1. In the OPT page-replacement algorithm, the reference bits of all the pages in memory have to be reset every clock interrupt.
True or False

Answers

Answer 1

The statement is false because the OPT page-replacement algorithm, the reference bits of all the pages in memory do not have to be reset every clock interrupt.

The OPT algorithm selects the page that will not be used for the longest period of time in the future, based on future memory references. It is not dependent on the current reference bit of the page. Therefore, there is no need to reset the reference bits of all pages in memory.

In fact, the OPT algorithm does not use the reference bits at all. Instead, it requires a prediction of future memory references, which may not be practical in many cases.

Learn more about algorithm https://brainly.com/question/28724722

#SPJ11


Related Questions

HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
The author uses the text structure of ____

a. problem and solution

b. cause and effect

c.compare and contrast

d.sequence of events

to show that _____

a.navigators

b.muliple signals

c. electromagnetic traps

d. quartx crystal oscillators

Answers

The author uses the text structure of compare and contrast to show multiple signals.

What is Text structures?

This is a term that connote the method used by authors to put together information in text.

Note that in the case above, The author uses the text structure of compare and contrast to show multiple signals.

Learn more about text structure from

https://brainly.com/question/12053427

#SPJ1

If a user has a low level of digital literacy, what might they have trouble interpreting?

Answers

If a user has a low level of digital literacy,  they might have trouble interpreting:

Calls to action IconsDesign patterns

What is digital literacy?

Digital literacy  can be regarded as the  an individual's ability in finding the evaluation, and communication of  information through typing and other media on various digital platforms.

It can be evaluated with  individual's grammar as well as the composition and  typing skills and ability to produce text, with technology.

It should be noted that If a user has a low level of digital literacy,  they might have trouble interpreting Calls to action and  Icons and Design patterns.

Learn more aboutdigital literacy at:

https://brainly.com/question/14242512

#SPJ1

COMPLETE QUESTION:

If a user has a low level of digital literacy, what might they have trouble interpreting? Select all that apply.

a. Calls to action

b. Words

c. Icons

d. Design patterns

According to repko and szostak, what is the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline?

Answers

According to repko and szostak,  the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline is option D- Cognitive Discord.

What is the relationship between interdisciplinarity and the disciplines?

Based on the words of Quoting Jantsch, “Interdisciplinarity is known to be a well used axiomatics for a set of disciplines is seen at a higher level and  this concept is one that can be used to co-ordinate or handle the disciplines.”

Note that Mono or multi - interdisciplinarity is one that is aim at role or duties concerning one or a lot of concrete cases.

Hence, According to repko and szostak,  the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline is option D- Cognitive Discord.

Learn more about disagreement from

https://brainly.com/question/955691

#SPJ1

See options below

A- Metanarrative

B- Perspective taking

C- Epistemic norms of a discipline

D- Cognitive Discord

In fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

Answers

The logging system which has replaced the journaling database system for use in recording messages that are normally stored within the boot.log is Journald.

What is Journald?

Journald refers to a logging system service which allows for messages to be stored and does so in an easier way so that system administrators can find relevant and interesting information when they look through log messages.

In the past, these messages that Journald now stores would have been stored in boot.log, messages, and syslog files but thanks to Journald using the special file format which is made especially for log messages, this has changed.

Find out more on log messages at https://brainly.com/question/4595770?referrer=searchResults

#SPJ1

Create a round object to hang in your window that will touch the midpoints of all four edges of your window

Answers

The round object that can touch the midpoints of all four edges of a window is illustrated by a circle with dimensions.(x-h)² + (y-k)² = r².

What is a midpoint?

It should be noted that a midpoint is a point that is lying between two points and is in the middle of the line joining the two points.

Based on the information given, the center is (h,k) and tthe radius = r.

Top of the circle = (h,r+k) = midpoint of the window's top

The circle's bottom = (h,k-r)=midpoint of the window bottom

The left edge of the circle = (h-r, k)=midpoint of the window's left side

The right edge of the circle = (h+r, k)= midpoint of the window's right side

The window square is illustrated as 2r by 2r and its vertices are (h-r, r+k), (h+r, r+k), (h-r, r-k),  (h+r, r-k).

Learn more about midpoint on:

https://brainly.com/question/5566419

#SPJ1

To create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes/No. Which criterion should Jorge use in the query for the Perennial field

Answers

The criterion that Jorge should use in the query for the Perennial field is Yes

What is a Datasheet?

This refers to the document that summarizes the product specifications and other necessary details of the project.

Hence, we can see that Jorge has created a database for the herb garden he is planting this spring.

The fields in the database include Plant Name, When to Plant, Amount of Sun, Annual, and Perennial.

Therefore, the criterion that Jorge should use in the query for the Perennial field is Yes

Read more about datasheets here:

https://brainly.com/question/27362402

#SPJ1

In the case above, to create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes.

What means datasheet?

A datasheet is known to be a kind of a document that is known to be often printed or electronic that gives a kind of a details in regards to a product, such as a computer, computer component, and others.

Note that  the datasheet is made up information that can be used to be able to make a buying decision about a product or services by giving technical specifications in regards to the product.

Hence the response is yes, In the case above, to create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes.

See full question below

Jorge has created a database for the herb garden he is planting this spring. Fields in the database include: Plant Name, When to Plant, Amount of Sun, Annual, and Perennial. He needs to answer the following questions using his database.Which plants need full sun?Which plants are Perennials? To create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes/No. Which criterion should Jorge use in the query for the Perennial field?

Learn more about Perennial field from

https://brainly.com/question/9465492

#SPJ1

The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer. a digital spirometer b wet spirometer c both digital and wet spirometers d it can not be measured directly

Answers

The residual volume can not be measured directly.

How is residual volume measured?

Residual volume is known to be measured by what we call a gas dilution test.

Note that this test often  measures how the concentration of the gases in the container changes.

What is residual volume?

This is known to be the Volume of air that is left over after a FORCED EXPIRATION. Note that it is one that cannot be measured by a spirometer.

Hence, The residual volume can not be measured directly.

Learn more about residual volume from

https://brainly.com/question/12897209

#SPJ1

_______________ is a technology system requiring the driver to maintain constant control of the vehicle.

Answers

The technology system requiring the driver to maintain constant control of the vehicle are:

 Forward collision avoidance Automatic emergency braking Lane keeping assist

What is technology?

Technology can be regarded as the application of science to bring improvement to mankind at large.

It should be noted that The technology system requiring the driver to maintain constant control of the vehicle includes  Forward collision avoidance as well as Automatic emergency braking and Lane keeping assist .

Learn more about technology  on:

https://brainly.com/question/25110079

#SPJ1

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem

Answers

The best  action to troubleshoot the problem is Airplane mode has been set on the tablet.

What does airplane mode do?

Airplane mode is known as “flight mode” as it is said to be a setting that can be seen on a  smartphone that temporarily hinders signals and Wi-Fi.

Note that The best  action to troubleshoot the problem is Airplane mode has been set on the tablet.

See options below

Which of the following is the MOST likely cause of this issue?

MAC filtering has been enabled on the branch office wireless access point.

Joe's tablet has been configured with full device encryption.

Airplane mode has been set on the tablet.

The connection between the branch office router and internet service provider is down.

Learn more about troubleshoot from

https://brainly.com/question/1382377

#SPJ1

what is the internet​

Answers

♨ANSWER♥

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer

...hope this helps...

_♡_mashi_♡_

The internet is a worldwide computer network that transmits a variety of data and media across interconnected devices. It works by using a packet routing network that follows Internet Protocol (IP) and Transport Control Protocol (TCP).

A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

Question 5 options: The description of ________ can be given by a lexical specification, which is usually separate from the syntactic description of the language

Answers

The description of LEXEMES can be given by a lexical specification, which is usually separate from the syntactic description of the language.

What is  syntactic structure of language?

Syntactic structure is known to be a form of an alphabet that are known to be legal characters.

Note that The description of LEXEMES can be given by a lexical specification, which is usually separate from the syntactic description of the language.

Learn more about LEXEMES  from

https://brainly.com/question/14125370

#SPJ1

Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirements, ethical considerations, and the digital sources you will be investigating in hopes of recovering data and collecting evidence to determine who was responsible for the data exfiltration.


For all assignments, remember the following important elements:

Proofread for spelling, grammar, and punctuation.
You may respond in bullet form for this project, but use standard written English. Do not use texting abbreviations or other similar shortcuts.

Answers

The steps you will take to obtain digital evidence.

One has to Respond First. Then a Search and Seizure is ordered.There is the Evidence Collection. There is the Securing of the Evidence. There is Data Acquisition stage.Then there is Data Analysis. Then there is Evidence Assessment. Then there is  Documentation and Reporting.The last is expert witness testimony.What is Digital evidence?

Digital evidence is known to be a kind of information that is often saved or transmitted in a method that uses binary form that can be relied on in case of court.

Note that it is one that can be found on a computer hard drive, a mobile device such as phone, among other means.

Hence, The steps you will take to obtain digital evidence.

One has to Respond First. Then a Search and Seizure is ordered.There is the Evidence Collection. There is the Securing of the Evidence. There is Data Acquisition stage.Then there is Data Analysis. Then there is Evidence Assessment. Then there is  Documentation and Reporting.The last is expert witness testimony.

Learn more about digital evidence from

https://brainly.com/question/18566188

#SPJ1

This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a spinner with a given number of sectors, all equal in size. the gamespinner class supports the following behaviors.

creating a new spinner with a specified number of sectors
spinning a spinner and reporting the result
reporting the length of the current run, the number of consecutive spins that are the same as the most recent spin

write the complete gamespinner class. your implementation must meet all specifications and conform to the example.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  generate random numbers in a game

Writting the code in JAVA:

public class GameSpinner {

int spinner;

int num;

int current;

public GameSpinner(int spinner) {

super();

this.spinner = spinner;

this.current = 0;

this.num = 0;

}

public int spin() {

int curr = 1 + (int) (Math.random() * spinner);

if (this.current == 0 || this.num == 0) {

this.current = 1;

this.num = curr;

return curr;

}

if (this.num == curr) {

this.current = this.current + 1;

return curr;

} else {

this.num = curr;

this.current = 1;

return curr;

}

}

public int currentRun() {

return this.current;

}

}

GameSpinnerTest.java

public class GameSpinnerTest {

public static void main(String[] args) {

// TODO Auto-generated method stub

GameSpinner g = new GameSpinner(4);

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

}

}

Output

g.currentRun() : 0

g.spin() : 1

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 2

g.spin() : 3

g.currentRun() : 1

g.spin() : 3

g.spin() : 2

g.spin() : 2

g.currentRun() : 2

See more about JAVA at brainly.com/question/12975450

#SPJ1

Developers found a "time of check to time of use" (TOCTTOU) vulnerability in their application. The vulnerability made it possible to change temporary data created within the app before the app uses the data later. This vulnerability is taking advantage of what process in the application?

Answers

This vulnerability above is taking advantage of the race condition process in the application.

What is race condition?

This race condition is said to be in the critical section or one that is a part of the program and it is a place where shared memory is accessed and it is concurrently worked on or executed by two or more threads.

Hence,  This vulnerability above is taking advantage of the race condition process in the application.

Learn more about race condition from

https://brainly.com/question/13445523

#SPJ2

One difference between a switch and a router is that a router will only process messages addressed to the router (at layer 2), while a switch processes all messages.

Answers

Answer: True

Explanation:

Class ____________ allow you to create one version of a class, without having to replicate code to handle multiple data types.

Answers

Class templates allow you to create one version of a class, without having to replicate code to handle multiple data types.

Answer:

Class templates allow you to create one version of a class, without having to replicate code to handle multiple data types.

Explanation:

A template is a general and already formatted standard that many people can use and customize on their own. For example, a PowerPoint template already has the font size, font, and background already picked, and you can put what you want on it.

Write a python program that prompts the user to enter 20 numbers, and then calculates and displays the sum of the positive ones.

Coding Assignment

Answers

123456789101112131415161818102

Explanation:

h

The Python program that prompts the user to enter 20 numbers and calculates the sum of the positive ones is given below.

We have,

The Python program that prompts the user to enter 20 numbers and calculates the sum of the positive ones:

def main():

   num_count = 20

   positive_sum = 0

   for i in range(num_count):

       try:

           num = float(input(f"Enter number {i+1}: "))

           if num > 0:

               positive_sum += num

       except ValueError:

           print("Invalid input! Please enter a valid number.")

   print("Sum of positive numbers:", positive_sum)

if __name__ == "__main__":

   main()

In this program, we define a function main() that runs the main logic.

It uses a for loop to prompt the user to enter 20 numbers.

Each input is converted to a floating-point number using float(), and if the number is positive (greater than 0), it adds it to the positive_sum variable.

The program then prints the sum of the positive numbers after all inputs are processed.

Thus,

The Python program is given above.

Learn more about Python programs here:

https://brainly.com/question/32674011

#SPJ3

In the formula =VLOOKUP(“shovel”, B2:D12, 3, FALSE), which part is the lookup value parameter?

A.
shovel

B.
FALSE

C.
B2:D12

D.
3

Answers

In the formula =VLOOKUP(“shovel”, B2:D12, 3, FALSE), the part that is the lookup value parameter is B2:D12.

What are the parameters in VLOOKUP?

The VLOOKUP is known to often have four arguments:

lookup_value, table_array, column_index_num, range_lookup

This value is known to be a LOOKUP searches which is in an array. The lookup_value argument is one that be seen to be a  number, text, a logical value.

Note that If LOOKUP is one that did not see or find the value of lookup_value, it is said to often uses the largest value in the array that is known to be smaller than or one that is equal to lookup_value.

Hence, In the formula =VLOOKUP(“shovel”, B2:D12, 3, FALSE), the part that is the lookup value parameter is B2:D12.

Learn more about value parameter from

https://brainly.com/question/24076677

#SPJ1

Any factor that leads businesses to collectively expect lower rates of return on their investments ______ investment demand.

Answers

Answer:

Reduces investment demand

A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network's SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed

Answers

In the case above, the most likely reason that the SSID is not being displayed is that The broadcast is disabled on the wireless router.

What is disable broadcast in Wi-Fi?

The term broadcasts is known to be any medium that is often used by organization to share a program.

Note that the act of Disabling the SSID Broadcast is said to  be one of the method of securing a wireless network.

Note also that this procedure will hinder other users from getting or detecting your SSID or one's wireless network name if they ever attempt to see the available wireless networks in one's area.

Therefore, In the case above, the most likely reason that the SSID is not being displayed is that The broadcast is disabled on the wireless router.

Learn more about wireless router from

https://brainly.com/question/9362673

#SPJ1

See full question below

A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network's SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?

Options are :

802.11g and 802.11b use different frequencies

The wireless router is not configured for DHCP support

The broadcast is disabled on the wireless router

The wireless router is configured with WPA2 encryption

An intern at an IT company provisioned a Linux based On-demand EC2 instance with per-second billing but terminated it within 30 seconds as he wanted to provision another instance type. What is the duration for which the instance would be charged

Answers

The duration for which the instance would be charged is known to be c. 60 seconds in regards to the (Billing and Pricing).

What are pricing models?

Pricing modeling is known to be the ways or the methods a person is able or can use to know the right price for a products or services.

Note that in the case above, since it involves billing and pricing, The duration for which the instance would be charged is known to be c. 60 seconds.

See options below

a. 600 seconds

b. 300 seconds

c. 60 seconds

d. 30 seconds

Learn more about billing from

https://brainly.com/question/24719924

#SPJ1

Question 3 Fill in the blank: Curiosity, understanding context, having a technical mindset, data design, and data strategy are _____. They enable data analysts to solve problems using facts.

Answers

Curiosity, understanding context, having a technical mindset, data design, and data strategy are data driven.

What are data driven skills?

Data-driven decision-making is known to be one that entails the five analytical skills which are:

curiosity, understanding context, having a technical mindset, data design, data strategy.

Hence,  Curiosity, understanding context, having a technical mindset, data design, and data strategy are data driven.

Learn more about Curiosity from

https://brainly.com/question/4975503

#SPJ1

A JavaScript __________ runs when something calls it. a. Object b. Programming language c. Property d. JavaScript e. Function

Answers

Function, I think.

Hope it helps!

A coworker is exploring virtualization for some development projects, and is trying to decide between a bare metal hypervisor and a hosted one. Which of the following pieces of advice should you give

Answers

The pieces of advice that one should give are:

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.Bare metal hypervisors can run more VMs on the same hardware

What is virtualization?

Virtualization is one that depends on software so as to be able to simulate hardware functionality and make a kind of a virtual computer system.

Hence, The pieces of advice that one should give are:

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.Bare metal hypervisors can run more VMs on the same hardware

See full question below

A coworker is exploring virtualization for some development projects and is trying to decide between a bare metal hypervisor and a hosted one. Which of the following pieces of advice should you give? Choose all that apply

answer choices

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.

Bare metal hypervisors can run more VMs on the same hardware

You can run a bare metal hypervisor within your existing operating system.

Learn more about virtualization from

https://brainly.com/question/13204456

#SPJ1

Question 6 options: This is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

Answers

Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

What is a lexeme in programming?

Lexemes are known to be those character strings that are put together from the character group of a program, and the token stands for what aspect of the program's grammar they are made of.

Hence, Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

Learn more about Lexeme from

https://brainly.com/question/14125370

#SPJ1

During the maintenance phase of the software development life cycle, the information system is ______

Answers

Design

Explanation:

After the maintenance phase, next you need to design or build the information system

During the maintenance phase of the software development , the information system is design.

What is software development?

Software development is the name given to a group of computer science tasks involved in developing, and maintaining software.

The set of instructions or programs that a computer follows are known as software. It makes computers programmable and is independent.

Operating systems, utilities, hardware management, and other fundamental operational functions are all provided by system software.

creating computer programs that provide code-writing tools including text editors, to programmers.

Therefore, During the maintenance phase of the software development life cycle, the information system is design.

To learn more about software, refer to the link:

https://brainly.com/question/1022352

#SPJ2

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

Answers

Answer:

VOIP (voice over internet protocol )

Which methods or commands provide access to superuser privileges for authorized users?

Answers

In Linux computer systems, the methods and commands that provide access to superuser privileges for authorized end users are:

The su command.Logging into the root account.The sudo command.

What is a Linux command?

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by entering a line of text.

In Linux computer systems, some examples of the methods and commands that provide access to superuser privileges for authorized administrators (end users) include the following:

The su command.Logging into the root account.The sudo command.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

Identify the numbered parts and accessories of a desktop computer. Include an indefinite article with each response

Answers

The numbered parts of the desktop in the image are;

Monitorlogic boardProcessor ChipRAM ChipFloppy DiskPower UnitDVD DriveHard DriveKeyboardMouse

What is a desktop computer?

A desktop computer is a piece of personal technology intended to sit on top of an ordinary office desk.

It links to input devices like the monitor, keyboard, and mouse that users use to interact with a computer's actual hardware.

Learn more about desktop computers:
https://brainly.com/question/26671214
#SPJ1

When methods have ____, other programs and methods may use the methods to get access to the private data.

Answers

When methods have public access, other programs and methods may use the methods to get access to the private data.

What do you mean by public access?

The Definition of the term public access is known to be a kind of a television channel where anybody can be able to broadcast a program

An example is the city council meeting can be able to broadcast on public access.

Hence, When methods have public access, other programs and methods may use the methods to get access to the private data.

See full question below

When methods have ____, other programs and methods may use the methods to get access to the private data.

a. private access

b. public access

c. complete access

d. all access

Learn more about public access from

https://brainly.com/question/2736088

#SPJ1

Other Questions
which psychologists established the conditioned reflex method of research that watson adopted? What is the total pressure of a wet gas mixture at 60C, containing water vapor, nitrogen, and helium. The partial pressures are Pnitrogen = 53. 0 kPa and Phelium = 25. 5 kPa. A58. 58 kPaB)78. 50 kPaC) 98. 42 kPaD101. 32 KP Cesar drove home from college traveling an average speed of 63. 4 mph and drove back to the college the following week at an average speed of 58. 5 mph. If the total round trip took 11 hours, how much time did it take Cesar to drive from home back to college? Express the time in hours and minutes. Round to the nearest minute determine the section modulos and select the most economical wide flange shape that should Tornado alley stretches from Texas up through Kansas, Oklahoma, and into South Dakota. The high frequency of tornadoes in this area is a result of: A. the high frequency of maritime tropical air colliding with continental polar air B. the high density of trailer parks C. a stronger Coriolis force over the plains D. orographic subsidence east of the Rockies 1.Analyze the similarities between each of the skull and front leg fossils.Which of the following that might lead to the conclusion that these are allrelated species.The pointy bone on top of the muzzle of the horseGap between front and rear teethThe triangular shape of the headAll of the above TWO PARTS: 1. of the MSW generated in 2017, 61 million tonnes was recycled and 24 million tonnes was composted. what percentage of the total MSW generated was either recycled or composed?2. a further 31 million tonnes of MSW was combusted for energy recovery. what percentage of MSW actually went to landfill in 2017? why is cytochrome b used in the study of phylogenetic relationships a hydrogen atom, initially at rest in the n = 4 quantum state, undergoes a transition to the ground state, emitting a photon in the process. what is the speed of the recoiling hydrogen atom? Match the mineral with the diagnostic property that is most useful for its identification. biotite [ Choose hematite galena [ Choose] high density metallic mineral, cubic cleavage glassy, breaks with conchoidal fracture breaks into black flexible sheets salmon pink color two cleavage planes at 90" will attract a magnet leaves a reddish brown streak on a porcelain plate fingernail will scratch pearly luster breaks into clear exible sheets Auto insurance options offered by AA Auto Insurance are outlined in the table below. What monthly payment would you expect for an insurance policy through AA Auto Insurance with the following options? Bodily Injury: $25/50,000 Property Damage: $25,000 Collision: $250 deductible Comprehensive: $100 deductible. The average North American city dweller uses an average of how many gallons of water on a daily basis Resting blood pressure is usually _____ after chronic aerobic training due to lower ____.Select one:a. lower; TPRb. higher; cardiac outputc. higher; TPRd. lower; cardiac output What is the solution to the following system of equations? (1 point) x 3y = 6 2x + 2y = 4 calculate the nuclear binding energy per nucleon for tl203 which has a nuclear mass of 202.972 amu BPK Inc. and OPK Inc. are owned by the same family. BPKs marginal tax rate is 21 percent, and OPKs marginal tax rate is 32 percent. BPK is about to incur a $72,000 deductible expense that would benefit both corporations. OPK could obtain the same mutual benefit by incurring an $82,500 deductible expense.What is the after-tax cost to BPK of incurring the expenseWhat is the after-tax cost to OPK of incurring the expenseWhich corporation should incur the expense what measurement approach does the accounting alternative permit? FILL IN THE BLANK. in aquatic ecosystems, the __________ is the depth at which net primary productivity is zero because respiration equals gross primary productivity. 1. write a statement that accesses the contents of the field quantity in an array variable named $_post. a gas in a closed, flexible container is slowly cooled from 50c to 25c. what is the ratio of the final volume of the gas to its initial volume? assume ideal behavior.