Which statement about tensile stress is true? A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object. B. Forces that act perpendicular to the surface and squeeze an object exert a tensile stress on the object. C. Forces that act parallel to the surface exert a tensile stress on the object. D. Forces that decrease the length of the material exert a tensile stress on the object.

Answers

Answer 1

Answer:

The correct option is;

A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object

Explanation:

A material under tensile stress has axial forces tending to stretch the material and cause elongation. It is the force per unit area externally applied that results in stretching

The definition of tensile stress is the magnitude or amount of applied force on an elastic material divided by the cross-sectional area of the material perpendicular to the direction of the applied force

Therefore, the tensile stress comprises of forces that act perpendicular to a given surface pulling the sections apart.


Related Questions

What are the types of computers?

Answers

Answer:There are 5 types of computers.

Explanation:(1)Super computer: are the fastest and expensive computer.super computer can do trillion calculations in every second.

(2)Mainframe: are similar to the super computers all use raw power focus on few tasks.

(3)Server computer: is a central computer that contain of collection data and program.

(4)Personal computer: is also known as a microcomputer.personal computer is all around can  be used as productivity tool.

(5)Work station: are expensive computers and more complex and are intended one user at a time.

Answer:

the four types of computers are;

personal computerMainframe computersuper computersMini computers

HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical controls D. Administrative, technical, and physical controls

Answers

Answer:

D

Explanation:

Based on HIPAA Privacy Rule requires that covered entities apply appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information, in any form.

What is the best use of a line chart? (A.)to show parts of a whole while emphasizing specific data,(B.)to compare and contrast discrete categories of data,(C.)to display data that changes over time(D.)to display data points that are unconnected and distinct

Answers

I think the answer to the question is C

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

How I to turn this ''loop while'' in ''loop for''? var i = 0; while (i < 20) { var lineY = 20 + (i * 20); line(0, lineY, 400, lineY); i++; }

Answers

Answer:

for(i = 0; i<20;i++){

lineY = 20 + (i * 20);

line(0, lineY, 400, lineY) }

Explanation:

First declare and initialize the variable i. You have not specified the data type of i so if the data type of i is integer i.e. int then you should declare i variable in the for loop as for(int i = 0; i<20;i++)

So the given while loop has a variable i which is initialized to 0. Then while(i<20) means that while loop executes until the value of i exceeds 20. If this while condition is true then the two statements inside its body will execute. The two statements are: lineY = 20 + (i * 20);

line(0, lineY, 400, lineY);

The value of i ins incremented after each iteration i.e. i++

So while loop has the following syntax"

1) initialization;  ---->  i = 0

2) while(condition) {  ----> i<20

3) loop body ----->  lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

4) increment or decrement loop variable  } ----> i++

For loop has the following syntax:

for( initialization of loop variable ; condition; decrement/increment loop variable)  {

loop body }

Here:

initialization  ---->  i = 0

condition        ----> i<20

loop body     -----> lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

increment or decrement loop variable  ---->  i++

Write a method, getFirstLine, that is passed a String argument and that returns the first line. (Recall that lines are terminated with the "\n" character.) Assume that the argument contains at least one complete, newline-terminated line.
My Solution:
public String getFirstLine(String a)
{
String[] myLines = a.split("\n");
return(myLines[0]);
}

Answers

Answer:  The answer to this question can be given as:

Method definition :

String getSecondLine (String aString) //define function getSecondLine()

{

return aString.substring(aString.indexOf("\n") + 1, aString.indexOf("\n") + 1 + aString.substring(aString.indexOf("\n") + 1, aString.length()).indexOf("\n"));

//return value.

Explanation:

What is the role of bpo in growth of Indian economy ?

Answers

Answer:

BPO Role in India's Economic Growth

The role played by BPOs in boosting India's economy shows that the IT and ITeS sector have been contributing largely to the economic growth of India. The growth in the contribution of BPOs to Gross Domestic Product has shown a steady rise from 1.2% to 5.4%.

Thanks to the availability of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.
a. True
b. False

Answers

Answer:

False

Explanation:

The advent of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.

It has made information flowing through companies to be readily available to executives, managers and workers. It helps workers to make sound decisions and discharge their duties effectively.

what are the different categories of a computer

Answers

Answer:Computer is a machine that can be program to manipulate the symbols.

Explanation:There are five different categories of a computer.

(1)super computer (2) mainframe (3) personal computer (4) workstation

(5) minicomputer

(1)super computer: super computer is the term fastest computer available current time.super computers are very expensive and specialized computer.

(2)mainframe : mainframe computer is perform to the execute the program the currently.

(3) personal computer: The most popular use for personal computer playing games and surfing internet.

(4)workstation: This type of computer used for the engineer applications desktop publishing , software development.

(5)minicomputer: The general a minicomputer is multiprocessing system it is a midsize computer.

Suppose you have the following variables defined: a = 100 b = 50 Write a Python if/else statement to assign the smaller of a and b to the variable m.

Answers

Answer:

a, b = 100, 50

if a < b:

m = a

else:

m = b

The program which assigns the smaller of the values in variable a and b using an if/else statement ls :

a = 100

b = 50

#assign the 100 and 50 to the variables a and b respectively

if a > b :

# the if statement checks if the variable a is greater the value on variable b

m = a

# if true assign the value of a to the variable m

else :

# if otherwise, then b would be greater

m = b

#assign the value of b to m

#the sample run of the program is attached

print(m)

Learn more :https://brainly.com/question/15727806

Which of the following statements is false? a. Java allows a class to implement multiple interfaces in addition to extending one class. b. Classes declared with implementation inheritance are tightly coupled. c. Classes declared with interface inheritance are tightly coupled. d. An interface also may extend one or more other interfaces

Answers

Answer:

The answer is "Option d".

Explanation:

In java, programming language interface is used to achieve the multiple inheritances,  that's why it used the extends keyword to inherit the interface to interface, that's why above given point is correct and \wrong choices can be described as follows:

The choice (a) is incorrect because it uses the implement keyword to inherit the class to an interface.  Choice b and choice c both are wrong because it can't be tightly coupled.

An interface consists of the shared boundary within the 2 separate components of the computer system of interchange.

The exchange takes place between the software computer and periphery devices. An interface cannot be extended to more than one devices. Hence e the option D is correct.

Learn more about the following statements are false.

brainly.com/question/17095049.

Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
A. The web server at 192.168.0.10 is reachable from the source host.
B. The default gateway between the source host and the server at 192.168.0.10 is down.
C. There is a problem with the web server software on web-s1.cisco.com.
D. A router is down between the source host and the server web-s1.cisco.com.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.

Answers

......Explanation:

ascsmlmcm

Based on the information, it is clear that the web server at the IP address is reachable, yet there may be a DNS goal issue for its space name. Option A and E is the correct answer

How is the web server part of the problem?

The problem can be understood in two ways based on the information provided:

A. The web server at 192.168.0.10 is reachable from the source.

This is not entirely set in stone by the fruitful ping order reaction to the IP address of the web server. Assuming that the web server was inaccessible, the ping would fall flat.

E. DNS cannot resolve the IP address for the server web-s1.cisco.com.

This may be induced by the truth that the specialist utilized the IP address (192.168.0.10) rather than the space title (web-s1.cisco.com) to test the network. On the off chance that DNS was working appropriately, the expert would have utilized the space name all things being equal.

As a result, we are able to conclude from the exhibit that the web server at the specified IP address can be reached; however, there may be a problem with DNS resolution for the server's domain name.

Learn more about web servers here:

https://brainly.com/question/29490350

#SPJ2

Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos

Answers

Answer: clip art

Explanation:

The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".

Answer:

B) clip art

Explanation:

I got this question correct

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.

It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?

Answers

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;

Bind, addSearch, modifyBind, modifyStartTLS, delet

According to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.

As a result of this we can see that making use of  StartTLS, delete can serve this purpose and other function as well.

Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.

Learn more about directory architecture at:

https://brainly.com/question/13171394

How do I make my kali Linux faster in my virtual box?

Answers

Answer:

If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.

does that make sense?

What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.

what is the best phone company that sells long lasting battery life phones?​

Answers

Answer:

A lot of people won't agree with me, but I have had phones from a variety of companies and found Motorola phones to be by far the best.

Explanation:

Answer:

apple but sometimes the batterys be breaking  fast lol

Explanation:

Which of the following statements is false? a. The Java API consists of packages. b. The Java API helps programmers avoid "reinventing the wheel." c. The Java API consists of import declarations. d. None of the above.

Answers

Answer:

The answer is "Option c".

Explanation:

In Java programming, the API stands for "application programming interface", which is also known as the lists of all classes in the JDK. It contains all packages, classes, and interfaces, with their techniques, fields. It is a built-in class, which gives the programmer a great deal of usability, and correct choices can be described as follows:

In option a, It is correct because it imports the package to use API. In option b, It allows you to "re-invent the wheel" by developers, that's why it is correct.

Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A

Answers

Answer:

D

Explanation:

Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"

score = 68

if (score < 50) --> print "F"

68 < 50 --> false

else if (score >= 50 OR score < 55)  --> print "D"

68 > = 50  TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)

As this condition is true the system will not validate the other conditions

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2

Answers

Answer:

Following are the code to this question:

def binarynumber(num):#defining a method binarynumber that accepts a parameter num

   x=""#defining a string variable x

   if (num!=0):#defining if condition to check number not equal to 0

       while (num>=1):#defining a loop that check value is grater then equal to one

           if (num %2==0):#defining if condition to check num is even

               x=x+"0" #add string value 0 in num variable

               num=num/2 #divide the value by 2

           else:#defining else block

               x=x+"1"#add string value 1 in num variable

               num=(num-1)/2#first subtract 1 into num variable then divide the value by 2

   else:

       x="0"#assign string value 0 in num variable  

   return "".join(reversed(x))#return value

num = int (input ("Enter any number: "))#defining num variable that input the integer value

print (binarynumber(num))#using print method to call method binarynumber with passing num parameter

Output:

Enter any number: 12

1100

Explanation:

In the above python code a method "binarynumber" is declared, in which the "num" variable passes as the parameter inside the method a string variable "x" is declared that stores all converted values. Inside the method and if the block is declared that checks number value is not equal to 0 if this condition is false then it will add string value and reverse its value. Or if the condition is true it defines a while loop that calculates the given number binary digits and returns its value. At the last step, the num variable is declared that inputs the integer value from the user end and calls the method by using the print method.    

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

Answers

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not making MWI calls. How can you quickly check whether or not this is the case

Answers

Answer:

You should run the port activity report.

Explanation:

In this scenario, several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of message waiting indicator (MWI) problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not a making message waiting indicator (MWI) calls.

In order to quickly check whether or not this is the case, you should run the port activity report.

A message waiting indicator (MWI) can be defined as a Cisco proprietary lamp, flashing liquid crystal display (LCD) panel, or special dial tone installed on the phones of a user which enables him or her to know a voice message waiting. When a message is waiting, the phone system is notified by the Cisco Unity Connection to activate the message waiting indicator on the user's phone.

The procedure for running the port activity report are;

1. Click on "reports" in the tool menu of the Cisco Unity Connection Serviceability.

2. Then click on "port activity report" on the serviceability report page.

3. Select the necessary options and lastly, click on "generate report."

You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his workstation is malfunctioning and that you need to fix it NOW. What is the first action you should take?

Answers

Answer:

Calmly ask him for his name and a more detailed explanation of the problem.

Explanation:

Since in the question,  it is mentioned that the anger use who fails to identify himself and claim that his workstation is malfunctioning and want to fix it now

Now the action which would be taken is to ask his name in a calmy manner and understand what the actually problem he is suffering by understanding it in a detailed way

Therefore according to the given case, the correct option is d.

Does anyone know how to fix this problem My kali Linux is getting stuck on the failed to send host log message the first time I run it but when I reset it it gets fixed but I wanna stop it from freezing and getting stuck on that error message

Answers

Update it, or just get a new Linux

Answer:

Is

Explanation:

You should check with a person repairing computers or call him and ask him Wats the problem with your pc or laptop or computer. This is just a suggestion. U can also get what to do from sites in the internet.

Hope this helps....

Have a nice day!!!!

what is the base number of binary, decimal and octal?​

Answers

Answer:

Explanation:

Answer:

0 and 1

Explanation:

Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective data______program.
a. data structuring.
b. data privacy.
c. data recovery.
d. data piracy.

Answers

Answer:

b. data privacy

Explanation:

one of the importance jobs is establishing an effective data privacy program inorder to keep tracks of sensitive information or documents and how it is collected, stored, and use.

Data privacy which is also refer to as information privacy is the aspect of information technology that deals with the capacity of an organization in safeguarding the information received.

Referential integrity states that:______.
A. Something assigned to an attribute when no other value applies (N/A) or when the applicable value is unknown;
B. Values of an attribute must be taken from a pre-defined domain;
C. No primary key attribute (or component of a primary key) can be null;
D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null;

Answers

Answer:

D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null.

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Are bpos safe for organisations ? State your views on it

Answers

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.

Other Questions
15x - 30 x 0 + 40 = 89 Suppose that a company based in Dallas, Texas, initially confronts only four other rival firms. Its own market share is percent, which ties it with the other largest producer and seller in the industry. The market share of each of the other three firms is percent. Then a sixth firm, located in Cleveland, Ohio, enters the same industry. The new firm captures percent market share, and the market share of one of the smallest three original incumbents declines to percent as well. After the Cleveland firm's entry into the industry, what are the values of the four-firm concentration ratio and of the Herfindahl-Hirschman index? jogged the track 5/9 miles long and jogged around it 4 times Which of the following actions could be taken as part of colonialism? Solve the equation.y + 3 = -y + 9 y= 1 y=3y = 6 y = 9 What is the name given to the "blank check" Lyndon Baines Johnson received from Congress to "repel any armed attack against the forces of the United States and to prevent further aggression"?\ Select the correct text in the table. Use the fundamental theorem of algebra to determine whether each statement is sometimes true, always true, or never true. 1. A quadratic function has 2 distinct roots. always sometimes never 2. A cubic function has at least 1 real root. always sometimes never 3. A function with a degree of 5 has 5 roots. always sometimes never 4. A quadratic function can have only 1 complex solution. always sometimes never Filer Manufacturing has 11.6 million shares of common stock outstanding. The current share price is $59, and the book value per share is $5. Filer Manufacturing also has two bond issues outstanding. The first bond issue has a face value of $99 million, has a 8 percent coupon, and sells for 92 percent of par. The second issue has a face value of $81.2 million, has a 8 percent coupon, and sells for 95.5 percent of par. The first issue matures in 10 years, the second in 5 years. What is Filer's capital structure weight of equity on a book value basis? (Do not round your intermediate calculations.) What is Filer's capital structure weight of debt on a book value basis? (Do not round your intermediate calculations.) What is Filer's capital structure weight of equity on a market value basis? (Do not round your intermediate calculations.) What is Filer's capital structure weight of debt on a market value basis? A school trip requires students to score at least a total of 335 points on four tests. Each test is worth 100 points. If a student's scores on the first three testswere 77, 95, and 82, what score would the student need on the last test to have no less than 335 points ?O A. 79OB. 75O C. 93O D. 81 A retailer charges a flat handling fee of $5.00, plus $0.75 per quarter pound, to ship an item. Bailey pays $9.50 to have an item shipped from the retailer. What is the weight of the item? A- 1.50 pounds B- 1.75 pounds C- 3.75 pounds D- 6.00 pounds 10 POINTS IDENTIFY THE SLOPE, Y-INTERCEPT AND GRAPH.1. Y= 2X + 32. Y = 34 X-2 Percent of sales method; write-off At year-end (December 31), Chan Company estimates its bad debts as 0.5% of its annual credit sales of $975,000. Chan records its Bad Debts Expense for that estimate. On the following February 1, Chan decides that the $580 account of P. Park is uncollectible and writes it off as a bad debt. On June 5, Park unexpectedly pays the amount previously written off. Prepare the journal entries of Chan to record these transactions and events of December 31, February 1, and June 5. A cylindrical container with a radius of 5 cm and a height of 14 cm is completely filled with liquid. Some of the liquid from the cylindrical container is poured into a coneshaped container with a radius of 6 cm and a height of 20 cm until the coneshaped container is completely full. How much liquid remains in the cylindrical container? (1 cm3 = 1 ml) Which set of points does NOT represent a function?OA) (8,5), (7,5), (6,5), (5,5)O B) (3,-5), (3, -1), (3, 2), (3, 4)OC) (-2,3), (-3,2), (2, -3), (3, -2)OD) (4, -1), (5, 1), (-1,4), (1,5) calculate the area and leave your answer in term of pie Rewrite2(4)(6) in a different way, using the Commutative Law of Multiplication. Which two features of igneous rocks are determined by their cooling rate?color and shininessshininess and hardnesshardness and crystal sizecrystal size and rock texture To determine the concentration of chloride ion (Cl-) in a 100 mL sample of ground water, a chemist adds a large enough volume of AgNO3 solution to precipitate all Cl- as AgCl. The mass of the resulting precipitate is 93.9 mg. What is the chloride ion concentration in milligrams of chloride per liter of ground water In graphing a trigonometric function, how does one establish which are the EXTREMUM coordinates and which are the MIDLINE INTERCEPTION coordinates. I can find the x values and the y values but do not know which X goes with which Y and the graphs end up incorrect! It is EXTREMELY frustrating. How do I discern which is which!!!!! Thank You. which characteristic of living things best describes why birds fly south for the winter?