What are some examples and non-examples of digital etiquette?

Answers

Answer 1

Answer:

saying hello to strangers and standing up to cyber bullies

using all caps. cyber bullying. cursing. stalking

dont download that file


Related Questions

⡯⡯⡾⠝⠘⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢊⠘⡮⣣⠪⠢⡑⡌
⠀⠀⠀⠟⠝⠈⠀⠀⠀⠡⠀⠠⢈⠠⢐⢠⢂⢔⣐⢄⡂⢔⠀⡁⢉⠸⢨⢑⠕⡌
⠀⠀⡀⠁⠀⠀⠀⡀⢂⠡⠈⡔⣕⢮⣳⢯⣿⣻⣟⣯⣯⢷⣫⣆⡂⠀⠀⢐⠑⡌
⢀⠠⠐⠈⠀⢀⢂⠢⡂⠕⡁⣝⢮⣳⢽⡽⣾⣻⣿⣯⡯⣟⣞⢾⢜⢆⠀⡀⠀⠪
⣬⠂⠀⠀⢀⢂⢪⠨⢂⠥⣺⡪⣗⢗⣽⢽⡯⣿⣽⣷⢿⡽⡾⡽⣝⢎⠀⠀⠀⢡
⣿⠀⠀⠀⢂⠢⢂⢥⢱⡹⣪⢞⡵⣻⡪⡯⡯⣟⡾⣿⣻⡽⣯⡻⣪⠧⠑⠀⠁⢐
⣿⠀⠀⠀⠢⢑⠠⠑⠕⡝⡎⡗⡝⡎⣞⢽⡹⣕⢯⢻⠹⡹⢚⠝⡷⡽⡨⠀⠀⢔
⣿⡯⠀⢈⠈⢄⠂⠂⠐⠀⠌⠠⢑⠱⡱⡱⡑⢔⠁⠀⡀⠐⠐⠐⡡⡹⣪⠀⠀⢘
⣿⣽⠀⡀⡊⠀⠐⠨⠈⡁⠂⢈⠠⡱⡽⣷⡑⠁⠠⠑⠀⢉⢇⣤⢘⣪⢽⠀⢌⢎
⣿⢾⠀⢌⠌⠀⡁⠢⠂⠐⡀⠀⢀⢳⢽⣽⡺⣨⢄⣑⢉⢃⢭⡲⣕⡭⣹⠠⢐⢗
⣿⡗⠀⠢⠡⡱⡸⣔⢵⢱⢸⠈⠀⡪⣳⣳⢹⢜⡵⣱⢱⡱⣳⡹⣵⣻⢔⢅⢬⡷
⣷⡇⡂⠡⡑⢕⢕⠕⡑⠡⢂⢊⢐⢕⡝⡮⡧⡳⣝⢴⡐⣁⠃⡫⡒⣕⢏⡮⣷⡟
⣷⣻⣅⠑⢌⠢⠁⢐⠠⠑⡐⠐⠌⡪⠮⡫⠪⡪⡪⣺⢸⠰⠡⠠⠐⢱⠨⡪⡪⡰
⣯⢷⣟⣇⡂⡂⡌⡀⠀⠁⡂⠅⠂⠀⡑⡄⢇⠇⢝⡨⡠⡁⢐⠠⢀⢪⡐⡜⡪⡊
⣿⢽⡾⢹⡄⠕⡅⢇⠂⠑⣴⡬⣬⣬⣆⢮⣦⣷⣵⣷⡗⢃⢮⠱⡸⢰⢱⢸⢨⢌
⣯⢯⣟⠸⣳⡅⠜⠔⡌⡐⠈⠻⠟⣿⢿⣿⣿⠿⡻⣃⠢⣱⡳⡱⡩⢢⠣⡃⠢⠁
⡯⣟⣞⡇⡿⣽⡪⡘⡰⠨⢐⢀⠢⢢⢄⢤⣰⠼⡾⢕⢕⡵⣝⠎⢌⢪⠪⡘⡌⠀
⡯⣳⠯⠚⢊⠡⡂⢂⠨⠊⠔⡑⠬⡸⣘⢬⢪⣪⡺⡼⣕⢯⢞⢕⢝⠎⢻⢼⣀⠀
⠁⡂⠔⡁⡢⠣⢀⠢⠀⠅⠱⡐⡱⡘⡔⡕⡕⣲⡹⣎⡮⡏⡑⢜⢼⡱⢩⣗⣯⣟
⢀⢂⢑⠀⡂⡃⠅⠊⢄⢑⠠⠑⢕⢕⢝⢮⢺⢕⢟⢮⢊⢢⢱⢄⠃⣇⣞⢞⣞⢾
⢀⠢⡑⡀⢂⢊⠠⠁⡂⡐⠀⠅⡈⠪⠪⠪⠣⠫⠑⡁⢔⠕⣜⣜⢦⡰⡎⡯⡾⡽

Answers

Answer:

nice................

Answer:

24

Explanation:

4 reasons why users attach speakers
to their computers​

Answers

Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: Hope this helps!

which software manages the functioning of the entire computer system

Answers

it’s the operating system

Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file

Answers

Answer:

The answer to this would be D: A music file

Explanation:

Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.

I want to know the basic of Excel

Answers

Answer:

Use Pivot Tables to recognize and make sense of data.

Add more than one row or column.

Use filters to simplify your data.

Remove duplicate data points or sets.

Transpose rows into columns.

Split up text information between columns.

Use these formulas for simple calculations.

Get the average of numbers in your cells.

which service is a major commercial cloud platform?
a. Microsoft SQL Services
b. SAP Cloud Services
c. Amazon Web Services
d. Oracle Enterprise Services

Answers

Answer: Amazon Web Service

Explanation:

The service that's a major commercial cloud platform is the Amazon Web Service.

Amazon Web Services offers global cloud based products which include databases, storage, networking, IoT, developer tools, analytics, mobile, develo management tools, security applications etc.

The services are of immense benefit to organizations as they help them in achieving their goals as it helps in lowering IT costs, increase speed, enhance efficiency and revenue.

Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentations side by side? Which command allows a user to show one presentation overlapping another? Which command allows a user to jump from one presentation to another?

Answers

Answer:

Look at the attached file for the correct answer to  this question on edge:

Explanation:

The command allows a user to jump from one presentation to another Switch windows.

What is Switch windows?

Flip is similar to the Task view feature, although it operates somewhat differently. Click the Task view button in the taskbar's lower-left corner to launch Task view.

As an alternative, you can use your keyboard's Windows key and Tab. You can click on any open window to select it from a list of all your open windows.

It may be challenging to view the desktop if you have many windows open at once. When this occurs, you can minimize all currently open windows by clicking the taskbar's bottom-right corner. Simply click it once again to bring back the minimized windows.

Therefore, The command allows a user to jump from one presentation to another Switch windows.

To learn more about Windows, refer to the link:

https://brainly.com/question/13502522

#SPJ3

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.

help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..​

Answers

Answer:

if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus

Explanation:

what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term

Explain what an IM is, and what is the technology shown in the accompanying figure

Answers

Answer: Instant Message

Explanation:

Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz

Explanation:

Which best describes the possible careers based on
these employers?
Yoshi worked in Logistics Planning and Management
Services, Dade worked in Sales and Service, Lani
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation, and Miki
worked in Transportation Operations.
Yoshi worked in Transportation Operations, Dade
worked in Logistics Planning and Management
Services, Lani worked in Sales and Service, and Miki
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation
Yoshi worked in Health, Safety, and Environmental
Management, Dade worked in Transportation
Operations, Lani worked in Facility and Mobile
Equipment Maintenance, and Miki worked in
Warehousing and Distribution Center Operations.

Answers

Answer:

It's c bodie I'm fr on this question rn lol

Answer:

the guy above is right, its c

Explanation:

edge 2021

Define a class Complex to represent complex numbers. All complex numbers are of the form x + yi, where x and y are real numbers, real numbers being all those numbers which are positive, negative, or zero.

Answers

Answer:

The program in C++ is as follows:

#include<bits/stdc++.h>

using namespace std;

class Complex {

public:

 int rl, im;

Complex(){ }

Complex(int Real, int Imaginary){

 rl = Real;  im = Imaginary;

}

};

int main(){

   int real, imag;

   cout<<"Real: ";    cin>>real;

   cout<<"Imaginary: ";    cin>>imag;

Complex ComplexNum(real, imag);

cout<<"Result : "<< ComplexNum.rl<<" + "<<ComplexNum.im<<"i"<<endl;

}

Explanation:

See attachment for explanation

Write an application that combines several classes and interfaces.

Answers

Answer:

Explanation:

The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.

import java.util.Scanner;

interface Animal {

   void animalSound(String sound);

   void sleep(int time);

}

public class PetInformation {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       String petName, dogName;

       String dogBreed = "null";

       int petAge, dogAge;

       Pet myPet = new Pet();

       System.out.println("Enter Pet Name:");

       petName = scnr.nextLine();

       System.out.println("Enter Pet Age:");

       petAge = scnr.nextInt();

       Dog myDog = new Dog();

       System.out.println("Enter Dog Name:");

       dogName = scnr.next();

       System.out.println("Enter Dog Age:");

       dogAge = scnr.nextInt();

       scnr.nextLine();

       System.out.println("Enter Dog Breed:");

       dogBreed = scnr.nextLine();

       System.out.println(" ");

       myPet.setName(petName);

       myPet.setAge(petAge);

       myPet.printInfo();

       myDog.setName(dogName);

       myDog.setAge(dogAge);

       myDog.setBreed(dogBreed);

       myDog.printInfo();

       System.out.println(" Breed: " + myDog.getBreed());

   }

}

class Pet implements Animal{

   protected String petName;

   protected int petAge;

   public void setName(String userName) {

       petName = userName;

   }

   public String getName() {

       return petName;

   }

   public void setAge(int userAge) {

       petAge = userAge;

   }

   public int getAge() {

       return petAge;

   }

   public void printInfo() {

       System.out.println("Pet Information: ");

       System.out.println(" Name: " + petName);

       System.out.println(" Age: " + petAge);

   }

   //The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

   Override

   public void animalSound(String sound) {

       System.out.println(this.petName + " says: " + sound);

   }

//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

  Override

   public void sleep(int time) {

       System.out.println(this.petName + " sleeps for " + time + "minutes");

   }

}

class Dog extends Pet {

   private String dogBreed;

   public void setBreed(String userBreed) {

       dogBreed = userBreed;

   }

   public String getBreed() {

       return dogBreed;

   }

}

Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.

import java.util.Scanner;

class Brainly {

   static int[] arr;

   public static void main(String[] args) {

       // Print Unsorted Array and Call Selection Sort and print

       resetArray();

       SelectionSorter(arr);

       System.out.print("\nSelection Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Bubble Sort and print

       System.out.println('\n');

       resetArray();

       BubbleSorter(arr);

       System.out.print("\nBubble Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Insert Sort and print

       System.out.println('\n');

       resetArray();

       InsertSorter(arr);

       System.out.print("\nInsert Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void resetArray() {

       arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};

       System.out.print("Unsorted Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void SelectionSorter(int[] arr) {

       for (int i = 0; i < arr.length - 1; i++) {

           int index = i;

           for (int j = i + 1; j < arr.length; j++) {

               if (arr[j] < arr[index]) {

                   index = j;//searching for lowest index

               }

           }

           int smallerNumber = arr[index];

           arr[index] = arr[i];

           arr[i] = smallerNumber;

       }

   }

   static void BubbleSorter(int[] arr) {

       int n = arr.length;

       int temp = 0;

       for (int i = 0; i < n; i++) {

           for (int j = 1; j < (n - i); j++) {

               if (arr[j - 1] > arr[j]) {

                   //swap elements

                   temp = arr[j - 1];

                   arr[j - 1] = arr[j];

                   arr[j] = temp;

               }

           }

       }

   }

   public static void InsertSorter(int arr[]) {

       int n = arr.length;

       for (int j = 1; j < n; j++) {

           int key = arr[j];

           int i = j - 1;

           while ((i > -1) && (arr[i] > key)) {

               arr[i + 1] = arr[i];

               i--;

           }

           arr[i + 1] = key;

       }

   }

}

Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks​

Answers

Answer:

The answer is below

Explanation:

There are various methods of phishing and spoofing scammers use, some of which are:

Phishing:

1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details

2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim

3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.

Other phishing attacks are vishing, smishing, and pharming, etc.

Spoofing:

1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim

2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.

3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.

Others include website spoofing, text message spoofing, Io spoofing etc.

In which category would Jamal most likely find an appropriate template for his report?

Designs
Diagrams
Education
Personal

Answers

Answer:

Education

Explanation:

Phone numbers and PIN codes can be easier to remember when you find words that spell out the number on a standard phone keypad. For example, instead of remembering the combination 2633, you can just think of CODE. Write a recursive function that, given a number, yields all possible spellings (which may or may not be real words).

Answers

Answer:

Explanation:

The following is written in Python and the code first creates a simulated keypad with all the characters. Then the function detects the number passed as an input argument and outputs all the possible spelling combinations.

keypad = {

   '2': 'abc',

   '3': 'def',

   '4': 'ghi',

   '5': 'jkl',

   '6': 'mno',

   '7': 'pqrs',

   '8': 'tuv',

   '9': 'wxyz',

}

def word_numbers(number):

 number = str(number)

 wordList = ['']

 for char in number:

   letters = keypad.get(char, '')

   wordList = [prefix+letter for prefix in wordList for letter in letters]

 return wordList

What methods do phishing and spoofing scammers use?

Answers

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Answers

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.

Answers

Solution :

class Account

[tex]$ \{ $[/tex]

public:

[tex]$\text{Account}()$[/tex];

double [tex]$\text{getBalance}$[/tex]();

void [tex]$\text{setBalance}$[/tex]();

[tex]$\text{bool withdraw}$[/tex](double bal);

[tex]$\text{private}:$[/tex]

double [tex]$\text{balance}$[/tex];

}:

[tex]$\text{Account}()$[/tex] {}

double [tex]$\text{getBalance}$[/tex]()

[tex]$ \{ $[/tex]

[tex]$\text{return balance}$[/tex];

}

void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])

[tex]$ \{ $[/tex]

this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];

}

[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])

[tex]$ \{ $[/tex]

if([tex]$\text{balance}$[/tex] >= bal)

[tex]$ \{ $[/tex]

[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;

[tex]$\text{return}$[/tex] true;

}

[tex]$\text{return}$[/tex] false;

}

}

Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER

aspect-oriented
data-oriented
fourth-generation
logic-based

Answers

Answer:

I think it is fourth-generation.

Explanation:

Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.

Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).


Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).


On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses

Answers

Answer:

Explanation:

suna shahani kesa a ..

why do we need to settle technology in business?​

Answers

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Ten output devices you know

Answers

Monitor
Printer
Headphones
Computer Speakers
Projector
GPS
Sound Card
Video Card
Braille Reader
Speech-Generating Device

Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices

self-modeling

gigabit ethernet

political awareness

social distancing

binary verificationism

Answers

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.

The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.

Required:
Develop a program to count the incoming votes at election central.

Answers

Answer:

Explanation:

The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.

precinct = input("Enter Precinct Number: ")

option1 = 0

option2 = 0

while True:

   choice = input("Enter your vote 1 or 2: ")

   if int(choice) == 1:

       option1 += 1

   else:

       option2 += 1

   endVote = input("Vote again y/n")

   if endVote.lower() != 'y':

       break

f = open("results.txt", "w")

f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))

discuss five domains of Instructional technology​

Answers

Answer:

Design, Development, Utilization, Management, and Evaluation.


State
any three (3) reasons why users attach speakers to their computer?

Answers

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not really complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

web analytics can tell you many things about your online performance, but what can analytics tools not tell you​

Answers

Answer:

The answer is below

Explanation:

While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:

1. Web Analytics can’t accurately track leads

2. Web Analytics can’t track lead quality

3. Web Analytics can’t track the full customer journey

4. Web Analytics can’t highlight the true impact of payment.

PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
Select all benefits of using a wiki for business.


inexpensive

accessible twenty-four hours per day and seven days per week

online conversation

quick and easy editing

document sharing

Answers

Answer:

B, D, E is the answers I think

Answer:

Accessible twenty-four hours per day and seven days per week

Quick and easy sharing

Document sharing

Other Questions
what does the t cell do to your body? Based on the measurement shown, choose the response that would correctly complete this conversation.Doctor. Cunto mides?Rosa:OA.Mido ciento cincuenta y siete centmetros.OB.Mido ciento cincuenta y ocho centmetros..Mido ciento cuarenta y ocho centmetros.OD.Mido mil cincuenta y ocho centmetros. PLZ PLZ PLZ HELPPPPPPPP The air pressure inside a balloon is 0.783 atm. What is this pressure in mmHg?Do not include units in your answer. Which physical feature covers most of the earth?watermountainsarable landdesert URGENT!!! plz help will give brainlist question is in photo NEED HELP ASAP!!!get brainlist 3 cm..5 cmIf the base is halved and the height is quadrupled, then which of the following statementsabout its area will be true? find the measure of 2 and 4 if 1=122 and 3 = 58 in prokaryotic and eukaryotic cells the amount of water in the cell is kept at a steady state. The organellesthrough which water passes into and out of cell is theA) cell membraneB) cell wallC) nuclear D) ribosome how is a svanna different from a plateau Which of the following accurately describes a capital gain?A. An increase in the value of an investment. B. An upward trend in pricesC. The difference between costs and revenuesoD. A rise in the standard of livingSUBNDh The small piston of a hydraulic lift has an area of 0.20 m2. A car weighing 1200 N sits on a rack mounted on the large piston. The large piston has an area of 0.90 m2. What is the mechanical advantage of the hydraulic lift? This is for today someone can help me pls!!! If OC = 4 and OE = 6, which relationship between the length of arc EF and the length of arc CD is always true? Factor the expression.Show your workx+3xy18y Superior Inc. is starting a new project. It plans to develop an online platform that allows for 3D printing of online purchases. This would effectively reduce the online purchases' delivery times to minutes. It expects this new product to be a great success and bring rapidly growing profits in the first few years. After that, it expects the competition to kick in which will reduce the growth of annual profits. The dividends on Superior Inc.'s shares will be growing accordingly. Here is the exact schedule of expected future dividends: Most recently paid dividend is $4. Expected annual growth rate of dividends for the first 3 years is 50%.Expected annual growth rate of dividends after that is 10%. Discount rate for this company is 15%.Required:Calculate the price per share of stock of Superior Inc. What is the meaning of the following quote and how can we see this in ourworld today? "Fear, though, can also be used to do harm. Some politiciansuse it to control their followers. They might want their supporters to fearand to hate people who are different." (write a paragraph of 4-5 sentences) 5m+15m=0t-5t+6=05p+12p+4=02a+10a-48=0x(2x+5)=0 The closing process is also known as which of the following?A. Project completionB. Project postmortemC. Project wakeD. Project parity