How can I be future ready (in terms of careers and in general)?

This is for school


Please provide at least 3 reasons with evidence, and make sure they are not personalized towards you; just provide a general overview

Thanks, appreciate it.

Answers

Answer 1

Answer:

being ready to take care of yourself and getting high scores

Explanation:

you will have to have high scores to get a good job or even start a business you wont have somone to take care of you if your 26 like your a boss


Related Questions

Which statement does not describe desktop publishing?
DTP is the same as WP.
DTP features are included in most WP programs.
DTP enables workers to produce documents that improve communication,
DTP lets you resize and rotate text.

Answers

Answer:

DTP is the same as WP.

Explanation:

Desktop publishing can be defined as a graphical design process which typically involves the creation of a printable document such as magazines or newspapers, through the use of special software programs or applications and a printer.

The following statement best describes desktop publishing;

DTP features are included in most WP programs.

DTP enables workers to produce documents that improve communication,

DTP lets you resize and rotate text.

Given that, x = 2, y = 1, and z = 0, what will the following cout statement display?

cout << "answer = " << (x || !y && z) << endl;

Answers

Answer:

This will return 1

Code:

#include <iostream>

using namespace std;

int x = 2;

int y = 1;

int z = 0;

int main() {

   cout << (x || !y && z) << endl;

   return 0;

}

The following is a partial overall list of some of the sources for security information: • Security content (online or printed articles that deal specifically with unbiased security content)

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)
• Vendor content (material from security vendors who sell security services, hardware, or software)
• Security experts (IT staff recommendations or newsletters)
• Direct instruction (college classes or a workshop conducted by a local computer vendor)
• Friends and family
• Personal experience

Required:
Create a table with each of these sources and columns listed Advantages, Disadvantages, Example, and Rating.

Answers

Answer:

Kindly check explanation

Explanation:

SOURCE OF SECURITY INFORMATION :

• Security content (online or printed articles that deal specifically with unbiased security content)

ADVANTAGES :

Target based on highly specific to certain aspects

DISADVANTAGES :

They usually cover limited aspects

RATING : 4

SOURCE OF SECURITY INFORMATION :

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)

ADVANTAGES :

Offers greater level of accessibility

DISADVANTAGES :

They aren't usually curated and thus may be inaccurate

RATING : 6

SOURCE OF SECURITY INFORMATION :

• Vendor content (material from security vendors who sell security services, hardware, or software)

ADVANTAGES :

Accurate information and tips

DISADVANTAGES :

Usually involves a fee

RATING : 3

SOURCE OF SECURITY INFORMATION :

• Security experts (IT staff recommendations or newsletters)

ADVANTAGES :

Accurate and vast tips

DISADVANTAGES :

Not much

RATING : 5

SOURCE OF SECURITY INFORMATION :

• Direct instruction (college classes or a workshop conducted by a local computer vendor)

ADVANTAGES :

Highly specific

DISADVANTAGES :

They usually cover limited aspects

RATING : 2

SOURCE OF SECURITY INFORMATION :

• Friends and family

ADVANTAGES :

Cheap

DISADVANTAGES :

May be biased and inaccurate

RATING : 7

SOURCE OF SECURITY INFORMATION :

• Personal experience

ADVANTAGES :

Grows continuously with time

DISADVANTAGES :

Limited in nature

RATING : 1

Does analogue conversation take place in source as transmitter?

Answers

Answer:Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals that have continuous electrical signals, while digital signals have non-continuous electrical signals.

Explanation:

When a tape deck is plugged into recording equipment, the analog cassette tape is transformed into a digital equivalent.

What is the analogue conversation in source as transmitter?

An analog media is a tangible, changed thing that stores music. For instance, to record sound on a cassette tape, a tape recorder modifies the magnetic properties of magnetic tape.

Signals containing information often come in the form of analog and digital signals. The primary distinction between the two signals is that analog signals have continuously varying electrical signals, but digital signals do not.

And no source coder or channel coding are used at the transmitter side; just this occurs there.

Therefore, The channel's signal is picked up at the receiver's end and sent through a demodulator before being approximated to be the original information signal.

Learn more about analogue conversation here:

https://brainly.com/question/24750760

#SPJ2

Discuss the objectives of business 8 marks​

Answers

Answer:

Objectives of Business – Profitability, Growth, Stability, Efficiency and Survival. Business means busy in some activities. Business means conducting activities such as – sale, purchase and manufacturing etc for profit and growth.

The main objectives that a business might have are: Survival – a short term objective, probably for small business just starting out, or when a new firm enters the market or at a time of crisis. Profit maximisation – try to make the most profit possible – most like to be the aim of the owners and shareholders.

WIRELESS DATA TRANSMISSION METHODS​

Answers

Answer:

Infrared

802.11-based

802.15-based

Explanation:

Infrared:

It's short distance wireless transmission - for example tv remote control using infrared waves.

802.11-based:

Mostly used for wifi and things like that...

802.15-based:

It's a bluetooth standart wireless data transmission method.

edhesive 7.6 lesson practice python

def mystery(a, b = 8, c = -6):
return 2 * b + a + 3 * c

#MAIN
x = int(input("First value: "))
y = int(input("Second value: "))
z = int(input("Third value: "))

1) Suppose we add the following line of code to our program:

print(mystery(x))
What is output when the user enters 1, 1, and 1?

2)Suppose we add the following line of code to our program:

print(mystery(x, y, z))
What is output when the user enters 8, 6, and 4?

Answers

Answer:

(a) The output is -1

(b) The output is 32

Explanation:

Given: The above code

Solving (a): The output when 1, 1 and 1 is passed to the function

From the question, we have: print(mystery(x))

This means that only the value of x (which in this case is 1) will be passed to the mystery function

(a, b = 8, c = -6) will then be seen as: (a = 1, b = 8, c = -6)

[tex]2 * b + a + 3 * c = 2 * 8 + 1 + 3 * -6[/tex]

[tex]2 * b + a + 3 * c = -1[/tex]

The output is -1

Solving (b): The output when 8, 6 and 4 is passed to the function

From the question, we have: print(mystery(x,y,z))

This means that values passed to the function are: x = 8, y = 6 and z = 4

(a, b = 8, c = -6) will then be seen as: (a = 8, b = 6, c = 4)

[tex]2 * b + a + 3 * c = 2 * 6 + 8 + 3 * 4[/tex]

[tex]2 * b + a + 3 * c = 32[/tex]

The output is 32

If we add the line of code print(mystery(x)) and our input are 1, 1 and 1 the output will be -1.

If we add the line of code print(mystery(x, y, z)) and our inputs are 8, 6 and 4 the out put will be 32.

This is the python code:

def mystery(a, b = 8, c = -6):

  return 2 * b + a + 3 * c

#MAIN

x = int(input("First value: "))

y = int(input("Second value: "))

z = int(input("Third value: "))

print(mystery(x))

#What is output when the user enters 1, 1, and 1?

#Suppose we add the following line of code to our program:

print(mystery(x, y, z))

#What is output when the user enters 8, 6, and 4?

The code is written in python

Code explanation:The first line of code defines a function named mystery with the argument a, b by default is equals to 8 and c is equals to -6 by default. Then the code return the product of b and 2 plus a and plus the product of 3 and c.  x, y and z variable that stores the users input.Then we call the function mystery  with a single argumentThen we call the function mystery with three argument x, y and z which are the users input.  

The first print statement with the input as 1, 1 and 1 will return -1

The second print statement with the input 8, 6 and 4 will return 32.

learn more on python code here: https://brainly.com/question/20312196?referrer=searchResults

What is Creaite and how does it work?

Answers

Creatine is a natural substance that turns into creatine phosphate in the body. Creatine phosphate helps make a substance called adenosine triphosphate.

Answer:

Creatine is a substance that is found naturally in muscle cells. It helps your muscles produce energy during heavy lifting or high-intensity exercise.

Explanation:

Taking creatine as a supplement is very popular among athletes and bodybuilders in order to gain muscle, enhance strength and improve exercise performance

Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type unsigned char. Read two int values p and k from the keyboard, where the values are less than 8. Replace the n bits of the first variable starting at position p with the last n bits of the second variable. The rest of the bits of the first variable remain unchanged. Display the resulting value of the first variable using printf %x.Test Cases:n = 3;p=4;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: f (0000 1111)n = 2;p=5;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: 3f (0011 1111)

Answers

Solution :

#include  [tex]$<\text{stdio.h}>$[/tex]

#include [tex]$<\text{string.h}>$[/tex]

#include [tex]$<\text{stdlib.h}>$[/tex]

//Converts [tex]$\text{hex string}$[/tex] to binary string.

[tex]$\text{char}$[/tex] * hexadecimal[tex]$\text{To}$[/tex]Binary(char* hexdec)

{

 

long [tex]$\text{int i}$[/tex] = 0;

char *string = [tex]$(\text{char}^ *) \ \text{malloc}$[/tex](sizeof(char) * 9);

while (hexdec[i]) {

//Simply assign binary string for each hex char.

switch (hexdec[i]) {

[tex]$\text{case '0'}:$[/tex]

strcat(string, "0000");

break;

[tex]$\text{case '1'}:$[/tex]

strcat(string, "0001");

break;

[tex]$\text{case '2'}:$[/tex]

strcat(string, "0010");

break;

[tex]$\text{case '3'}:$[/tex]

strcat(string, "0011");

break;

[tex]$\text{case '4'}:$[/tex]

strcat(string, "0100");

break;

[tex]$\text{case '5'}:$[/tex]

strcat(string, "0101");

break;

[tex]$\text{case '6'}:$[/tex]

strcat(string, "0110");

break;

[tex]$\text{case '7'}:$[/tex]

strcat(string, "0111");

break;

[tex]$\text{case '8'}:$[/tex]

strcat(string, "1000");

break;

[tex]$\text{case '9'}:$[/tex]

strcat(string, "1001");

break;

case 'A':

case 'a':

strcat(string, "1010");

break;

case 'B':

case 'b':

strcat(string, "1011");

break;

case 'C':

case 'c':

strcat(string, "1100");

break;

case 'D':

case 'd':

strcat(string, "1101");

break;

case 'E':

case 'e':

strcat(string, "1110");

break;

case 'F':

case 'f':

strcat(string, "1111");

break;

default:

printf("\nInvalid hexadecimal digit %c",

hexdec[i]);

string="-1" ;

}

i++;

}

return string;

}

 

int main()

{ //Take 2 strings

char *str1 =hexadecimalToBinary("FA") ;

char *str2 =hexadecimalToBinary("12") ;

//Input 2 numbers p and n.

int p,n;

scanf("%d",&p);

scanf("%d",&n);

//keep j as length of str2

int j=strlen(str2),i;

//Now replace n digits after p of str1

for(i=0;i<n;i++){

str1[p+i]=str2[j-1-i];

}

//Now, i have used c library strtol

long ans = strtol(str1, NULL, 2);

//print result.

printf("%lx",ans);

return 0;

}

16
is a built-in mathematical formula included in MS Excel,
A) Function
By del
C) Formula
D) Range​

Answers

16
is a built-in mathematical formula included in MS Excel,
A) Function

d. A................ usually contains detailed comments about something in the text.
i. Footer
ii Footnote
Hii Header
iv. none of these​

Answers

Answer: Foot note

Explanation:

The option that contains detailed comments about something in the text is simply referred to as the foot note.

A footnote is simply refered to as the note that is at the bottom of a particular page which gives more information about a particular thing.

Therefore, based on the options given, the answer is B.

Learning Management Systems (LMS) allow students to interact with each other, but NOT their teachers.

Answers

Answer:

what do you mean friend not for teacher

Answer:

Explanation:

Communication outside the classroom can be facilitated through discussion forums, real-time messaging, video-conferencing, email and announcement posts.

Who are the member banks?

Answers

A member bank is when someone is associated with the Federal Reserve System. What this bank consists about is that there are people who can do deposits towards the Federal Reserve Bank in their area

Examine the following code. (1 point) Object obj = new Integer (5); Which of the following statements is true? The declared type of obj is Object. The actual type is also Object. The declared type of obj is Integer. The actual type is Object. The declared type of obj is Object. The actual type is Integer. The declared type of obj is Integer. The actual type is also Integer. 2. Examine the following code. (1 point) class D {} class C extends D {} class B extends D {} class A extends B {} Which of the following statements will compile without error? OA a = new B(); OB b = new DO); OCC = new AO; OD d = new A);

Examine the following code.
(1 point) class One { public void print() { System.out.println("One"); } class Two extends One { public void print() { System.out.println("Two"); } class Three extends Two { public void print() { System.out.println("Three"); } Which of the following code fragments will compile without error and display something other than the word, "Three"? One w = new Three(); w.print(); Three x = new One(); x.print(); One y = new Two(); y.print(); Two z = new Three(); z.print();

(1 point) Suppose that class Alpha is the parent of Beta and Beta is the parent of Charlie. Method calculate() is defined in Beta and is inherited and overridden by Charlie. Which of the following code fragments shows a valid method call? Alpha k = new Beta(); k.calculate(); Alpha k = new Charlie(); k.calculate(); Beta k = new Charlie(); k.calculate();
Charlie k = new Object(); k.calculate(); 5. What is the output of the following program?

(1 point) public class Circle { private double radius; public Circle( double radius) { this.radius = radius; public static void main(String[] args) { Circle x = new Circle(5); Circle y = new Circle(5); Circle z = x; System.out.println(x.equals(y) + ", " + (x == z)); true, true true, false false, true false, false

6. Consider the following code. (1 point) ArrayList names = new ArrayList(); names.add("Alexa"); names.add("Bill"); names.add("Christine"); Which of the following statements will display, "Alexa"? System.out.println(names.get()); System.out.println(names.retrieve()); System.out.println(names.get(1)); System.out.println(names.retrieve (1));
Which of the following statements will display, “Alexa"? System.out.println(names.get(0); System.out.println(names.retrieve (0)); System.out.println(names.get(1)); System.out.println(names.retrieve(1));

7. Which field or method of the ArrayList class will return the number of elements stored in the ArrayList? (1 point) length length() size() capacity (1 point)

8. Which of the following sequences shows Java access modifiers in correct order from most restrictive to least restrictive? private, default, protected, public private, protected, default, public public, default, protected, private public, protected, default, private

9. Which of the following statements is true about the protected modifier? (1 point) A protected member can only be accessed by code in other classes in the same package. Not only can a protected member be accessed by code in other classes in the same package, it can also be inherited by a subclass, even if the subclass is in a different package. The public and protected modifiers are nearly identical except that protected level access can be turned on or off at runtime. The protected modifier should be used nearly all the time, even in combination with private and public, especially when sensitive data is involved.

10. Which of the following statements is true? (1 point) It is possible to create instances of a class marked final. It is possible to extend a class marked final. It is possible to override a method marked final. It is possible to override a method inherited from a class that is marked final. Finish Cancel
will give more point if you help

Will mark brainliest!!!!!! no bs answers

Answers

Explanation:

what is this this is very long question I cannot answer this right now I need time

1 is C. The declared type of obj is Object. The actual type is Integer

2 is D. D d =new A();

3 is C. one y = new Two();

4 is C. Beta k = new Charlie();

5 is C. false,true

6 is A. System.out.println(names.get(0));

7 is C. size()

8 is A. private, default, protected, public

9 is B. Not only can a protected member be accessed by code in other classes....

10 is A. It is possible to create instances of a class marked final.

Exercise 1: Multiples of Five Develop a program that contains the following functions: - Function that returns true if a given number is a multiple of 5; false otherwise. Main function that reads two integer values from the user and print all multiples of 5 between them inclusive. Your function should start from the lowest to the highest value entered by the user. Samples of input/output are given below. Sample input/output 1 Enter first: 4 Enter second: 40 Multiples of 5 between 4 and 40 are: 5 10 15 20 25 30 35 40 Sample input/output 2 Enter first: 40 Enter second: 4 Multiples of 5 between 4 and 40 are: 5 10 15 20 25 30 35 40

Answers

Answer:

Explanation:

please see attached picture

Drag each label to the correct location on the image.
Identify the cell references in the formula.
absolute
reference
relative
reference
mixed
reference

Answers

Answer:

1.) Relative cell reference - A1

2.) Absolute cell reference - $D$2

3.) Mixed cel reference - $D2

Explanation:

In Microsoft Excel, cell references are very important and critical when dealing with formula. They can give you what you’re looking for or make your entire worksheet incorrect.

A cell reference is a cell address or a range of cell addresses that can be used in a formula.

There are three types of cell references and they are;

a) Relative reference

b) Absolute reference

c) Mixed reference

A relative cell reference is a cell reference that changes when you copy the formula to other cells. It s usually just a normal cell reference like A1, B2, C3. If a formula with a relative cell reference is copied down to other cells, the formula will change. That is a formula with a relative cell reference changes with respect to the cell which it is copied to.

An absolute reference does not change when you copy the formula to other cells. In absolute references, the dollar sign $ is used to “lock” both the row and column so that it does not change when it is copied to other cells. An example is $D$2.

Using a mixed cell reference, one is trying to see that only either the row or column changes with respect to other cells when they are copied. It is like “locking” either the column or the row while changing the other. Just like from the example, $D2 is a mixed cell reference where only the column is locked such that only the row changes when the formula is copied to other cells.

1. name of industry credential available to students taking this class

2. two reasons for acquiring the industry credential

Answers

Answer:

Explanation:

I need points to ask questions

what internal commands can we use when in interactive mode? can we use CLS and CD?

Answers

The cd command, also known as chdir (change directory), is a command-line shell command used to change the current working directory in various operating systems. It can be used in shell scripts and batch files.

Oliver is working for a team that uses object-oriented concepts to design software. Which language would they use to develop this software?

Answers

Answer:

Probably C++

Explanation:

The language must be object oriented. This narrows it to something like Java or C++. Java is fine for application development, but has a compiler and interpreter whereas C++ only has a compiler.

Which of the displays could be represented by a single bit?

Note that there are 2 answers to this question.

Choose 2 answers:

A. The current day of the week

B. The current month (1-12)

C. The current hour (1-12)

D. The temperature unit indicator ("C" or "F")

E. The "PM"/"AM" indicator

F. The current date (1-31)

Answers

Answer:

E. The "PM"/"AM" indicator

and

D. The temperature unit indicator ("C" or "F")

Microsoft

The Lock Tracking option prevents someone from turning the Track Changes feature off without a ________________________ . [Lock and Unlock Change Tracking]
Question 4 options:

password

lock definition

filename

computer

Answers

Answer:

Password

Explanation:

just took the test got a A!

11. You are considered accepting a job offer at a company on the other side of the country, but are worried about the movies costs. What is your best strategy regarding moving costs?
a. Inquire whether the company pays for the relocation or moving but be prepared to receive a no for an answer.
b. Do not as about having your moving expenses paid by the company, as it can create an impression that you are not fully interested in the offer.
c. Consider moving expenses an investment into your future and assume the full cost of it.
d. Insist that you will only accept the offer if all moving costs are covered by the company.

12. In general, freelancing jobs offer all EXCEPT which of the following?
a. More flexibility to choose the projects you wish to work on
b. Higher salary per hour
c. More job security
d. More independence - you are your own boss

Answers

11 answer would be A and 12 answer would be C as a freelancer there is no guarantee of jobs or job security

The space between the margin
and start
of paragraph is called

Answers

Answer:

The space between the margin and start of paragraph is called an indent OR Indentation.06

Explanation:

what is information technology ?​

Answers

Information technology can be defined as the study or use of systems for storing, retrieving, and sending information. Can be abbreviated to IT.

Answer:

Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.

Explanation:

Which of the following statements about malware protection are accurate? Select 3 options. Firewalls and anti-malware should be used together to provide a higher level of protection. Being cautious in your behavior and how you interact with your devices is just as important as technology-based malware protections. Apps from any source can be downloaded safely onto mobile devices, since the operating system will stop any malware infection. Popular anti-malware applications can locate and remove ALL malicious software. Updates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Answers

Answer:

Updates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Firewalls and anti-malware should be used together to provide a higher level of protection.  

Being cautious in your behavior and how you interact with your devices is just as important as technology-based malware protections.

Explanation:

Hope this helps

The statements about malware protection that are accurate:

Firewalls and anti-malware should be used together to provide a higher level of protectionBeing cautious in your behavior and how you interact with your devices is just as important as technology-based malware protectionsUpdates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Malware refers to the software that damages computers and destroys them. It should be noted that malware refers to malicious software.

Examples of common malware include worms, viruses, spyware, ransomware, etc.

It should be noted that anti-malware is used in order to protect computer systems from being infected with viruses.

Read related link on:

https://brainly.com/question/24252756

What is the output of this program? age=4 if age >5: print (“more”) else: print (“less”)

Answers

Answer:

less

Explanation:

The input is 4, a number that is not greater than 5. So as a result, it will print "less".

Read this outline for an argumentative essay about government.
1. People have different ideas about the role of government.
A. The primary_purpose of government is to provide social services.
2. Government should provide services for
people who are poor or elderly.
A. Government can effectively provide the services that poor and elderly people need.
B. Food stamps keep people from going hungry.
C. Medicare and Medicaid provide health care.
D. Some people believe social services are an entitlement and not a right,
but many people could not survive without them.
Government's main role is provide to social services, such as food stamps.
The underlined sentence in the outline is the
O claim.
• conclusion.

Answers

Answer:

First option.

Explanation:

The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.

What is an introduction?

The essential concept of an outline for a particular piece of writing, such as an essay, is presented in a single brief sentence for the body paragraphs. In this manner, it is positioned at the start and briefly summarizes the thesis of an article.

Because it appears at the beginning of the outline and contains the key notion that unifies all the other ideas offered in the subsequent phrases, the sentence with the asterisk (*) serves as the introduction. Government can effectively provide the services that poor and elderly people need.

Therefore, The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.

Learn more about an introduction, here:

brainly.com/question/18119893

#SPJ5

Microsoft
Comments are added through the ____________________________ tab on the ribbon. [Add Comments]
Question 1 options:

Home

Help

Review

View

Answers

I believe it’s review

Comments are added through the review tab on the ribbon. The correct option is c.

What are tabs and ribbons in Microsoft?

The animation tab in the PowerPoint ribbon is distinct from other office suites like word, excel, outlook, publisher, etc. Since animation can use in PowerPoint to make your presentations animated, you can manage all of your animation settings in the animation tab.

Many of your most important functions in Microsoft Word are available on the ribbon, allowing you to do them without accessing any menus. To improve efficiency, you can modify this ribbon as you see fit.

A new screen containing options for opening, saving, printing, sharing, and dismissing a file is displayed when you click the File tab. Groups of commands are displayed above the currently open document on the other Ribbon tabs.

Therefore, the correct option is c, Review.

To learn more about tabs and ribbons, refer to the link:

https://brainly.com/question/10015755

#SPJ2

If you are running a server , which of the follow operating system would be best suited ?window 10 or macOS

Answers

Answer:

MacOS. MacOS is always better for developers with the linux-like commands. The powerful shell for hosting servers, downloading programs for the servers, and much more. Windows is easier to use for normal users, but does not have a good shell for running commands. But the best OS to run a server on is Linux. Over 90% of servers are hosted on some linux distribution. Probably most of them are Ubuntu

Please mark me as brainliest.

What’s the best Wi-Fi name you’ve seen?

Answers

Answer:

etisalath is the best wifi name

Bill Wi the Science Fi.
Other Questions
there are 4 triangles, 12 sqaures and 6 circles. What is the ratio of squares to circles? Simplify. Which measurement has the LEAST capacity?2 gallons7 quarts19 pints30 cups (B)Fill in the blanks with appropriate forms of the adjectives from the brackets.2My friend is ___(old) than I am, yet he is not so (clever)as I am. Of course, Ranjan is the(intelligent) girl in our class, but I havenever scored( little) marks than her in any examination. Trish is ordering t-shirts from a website that charges a certain amount per t-shirt plus a flat rate for shipping. The cost for a given number of t-shirts is shown in the table. HELP PLEASE YEAH YEAH HERE IS THE IMAGE I need help please help me thanks A father a son are standing beside each other in the sun. The father is 2 meters tall and casts a shadow 4 meters long. The son is 1 meter long. How long is his shadow What function of language is involved when members of the LGBTQ (Lesbian, Gay, Bisexual, Transgendered, Queer) community struggle to find acceptable terms for describing sexual orientation?A. sharing meaningb. linguistic relativity c. linguistic determinismd. naming Which type of scientist studies how to use plants for food, medicine and other products?Pls help fast !!!!!!!!!!pleaseeeee 5. Which of the following poets was unable to attend college?A. Langston HughesB. Paul Laurence DunbarC. Countee CullenD. All of the above If the length of a rectangle is decreased by 6 cm and the width is increased by 3 cm, the result will be a square, the area of which will be 27 cm^2 smaller than the area of the rectangle. Find the area of the rectangle. PLZZZZZZ HELP WILL MAKE BRAINLIEST!!! Please help I really don't wanna fail this is so hard I will give brainliest to the person with the CORRECT ANSWERS !Please don't do it for the points : European traders impressed the Chinese government, who held them in high regard. Please select the best answer from the choices provided T F Leading up to the war of 1812, many Americans believed the ____________ had provided arms to the American Indians.PLEASE HELP MUCH LOVE!! 3N and 3N+3 are two consecutive multiples of three.a The sum of the two numbers is 141. Write down an equation to show this.b Solve the equation to find the value of Nc Work out the values of the two initial numbers. 15) Volume of a cuboid with base area 500 m2 and height 4m is. with steps Which option describes the best audience for a short story about a funny incident that happened in a sixth-grade classroom?Select one:high-school teachersparents of preschoolersmiddle-school studentsprofessors of writing (03.01 LC)Why would the same credit card have two different interest rates, of 10.50% and17.50%, for two different adults?Due to their ageDue to their APRDue to their rate of returnDue to their creditworthiness In the figure find the value of x figure is not drawn on scale II. Write TRUE if the statement is correct and FALSE if not.11. The flower of mongo beans is self- pollinating.12. Most ferns reproduce sexually using spores.13. Pine tree has flowers.14. Rose, santan , daisy can be reproduced through leaves.