Don is the superintendent of the county school system. What task might Don
perform as part of his job?
A. coaching the junior varsity football team
B. monitoring inventory for the band program
C. cancelling school if there is bad weather
D. teaching trigonometry to high school students

Answers

Answer 1

Don as the superintendent of the county school system is able to cancel school if there is bad weather

Further Explanation:

A school superintendent is like the chief operating officer of the county school system. He or she is tasked to run the day to day operations of a school district. A school superintendent falls under the supervision of the executive branch and his or her key responsibility is to hire principals and administrative district staff members. In addition, their other roles are to manage other financial roles. The answer C falls under the operations that Don as the District superintendent needs to take care of. Don has the powers to make decisions in the event of a school emergency like bad weather or incidents that concern the safety of teachers, students, and other staff members.

Learn more about a school superintendent

https://brainly.com/question/9735495

#LearnWithBrainly

Answer 2

Answer:

Canceling school if there is bad weather.

Explanation:


Related Questions

user intent refers To what the user was trying To accomplish by issuing the query​

Answers

User intent is the purpose behind a user's query in search engines or databases, aiming to find specific information or results. Queries must be crafted clearly and consider user characteristics and technology traits to be effective. With skill and familiarity, user interactions with technology become more intuitive.

When discussing user intent, we are referring to the objective or purpose a user has when entering a query into a search engine or database. The intent encapsulates the outcomes or information the user desires. Knowing user intent is crucial because well-crafted queries are more likely to yield relevant results, sparing the user from filtering through unnecessary information.

The wordings of queries can affect the clarity and effectiveness of the search. For example, instructions should be crystal clear; instead of using passive constructions or vague subjects, actions should be mentioned first and subjects should be specific. Taking into account user characteristics, technology traits, and desired functions and purposes for technology use is important to tailor the technology effectively to the user's intentions.

Understanding queries ranges from simple database requests to complex search directives, all centered around the needs and intentions of the user. Queries become more seamless and intuitive as the user gains proficiency and familiarity with the technology, much like a player mastering control over his avatar in a virtual environment. Ultimately, queries are communication - they convey our needs, desires, and purposes to a system designed to serve us.

Jason needs to create a storyboard for his school's web page. Which should he include? A:Code B:Exact text C:HTML D:Purpose

Answers

Answer:

He should include Purpose of the storyboard.

Explanation:

A website storyboard contains all the information provided on website. This information is just on single page that contains all  important images, text, navigation and graphics. It is just the layout of the website to present it before clients.

The only things that is important, to create the storyboard of the website is why someone creating the storyboard. The purpose should be added in storyboard to present it before the users or client so that they can understand the purpose of storyboard.

Answer:

I just did the test and its Purpose.

Explanation:

Jason is computer professional who has access to sensitive information. He shares this information with another organization in the same industry. Which professional code of conduct did Jason violate?

Answers

Jason violated the confidentiality of information.

Part of information security is "confidentiality of information" wherein an employee must kept all the information he may acquire when he is working in a company, confidential. When we say confidential, he is not allowed to disclose anything that he may know about company's operation, sensitive information to anybody who is outside the company (like in the example, another organization). Because data that he might disclose may get on hands by company's competitors and it can be used against the company. They might steal ideas and strategies.

What output will the look up formula below produce in relation to the following table?

Answers

Answer:

The VLookup checks a value inside a table through matching over the 1st column.

Lookup a value in a table by matching on the first column and the matched value is returned from the table.

Explanation:

The formula for the VLOOKUP is

=VLOOKUP (value to be matched in the first column, table from which the value will be looked for, col_index is the column inside the table from where the value is fetched, [range_lookup] is true for the approximate match, and false for exact match)

Answer:

Rainy

Explanation:

Got it right on test

From the following list choose all the tasks an operating system performs.

manages files
manages memory
powers up
works as an intermediary between the hardware and the software
stores files
runs tests
manages which program gets access to memory and for how long

Answers

Manage memories - Operating system has utilities that could help users to manage their memories. Such utilities include Disk Maintenance and Disk Degfragmentation which are helpful to detect problems within your disk storage. Works as an intermediary between the hardware and the software - OS has a special program called kernel. Basically, a kernel can recognize a command in relation to hardware. For example, when the user click on Ctrl and P keys on the keyboard, the kernel would send alert to the corresponding hardware which is the printer then do the task. Manages which program gets access to memory and for how long - OS manages tasks. It supports multi tasking which means several processes can happen at a time. In order to do that, OS manage the computation and priorities of tasks to ensure that the user can have a good experience.

Consider the following method intended to modify the parameter names by removing all instances of the String n.

public static void removeNames (ArrayList names, String n) { for (/* Missing Code */) { if (names.get(i).equals(n)) { names.remove(i); } } }

Which of the following could correctly replace /* Missing Code */ so that removeNames works as intended?

int i = 0; i < names.size(); i--

int i = names.size() - 1; i >= 9; i++

int i = 0; i < names.size(); i++

int i = names.size() - 1; i >=0; i--

none of the above. The code has an error.

Answers

Final answer:

Replace the missing code with 'int i = names.size() - 1; i >=0; i--' to correctly iterate backwards through the ArrayList, preventing skipping elements after removals.

Explanation:

The correct code to replace /* Missing Code */ is int i = names.size() - 1; i >=0; i--. This is because we need to iterate backwards through the list to avoid skipping elements after removing one. If we iterate forwards and remove an element, the next element will shift to the position we just removed, and the loop will skip it when i increments. By iterating backwards, we ensure that after an element is removed, it does not affect the iteration since we are moving to previous elements that have already been checked.

Final answer:

The correct iteration pattern for removing elements from an ArrayList without skipping any elements is to iterate backwards. The iteration syntax 'int i = names.size() - 1; i >=0; i--' allows the method to function as intended.

Explanation:

The correct code to replace /* Missing Code */ in the removeNames method should allow the removal of all instances of a specific String n from the ArrayList names. To achieve this, the iteration should go backwards through the ArrayList to avoid skipping elements after removal. Therefore, the correct replacement is:

int i = names.size() - 1; i >=0; i--

When you remove an item from an ArrayList while iterating forward, the next item shifts into the current index, which your loop just passed over, potentially causing you to miss elements. By iterating backwards, you can ensure that the removal of an item does not affect the items you've not yet checked.

What technology does a smart phone use, and how does it work? ​

Answers

The smartphone is using several technologies. Such technologies include:

1. Artificial Intelligence - this is the type of technology wherein gadgets can talk to you and provide you information when you communicate to them. Communicate means you give gesture to the device or you talk to the device. AI software normally has names depending on the hardware/ brand you are using.

2. Mobile device that can paired and sync with wearable devices - Sync is a process of saved information in the cloud can be accessed to multiple devices that has the same credentials to all your devices. These changes and data can also be saved on your wearable devices like smart watches. Smart watches can be paired and used with smartphones. Data in your watch can be seen in phones and vice versa. You can even see what music or movies are playing in your phones using your watch. You can send text message and accept phones using your watch.

3. Virtual Reality - you can play and experience Virtual Reality games on your mobile. You can even watch Virtual Reality movies on it. You just have to buy a device that plays or support Virtual Reality apps and movies to complete the experience.

Before you take any medicine, _____ to see if it could affect your ability to drive.
a. test a small dose b. read the warning label c. search on the internet d. see if it contains alcohol

Answers

Answer: B. read the warning labels

Answer:

b. Read the warning label

Explanation:

In the warning label, most drug manufacturers put details concerning allergies, side effects and details to not if the symptoms keep occurring.

Also details about conditions under which a patient should avoid taking the particular drug is always stated there.

A vector is based on...​

Answers

Answer:

Magnitude and direction

Explanation:

Vector quantity is a quantity which is described by magnitude and direction

What is the decimal representation of the following signed binary numbers?
10000000
11001100
10110111

Answers

Answer:

(10000000)₂ = -128 in decimal

(11001100)₂ = -52 in decimal

(10110111)₂ = -73 in decimal

Explanation:

NOTE: If Most Significant Bit is 0, it is positive number and if MSB is 1, it is negative number. If number is positive we can simply convert it to decimal. But if number is negative, follow following formula:

(complement of the number) +1

EXAMPLE 1

  (10000000)₂

  (01 1 1 1 1 1 1)₂   ↔  complement of the number

+                    1

  (10000000)₂ = 1 ×[tex]2^{7}[/tex]= 128 (magnitude in decimal)

But we remember MSB was 1 so answer is -128.

EXAMPLE 2

  (1 1 0 0 1 1 00)₂

  (0 0 1 1 0 0 1 1)₂

+                       1  

  (0 0 1 1 0 1 0 0)₂ = 52 (magnitude in decimal)

But we remember MSB was 1 so answer is -52.

EXAMPLE 3

  (1 0 1 1 0 1 1 1)₂

  (0 1 00 1 000)₂

+                      1  

  (01 00 1 00 1‬)₂ = 73 (magnitude in decimal)

But we remember MSB was 1 so answer is -73.

Final answer:

To convert signed binary numbers to their decimal representation, check if the first bit is 1 (indicating a negative number) and then find the two's complement of the rest of the bits. After converting the two's complement to decimal, prefix the number with a negative sign. For example, 10000000 represents -128, 11001100 represents -52, and 10110111 represents -73 in decimal.

Explanation:

The question asks about converting signed binary numbers into their decimal representations. Signed binary numbers use the leftmost bit as a sign indicator, where 0 usually means positive and 1 means negative. To convert them into decimals, one must understand two's complement notation, which is a method used to represent negative binary numbers.

Steps for converting signed binary numbers to decimal:

Check the first bit (most significant bit). If it is 0, the number is positive. If it is 1, the number is negative and you will proceed with finding the two's complement of the rest of the bits.To find the two's complement, invert all the bits (change 1s to 0s and vice versa) and then add 1 to the least significant bit.Convert the resulting binary number to a decimal number.If the original most significant bit was 1, prefix the result with a negative sign to show it is a negative decimal number.

Following these steps:

10000000: This represents -128 in decimal as it is the two's complement of 128 (the most significant 1 indicates a negative number).11001100: The first bit is 1, so this is a negative number. Its two's complement is 00110100, which is 52 in decimal, thus the original number is -52.10110111: The first bit is 1, so this is a negative number. Its two's complement is 01001001, which is 73 in decimal, thus the original number is -73.

Charlotte was a big fan of her new operating system because she was able to use the same OS at home as she did at
work. She liked the new Media Player it introduced and was thrilled with the ease that new hardware devices could be
connected. Her new OS was most likely
Windows 98
Windows NT
Windows ME
Windows XP

Answers

Answer:

The new operating system is Window XP.

Explanation:

The latest operating system in the list is Window XP. It has many new features such as it can support new hardware easily. It has also the new media player facility.

In previous operating systems, whenever we install OS on system, drivers for all hardware need to be installed before use. In this Operating System, device drivers automatically install along with OS. This will make hardware usage easy.

People use a computer connected to the internet to manage financial accounts

Answers

Answer:

No however, if financial accounts are on website, then that is done, however, not on public network.

Explanation:

This should not be done on the public network, or some other computer. And in general its no. However, if the internet is required, then this must only be done on a private network and under strict firewall rules. Do not ever use the VPN for this as well, as your information can be leaked. You need to do all this, as these are monetary usage, and at times it can be very heavy, and result in very heavy loss. However, this is especially required by small children who use bank accounts regularly. They and all should keep this in mind.

Which segment of society introduced the grunge look?
A. artistic and experimental college students
B. middle-aged men who wanted to look younger
C. young people with limited income
D. housewives who wanted to look fashionable

Answers

Answer:

The answer is not a it is c

Explanation:

I took the test

The segment of society that introduced the grunge look is:

C. young people with limited income

The grunge look was introduced by young people with limited income. Originating in the Pacific Northwest, particularly Seattle, during the late 1980s and early 1990s, the grunge fashion style was heavily influenced by the grunge music scene. This style was characterized by its casual, unkempt, and thrift-store aesthetic, often featuring flannel shirts, ripped jeans, and worn-out clothing. These fashion choices were partly a reflection of the financial constraints faced by many young people at the time, who shopped at second-hand stores and prioritized comfort and practicality over conventional fashion trends. This anti-fashion statement quickly gained popularity and was embraced by youth culture across the country.

Which workplace task can be best addressed by using e-mail?
alerting your boss of an emergency that needs immediate attention
sending a status report to all employees working on one project
giving a coworker some advice on how to better do her job
informing your boss and coworkers that you are quitting

Answers

Answer:

the best answer is option B).

Explanation:

The work place task that can be best addressed by using e-mail is sending a status report to all employees working on one project

Explanation:

Email can be used to convey your message at workplace when:

When you need to get in touch with a person who is not responding to your calls.When you need to contact someone who is located geographically in a different location.when the information you want to convey/share is not time sensitive(time bond)E-mails are used at workplace to convey electronic files such as word documents,spreadsheets.Emails are also used for communications where a written record of the same is required.When a employer need to address large number of employees an email is used to communicate such information

a page can have High needs met rating even if it is not related To the topic of the query​

Answers

Answer: A page can have the high needs met rating even being not related to the topic of the query is False. A needs met rating is completely based on how well the resulting landing page meets the related query.

Explanation:

4. How do artistic designing and engineering designing differ? How do they overlap?

Answers

Answer: design is art, art is design.

Any good artist is designing their work. Any good designer has an art to their work. The artist "designs" the composition of any piece they create, be it a painting, sculpture, furniture, etc. There is design even in a child's drawing.

Explanation:

Peter is software designer working at a big software company. He just found out that he has been shifted to their downtown branch. Peter is upset because his manager did not consult him over this move. What kind of environment is prevalent in Peter’s company?

The managers at Peter’s company have an __ environment.

Answers

The managers at Peter’s company have an Autocratic environment.

Explanation:

The managers who are autocratic in nature make decisions on their own. They will never get insights of their employees and they will not take the inputs of them in taking any decisions. This type of management is suitable in an organisation where there is an urgent need to taking decisions to any matter.

Managers who are autocratic in nature will make decisions without consulting anyone's advice.  This type suits those organisations wherein there are very less number of employees. Here, the manager of Peter did not consulted peter in making decisions related to him, the environment is authoritarian or autocratic.  

Answer:

autocratic

Explanation:

A python script to print fibonacci series first 20 elements

Answers

Answer:

   nterms =20

   # first two terms

   n1, n2 = 0, 1

   count = 0

   # check if the number of terms is valid

   if nterms <= 0:

      print("Please enter a positive integer")

   elif nterms == 1:

      print("Fibonacci sequence upto",nterms,":")

      print(n1)

   else:

      print("Fibonacci sequence:")

      while count < nterms:

          print(n1)

          nth = n1 + n2

          # update values

          n1 = n2

          n2 = nth

          count += 1

Explanation:

Here, we store the number of terms in nterms. We initialize the first term to 0 and the second term to 1.

If the number of terms is more than 2, we use a while loop to find the next term in the sequence by adding the preceding two terms. We then interchange the variables (update it) and continue on with the process.

output:

Fibonacci sequence:

0

1

1

2

3

5

8

Final answer:

To print the first 20 elements of the Fibonacci series in Python, a function can be used which iterates through a specified number of elements, updating and printing the next number in the sequence in each step.

Explanation:

The Fibonacci series is a sequence where each number is the sum of the two preceding ones, usually starting with 0 and 1. To print the first 20 elements of the Fibonacci sequence in Python, you can use the following script:

fibonacci.py

def fibonacci(n):
   a, b = 0, 1
   for _ in range(n):
       print(a, end=' ')
       a, b = b, a + b

fibonacci(20)

This script uses a simple loop to generate the series and prints out each element. The variables a and b start with values 0 and 1, which are the first two numbers in the Fibonacci sequence. Each iteration of the loop updates the values of 'a' and 'b' to the next two numbers in the sequence, and 'a' is printed out each time. Running this script will output the first 20 numbers of the Fibonacci series.

use of multimedia in business sector...​?

Answers

Answer:

Advertisement or Marketing

Explanation:

Most products are marketed or advertised through the use of multimedia content such as videos and pictures.

Multimedia in the business sector is pivotal for engaging and effective communication. It includes text, audio, and video, and is integrated in presentations and training materials to enhance audience engagement and efficiency.

The term 'multimedia' encompasses a variety of content forms such as text, audio, images, animations, video and interactive content. The integration of multimedia in business communications allows for more dynamic presentations, potentially leading to increased engagement from the audience. In presentations, for instance, utilizing software like PowerPoint to create multimedia presentations that include pictures, movies, and sounds can help convey messages more effectively.

Furthermore, multimedia convergence has transformed various industries, merging previously distinct sectors like publishing and filmmaking into interconnected fields with information as their shared product. This transformation, facilitated by the digitization of information processing, has significant implications for employment, vocational training, and computer literacy. In the business context, multimedia can enhance learning through varied training materials, grab the audience's attention, and even assist in media multitasking, thereby increasing efficiency and engagement.

Jonathan works with a team of photographers. They have a collection of photos and have divided the photo editing work among them. They
have their individual computers to work with. Jonathan suggests that the storage device for sharing their work should be of the plug-and-play
type. Which storage device is he talking about?
A
B,
USB drive
CF card
C
SD card
D. MMC

Answers

Answer:

I think it's B

USB drive

Answer:

USB drive.

Explanation:

USB drives can be plugged into the computer to hold files and then play them back on any device. You can transfer data from a USB drive onto any computer. Not just the one you took the files from.

Which resources can help you learn more about specific careers?

Answers

Try these websites:

1. https://www.careerbuilder.co.uk

2. https://nationalcareersweek.com

3. https://kudos.cascaid.co.uk/#/

4. https://www.careercompanion.co.uk/#12

Answer:

1 4 5

Explanation:

At what stage of the creative process would a designer determine the target audience for a project?

revision
brainstorming
research
creation

Answers

Creation, the designer would need to understand what they are making and for what type of person

Answer:

At the research stage.

Explanation:

For any successful business or project meant to be use by certain audiences. The audience has to be known before the project is started else what the essence of creating such project. So when researching, target audience must be given enough effort and attention for the project to be successful.

Complete the following table.
Definition Example
Define problem
Generate Concepts
Design a solution
Build and Test Prototype
Evaluate Solution
Present Solution

Answers

Answer:

Only one aspect is left, and that is to record the solution

Explanation:

When we study software architecture these days, we also study design patterns. You must have got the message like let so and so company know what problem you faced or your findings, for research purposes. And this is what gives an insight into the requirement of the design pattern. Always make an habit to record your findings in proper world, and also tick mark the option mentioned above while installing the IDE. Your design pattern will be automatically picked. And if its awesome, you can be rewarded as well.

Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the database to look up movies by rating, actors, producer, and title. She would also like to retrieve the movies that are in stock. What fields should she have in her database? title, rating, actor, and producer rating, director, and actor title, rating, actor 1, actor 2, actor 2, actor 4, producer, and in stock product number, price, and rating

Answers

Final answer:

Nicole's video rental store database should have fields for title, rating, actors, producer, director, and in stock status to effectively manage her inventory and allow customers to search for movies by various attributes.

Explanation:

Nicole should have the following fields in her database to collect information about videos in her video rental store: title, rating, actor 1, actor 2, actor 3, actor 4, producer, director, and in stock status. Each field serves a specific purpose; for example, the title is for the name of the movie, rating for age-appropriateness, actors and producer for identifying the cast and production team, director for the individual who oversees the creative aspects of the film, and the in stock status to retrieve the movies that are currently available for rent.

Final answer:

Nicole should create a database for her video rental store with fields for title, rating, actors, producer, and in-stock status, using a structured query language to manage relationships and minimize data redundancy.

Explanation:

Nicole wishes to create a database for her video rental store to manage and retrieve information about her inventory. Considering her requirements, the fields she should include in her database are; title, rating, actors, producer, and in-stock status.

This set of fields will allow her to perform searches based on movie characteristics, such as rating, actors, and producer, as well as check availability. To efficiently store information about actors, which can have a one-to-many relationship with movies, an all-reference table would be beneficial to avoid duplication and to minimize space utilization.

Databases, like the one proposed for Nicole, are highly structured and allow for complex queries using a structured query language. This language creates relationships between different pieces of data, such as linking actors to movies they have starred in.

When setting up her database, Nicole should be mindful of managing data types with one-to-many or many-to-many relationships to reduce data redundancy and improve searchability.

Ultimately, the proper organization of her database will enable Nicole to quickly and efficiently find detailed information about the videos in her store, while also ensuring the database remains manageable and scalable as her collection grows.

To write 10 lines of code on paper:

It must include
2 Print statements
an IF statement
2 integers/floats with a calculation

Answers

print("enter numbers between 1 and 10")

num1=float(input("enter the first digit to add together"))

num2=float(input("enter the second digit to add together"))

if num1 and num2 >=10:

answer=num1+num2

print(answer)

else:

print("answer not accepted please try again later")

exit()

26. Give two properties of softwood

Answers

Answer:

softwood come from coniferous trees and have cone or needle shaped leaves. They are also known as the  group of Gymnopermae plants which contain exposed seeds. Softwood have a tall pointed profile and are evergreen. Their cell structure is less porous than Hardwood. The most comercial common ones are Cedar, Kauri, Fir, Larch, Pine, Spruce.

Explanation:

There is a great difference between hardwood and softwood. While hardwood have more density than softwood, the latter is known for its low density.


Which address does a host have to find out in order to send a data packet to another host (whose IP address they know!) If the person is on the same network? When the person is on a different network?​

Answers

Answer:

1. Ethernet network address

2. native address, and the router

Explanation:

Each PC is connected to the Ethernet network through the Ethernet NIC or the network interface card. And anybody from the same network can send the data packet to this host through the Ethernet network address. And when the PCs are not on the same network then they are connected through the router and are being identified through their native addresses.

why should you avoid using cincinnati’s in a domain name?

Answers

Answer:

It is often misspelled

Explanation:

We could use cincinnati’s like a domain name and doesn't matter if it is the name of a city, even we can use it, if we're of another country or city, in addition, we can use other cities or towns if this is available. But this word is commonly misspelled, people can write sinsinnnati or cincinati, we should use words easier to remember.

Emery needs to select a single word within a text box on a PowerPoin
Click and drag the mouse to grab a selection of text.
O Double-click the word.
O Triple-click the text.
O Press Ctrl+A.

Answers

Answer:

The first option is correct "Double click the word"

Explanation:

Emery should double click on the word she wanted to select while working on power point.  

Following are the instructions that tell what command should be used for what selection in a text:

if you want to select a word you can double click on it if want to select a line then triple click on it if want to select all data then you should use Ctrl+A command.

I hope it will help you!

Answer:

B

Explanation:

edg 2020

If you refuse to take a blood, urine, or breath test to determine if you are driving under the influence of alcohol or drugs, you will
automatically
be assigned to 50 hours of community service
1
be required to pay a $500 fine
have your driving privilege suspended for one year
have your motor vehicle insurance cancelled by the state

Answers

Answer:

have your driving privilege suspended for one year

Explanation:

Other Questions
A biologist spent many years researching the rate of evolutionary change in the finch populations of a group of islands. It was determined that the average beak size (both length and mass) of finches in a certain population increased dramatically during an intense drought between 1981 and 1987. During the drought, there was a reduction in the number of plants producing thin-walled seeds.Which of the following procedures was most likely followed to determine the change in beak size?1. A few finches were trapped in 1981 and again in 1987, and their beak sizes were compared.2. The beak size in fifteen finches was measured in 1987, and the beak size in the original finches was determined by estimation.3. The beak size in a large number of finches was measured every year from 1981 to 1987.4. Finches were captured and bred in 1981, and the beak size of the offspring was measured. Mandy calls a local newspaper and pretends to be a neighbor who is away for the winter. She obtains account history and orders the newspaper for six months. Has Mandy committed a fraud? If yes, under which act Effective corporate governance is essential in large corporations because corporate ownership (by shareholders) is separated from corporate control (by officers and managers). In order to improve corporate governance, most large corporations have eliminated the use of outside directors.A. TrueB. False A floating ball normally weighs 5.5 N. The acceleration of gravity is 9.8 m/s 2 . What is the size of the buoyant force that acts on it? What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large volume sizes?A) NTFSB) FAT32C) FAT16D) ReFS Given the line below.Write the equation of the line, in point-slope form. Identify the point (-2, -2) as (x1, y1). Use the box provided to submit all of your calculations and final answer. An associate is seeking advice on which device to purchase for a friend who is a business owner. The friend needs the ability to chat activity while keeping in contact with the home office. Which of the following would be the BEST recommendation?A. Smart watch (Correct)B. Fitness monitorC. Global positioning sensorD. Portable hotspot (Incorrect) If the demand for a good falls by less than the supply of the good rises, then the goods equilibrium price will __________ and its equilibrium quantity will __________. Interest earned: $3250 principal: $5000 Interest rate: ? Time: 10 years Please HELP ME! :0 20 points A ball that is thrown upwards from the ground will eventually reach its highest point and fall back to the ground. Which of the following quantities will be constant over the course of this up and down motion?a. The ball's position.b. The ball's speed.c. The ball's acceleration.d. Nonsense! None of these are constant. Which of the following are core capabilities for a response? a. Cybersecurity; community resilience; and housing b. Forensics and attribution; physical protective measures; and economic recovery c. Interdiction and disruption; access control; and threats/hazards identification d. Critical transportation; situation assessment; and mass care services Wrote "The Age of Innocence"Novels dealt with social class and the ""old rich" and the "nouveau riche" Which female author is being described?A)Zora Neale HurstonB)F.Scott FizgeraldC)Edith WhartonD)Willa Cather The correlation between a cars engine size and its fuel economy (in mpg) is r = - 0.774. What fraction of the variability in fuel economy is accounted for by the engine size?A. 27.5%B. 63.8%C. 71.8%D. 84.1% Skrugetech Inc. designs its jobs in such a way that each job profile has a number of tasks associated with it. The employees are also given a substantial amount of liberty to make decisions about their work as long as they fulfill other work and quality requirements. In the context of job design, Skrugetech Inc. is most likely using ________.A) job specializationB) task rigidityC) job enrichmentD) task identity One of the nursing achievements in the Crimean War was that the death rate of soldiers dropped from 60% to 1%. What is the most appropriate reason for the fall in the death rate? Dr. Bogdarian noticed that one of her students addresses her with the word mother instead of the word professor or doctor. Dr. Bogdarian applies the principles of ________, and hypothesizes the student misspeaks because he is unconsciously associating her with his mother.A. functionalismB. Gestalt psychologyC. psychoanalytic theoryD. structuralism Two populations of a species of squirrel are geographically isolated from each other. Although they have the same population density, one population is significantly larger in number than the other. A new bacterial disease, which is easily spread and extremely virulent, affects both populations at the same time.Which of the following is the best prediction of how the new disease will affect the two populations?(A) The two populations will be equally affected, because the ability to trigger an immune response is randomly distributed among all squirrels of that species.(B) The larger population will be less affected by the disease than will the smaller population, because the mutation rate of the larger population is higher than the mutation rate of the smaller population.(C) The smaller population will be more affected than will the larger population, because the smaller population has less genetic variation than the larger population has.(D) The smaller population will be less affected than will the larger population, because the smaller population exhibits more genetic drift than the larger population exhibits. A charge of 5.67 x 10-18 C is placed 3.5 x 10 m away from another charge of - 3.79 x 10 "CWhat is the force of attraction between them? A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016) This illustration and excerpt depict events from which time and place in history? 1) Revolutionary France. 2) Victorian England. 3) Meiji Japan. 4) Soviet Russia. Steam Workshop Downloader