endl;              

  }                                                    

  else if(b < a && b < c)   {      

     cout << b << endl;

  }

  else   {

     cout << c <<endl;

  }    

  return 0;

}

What is the key stroke combination for BOLD text?
O Ctrl + B
O Ctrl + D
O Ctrl + H
O Ctrl + M​

Answers

Answer:

Ctrl + B.....................

Implement a program that manages shapes. Implement a class named Shape with a method area() which returns the double value 0.0. Implement three derived classes named Rectangle, Square, and Circle. Declare necessary properties in each including getter and setter function and a constructor that sets the values of these properties. Override the area() function in each by calculating the area using the defined properties in that class.

Answers

Answer:

Explanation:

The following code is written in Python. It creates the parent class Shape and the three subclasses Rectangle, Square, and Circle that extend Shape. Shape has the constructor which is empty and the area method which returns 0.0, while the three subclasses take in the necessary measurements for its constructor. Each subclass also has getter and setter methods for each variable and an overriden area() method which returns the shapes area.

class Shape:

   def __init__(self):

       pass

   def area(self):

       return 0.0

class Square(Shape):

   _length = 0

   _width = 0

   def __init__(self, length, width):

       self._width = width

       self._length = length

   def area(self):

       area = self._length * self._width

       return area

   def get_length(self):

       return self._length

   def get_width(self):

       return self._width

   def set_length(self, length):

       self._length = length

   def set_width(self, width):

       self._width = width

class Rectangle(Shape):

   _length = 0

   _width = 0

   def __init__(self, length, width):

       self._width = width

       self._length = length

   def area(self):

       area = self._length * self._width

       return area

   def get_length(self):

       return self._length

   def get_width(self):

       return self._width

   def set_length(self, length):

       self._length = length

   def set_width(self, width):

       self._width = width

class Circle(Shape):

   _radius = 0

   def __init__(self, radius):

       self._radius = radius

   def area(self):

       area = 2 * 3.14 * self._radius

       return area

   def get_radius(self):

       return self._radius

   def set_radius(self, radius):

       self._radius = radius

Other Questions
helppppWhat are the positive results of the French revolution? if anyone has ever read "Fast Fashion Denies Basic Human Rights." what is the claim? This is for language arts. The shareholders of the Stackhouse Company need to elect seven new directors. There are 850,000 shares outstanding currently trading at $45 per share. You would like to serve on the board of directors; unfortunately no one else will be voting for you. How much will it cost you to be certain that you can be elected if the company uses straight voting Huntington disease is caused by the inheritance of a dominant allele for a gene that affects the brain. The symptoms of the disease include the lossof mental abilities and muscle coordination Elements in the same group have A. A wide range of chemical properties B. The same atomic radius C. Number of electrons in its outer shell. D. Same number of protons E. The same number of electron shells. A start-up company is about to market a new computer printer. It decides to gamble by running commercials during the Super Bowl. The company hopes that name recognition will be worththe high cost of the ads. The goal of the company is that over 40% of the public recognize its brand name and associate it with computer equipment. The day after the game, a pollster contacts 420 randomly chosen adults and finds that 181 of them know thatthis company manufactures printers. Would you recommend that the company continue to advertise during Super Bowls this is a restaurant you can find many different cuisines from around the world A tin has a radius of 3cm anf height 6cm. Find the volume, in litres of the liquid that will fill the tin to capacity, correct to 2 decimal places Solve for x. Round to the nearest tenth, if necessary. Brian Ferguson is a cashier at a 24-hour convenience store. He has worked the night shift for the last year and a half, and often fills in for other employees at the last minute, but has never received a raise. Furthermore, Brian just got passed over for a promotion to store manager, which would have nearly doubled his pay. Understandably, he is outraged. Because his employer is so Which of the following was NOT occurring in Italy during the interwaryears?Enjoyed territorial expansion into AsiaGrowing fascist movementSecret police arrest and punished people who opposed the GovernmentSuffered from massive economic downturn Will choose brainliest! How would you do this problem? Pls help if you know the answer! Of 30 student, 1/3 play sports. Of those who play sports, 2/5 play soccer. How many students play soccer. An object In geometry with no width,length or height is a: A. angleB. lineC. point D. ray Name the vertexdoes anyone know what this is called please help Crossborder, Inc. is considering Project A and Project B, which are two mutually exclusive projects with unequal lives. Project A is an eightyear project that has an initial outlay or cost of $140,000. Its future cash inflows for years 1 through 8 are the same at $36,500. Project B is a sixyear project that has an initial outlay or cost of $160,000. Its future cash inflows for years 1 through 6 are the same at $48,000. Crossborder uses the equivalent annual annuity (EAA) method and has a discount rate of 13%. Which project(s), if any, will Crossborder accept? The gravitational force between two objects has a magnitude of F. If both masses were doubled and the distance between them doubled, the new force would have what magnitudes? 18 of 25The practice of science can answer only scientific questions. And scientificquestions guide the design of investigations. What must be true of thepossible answers to a scientific question?A. They agree with all prior experiments,B. They can be supported by evidence,C. They are popular with a majority of scientists,D. They lead to increased funding of scientific research, Question 11 (1 point) What was one of the most significant drawbacks of the daguerreotype photographic process?