Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)
a. Try an external device before replacing the motherboard.
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.

Answers

Answer 1

Answer: Option(b), (c) and (d) are correct.

Explanation:

According to the question,Sherri should check that process is right for motherboard as incorrect processor may not be able to process instruction and operation successfully and rapidly.

She should also check the warranty of the laptop.If in case , laptop is under warranty then she can get it repaired or replaced as per the policy of laptop company. Tear-down process can be verified so that laptop can be dismantled to investigate the components of processor that is causing issue in processing or other part is responsible for slow execution.Option (a) is incorrect because external devices is attached with motherboard with help of ports and cables.Processor is the actual unit that can cause slow execution and external devices are not responsible for it.Thus, the correct options is option(b),(c) and(d).
Answer 2

Final answer:

Sherri should check if her laptop is still under warranty, ensure she has a compatible processor for her motherboard, and locate a guide for the proper teardown procedure before attempting to replace her laptop's processor.

Explanation:

Sherri should consider several factors before attempting to replace the processor on her laptop to address its slow performance. Firstly, she should verify that the laptop is not under warranty. Tampering with the hardware can void the manufacturer's warranty, and if the laptop is still covered, it might be more beneficial to seek professional repairs.

Secondly, it is essential to make sure you have the correct processor for the motherboard. Not all CPUs are compatible with every motherboard due to socket type, chipset, and power requirements. Lastly, Sherri should determine whether a teardown procedure is available to guide her through disassembling and reassembling her laptop safely.

Missing this step could lead to damage to the laptop components or render it completely inoperable when done incorrectly.


Related Questions

During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.

Answers

Answer:

Tempest

Explanation:

Your environment includes many users who print documents often. A single print device isn't sufficient. You need a "printer pool" to accommodate all the concurrent print jobs. How would you accomplish this advanced printing configuration?

Answers

Answer:

By connecting a printer to many print devices

Explanation:

By connecting one printer to many printer allows all the printers connected to act as one single printer this technique is called "pooling", this helps when the print work is so heavy that one printer can't possibly handle. This feature is available in Windows 7 Operating system and other windows computers, this technique is used when there are many computers in the office and this improves productivity.

One type of CAPTCHA is ________. a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website a password method antivirus software

Answers

password method

Explanation:

Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.

Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.

Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.

One type of CAPTCHA is the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website. Therefore, the correct option is B.

The Completely Automated Public Turing test to tell computers and humans apart is called a CAPTCHA. It serves as a security mechanism to separate legitimate human users from automated bots or dangerous software when they attempt to access a website or perform specific tasks.

A typical CAPTCHA type that asks users to correctly identify and enter displayed characters to confirm their human identity is a wavy, challenging letter and number sequence. It helps protect the integrity and security of online platforms by preventing automated bots from spamming or abusing websites.

Therefore, the correct option is B.

Learn more about CAPTCHA, here:

https://brainly.com/question/30627742

#SPJ6

Your question is incomplete, most probably the complete question is:

One type of CAPTCHA is ________.

a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website a password method antivirus software

_______ is a process that insures that operations meet data validity standards. For instance, information systems that process checking accounts will only allow unique check numbers for each transaction—and reject duplicates.

Answers

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

Which of the following CollegeBoard AP Computer Science Principles Pseudocode commands is used to record something typed by a user of the program so that it can be used in the program?
a. a MOD bb. RANDOM (a, b)c. DISPLAY (expression)d. INPUT ()

Answers

Answer: Option D. INPUT ()

Explanation:

Pseudo code is a simple way of describing a set of instructions that do not have to use specific syntax.

a MOD b : Evaluates to the remainder when a is divided by b. Assumes that a and b are positive integers.

RANDOM(a, b) : Evaluates to a random integer from a to b, including a and b.

DISPLAY (expression):  Displays the value of expression, followed by a space.

INPUT (): Accepts a value from the user and returns it.

Thus, INPUT () is the correct option.

If the name of the input file was in a variable named filename, which of the following is the correct way to open the input stream named inFile and associate it with this file?
a. inFile.open (filename);
b. inFile = filename;
c. inFile = "filename";
d. inFile.open ("filename");

Answers

It would be A - inFile.open(filename)

Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper?A. DTPB. CBTC. Photo editingD. Paint

Answers

Answer:

D. Paint.

Explanation:

Paint is an application used to create digital images and illustrations using tools like the pen, brush and eyedropper. It produces raster or pixel based graphic files. Example of paint application is Sketch.

Photo editing applications are used to modify the qualities of picture files imported from digital cameras. Example of photo editing software is the Photoshop application. Photoshop is a photo editing tool but also has provision for drawing images and illustrations, and is also used to animation.

Which of the following forms of wireless security is easily cracked?
a. WEP
b. WPA
c. WPA2
d. IPsec

Answers

Answer:

The answer is "Option a".

Explanation:

The full of WEP is "wired equivalent privacy", which is available on an IEEE network project 802.11b, that allows you to provide security and privacy in the Local wireless networks, but it is easy to crack, WEP because it only protects the wireless network against ordinary users, and other options were not correct, that can be described as follows:

In option b, It is used for data encryption which is better than WEP security, that's why it is not correct.In option c, It is an upgraded version of WPA, that's why it is not correct. In option d, It is a security service, which is used in communication, that's why it is not correct.

__________ is a character encoding system that can range from 7 to 32 bits which represent text and symbols used in a wide variety of languages worldwide.

Answers

Answer:

Unicode is the correct answer for the above question.

Explanation:

Unicode is a code that can be 7 to 32-bit code and form for personal use for the computer system. This is used for the decomposition and normalization and some times it is also used for encryption technology. One example of Unicode is ASCII code. The above question asked about that code which is used for character coding and can be used in 7 to 32 bits. then the answer is Unicode.

Answer:

its A

Explanation:

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be: a. Keywords b. Options c. Arguments d. Metacharacters

Answers

Answer:

Option B i.e., Options is the correct option.

Explanation:

While the user using a dash(-) operator in command line terminal with any particular letter that starts with the dash operator then some commands will appear after the command name that considered to be options. Command Line terminal uses a dash operator for only some specific letters and it will not use with all the commands.

What feature of an IDE can help you enter a method by displaying a list of methods that are available from an object or class? Select one:

a. the code completion feature
b. the automatic compilation feature
c. the syntax detection feature
d. the bytecode integration feature

Answers

Answer:

A. The code completion feature.

Explanation:

Java is a high level programming language, used by programmers as a scripting language to program the interactivity of native applications, web applications etc. It is in fact a general purpose, object oriented and class based language.

The Netbean is an IDE used to write and compile java codes to bytecodes. It has a feature for writing the java code at ease, that can help enter a line of code from a list of drop-down related menus, called the code completion feature.

The ______ element, a Hypertext Markup Language (HTML) metadata element, contains a collection of metadata elements that describe the document of provide instructions to the browser.a. Head
b. HTML
c. Body
d. List

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The head tag is used to give the title of the website which describes the website which is opened by the web browser. The metadata refers to the concept of data about data means when there is data that describes the other data then that is known as metadata. The head tag also used to define the data of that website because the title is used to define the project in one tag and the head tag defines the tile which can be called metadata of the website.

The above question asked about the HTML element which is a metadata for the website. So the answer is head which is defined above and it is stated from the option a. Hence the option a is the correct answer for the above question while the other is not because--

Option b states about the HTML, which is the collection of all the data of the website.Option c states about the body, which is defined as the main data of the website.Option d states about the list which is not the correct answer for the above question.

Which of the following statements are true? Select all that apply.A. Since ObjectInputStream/ObjectOutputStream contains all the functions of DataInputStream/DataOutputStream, you can replace DataInputStream/DataOutputStream completely by ObjectInputStream/ObjectOutputStream. B. If all the elements in an array is serializable, the array is serializable too. C. To write an object, the object must be serializable. D. ObjectInputStream/ObjectOutputStream enables you to perform I/O for objects in addition for primitive type values and strings. E. The Serializable interface does not contain any methods. So it is a marker interface.

Answers

Answer:

Correct options are A, B, D, E

Explanation:

For option A, D, E:

reference :Book: Object Oriented Programming with Java

chapter 5 and section 5.4 Object I/O

for option 'C' it incorrect statement because to write an object it is not necessary to be serialize.

for option B it is correct because if all attributes of array having type T then we can say array is of type T implying the same statement for serialization.

The term language can be defined as: Gestures, signs, objects, signals, and words that help people understand the world. A symbolic system through which people communicate and through which culture is transmitted. The exchange of gestures and signals for the purpose of reaching a consensus. Communication grounded in ideals, norms, and values.

Answers

Answer:

The correct answer is: "A symbolic system through which people communicate and through which culture is trasmitted".

Explanation:

To define the concept "language" is a hard task and yet nowadays language philosophers and scientists, such as professors and researchers, have been in a great deal to define this concept, including well known philosophers like Michel Foucault, Noam Chomsky, Mikhail Bakhtin, Ferdinand de Saussure, and others. According to them, the main conceptualization is that language is everything and everywhere, all comes to life and shape by letters, sounds, words, sentences, texts, and, therefore, are only real because language exists. However, there are a lot of other definitions for the concept, and here it is not the time to assess which one is true or not, important or not, or even radical or not, rather it is necessary to highlight that the commonest idea about language is expressed in the second option of the question: "A symbolic system through which people communicate and through which culture is transmitted". All the other options may present a simple idea concerning language's features, but they are not the best option to define the concept, which is much more complex and must be necessarily concerned to the production of culture.

(ps: mark as brainliest, please?!)

Answer:

(A)symbolic system through which people communicate and through which culture is trasmitted

Explanation:

[Sebesta01] According to the author. Consider the list of potential benefits of studying concepts of programming languages. One of the benefits would be argued as follows:Many professional programmers have had little formal education in computer science; rather, they have developed their programming skills independently or through in- house training programs. Such training programs often limit instruction to one or two languages that are directly relevant to the current projects of the organization. Many other programmers received their formal training years ago. The languages they learned then are no longer used, and many features now available in programming languages were not widely known at the time. The result is that many programmers, when given a choice of languages for a new project, use the language with which they are most familiar, even if it is poorly suited for the project at hand. If these programmers were familiar with a wider range of languages and language constructs, they would be better able to choose the language with the features that best address the problem.This is an example of ____.

Answers

Answer:

Improved background for choosing appropriate languages

Explanation:

Based on the information provided within the question it can be said that this is an example of Improved background for choosing appropriate languages. Meaning that the an computer programmer that has learned many languages and gained the ability to choose the appropriate language for each situation is of much greater use to companies because of their increased efficiency.

What is a central location that houses Joint Information System (JIS) operations and where public information staff perform public affairs functions.

A. Incident Command Post
B. MAC Group
C. Joint Information Center (JIC)
D. Emergency Operations Center

Answers

Answer:

The correct answer to the following question will be Option C (Joint Information Center (JIC)).

Explanation:

The center formed as the main point of contact for corporate media and partners to organize emergency reporting efforts at the site of the event.Public knowledge officers from all federal, state and local departments participating at the JIC will centrally manage.It is a convenient location which houses operations of the Joint Information System and where government information workers perform functions of public affairs.

There other three options are not related to the JIS. Therefore, JIC is the right answer.

Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex: 101 133 Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.

Answers

Answer:

srand(time(NULL));   //using srand once

cout<< (rand()%50)+100;   // first random number

cout<<endl;      //new line

cout<< (rand()%50)+100;   //second random number

Explanation:

The srand function in C++ seeds the rand function. It means that the srand function provides rand function with a number which is used by the random function to generate random numbers.

Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the power.True / False.

Answers

Answer:

False

Explanation:

It is of importance to note that a Random-access memory is a form of computer memory that can be read and changed in any order , in other words, modified, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

Windows Hello supports multiple biometric authentication methods, including facial recognition. The failsafe method to authenticate in case the facial recognition method is unavailable is ___.

a. fingerprint sensor
b. retina scanner
c. PIN
d. Microsoft Passport

Answers

Answer:

The correct answer to the following question will be Option C (PIN).

Explanation:

The PIN is the failsafe system to authenticate in case the identification software is not available. This is a numeric password used only to authenticate a user who has access to the system.

The other three choices aren't in the right answer because they have not been authenticated if image recognition or any other identifying software is unavailable.

Therefore, Option C is the right answer.

What will be the value of ans after the following code has been executed?
int ans = 10;
int x = 65;
int y = 55;
if (x >= y)
ans = x + y;
A) 10
B) 120
C) 100
D) No value, there is a syntax error.

Answers

Answer:

Option B 120

Explanation:

There are three variables, ans, x and y given in the code. In beginning, the variable. ans, holds value of 10.  And variable x and y hold value of 65 and 55, respectively. Since the value held by x is bigger than one held by y, the if condition is met and the statement ans = x + y will run. The execution of this statement will total x with y -> 65 + 55 and the initial value of ans is overwritten by the addition result which is 120.

Answer:

B) 120

Explanation:

In the first three lines of the code, three variables ans, x and y have been declared and initialized;

=> ans = 10;

=> x = 65;

=> y = 55;

On the fourth line and fifth line of the code, there is an if block statement that will get executed if the value of x is greater than or equal to that of y;

i.e

     if (x >= y)

       ans = x + y;

And since x = 65 and y = 55, it implies that x is greater than or equal to y.

Therefore the fifth line of the code will be executed

=> ans = x + y

=> ans = 65 + 55

=> ans = 120

Note:

Though the value of variable ans was initially 10 before the execution of the if statement, its new value 120 will replace the former value.

Therefore the value of ans after the code has been executed is 120

The feature that moves text from the right edge of a paragraph to the beginning of the next line as necessary to fit within the margins.

Answers

Answer:

Return Key (Enter Key on Windows)

Explanation:

It is a key on the keyboard that has a downward arrow with corner leftward, it can be used to start a new line of writing.

Which of the following statements is true?A. Smart-phones do not contain a CPU.B. All cell-phones are smart phones.C. Smart-phones are considered a type of computer.D. Smart-phones have generally less computing power then desktop computers.

Answers

Answer:

The answer is "Option C".

Explanation:  

Smartphone normally provides a touch screen interface, which used in phones and tablets, that displays and inserts data on the seen. Nowadays laptops and smartphones are much more comparable to traditional computers on the desktop, In the given question except option c, all option are wrong that can be described as follows:

In option A, It is not correct because all the smart-phones contain CPU which is known as the processor. In option B, It is not correct because the cell phone is normally used for call purposes only. In option D, It is not correct because both computers and smartphones have the same computing power.

 

Final answer:

The true statement among the options provided is that smartphones are indeed considered a type of computer

(option C), as they combine multiple communication and computing functions and have a CPU, allowing them to run a variety of applications.

Explanation:

Among the given statements about smartphones, the correct one is that smartphones are considered a type of computer. Smartphones are essentially pocket-sized mobile devices that combine voice, text, and computing functions, equipped to access the Internet and run a variety of applications. These devices contain CPUs (Central Processing Units), which are integral to their ability to run software and process information. Smartphones have revolutionized the way we communicate and access information. They allow users to perform many functions such as calculations, phone calls, taking pictures and videos, sending emails, and text messaging. Moreover, they can run applications similar to a personal computer, making them invaluable tools for connecting people in various settings, including developing countries where they might serve as the primary means of accessing the Internet.

Green field county stadium is planning to conduct a circket match between two teams A and B. A large crowd is expected in the stadium as 10000 tickets have already been sold. To fulfill the views requriments the match administrator are willing to install large display screens inside the stadium which should display the match live through several cameras installed on different angles in the stadium. What is transmission modes?

Answers

Answer:

there are multiple, but it could be wireless transmission. There is no spercific anwser unless there are choices.

Explanation:

this is because almost any trassmition mode would work, either wired or wireless. Wireless transmission is better since the problem states that there are several camaras.

Swee Yin's fashion-apparel department store runs a popular biannual sale on men's hats, with large discounts and surprise bonus items. She wants to tailor her Google Search campaign to highlight this sale. How can Google Search campaigns be tailored to promote her company's sales event?

Answers

Answer:

By designing a fresh ad group for the particular sale

By setting time the campaign starts and finishes

Explanation:

Creating an ad group is necessary to make Swee Yin's products appear on search results when users search for related items on Google search engine, this will promote Swee Yin's sale event even though a payment will be made to that effect to run the google ad campaign and setting the start and end date of the campaign is necessary because you will not need your ad still displaying when the sale event is over.

A constructor is a method that
Select one:
A. removes the object from memory.
B. returns an object of the class.
C. never receives any arguments.
D. performs initialization or setup operations.

Answers

Answer:

A constructor is a method that performs initialization or setup operations.

Explanation:

A constructor is a special method that is immediately called just after a memory space as been allocated to an object or when an instance of the class is created.

Constructors perform initialization or setup operations, such as assigning initial values to instance Variables. They are called "constructors" because they assist in constructing an object even though they actually don't construct the object.

Final answer:

A constructor is a method in object-oriented programming that initializes an object's state or performs setup operations. It is defined within a class and typically has the same name as the class.

Explanation:

A constructor is a special method in object-oriented programming that is used to initialize an object's state or perform setup operations when the object is created. It is typically defined within a class and has the same name as the class. Constructors can take arguments or parameters, allowing for customization and initialization of objects based on specific values.

For example, let's consider a class called 'Car' in a car dealership system. The constructor of the 'Car' class could be used to set initial values for properties such as 'make', 'model', 'year', and 'mileage' when a new 'Car' object is created.

Learn more about Constructors here:

https://brainly.com/question/33443436

#SPJ6

Computers and communication systems use _____ to represent information between computers and network systems.

Answers

Answer:

Data Code

Explanation:

In Data Communication, Data and Information are being assigned binary code in a digital system. This process is known as encoding system. This binary code helps computer of different architecture communicate with one another.

Data code is an encoding system for data in a computer. For text encoding we have ASCII, 7-bit ASCII, EBCDIC and Unicode. For non-text encoding, we have MIME, BinHex, Codec, etc. For video encoding, we have MPEG, YUV, YCbCr, chroma, e.t.c.

Computers and communication systems use **binary code** to represent information between computers and network systems. Binary code consists of two symbols, typically 0 and 1, which are used to encode data. This binary representation is fundamental for digital computing and communication, enabling the processing, storage, and transmission of information.

Computers and communication systems use **binary code** to represent information between computers and network systems. Binary code is a system of representing text or computer processor instructions using the binary number system's two binary digits, 0 and 1. This system forms the basis of all modern computing processes.

In binary code, each digit is referred to as a bit. These bits are grouped together to form bytes, typically consisting of eight bits. Bytes can represent a wide variety of data types, including characters, integers, and more complex data structures.

The primary advantage of binary code is its simplicity. Digital systems only need to distinguish between two states, which can be easily represented by electrical signals (on/off, high/low voltage). This reduces the complexity and cost of hardware.

Additionally, binary code enables reliable error detection and correction. Techniques such as parity checks and cyclic redundancy checks (CRC) ensure data integrity during transmission across networks. This binary representation is fundamental for digital computing and communication, enabling efficient processing, storage, and transmission of information across various platforms and devices.

Given a floating-point variable fraction, write a statement that writes the value of fraction to standard output. Do not write anything else to standard output -- just the value of fraction.

Answers

Answer:

The statement to this question is "cout << fraction;".

Explanation:

In the given question it is declared, that a floating-point variable "fraction" is defined, which holds some value. To print this variable value in C++ program we use the print function, which is "cout". This function also used to print messages and values, in this question the print function uses the float variable "fraction", which prints variable value.

Suppose TestSimpleCircle and SimpleCircle in Listing 9.1 are in two separate files named TestSimpleCircle.java and SimpleCircle.java, respectively. What is the outcome of compiling TestsimpleCircle.java and then SimpleCircle.java?

Answers

Answer:

Both will compile without any error

Explanation:

Since there was nothing to note we assume that they have no errors in them, we compile each java file by typing javac "name of file.java", javac TestsimpleCircle.java in the case of TestsimpleCircle file, and later go on to type java TestsimpleCircle to see the output. Java files can be compiled either in the console (as done above) or in the development environment like Netbeans where you click the run button and it compiles and run the program for you.

A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools such as charts, color-coding, and formulas is called:________.

Answers

Answer:

Quick analysis tool.

Explanation:

Excel is a spreadsheet application package found in the Microsoft office suite. it's environment on the display screen is called a worksheet and a collection of the worksheets is called a workbook. The excel packet is used for data analysis and interpretation and presentation.

When a group of cells in a worksheet is selected, a small tool kit appears that the lower right corner, it is known as a quick analysis tool. It is use for easy and fast analysis and formatting of that selected group.

Answer:

Quick analysis tool

Explanation:

In Excel, once you have selected the cells or range of cells containing some data to analyze, a button called the Quick analysis tool appears just at the lower right corner of the selected range. When a user clicks this button, they can analyze the selected data by using some options such as totals, charts, formatting, color-coding, formulas, tables and so on.

Besides the popular, comprehensive programming languages such as Java and C++, many programmersuse scripting languages such as Python, Lua, Perl, and PHP. A) FalseB) True

Answers

Answer:

True is the correct answer for the above question.

Explanation:

The peoples are using many popular languages generally like java and c++ for desktop application but some scripting language is also used for the websites. If any user wants to develop any websites then he can do this with the help of scripting language only because the scripting language is only a language that is used to do programming in website projects. There are two types of scripting language- client-side and server-side.The above-question states that both types of language are used to develop the project scripting language and comprehensive language which is correct as defined above.

Answer:

B) True

Explanation:

This is correct:

Whilst Java has 9 million programmers and somewhere near 4 million C++ coders, there are a very large number of people who perfer Python, lua, perl, etc.

8.2 million official developers in the world who code using PythonSomewhere near 5 million official developers in the world use Lua/RBX Lua3 BILLION unofficial developers have used Perl.PHP is used by 78.9% of all websites with a known server-side programming language. So 7.89 out of every 10 websites that you visit on the Internet are using PHP in some form.

You get the point.

Other Questions
Under the New Jersey Temporary Disability Law, a "covered individual" is any person who has been out of work for less than 2 weeks or who is employed by a:________. 12. Why aren't reforms likely to be made to the presidential nominating process? When the spring, with the attached 275.0 g mass, is displaced from its new equilibrium position, it undergoes SHM. Calculate the period of oscillation, T , neglecting the mass of the spring itself. This organ is surrounded by a series of tubes that are used for the transport of oxygen. What do we normally call these "transport tubes"? sharon is planning a cookout for 42 people. each guest will get 1 veggie burger. sharona will put one slice of cheese on half of the burgers. cheese slices come in packs of 8. write and solve an equation to find the number of packs of cheese, p, that sharon needs to buy. Question 9/10Which of the following statements about check cashingcompanies is TRUE?They charge high fees.They have limited operating hours during the day.They delay when you can access your cash.They sometimes offer free services, Which of the following should an endurance athlete consume 2-4 hours before exercising to ensure adequate stores of muscle glycogen? a. Baked potatob. Oatmeal cookiec. Avocadod. Spinach Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?A. Spyware applicationsB. Computer wormsC. Computer virusesD. Freeware applications What cellular structure is directly involved in converting the "message" found in a nucleic acid into a specific sequence of amino acids to make a protein. Read the passage below and answer the question that follows.The state of Hawaii became the 50th state of the United States of America in 1959. Hawaii is the southernmost state of the United States. The state of Hawaii is made up of eight main islands and hundreds of smaller islands. All of the Hawaiian Islands were formed by volcanoes. Hawaii earns most of its money through tourists visiting the islands. Hawaii also makes money from its food exports of coffee, pineapple, and sugar cane.Which of the following inferences can be drawn from this passage?a. Hawaii makes more money than the state of Texas.b. Hawaii is located further south than Texas.c. Hawaii is more beautiful than Texas. What do osmosis, diffusion, filtration, and the movement of ions away from like charge all have in common? In what way do they differ? Use the quadratic formula to solve the equation. If necessary, round to the nearest hundredth. x2 6 = x A. x = 2, 3 B. x = 2, 3 C. x = 2, 3 D. x = 2, 3. The quota system of the early 1900's limited ____________ from each country into the United States. A. The number of imports b. The amount of currency c. The amount of natural resources d. The number of immigrants Please select the best answer from the choices provided A B C D The following transactions occurred during 2014. Assume that depreciation of 10% per year is charged on all machinery and 5% per year on buildings, on a straight-line basis, with no estimated salvage value. Depreciation is charged for a full year on all fixed assets acquired during the year, and no depreciation is charged on fixed assets disposed of during the year. Jan. 30 A building that cost $132,000 in 1997 is torn down to make room for a new building. The wrecking contractor was paid $5,100 and was permitted to keep all materials salvaged. Mar. 10 Machinery that was purchased in 2007 for $16,000 is sold for $2,900 cash, f.o.b. purchaser's plant. Freight of $300 is paid on the sale of this machinery. Mar. 20 A gear breaks on a machine that cost $9,000 in 2009. The gear is replaced at a cost of $2,000. The replacement does not extend the useful life of the machine but does make the machine more efficient May 18 A special base installed for a machine in 2008 when the machine was purchased has to be replaced at a cost of $5,500 because of defective workmanship on the original base. The cost of the machinery was $14,200 in 2008. The cost of the base was $3,500, and this amount was charged to the Machinery account in 2008. June 23 One of the buildings is repainted at a cost of $6,900. It had not been painted since it was constructed in 2010. Instructions Round to the nearest dollar.) Prepare general journal entries for the transactions. pls help me asapmy teacher asked- Which writing strategies have you found most effective and how will you employ these in your own writing?I have no idea what writing strategies are pls help and let me know what they are A small company manufactures a certain product. Variable costs are $20 per unit and fixed costs are $10,875. The price-demand relationship for this product is P= -0.25D + 250, where P is the unit sales price of the product and D is the annual demand. Use the data (and helpful hints) that follow to work out answers.- Total cost = Fixed cost + Variable Cost- Revenue = Demand X Price- Profit = Revenue - Total CostSet up your graph with dollars on the y axis (between 0 and $70,000) and, on the x axis, demand D: (units produced or sold), between 0 and 1000 units.a) Develop the equations for total cost and total revenue.b) Find the breakeven quantity (in terms of profit and loss) for the product.c) Find the profit that the company would obtain by maximizing it's total revenue and neatly graph the solutions Masses are stacked on top of the block until the top of the block is level with the waterline. This requires 20 g of mass. What is the mass of the wooden block What is the distance ? consider the following quadratic function f(x)= -2x^2+12x+32=0 select all the statements that are true for the function When coding the phrase bilateral multiple perforations of the tympanic the term to reference in the index is membrane true or false Steam Workshop Downloader