If the destination file is closed when you make a change in the source file, you choose whether to update the link to display the current values when you open the destination file or continue to display the older values from the destination file.a) trueb) false

Answers

Answer 1

Answer:

True

Explanation:

When changes are made in the source file, even if the destination file is closed, you can either do any of these two; you choose whether to update the link to display the current values when you open the destination file or continue to display the older values from the destination file till the destination file is opened.

Any of the two you choose will not affect the changes already made at the source file becsuse the source file controls the activities in the destination file.

Hence, the statement as ascertained to be true.


Related Questions

java
Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop should ask the user whether he or she wishes to perform the operation again. If so, the loop should repeat; otherwise it should terminate
Sample Run1
Enter two numbers: 3 15
Do you want another operation: Yes
Enter two numbers: 45 56
Do you want another operation: No
Output1: Sum = 119
Sample Run2
Enter two numbers: 33 150
Do you want another operation: Yes
Enter two numbers: -56 56
Do you want another operation: Yes
Enter two numbers: 58 15
Do you want another operation: Yes
Enter two numbers: 123 87
Do you want another operation: No
Output2: Sum = 466

Answers

Answer:

import java.util.Scanner;

public class num3 {

   public static void main(String[] args) {

     Scanner in = new Scanner(System.in);

       System.out.print("Enter two numbers: ");

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int sum = num1+num2;

       System.out.print("Do you want another operation: ");

       String ans = in.next();

       while(ans.equalsIgnoreCase("yes")){

           System.out.print("Enter two numbers:");

           num1= in.nextInt();

           num2 = in.nextInt();

           System.out.println("Do you want another operation: ");

           ans = in.next();

           sum = sum+(num1+num2);

       }

       System.out.println("sum = "+sum);

   }

}

Explanation:

In the program written in Java Programming language,

The scanner class is used to prompt and receive two numbers from the user which are stored as num1 and num2. Another variable sum is created to hold the sum of this numbers

Then the user is prompted to answer yes or no using Java's equal.IgnoreCase() method.

If the user enters yes, he/she is allowed to entered two more numbers that are countinually added to sum

If the user eventually enters a string that is not equal to yes. The loop terminates and the accumulated value of sum is printed.

Information flows:
a. only back and forth between supply and external sources.
b. only into the supply group from external sources.
c. only into the supply group from other internal functions.
d. only back and forth between supply and other internal functions. between and among supply and other internal functions and external sources.

Answers

Answer:

e.

Explanation:

Information flow refers to the back and forth movement of information between different people and systems in order to communicate and perform different decision making processes. Information flows between and among supply and other internal functions and external sources. Information flow is used in just about everywhere in the world.

What machine learning technique helps in answering the question

Answers

i don’t know I need points :))))

Machine learning techniques like deep learning and reinforcement learning are pivotal for text analysis tasks, which require identifying and classifying patterns without explicit rules.

The question relates to machine learning (ML) to process textual data, where traditional rule-based systems fall short because of the complexity and variety of language. Such problems, like identifying references to a specific subject like the prophet Muḥammad in a corpus, require machine learning techniques to recognize patterns and infer rules that are not explicitly provided. ML techniques such as deep learning and reinforcement learning are especially potent in these scenarios, as they can learn from data to predict patterns and improve their performance over time, reducing bias and increasing the effectiveness of predictions.

Within the field of education, machine learning can help in the allocation of resources by analyzing data like satellite imagery combined with student enrollment information. This approach has been successfully used in international development efforts to predict poverty and mortality indicators, which demonstrates the potential utility of such techniques in helping answer complex questions and in making informed decisions.

You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Internet. The user tells you he has good signal strength, but the network connection states "acquiring network address" and the IP address is all zeros. What could cause this problem?

Answers

Answer:

From the user explanations, it can be inferred that the issue may be as a result of incorrect security parameters such as Wireless Protected Access (WPA) which ensure security for wireless connections.

Explanation:

If there is an incorrect access pass to the wireless network by the WPA, any wireless user will not be able to complete a Layer 2 connection to the wireless network after connecting and getting good signal indication and would thus be unable to obtain IP address automatically to be able to log on to browse the internet from the DHCP Server.

Answer:

Incorrect connectivity configurations.

Explanation:

In many instances, the connectivity configurations may not be matching. This results in a loss in internet connectivity. Thus, the first thing  will be to check the wireless area connections settings or simply the LAN settings. In addition, the local host or server can also check their systems to see if there are no generation problems on their side. Sometimes it may happen that external factors beyond the customer control can hinder the connectivity issues.

Mila received a new DVD player that she is trying to connect to the back of her television by feel alone. The first stage of memorizing how to make the connection would be through ____.

Answers

Answer:

The options for this question are the following:

a. iconic sensory memory

b. haptic sensory memory

c. short-term memory

d. long-term memory

The correct answer is b. haptic sensory memory.

Explanation:

Haptic memory has a capacity of 4 or 5 items, such as the iconic one, although the footprint is maintained for a longer time, about 8 seconds in this case. This type of sensory memory allows us to examine objects by touch and interact with them, for example to pick them up or move them properly.

It is believed that there are two subsystems that make up the haptic memory. On the one hand we find the cutaneous system, which detects the stimulation of the skin, and on the other the proprioceptive or kinesthetic, related to muscles, tendons and joints. It is appropriate to distinguish proprioception from interoception, which involves internal organs.

Haptic memory has been defined more recently than iconic and echoic, so that the scientific evidence available around this type of sensory memory is more limited than those that exist on the other two we have described.

Haptic memory depends on the somatosensory cortex, especially on regions located in the upper parietal lobe, which store tactile information. Likewise, the prefrontal cortex, fundamental for movement planning, also seems involved in this function.

What is workfare?
a program that requires work in exchange for assistance
welfare that is limited to preschool-age children
an early poverty program from the 1950s
a state-by-state grant program of aid to the elderly

Answers

A program that requires work in exchange for assistance

Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option. He’d Like To Influence Customer Consideration, But His Niche Audience Isn’t Covered By An In-Market Audience Segment. Which Two Data Inputs Can Howard Submit To Best Represent His Audience? (Choose Two.)
1. January 28, 2020 Admin0
2. Negative keywords
3. URLs4. Keywords
5. Topics6. Offline conversions

Answers

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer. So, the following are the reason that describe the other options are not appropriate according to the scenario.

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers. What should you do next?

Answers

Answer:

Edit the printer properties there after, configure the device-specific settings.

Explanation: This is done through the following procedure

Open Start ~Settings ~ Printers and Faxes.

Right click printer, select Printing Preferences.

Then change the settings.

hich of the following is a disadvantage of online surveys? They result in high response bias They lead to higher cost per completed interview than other methods. They involve slow data acquisition. They are less convenient for using visual stimuli They require extensive coding after the data is collected.

Answers

Answer:

They result in high nonresponse bias.

Explanation:

The online survey seems to be a survey that can be answered by the intended community across the Web. Internet-based surveys become mainly done with such a database as Web types to preserve the responses as well as analytical tools that deliver analysis.

Although online survey is the examination of anything such as web, tool, software or any popular app, etc, by which they can get that how many and how many peoples using or like those things.

So the following are the reason that the other options are not true according to the given statement.

Why would an administrator lower an RF signal on a wireless access point?
Increase QoS
Lower interference
Lower the signal to keep it in the building
Make it harder for guests to access the network

Answers

1. Increase QoS

Explanation:

The radio bands with lower frequency have relatively large wavelengths that are not as affected by objects such as building, trees, weather events or other features in the troposphere as the higher frequency radiation. General rule for radiation is that the lower the frequency, i.e. the longer the wavelength, the further a signal can penetrate through solid objects or liquids. Hence, when the frequency is lowered on a wireless access point, the signals can travel farther and smoother. Thus, increasing the quality of service.

When trying to remember a list of words, a person may choose a word to which they "hang" their memories on. This type of mnemonic device is called the _____ technique.

Answers

Answer:

Peg

Explanation:

This is known as the "peg technique." The name comes from the fact that we usually employ pegs to hang clothes to dry. In this memory aid, the person who wants to memorize something creates mental associations between two concrete objects. This is done in a one-to-one fashion that links all the words together.

Design a program that lets the user enter the total rainfall for each of 12 months into a list. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.

Answers

Answer:

import java.util.Arrays;

import java.util.Scanner;

public class num12 {

   public static void main(String[] args) {

       double [] rainfall = new double[12];

       Scanner in = new Scanner(System.in);

       System.out.println("Enter the rainfall for the first month");

       rainfall[0]= in.nextDouble();

       for(int i=1; i<rainfall.length-1; i++){

           System.out.println("Enter rainfall for the next month");

           rainfall[i]= in.nextDouble();

       }

       System.out.println("Enter the rainfall for the last month");

       rainfall[11]=in.nextDouble();

       System.out.println(Arrays.toString(rainfall));

       int totalRainfall = 0;

        for(int i=0; i<rainfall.length; i++){

            totalRainfall += rainfall[i];

        }

       System.out.println("Total Rainfall is "+totalRainfall);

       System.out.println("The Average Monthly Rainfall is "+(totalRainfall/12));

       double minRain = rainfall[1];

       int monthLowest =0;

       for(int i =0; i<rainfall.length; i++){

           if(minRain>rainfall[i]){

               minRain = rainfall[i];

               monthLowest =i;

           }

       }

       System.out.println("The Minimum Rainfall is: "+minRain+ " In the "+(monthLowest+1) +" Month");

       double maxRain = rainfall[1];

       int monthHighest =0;

       for(int i =0; i<rainfall.length; i++){

           if(maxRain<rainfall[i]){

               maxRain = rainfall[i];

               monthHighest =i;

           }

       }

       System.out.println("The Maximum Rainfall is: "+maxRain+" In the "+(monthHighest+1)+" Month");

   }

}

Explanation:

Using Java programming Language

An Array is created to hold the list of total monthly rainfall.Scanner is used to prompt user to enter the monthly rainfallUsing a for loop the user is prompted to repetitively enter rainfall for each monthThe list is displayed using Java's Arrays.toString MethodThe total rainfall is created by adding elements at index 0-11 using a for loopThe montly average is calculated by dividing total rainfall by 12 totalRainfall/12Using a combination of  for loops and if statements and creating variables for Min and Max rainfall we determine the maximum and minimum months of rainfall and output them

The _____ is in effect when an interest group tries to mobilize large numbers of constituents to write, phone, or send e-mails and tweets to legislators or the president.

Answers

Answer:

Shotgun Approach

Explanation:

The shotgun approach is used in politics, marketing, and other areas as well.

In marketing, it is an approach to reach large populations or cover a wide area with product or service promotional campaigns.

In politics, however, it is considered more of a brute approach to handle certain issues. A large number of constituents are mobilized to reach the president or higher authorities (legislators) through different means, such as writing, phoning, sending emails or tweeting to emphasize their plight.

This approach is usually used when it is assumed that the legislator or president is not aware of what is going on with that location.

A page break can be prevented from being added before or after a heading by using the keyword _____ in the page-break-before or page-break-after properties.

Answers

Answer:

avoid

Explanation:

Fill in the blank

A page break can be prevented from being added before or after a heading by using the keyword avoid  in the page-break-before or page-break-after properties.

The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same message to arrive out of order.Which field in the IP packet helps computers put the packets in the original order?

Answers

Answer:

The header file

Explanation:

The 'header' of a packet contains two important information about the data being sent over a network,  number indicating the ordering of all the packets (This ensures that the packets are re-ordered corrected upon arrival at the destination). and information about the total number of packets that the data has been split into, this helps at the destination to know if all packets has arrived, or delayed or lost

A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the entire expression is:_____.A. True B. false

Answers

Answer:

A. True

Explanation:

Characteristics of a short - circuit:

C. C++, Java uses short circuit evaluation of logical expressions involving && and ||.Short - circuit evaluation exposes the potential problem of side effects in expressions, e.g.

     (a > b) || (b++ / 3).

Ada: programmer can specify either (short - circuit is specified with and then and or else).

Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A database stores a large amount data in vertical and horizontal .

Answers

Answer:

1: Records

2: tables

Answer:Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A database stores a large amount data in vertical Records and horizontal Tables.

Explanation:

You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits syncing devices over wireless connections or the internet. which connection(s) could you use to perform the synchronization?

Answers

Answer:

USB

Explanation:

WHile trying to sync your mobile device data with your desktop computer, and Trying to avoid syncing your device over wireless connections or the internet, the best possible solution that comes to mind is to make use of USB.

Here you simply connect your phone to a USB cable and plug it to the USB port on your computer, you will be able to carry out the necessary syncing without violating the promotions from your organization concerning syncing devices over wireless connections or the internet.

Explain one way that wartime advances in such areas as computers

Answers

Explanation:

If countries went to war right now, the counties that will be most successful to win are those that have the best technology. However, my answer will not discuss about wars, but will rather discuss how military technologies in the 20th and 21st centuries have caused technological advancements in areas such as computers, medicine, and air travel. Wartime advances brought about the internet that is commonly known as the World Wide Web. We use the internet in our everyday lives to work and co-exist. Without the internet right now, we would not be able to achieve a lot in our lives. Computers during the World War II helped win wars and kick started the modern digital era. The computers have since shrunk in size and are portable enough to fit right into our pockets. Many years later, we use computers a lot for survival. The emergence and discovery of various war craft and jet engines has brought about the planes in the skies above us that helps us travel from point A to B in this modern world.

In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system. Question 1 options: physical process input command

Answers

Answer:

Process

Explanation:

In older systems, the user interface mainly consisted of process-control screens that allowed a user to send commands to the system. These systems were used in a great variety of industries, and it gave the user control over process measurements or process variables. It also allowed the user to view the current state of the process, modify the operation of the process, and perform other related actions.

Falcon Security can obtain the computing resources it needs from​ Amazon, including​ servers, operating​ systems, and a DBMS. If Falcon Security uses this​ option, it is utilizing the​ ________ services.

Answers

Answer:

The correct answer to the given question is "PaaS" .  

Explanation:

The full form of  PaaS is Platform as a service sometimes it is also known as an application platform as a service. The  Platform as a service is under cloud computing. The Platform as a service is under the third-party vendors that provide the client hardware and software resources for developing the application.

With the help of PaaS(Platform as a service ) services, the falcon Security will access Amazon's computing tools like servers, operating systems and DBMS.

Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme.

Answers

Here are two difficulties that I think could arise with a scheme that protects the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself.

What's the issue about?

The operating system would be difficult to update. Any changes to the operating system would require the entire operating system to be copied to a new memory partition. This could be a time-consuming and error-prone process.

The operating system would be vulnerable to hardware failures. If the memory partition containing the operating system were to fail, the entire operating system would be unavailable. This could cause a major disruption to the system.

Learn more about computer

https://brainly.com/question/24540334

#SPJ1

Placing the operating system in a non-modifiable memory partition poses two main challenges: difficulty in applying software updates and complications in system recovery. Both of these issues stem from the inability to modify the protected partition.

Early computers sometimes placed the operating system in a non-modifiable memory partition to protect it from being altered by user jobs or the operating system itself. This approach has notable difficulties:

Software Updates: By placing the OS in a memory partition that cannot be modified, applying updates or patches to address vulnerabilities becomes extremely difficult. This can render the system vulnerable to new threats as patching bugs or upgrading the OS requires access to modify the partition, which is restricted.System Recovery: In the event of an OS malfunction or corruption, restoring the system becomes challenging since the OS partition cannot be modified or rewritten. This may require physical intervention to replace the memory hardware or specialized tools to bypass the protection, leading to longer downtimes and more complex recovery processes.

These issues underline the balance modern operating systems must maintain between protecting their integrity and ensuring they remain flexible enough for updates and recovery.

You wish to use a file system that creates a record or log of to-be-committed changes in the system so that if the system crashes mid-change, it can recover gracefully. To do this, you will need to make use of a(n) ___________ file system.

Answers

Answer:

Journaling file system

Explanation:

A "file system" allows the control of data storage and retrieval.

The "Journaling file system" is a type of file system that records the to-be committed changes in the computer. This can track both of the data stored and the related metadata. This kind of data structure is then referred to as a "journal." So, this means that if the system crashes or a power failure happens, there is a lesser chance for the file system to be corrupted. It can also recover gracefully or even more quickly.

So, this explains the answer.

Final answer:

The correct answer is "journaling"To ensure data integrity and facilitate recovery from crashes, a journaling file system is required. It maintains a log of changes to be applied, allowing for graceful recovery. Additionally, version control is a related technology that manages file changes over time, useful for collaborative projects.

Explanation:

You wish to use a file system that logs changes before they're permanently committed to storage to ensure data integrity and provide a way to recover in case of a system crash. For this requirement, a journaling file system is the ideal solution. Journaling file systems such as EXT3, EXT4, and NTFS, keep a record of changes in a dedicated space known as a journal before they are applied to the main file system. In the event of a system failure during a write operation, the system can consult this journal to determine what changes were in progress at the time of the crash and apply them correctly, preventing data corruption.

Beyond journaling at the file system level, another related concept is version control, which is more specifically focused on managing changes to files over time, particularly for code and document collaboration. Popular version control systems include SVN (Subversion) and CVS (Concurrent Versions System). While a journaling file system protects against data loss from system crashes, version control systems provide a detailed record of edits, changes, and contributions over time, facilitating collaborative work and historical tracking of file changes.

Both journaling file systems and version control systems are essential tools in ensuring data integrity, recovery, and collaborative efficiency in computing environments.

Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? Select one: a. SSN b. ASP c. LAN d. SAN e. Grid

Answers

Answer:

SAN

Explanation:

A Storage Area Network (SAN) is a high-speed sub network of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network.

Yan wants to attract customers specifically searching on Google for Time-B-Gone, his company's unique office-support product. His marketing consultant suggests using Dynamic Search Ads, and knows Yan will need to start with a simple approach. For vendors like Yan, what’s the simplest method for using Dynamic Search Ads? A. Landing pages from standard ad groups.
B. Page feeds.
C. URL filtering.
D. Categories from dynamic search engines.

Answers

Answer:

The answer is "Option A".

Explanation:

The interactive background advertisements, that use advanced internet navigation technology from Google to dynamically resolve specific information demands based on the quality of a network page are also referred to as interactive search ads. This ads are good for tactics, and certain options were incorrect, that can be defined as follows:

In option B, It allows you easily access all other URLs of creative online ads. In option C, It helps regulate operation in a machine. In option D, It grows the internet traffic.

A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers.

Answers

Answer:

Cloud Broker is the correct answer of this question.

Explanation:

A cloud broker is a person or industry government entity acting as an operator between the buyer of a cloud computing service and the buyers of that software

In a cloud broker would be someone who operates as an interpreter during negotiation involving two or more organizations.A cloud broker is a technology platform which utilizes function transmission between multiple third party service suppliers.

The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indicate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?

Answers

Answer:

Drill and Practice

Explanation:

Drill and Practice is a type of Computer-based Instruction (CBI) program. In Drill and Practice, answered questions are given immediate feedback. These problems or exercises are structured and answered on the program to provide instant feedback to the person taking the test.

For instance, when going through an evaluation test but you are required to provide the correct answer before moving on. Once a question is answered, the program will indicate whether correct or wrong, if the question is correct, move to the next question but if wrong you start again. This is a typical example of Drill and practice.

This is exactly what is seen in our scenario in the question.

Daniel joined an outdoor activities club. He has begun to purchase many books about kayaking and rafting. Borders bookstore sends him email promotions focusing on outdoor activities. This is an example of ______ segmentation based on his lifestyle.

Answers

Answer:

Psychographic Segmentation

Explanation:

Psychographic Segmentation is a technique used in grouping or determining a market segment based on personality traits, beliefs, lifestyle choices, interest and other factors. It is a technique used in market Segmentation to determine target customers using psychological traits of individuals lifestyle that determines consumption habits. In this case, because Daniel joined an outdoor activities club and began to purchase books concerning outdoors, borders bookstore uses it as an opportunity to send promotions focusing on outdoor activities influenced by Daniel's lifestyle.

The __________ stage of the data science process helps in exploring and determining patterns from data.

Answers

Answer:

Data Explorations

Explanation:

The stages of a data science project can be summarized into the following

Step 1: Figure out the problem

Step 2: Data collection

Step 3: Process the data for analysis (Cleaning the data)

Step 4: Explore the data (Exploratory Analysis)

Step 5: Perform in-depth analysis

Step 6: Communicate Results

For this question, step 4 is the correct stage for the discovery of hidden patterns in the data. The activities in this stage are basically:

Inspection of data inline with some specific propertiesComputing some descriptive statisticsvisualize the data to observe significant features

If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and store managers to forecast sales and merchandise for the next year, and then transmitted those estimates up the organization to the top level, it would be an example of _____ planning.

Answers

Answer:

It would be an example of bottom-up planning

Explanation:

Bottom-Up Planning is a method of planning that defines objectives and ways to achieve them through the bottom up. It relatively narrows goals that are initially set at the lower levels of the organizational hierarchy. First, relatively close targets at lower levels of the organizational hierarchy are set. They are then gradually integrated into the framework of global goals and global strategy at higher and higher levels. It is therefore a convergent approach.

With bottom-up planning, you give your project deeper focus because you have a larger number of employees involved in the project, each with their own area of expertise. Team members work side-by-side and have input during each stage of the process. Plans are developed at the lowest levels and are then passed on to each next higher level. It then reaches senior management for approval.

Other Questions
The internal telephone numbers in the phone system on a campus consists of 4 digits, with the 1st not equal to 0. How many different numbers can be assigned in this system? A chlorine and bromine atom are adsorbed on a small patch of surface (see sketch at right). This patch is known to contain possible adsorption sites. The and bromine atoms have enough energy to move from site to site, so they could be on any two of them. Suppose the atom desorbs from the surface and drifts away. Calculate the change in entropy. Round your answer to significant digits, and be sure it has the correct unit symbol. Relationship between bronchioles alveoli and blood vessels The height of a rectangular prism is 20cm. It has a surface area of 2400 square centimeters. What are two possible sets of lengths and widths? Find one set of dimensions with l and w equal in length as well as a set dimensions that are not equal Economists were sharply divided over how to best fight the Great Recession. A vocal minority of economists favored the "Structural Solution," arguing that the economy needs to undergo some structural adjustments and that government should, therefore, A. rely on the invisible hand of the market to relocate resources, by letting weak firms die out quickly B. take serious actions to increase the total demand output for the country What is the ability to complete extended periods of physical activity? Imagine that zika virus has a 1% incidence in the population. A test for the virus has a 3% false positive rate and no false negative rate. If someone takes the test and gets a positive result, what is the chance that they are infected? If an athlete expends 3480. kJ/h, how long does she have to play to work off 1.00 lb of body fat? Note that the nutritional calorie (Calorie) is equivalent to 1 kcal, and one pound of body fat is equivalent to about 4.10 103 Calories. Aqueous hydrochloric acid will react with solid sodium hydroxide to produce aqueous sodium chloride and liquid water . Suppose 31.4 g of hydrochloric acid is mixed with 12. g of sodium hydroxide. Calculate the minimum mass of hydrochloric acid that could be left over by the chemical reaction. Be sure your answer has the correct number of significant digits. Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles.Yet, by the time Robert E. Lee surrendered to Ulysses Grant at Appomattox, Virginia, some four years later, about 620,000 soldiers had died on the battlefields, more than American battle deaths in all other wars from the Revolution through the Vietnam War.What is the authors primary purpose for including this detail?A. to inform readers about the differences between three military conflictsB. to persuade readers of the seriousness of the American Civil WarC. to entertain readers with tales from behind the lines of battleD. to encourage readers to visit battlegrounds in Appomattox, Virginia Identify the slope and y-intercept of the line y=5x/3+1. Consider a cylindric container with the radius of circle 50 cm and the length of 3 m. We fill this container with one mole of the oxygen gas O2 at the room temperature 20C. Assume it is an ideal gas. a) What is the density of the gas in the tank? Immigrant couples often abandon Breadwinner/Supportive Spouse strategies in favor of economic interdependence when they arrive in the United States. What is one reason why couples do so? A drawer contains 4 different pairs of gloves. Suppose we choose 3 gloves randomly, what is the probability that there is no matching pair? Ojal que ellos You Answered descubrandescubran (descubrir) nuevas formas de energa. correct Espero que Ana nos You Answered ayudeayude (ayudar) a recoger la basura en la carretera. correct Es una lstima que la gente no You Answered reciclerecicle (reciclar) ms. incorrect Esperamos You Answered proteguesproteguesIncorrect or extra word (proteger) a las tortugas marinas que llegan ASAP ANSWERconsider the painting on silk fabric. reflect on how the production of silk affected china's trade economy. do you think it was positive or negative? explain your answer The statements in the file main.cpp are in incorrect order.Rearrange the statements so that they prompt the user to input:The shape type (rectangle, circle, or cylinder)The appropriate dimension of the shape.Note: For grading purposes place the cylinder height statement before the radius statement.The C++ program then outputs the following information about the shape:For a rectangle, it outputs the area and perimeterFor a circle, it outputs the area and circumferenceFor a cylinder, it outputs the volume and surface area.After rearranging the statements, your program should be properly indented.Here is the code out-of-order:using namespace std;#include int main(){string shape;double height;#include cout > shape;cout Suppose a child drives a bumper car head on into the side rail, which exerts a force of 3400 N on the car for 0.400 s. (Assume the initial velocity is in the positive direction.)(a)What impulse (in kg m/s) is imparted by this force? (Indicate the direction with the sign of your answer.)(b)Find the final velocity (in m/s) of the bumper car if its initial velocity was 3.30 m/s and the car plus driver have a mass of 200 kg. You may neglect friction between the car and floor. (Indicate the direction with the sign of your answer.)Q2: Compare the kinetic energy of a 22,000 kg truck moving at 120 km/h with that of an 82.0 kg astronaut in orbit moving at 28,000 km/h. Consider each of the following possible recovery strategies and discuss the merits and drawback of each one with your classmates, specifically focusing on their appropriateness for limited, average, and substantial budget: Weekly full server backups with daily incremental backups Daily full server backups Daily full server backups with hourly incremental backups Redundant array of independent (or inexpensive) disks (RAID) storage devices with periodic full backups Storage area network (SAN) devices for multiple servers Replicated databases and folders on high-availability alternate servers Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space.What should you check next in Task Manager?