Place the steps in correct order:

1. Open the sent messages

2. Make additions/edits

3. Click actions

4. Choose resend the message

(correct order as listed here)

Answers

Answer 1

The correct order is:

1. Open the sent messages

2. Click actions

3. Make additions/edits

4. Choose resend the message


Related Questions

How to Fix a Padding to Disable Msie And Chrome Friendly Error Page?

Answers

Answer:

A "Padding to Disable MSIE and Chrome Friendly Error Page" error typically occurs when a website or application is using padding or extra spaces in the HTTP response headers, which can cause the browser to display a friendly error page instead of the intended content. To fix this error, you can remove any extra spaces or padding in the response headers. Here are a few ways you can do this:

Use a tool such as Fiddler or Wireshark to inspect the response headers and remove any extra spaces or padding.

Check your server-side code for any spaces or line breaks that may be added to the response headers. This could be caused by a library or framework that is being used.

Check for any middleware or plugins that may be adding spaces or padding to the response headers. Disabling or removing these may fix the issue.

Check for any load balancer or reverse proxy that may be adding spaces or padding to the response headers.

Check for any Content Security Policy that may be causing the issue and adjust it accordingly

It's important to note that this is a generic solution and the exact cause of the error will vary. The best way to fix this error is by identifying the root cause of the problem and addressing it accordingly.

Conduct online research on any three careers related to computers and electronic communication that are important for business, management, and administration. For each of these roles, discuss how electronic communication is useful. Type your response here:

Answers

You will examine numerous computer and electronic communication-related occupations in this assignment. Communication styles, Eight Different Listening Reactions. Listening in silence. Questioning. Paraphrasing. Empathizing. Supporting. Analyzing. Evaluating. Advising.

Describe electronics

The emission, behavior, and consequences of electrons as well as electronic devices are the focus of the physics and electrical engineering field known as electronics.

An extraordinarily wide spectrum of technology is included in electronics. The phrase was first used to refer to the investigation of electron behaviour and motion, notably as seen in the earliest electron tubes. With new information regarding the nature of electrons at their core and the potential applications of their motion, it started to be used in a broader meaning.

To know more about electrons visit now

https://brainly.com/question/1255220

#SPJ4

Jen’s office contains the following devices:


Jen’s laptop, which is wirelessly connected to the server and turned on

Her secretary’s PC, which connects to the server is turned off

A virus-infected computer that has been unplugged from the network

The boss’s smart phone, which wirelessly connects to the server


You know that the office network is a _____

Answers

The following gadgets can be found at Jen's office: A WAN is the office network (Wide Area Network).

What distinctions exist between LAN and WAN?

A local area network, or LAN, is a network of computers created within a restricted area, like a home, business, or group of buildings. On the other hand, a wide-area network (WAN) is a computer network that spans a large geographic area. Users can transport data more quickly across LANs than they can via WANs, which have a significantly slower data transmission rate.

What distinguishes a LAN from a WAN and what are some examples of each?

The data transport rate on LANs is high. WANs transfer data at a slower rate than LANs do. Telephone lines and radio waves can be used to connect one LAN to another LAN across any distance.

To know more about WAN visit:-

https://brainly.com/question/621746

#SPJ4

14) Which of these is used to tag parts of a text that will be on a web page?

A) SEO.

B) HTTP.

C) HTML.

D) JavaScript.

Answers

Answer: C

thats all ill just fill this up a bit y'know

What is the correct order of the following user interfaces from the earliest to the most current?Select one:a. GUI, CLI, TUIb. CLI, TUI, GUIc. TUI, CLI, GUId. GUI, TUI, CLI

Answers

The right sequence of the following user interfaces, from the earliest to the most recent, is CLI, TUI, and GUI.

How do I list the files in a directory using a command?

One of the most potent commands in a UNIX system is the ls command. It has a ton of options for listing the files that are present in the directory.

Which command would you use to order files in a directory by oldest to newest?

The available disk space as well as details about files and directories are displayed by the dir command. Every file in the current directory is shown along with its name, size, and the date and time it was last modified by default.

To know more about  user interfaces visit:-

https://brainly.com/question/28351003

#SPJ4

what is the value of sum after the code segment is executed?
Num1 <--- 6
Num1 <--- 4
Num1 <--- 10
If Num1 < Num2
Num1 <--- Num2
Else
Num3 <--- Num 2
If Num2 > Num3
Num1 <--- Num2 + Num3
Sum <--- num1 + num2 + num3

Answers

The value of sum after the code segment is executed is 16. A code segment, also called a text segment or just text, is part of an object file or corresponding section of a program's virtual address space that contains executable instructions.

The required details for code segment in given paragraph

Following the code segment:

num1 = 6

num2 = 4

num3 = 10

IF num1 < num2 (which is FALSE as 6 > 4) THEN....ELSE num3 = num2 = 4

IF num2 >= num3 (which is TRUSE as 4 = 4) THEN num1 = num2 + num4 = 4 + 4 = 8

sum = num1 + num2 + num3 = 4 + 4 + 8 = 16

The term "segment" comes from heaping, a historical approach to memory management that was replaced by paging. When a program is stored in an object file, the code segment is part of that file; When the loader places the program in memory for execution, it allocates a certain number of memory areas (specifically, in the form of pages) that correspond both to segments in object files and to segments needed only at execution time. For example, a code segment of a file object is loaded into the corresponding code segment in memory. A code segment in memory is usually read-only and has a fixed size, so in embedded systems it can usually be stored in ROM. You don't have to upload it.

If the code segment is not read-only, you can edit the code yourself due to the specific architecture.

To know more about code segment visit:

brainly.com/question/20063766

#SPJ4

walter selected data on a worksheet to show in a chart. which button on the insert tab can he click to display charts appropriate for the selected data?

Answers

Recommended charts buttons on the insert tab can he click to display charts appropriate for the selected data .

What is a chart? What kind is it?

The term "chart" (sometimes referred to as "graph") refers to a graphical representation of data visualization in which "the data is represented by symbols, such as bars in a bar chart, lines in a line chart, or slices in a pie chart" Data visualization and encouraging further study of a subject are two of a chart's key purposes.

                           Charts are used to illustrate significant correlations or patterns between data points when a straightforward table is insufficient.

What benefit does using the recommended charts command offer?

A list of chart types that would best fit your data can be found by clicking the Recommended Charts button. This is a fantastic place to begin if you're unsure on the type of chart you should use.

Learn more about data chart

brainly.com/question/28785373

#SPJ4

what job site features many entry-level jobs and internships from a very large number of employers, and uses a computer matching algorithm to pair job seekers with opportunities that fit their specific major, and skills?

Answers

A jobs site that offers a variety of entry-level jobs and internships from a large number of employers and uses a computer matching algorithm to match job seekers with jobs that match their specialization and skillset.

The required details for algorithm in given paragraph

What is an algorithm?

Algorithms come in many forms, from the simplest to the most complex, and can be used to solve a variety of problems in computer science, mathematics, engineering, and so on solve. Algorithms are generally used in computer science to provide a solution to a problem or to automate a process.

The algorithm consists of a set of well-defined steps that can be followed to achieve the desired result.

Learn more about the algorithm

brainly.com/question/20533936

#SPJ4

some websites allow users to create, edit, or delete the content found on the site. these are known as

Answers

Without having any prior knowledge of HTML, users can design, create, modify, and remove content from a website using the CMA.

What is the name of the website where users can add, edit, and delete content?

Wiki is server software that enables anyone to easily add, update, or create content on a website using a web browser. Wikis are developed through user collaboration on the website. Wikipedia, an online encyclopaedia with open source content, is an illustration of a wiki.

What can users of Web 2.0 do?

A Web 2.0 website enables users to communicate and work together as co-creators of user-generated content in a virtual community through social media dialogue.

To know more about HTML visit:-

brainly.com/question/15093505

#SPJ4

what is the binary equivalent of the hex value 78? (note it is not 78 in decimal but 78 in hex written more precisely as 0x78 where the prefix 0x simply tells us that what follows is a hex value)

Answers

The binary equivalent of the hex value 0x78 is 01111000. Binary is a number system that uses only two symbols: 0 and 1.

These symbols are often referred to as "bits," where each "bit" can have a value of either 0 or 1. It is a base-2 number system as opposed to the more commonly used base-10 system (decimal) which uses the digits 0-9. Binary is used in digital systems and computer technology to represent and manipulate data. It is the foundation for machine-level operations and is used to store and process data in memory, on disk and in network communications. It is also used to represent characters, images, sound, and other forms of information in computers and other electronic devices. To convert a hex value to its binary equivalent, you can break it down into its individual digits and convert each digit to its binary representation.

In this case, the hex value 0x78 is equivalent to 7*16 + 8 = 120 in decimal, and the binary representation of 8 is 1000, and the binary representation of 7 is 0111. so the binary equivalent is 01111000.

Learn more about binary: https://brainly.com/question/28222245

#SPJ4

Which levels of measurement can be quantitative?

Answers

The nominal and ordinal levels are thought of as categorical measurements, whilst the interval and ratio levels are thought of as quantitative measures.

Can data be quantitatively measured at what levels?

Numerical measurements or counts make up quantitative data. The four levels of measurement used to decide which statistical calculations are meaningful are as follows. They are ratio, nominal, ordinal, and interval.

Are there any limitations on the type of ordinal?

Organizing variables into numbered categories, ordinal data are a type of qualitative information. The categories are ranked or arranged naturally according to some hierarchical scale, such as from high to low. But the space between the categories is not definitely defined.

To know more about quantitative visit :-

https://brainly.com/question/26457936

#SPJ4

cisco asa interface access rules are the most commonly used access control mechanisms on the security appliance. interface access rules permit or deny network applications to establish their sessions through the security appliance based on different information. on which three of these options is the access rules filtering based?

Answers

This is Cisco's solution, the Cisco IronPortTM S670 Web Security Appliance (WSA), which combines reputation filtering, inline file scanning, and signature-based malware detection.

Access control lists (ACLs), which restrict access in your network by blocking specific traffic from entering or leaving, are a feature of Cisco ASAs that offer basic traffic filtering capabilities. A STATIC NAT and an ACL authorizing the traffic are typically required to permit traffic from a lower-security interface to a higher-security interface. You can therefore reach any host on the inside if it has a static translation for that host and an ACL that permits the traffic.

Learn more about security here-

https://brainly.com/question/5042768

#SPJ4

what type of zone should you create that contains records allowing a computer name to be resolved from its ip address?

Answers

Every zone has a SOA record that contains information pertinent to the zone, as stated in [RFC1035] section 3.3.13 and explained in [RFC2181] section 7.

One name may be aliased to another using CNAME records. Canonical Name is referred to as CNAME. A typical illustration is when example.com and are hosted on the same server and lead to the same application. In essence, each DNS server is a specific kind of database server. The database houses a wide variety of data regarding the zones or subdomains that the server is in charge of, as well as specific devices inside those zones and subdomains. Resource records are the names given to the database entries in DNS that contain this name information (RRs).

Learn more about data here-

https://brainly.com/question/15709585

#SPJ4

Drawing a half arrow (Python 3) This zyLab activity is the traditional programming assignment, typically requiring a few hours over a week. The previous section provides warm up exercises intended to help a student prepare for this programming assignment. This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by user specified arrow base height, arrow base width, and arrow head width. (1) Modify the given program to use a loop to output an arrow base of height arrow_base_height. (2) Modify the given program to use a loop to output an arrow base of width arrow_base_width. (3) Modify the given program to use a loop to output an arrow head of width arrow_head_width. (4) Modify the given program to only accept an arrow head width that is larger than the arrow base width. Use a loop to continue prompting the user for an arrow head width until the value is larger than the arrow base width

Answers

Python program arrow Based on the inputted coordinates, this function inserts the arrow to the graph.  The syntax is matplotlib.pyplot.arrow(x, y, dx, dy, **kwargs).  X and Y parameters the base of the arrow's x and y coordinates.

What in Python does annotate () mean?

Annotations were initially introduced in Python 3.0 without any clear goal in mind. Simply put, they provided a method to link arbitrary expressions to function arguments and return values.

What in Python are "annotations"?

The object will construct a brand-new, empty dict, which it will then store and return as its annotations when called __annotations__. An Attribute Error will be thrown if the annotations on a function are deleted using del fn before the function has lazily constructed its annotations dict.

To know more about Python program arrow  visit :-

https://brainly.com/question/16180388

#SPJ4



Which detail supports the conclusion that Owen

Kim has supported Zech Hipp in tough times?

Answers

The reader can infer that Owen feels uneasy behind the wheel.This is because he believes that the number of rules you must understand and the amount of practice you need make driving challenging.

What inferences about Owen can readers make? The reader can infer that Owen feels uneasy behind the wheel.This is because he believes that the number of rules you must understand and the amount of practice you need make driving challenging.People who are inexperienced drivers frequently experience this. The reader can draw the conclusion that Owen is uncomfortable driving. This is because he considers driving is difficult due to the amount of rules that you have to learn and the practice that you require. This is a common feeling among people who are not experienced drivers.

To learn more about Owen  refer

https://brainly.com/question/8758196

#SPJ4

You should see the following code in your programming environment:

import simplegui

def draw_handler(canvas):
# your code goes here

frame = simplegui.create_frame('Testing', 600, 600)
frame.set_canvas_background("Black")
frame.set_draw_handler(draw_handler)
frame.start()
Use the code above to write a program that, when run, draws 1000 points at random locations on a frame as it runs. For an added challenge, have the 1000 points be randomly red, green, or blue.

Hint: The colors can be represented by

Red: “RGB(255, 0, 0)”

Green: “RGB(0, 255, 0)”

Blue: “RGB(0, 0, 255)”

Answers

I'll answer this question using Python.Task automation, data analysis, and data visualization are all common uses for Python in the creation of websites and software.

What is the main use of Python?Task automation, data analysis, and data visualization are all common uses for Python in the creation of websites and software.Many non-programmers, including accountants and scientists, have started using Python because it's relatively simple to learn and useful for a wide range of daily tasks, including managing finances.Among the simplest programming languages to learn for beginners, Python is frequently cited.Python is a good place to start if you want to learn how to program.

Aside from that, it's one of the most popular.

I'll answer this question using Python.

print("  ^ ^")

print("( o o )")

print("   v")

To answer this question, you have to follow the hint as it is in the question

The hint says you should copy each line into a print statement and that's exactly what I did when answering this question;

In other words;

^ ^  becomes print("  ^ ^")

( o o )   becomes print("( o o )")

v becomes print("   v")

To learn more about Python refer

https://brainly.com/question/17297718

#SPJ1

Which group on the Home tab contains the command for changing the fill color of a cell?
a. Auto Fill
b. Format Painter
c. Clipboard
d. Font

Answers

Press Ctrl+Shift+F or choose Home > Format Cells dialog launcher. Select the desired color for the Background Color field on the Fill tab. Font.

If you wish to alter the fill color, which TAB should you select?

Click the Shape Fill drop-down arrow on the Format tab. The color you want to use is chosen. Select More Fill Colors to get more color options. The chosen fill color will show up as the shape.

Which tool is used to apply or modify an image's fill color?

You can alter the colors in your image with the Hue/Saturation adjustment tool. Just like the search Color tool, it is equally simple to use. However, it is non-destructive and allows for unlimited color adjustments.

To know more about  fill color cell visit:-

https://brainly.com/question/30336063

#SPJ4

please give one example of the first-order method, and one example of the accelerated first-order method, and one example of the second-order method, for solving an optimization problem. please describe each algorithm you provided as an example.

Answers

Answer:

First-order method: Gradient Descent

Gradient descent is a first-order optimization algorithm that iteratively updates the parameters of a model by moving in the direction of the negative gradient of the loss function.

The algorithm starts with an initial set of parameters and then at each iteration, it computes the gradient of the loss function with respect to the parameters and updates the parameters by taking a step in the opposite direction of the gradient. This process is repeated until the parameters converge to a minimum or maximum of the loss function.

Accelerated first-order method: Nesterov Accelerated Gradient Descent (NAG)

Nesterov Accelerated Gradient Descent (NAG) is an accelerated first-order optimization algorithm that improves upon the vanilla gradient descent by adding a momentum term.

The algorithm starts with an initial set of parameters and at each iteration, it computes the gradient of the loss function and updates the parameters by taking a step in the direction of the negative gradient with a momentum term.

The momentum term helps to smooth out the oscillations that can occur in the gradient descent algorithm and allows the algorithm to converge faster to a minimum or maximum of the loss function.

Second-order method: Newton-Raphson method

Newton-Raphson method is a second-order optimization algorithm that improves upon the first-order methods by taking into account the curvature of the loss function.

The algorithm starts with an initial set of parameters and at each iteration, it computes the gradient of the loss function as well as the Hessian matrix (the matrix of second-order partial derivatives of the loss function with respect to the parameters) and updates the parameters by taking a step in the direction of the negative of the inverse of the Hessian multiplied by the gradient.

explain the role that the number of data exchanges plays in the analysis of selection sort and bubble sort.

Answers

Both algorithms have the same worst-case complexity, or O(n2), but they have different best-case complexity. Selection sort uses an order of n2 time, whereas bubble sort uses an order of n. In contrast to selection sort, bubble sort is a stable algorithm.

Does bubble sort outperform selection sort in efficiency?

Because there is less swapping needed, selection sort is superior to bubble sort. In contrast to selection sort, bubble sort is a stable algorithm.

Why does bubble sort perform worse?

Due to its poor performance when sorting arrays, Bubble Sort to is is one of the most frequently discussed algorithms.

To know more about algorithms visit:-

brainly.com/question/16027903

#SPJ4

Mention five(5) businesses that needs computer to opperate.

Answers

Answer:

Tech blogging.Content writing.Digital marketing.Computer repairing and maintenance.Cartridge refilling.

Answer: Security analysts, software engineers, network architects, user interface designers, and systems engineers are some tech professionals who use computers and other technologies.

Extra one (LOL): Hacker

Explanation:

10 Ways to Fix ""Unknown USB Device (Device Descriptor Request Failed)""

Answers

Launch Hardware and Device Troubleshooter, reinstall the USB device driver. Disable USB Selective Suspend, disable Fast Startup, take a USB device out of the system, then check for hardware changes.

What causes me to receive an unrecognized USB device?

When the operating system has problems identifying a USB device, the "Unknown USB Device (Device Descriptor Request Failed)" issue manifests. The USB interface on your computer or a hardware issue with the item in question could be to blame for this.

How can I fix unidentified devices?

Go to the problematic device in Device Manager after opening it. In the Other devices node, it typically widens the section and is classified as an Unknown Device. Update Driver can be found by performing a right-click on the Unknown Device.

To know more about USB device visit :-

https://brainly.com/question/28333162

#SPJ4


Does Blackboard Ultra have an APP that you can download to keep up with your assignments?

Answers

Answer:yes!! ofc it is w=vec Judy 9_9n9+99m

Explanation:

What is output by the following code? Select all that apply.

c = 0




while (c < 11):

c = c + 6

print (c)
Group of answer choices

0

2

4

8

10

6

14

16

1

3

12

Answers

Answer:

6
12

Explanation:

c starts with value zero. When the while loop starts 6 is added to the value, so 0 + 6 = 6. then the value is printed on the screen. The while checks if 6 is less than 11, since it's true then the the loop executes again and more 6 is added to the previous value, so now the value is 12. The value is again printed. Then the while checks again if 12 is less than 11, since it's not, then the loop breaks there, and nothing more is printed. So  if there is no line break, the printing should look like:

612
if there is a line break, then its:

6
12

the space allowed for the mascot on a school's web page is 75 pixes wide by 100 pixels high. its digital image is 300 pixels wide by 400 pixels high. what is the largest image of the mascot that will fit on the web page?

Answers

The mascot's biggest image that can be shown on a web page is 75 pixels wide and 100 pixels height.

What is webpage?

A web page is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser. It is one of the primary resources that make up the World Wide Web. Web pages are typically composed of HTML or XHTML and may contain images, videos, and other forms of media.

Web pages are typically accessed through a web browser by typing in a URL, or Uniform Resource Locator, which is the address of the page.

To learn more about web page

https://brainly.com/question/22775095

#SPJ4

if you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married. T/F

Answers

When you have a foreign roommate for more than 30 calendar days, when you become a cohabitant, or when you get married, you must notify the security office if you have a top-secret clearance. You are not required to notify the Security Office of any unauthorized international travel.

What is Security?

Your possessions are protected from unforeseen risks by security.

These treasures could be anything like cash, jewelry, priceless papers, furniture, electronics, etc. in the real world.

However, the nature of valuables changes when we discuss computers. The main asset that needs to be protected in this case is information. These facts may include user account information, bank account information, payment card information, personal data posted on social networking platforms, etc.

To Know More About Security Visit here

https://brainly.com/question/29792642

#SPJ4

one method to retrieve data from tables is the use of a cursor. define what a cursor is and the steps needed to create and use one. list at least one drawback of using a cursor.

Answers

A cursor variable is declared, and then it is assigned using the SET command. Use the syntax I shown at all times: To choose the data, use the CURSOR STATIC FOR and SELECT statements.

What is a cursor used for in a database?

With or without going back to the source table, a cursor lets you conduct numerous operations row by row against with a result set while keeping track of where you are in the result set. In those other words, cursors theoretically return a set of results based on the databases' tables.

In SQL Server, a cursor is a database object that enables row-by-row data retrieval and manipulation. Instead of using T-SQL commands which operate on all of the rows in the result set at once.

To know more about cursor, visit:

https://brainly.com/question/30024413

#SPJ4

true or false: the content of a work of art consists of everything the eye registers about it, such as colors, shapes, and internal organization.

Answers

Forecasts are used by businesses to decide how to allocate budgets and how to schedule anticipated spending for the upcoming period.

The process of forecasting involves using past data as an input to generate accurate projections that indicate the course of future trends. Forecasts are used by businesses to decide how to allocate budgets and how to schedule anticipated spending for the upcoming period. For small business owners, forecasting is the act of analyzing past, present, and future data as well as market trends to make projections about their company's financial performance. This enables you to make significant spending budgets by estimating how much money you are expected to produce over a specific time period. The process of reflecting past sales demand into the future is known as forecasting. You can swiftly evaluate current market trends and sales by putting in place a forecasting system, which will allow you to make strategic operational decisions.

Learn more about Forecasting here:

https://brainly.com/question/29222754

#SPJ4

which remote file access protocol is an extension of ssh?

Answers

Answer:

SFTP (SSH File Transfer Protocol), and is the most widely used file transfer protocol that runs over SSH.

Explanation:

Found it on the internet. Hope this helps!

The remote file access protocol that is an extension of SSH (Secure Shell) is called SFTP (SSH File Transfer Protocol).

SFTP allows for secure file transfer and manipulation over a secure SSH connection. It provides a similar command set and functionality to traditional FTP (File Transfer Protocol), but with the added security of encryption provided by SSH. SFTP is widely supported and commonly used for secure file transfers in various applications and systems.

It offers similar functionality to traditional file transfer protocols like FTP (File Transfer Protocol), but with the added security provided by SSH. SFTP is commonly used in scenarios where secure file transfer is required, such as remote administration, secure backups, and secure file sharing.

Learn more about SSH File Transfer Protocol on:

https://brainly.com/question/30368613

#SPJ6

What is the most advanced master data management tool available at newlifedn.com?

Answers

One of the fully functional master data management systems for startups and agencies is Profisee.

What is an MDM tool from Informatica?

A single master record is created for each person, place, or item in a company using both internal and external data sources and applications as part of master data management (MDM). This data has undergone de-duplication, reconciliation, and enrichment, making it a consistent, trustworthy source.

What ETL tool is the most widely used?

The ETL tool from Talend is the most used open source ETL programme. Open Studio generates Java code for ETL pipelines rather than running an ETL engine's configurations through one. It gains some performance advantages as a result of this tactic.

To know more about applications visit:-

https://brainly.com/question/28206061

#SPJ4

do you need to download excel to access your integrated excel question?

Answers

Answer:

In this new assignment type, Excel opens seamlessly inside Connect with no need to upload or download any additional files or software.

Explanation:

Other Questions
____ is to genetic influences as ___ is to environmental influences speaker a: it is more important now to focus on vocational training and economic opportunities than on removing obstacles to social equality for african americans. speaker b: the american negro [african american] must focus on the achievement of three goals: higher education, full political participation, and continued support for civil rights. speaker c: african americans should return home to africa to establish their own independent nation free from white control. speaker d: the constitution is color-blind and recognizes no superior class in this country. all citizens are equal before the law. aks 42c black reform leaders tried to support the goals of speaker b (above) by the nurse is conducting a health history interview for a patient who admits to current tobacco use. which cancers is this patient at risk for developing? select all that apply Can I get help on this question ? the area of trapezoid $abcd$ is $80$. one base is $12$ units longer than the other, and the height of the trapezoid is $5$. find the length of the median of the trapezoid. which of the following is one of the management and people changes posing a major challenge in the business use of information systems? group of answer choices big data online collaboration iot cloud computing. mobile platform. For the translation below, give the vertices of ABC when placed at the same temperature, compare the entropy of 10 mole of ar(g) at 10.0 atm and 10 mole of ar(g) at 0.5 atm. which system has a higher entropy? group of answer choices 10 mole of ar(g) at 10.0 atm 10 mole of ar(g) at 0.5 atm there is not enough information. they are the same in entropy. You were recently at a performance given by a famous actor or musician. The timeline below displays major events of the Mexican-American War.Which event convinced many Mexicans that they could not win the war?Battle ofPalo AltoApril - May1846Battle ofMonterreySeptember1846Battle ofBuena VistaFebruary1847Capture ofMexico CitySeptember18472 umb1 MP Attend to Precision Denise needs 4 pounds of soilto fill a flowerpot. She has a bag with 2 1/8 pounds of soiland a box with 1 3/4pounds of soil. Does Denise have enoughsoil to fill the flowerpot? Explain. Boeing Inc. has criticized The Airbus Company's competitiveness on the grounds that Airbus benefits from:Select one:a. Import tariffs protecting Airbus in the European marketb. Import quotas protecting Airbus in the European marketc. Lenient environmental standards of European governmentsd. Production subsidies supplied by European governments Alg Fndins 1 AOrder of OperationsEvaluate each expression.(Help me please) Sammy wants to know what percent of students at her high school have a drivers license. She surveys all students in her statistics class and finds that 68% of the students in her sample have a drivers license. What type of sample did Sammy obtain? Explain why this sampling method is biased. Is 68% likely to be greater than or less than the percent of all students at her high school who have a drivers license? Explain how Sammy could avoid the bias described in part (b) Heat is transferred only when___________________. Triangle A C B is cut by line segment E D. Line segment E D goes from side B C to side A C. The length of B A is 4 x minus 6 and the length of E D is x + 2. The length of B E is x. Sides B E and E C are congruent. Sides A D and D C are congruent.What is the length of BC?From the markings on the diagram, we can tell E is the midpoint of BC and D is the midpoint of ACWe can apply the theorem: ED = One-halfBA.Substituting in the expressions for the lengths and solving for x, we get x = .Now, since BE = x, then BC = . Jose has scored 320 points on his math tests so far this semester. To get an A for the semester, he must score at least 389 points. Part 1 out of 2 Enter an inequality to find the minimum number of points he must score on the remaining tests in order to get an A. Let n represent the number of points Jose needs to score on the remaining tests. The inequality is + n (select) HELP ME WAAKAIAKAKAKAK Your workouts should include elements of which of the following? which of the following divisions would you continue to run in order to earn profits to invest in other businesses? a. freight forwarding b. cargo inspection c. railroad loading d. shipping In contextualizing the Civil War, Lincoln urges listeners to recall the principles upon which the United States was founded. In the context of this article, how has America changed over time?