____ occurs when data is entered into the computer. a. output b. storage c. input d. processing

Answers

Answer 1

c. input  occurs when data is entered into the computer.  The process of entering data into a computer or computerized system via input devices such as a keyboard, mouse, scanner.

Microphone, among others, is known as input. The computer then processes the supplied data to execute different operations or computations, and the results are either saved, shown as output, or further processed. In computer science and information technology, input refers to the process of delivering data or instructions to a computer system or software program. In general, input can be delivered via a wide range of devices and methods, including: A keyboard is one of the most popular input devices, and it is used to enter text and commands into a computer system. Keyboards can be real or virtual, and their layouts and settings vary depending on the language or locality. Another typical input device is the mouse, which is used for pointing, clicking, and dragging things on the computer screen. Certain mouse may additionally include extra buttons or functionality for scrolling, zooming, or doing other tasks.

learn more about  computer here:

https://brainly.com/question/21080395

#SPJ4


Related Questions

planning constraints are similar to which aspects of the clientele network

Answers

Planning restrictions resemble client network characteristics of Controllers.

What quality of successful strategies instantly motivates the employee team?

Which aspect of successful programmes provides the employee team with quick motivated feedback? mission, goals, guidelines, and practises. The terminology employed in policy statements is general in nature since they are general guidelines.

Why is employee participation in new approaches and practises beneficial?

Workers are a source of ideas and expertise, yet this resource is frequently underutilised. Employee participation in decision-making not only gives them the ability to contribute to the success of the firm, but it also saves the business time and money through higher productivity and decreased outsourcing.

To know more about network visit:-

https://brainly.com/question/29350844

#SPJ4

what components are included in a database?

Answers

The four main parts of the database management system are the following: DATA, USER, HW, and SOFTWARE.

What elements make up a database?

The user, the database application, the database management system (DBMS), and the database are the four elements that make up a database system. The DBMS, which manages the database, communicates with the database application, which communicates with the user.

What is the database's structure?

Similar to a spreadsheet, a database organizes linked data into tables that each have rows (also known as tuples) and columns. Start by making a table for each sort of object, such as products, sales, customers, and orders, before converting your lists of data into tables.

To know more about database visit:-

brainly.com/question/3804672

#SPJ4

when using snmp with tls, what port do agents receive requests on?

Answers

SNMP uses ports 10161 and 10162 for sending and receiving messages in a manner that is comparable to that which was discussed earlier when employing TLS or DTLS.

When is a packet considered enormous?

Definitions of terms: Giants: The number of giant frames received on the port—frames larger than the maximum size allowed by IEEE 802.3. A giant Ethernet packet, for instance, is one that has more than 1518 bytes.

What does a level 0 indicate when viewing a syslog message?

A severity level of 0 indicates an emergency panic condition, while a severity level of 7 indicates a debug-level message that is useful for developers but not for operations. Syslog messages are also assigned a severity level of 0 to 7.

To know more about SNMP visit :-

https://brainly.com/question/14553493

#SPJ4

T/F. a comment in excel can capture an ongoing text conversation.

Answers

It is accurate to say that an excel comment can record a text dialogue in progress.

Can Excel threaded chats incorporate comments?

The way comments function has changed in Excel for Microsoft 365. Now that comments are threaded, you can discuss the data with other readers. Notes function similarly to comments did in older iterations of Excel and are used for creating notes or remarks regarding the data.

What is a comment and how is it used?

Comments are text notes that are included into programs to provide explanations of the source code. In a programming language, they are used to describe the program, remind programmers of the tough things they recently accomplished with the code, and assist the following generation.

To know more about comments visit:-

https://brainly.com/question/30318947

#SPJ1

how many times does a loop with the header for count in range (10): execute the statements in its body? a. 9 times b. 10 times c. 11 times d. 1 time

Answers

The loop with header will execute 10 times hence option b. 10 times is the correct answer.

What is a loop?

A loop is a set of instructions that are repeatedly carried out until a specific condition is met. Normally, a certain action is taken, such as receiving and modifying a piece of data, and then a condition is verified, such as determining whether a counter has reached a predetermined value.

Loops are control structures that repeat a specific chunk of code until a certain condition is satisfied or a predetermined number of times. For.. next loops, do loops, and while loops are the three major types of loops in Visual Basic.

Learn more about loops here:

https://brainly.com/question/19344465

#SPJ1

When transmitting information via radio, you should:
A) break long messages into 60-second segments.
B) use a normal conversational tone of voice.
C) speak with your voice slightly elevated.
D) keep your mouth 1" from the microphone.

Answers

English is the common radio language over the world, unless you have a license to talk in another language.

What is Transmitting Audio?

Unlike a phone, a two-way radio does not allow simultaneous use of voice and listening.

If you hear other individuals talking, stay out of their way. Wait for their talk to come to an end. Except in cases of urgency.

In the event of an emergency, alert the other parties to the urgent nature of your message. If you are unsure whether the call is for you, don't answer. Wait to answer until you hear your call sign.

Therefore, English is the common radio language over the world, unless you have a license to talk in another language.

To learn more about radio, refer to the link:

https://brainly.com/question/866150

#SPJ1

When communicating information over radio, one should speak in a regular, friendly voice. As a result, choice (B) is accurate.

What do you meant by a Transmitting power?

The amount of heat energy emitted by a body and the amount of heat energy incident on a body are the two factors that define the body's transmitting power.

The ratio of the heat energy that a body transmits to the heat energy that is incident on it is known as the transmitting power. Energy must be transported from its source to a point where it will be used to carry out beneficial activity. This process is known as power transfer. Formally, power is defined as energy units per unit of time.

Learn more about Transmitting power, from :

brainly.com/question/30580091

#SPJ1

the most widely used character encoding standard today is

Answers

ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet. In standard ASCII-encoded data, there are unique values for 128 alphabetic, numeric or special additional characters and control codes.

explain why modern machines consist of multiple levels of virtual machines.

Answers

Modern machines consist of multiple levels of virtual machines to enable better resource utilization, more secure environments, and the ability to run multiple operating systems and applications simultaneously.

Modern machines consist of multiple levels of virtual machines to enable better resource utilization, more secure environments, and the ability to run multiple operating systems and applications simultaneously. By using virtual machines, multiple instances of different operating systems can run on the same physical machine, allowing better utilization of hardware resources. This also enables easier migration of software and services across different environments. Virtual machines also provide a more secure environment by isolating different services and applications from each other, preventing any security breaches from spreading across the system. Finally, virtual machines can be used to simulate real-world scenarios for testing and development purposes, without the need for dedicated hardware.

Learn more about Modern machines here:

https://brainly.com/question/19670786

#SPJ4

When you save a document, the computer transfers the document from a storage medium to memory.
a. true
b. false

Answers

False, The computer moves a document from a storage medium to memory when you save it.

Is it possible to copy data to RAM from a hard drive or other storage medium?

Copying data from a storage location, like a hard drive, to RAM is the act of saving. The slower the computer transfers data, the more bits the bus can handle. Your computer or mobile device may take up a lot of space with programs and apps that you no longer use.

Which operating system component maintains input and output units*?

The Memory, processes, drives, and the input/output devices are all managed by the operating memory.

To know more about memory visit:-

https://brainly.com/question/30049722

#SPJ4

why do we type turtle.turtle() to get a new turtle object?

Answers

It describes the turtle module, which enables the creation of Turtle objects and their use of them for drawing. turtle-2: Six reasons why we type turtle.

Why do we use the Python keyword turtle ()?

Using software that repeats simple movements, Turtle may create complex shapes. Complex shapes and images can be readily drawn by combining these and related instructions. The same-named module from the Python standard distribution up to version Python 2.5 is extended and reimplemented in the turtle module.

What does the Python term Bob turtle () mean?

This indicates that bob refers to a Turtle-type object as defined by the module turtle. Since there isn't much the user can do in this situation other than closing the window, the main loop instructs the window to wait for user action. A method can be used after a Turtle has been created to move it around the window.

to know more about turtles.turtle() here:

brainly.com/question/18992776

#SPJ4

1. Software piracy in a corporate setting is rarely directly traceable to IT staff members? (True or False)

Answers

Please, Delete this answer.

True. Software piracy in a corporate setting is often perpetrated by employees who are not part of the IT staff, and the IT staff members may not be aware of such activities.

What is Software Piracy?

Software piracy in a corporate setting is a serious problem that can lead to legal and financial consequences for the organization.

It is defined as the unauthorized use, distribution, or reproduction of copyrighted software, and it can be perpetrated by anyone within the organization, including employees, contractors, and consultants.

While IT staff members may have access to software and may be responsible for installing and maintaining it, they are not always the ones who engage in software piracy.

In fact, many cases of software piracy in corporate settings are perpetrated by employees who are not part of the IT staff.

However, IT staff members play an important role in preventing software piracy in corporate settings.

They can help prevent software piracy by implementing effective policies, educating employees on the legal and ethical implications of software piracy, and monitoring software usage within the organization.

Overall, while IT staff members may not be the ones who engage in software piracy, they have an important role to play in preventing it within the organization.

By implementing effective policies, educating employees, and monitoring software usage, IT staff members can help ensure that the organization is using software legally and ethically.

To know more about Software Piracy, visit: https://brainly.com/question/20828627

#SPJ1

For Python, the term data type can be used interchangeably with what other term? A. index B. class C. object D. sequence

Answers

Please brainliest to help me:

D. Sequence.

In Python, the term data type refers to the category of data that a particular variable or object belongs to. For example, some common data types in Python include integers, floats, strings, lists, tuples, and dictionaries.

The term data type can be used interchangeably with the term sequence, which refers to a collection of elements or items that are ordered and indexed. In Python, sequences can be of different types, such as lists, tuples, and strings, and they can be indexed using integers to access individual elements.

Classes and objects are related to data types and sequences but are not synonymous with them. Classes are templates or blueprints for creating objects, while objects are instances of a class that have their own attributes and behaviors.

When derivatively classifying information, where can you find a listing of specific information elements that identify their classification, reason for classification, downgrading, and declassification information?a. Properly marked source document
b. Security Classification Guide (SCG)
c. Executive Order 13526, Classified National Security Information
d. DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM)

Answers

b. Security Classification Guide (SCG) is where you can find a listing of specific information elements that identify their classification, reason for classification, downgrading, and declassification information when derivatively classifying information.

A Security Classification Guide (SCG) provides specific guidance and instructions on how to classify, mark, protect, and declassify information. The correct option is b.

It contains detailed information elements that identify the classification level, reason for classification, downgrading procedures, and declassification instructions for specific types of information.

While the other options mentioned (a, c, and d) are relevant to information classification and security, they do not specifically provide a listing of information elements for classifying, downgrading, and declassifying information.

Option a, a properly marked source document, refers to the marking of classified information itself, but it may not provide comprehensive guidance on the specific elements mentioned.

Thus, the correct option is b.

For more details regarding Security Classification Guide, visit:

https://brainly.com/question/28222508

#SPJ6

The order in which feedback is presented on an aspect of a project is known as a(n) __ loop.

Answers

The order in which feedback is presented on an aspect of a project is known as a feedback loop.

A feedback loop is a process in which the output of a system is used as input for the same system in order to make adjustments and improvements. This can be seen in various aspects of a project, such as design, testing, and implementation. By using feedback loops, a project can be continuously improved and refined to meet the needs and expectations of its stakeholders.

Furthermore, feedback loops should be designed to be as transparent as possible, so that the team can have a clear view of the progress they are making and the areas that need the most improvement.

Learn more about feedback loop:

https://brainly.com/question/2902510

#SPJ11

The order in which feedback is presented on an aspect of a project is known as a feedback loop.

A feedback loop is a process in which the output of a system is used as input for the same system in order to make adjustments and improvements. This can be seen in various aspects of a project, such as design, testing, and implementation. By using feedback loops, a project can be continuously improved and refined to meet the needs and expectations of its stakeholders.

Furthermore, feedback loops should be designed to be as transparent as possible, so that the team can have a clear view of the progress they are making and the areas that need the most improvement.

Learn more about feedback loop:

brainly.com/question/2902510

#SPJ1

what does pda stand for

Answers

Like a public kiss or touching display of affection: Your parents engaging in PDA is awkward. I would give you a hug, but I don't like PDAs.

A parent is what?

To give your child a place to live, food, and clothing. to provide for your child financially. to offer control, oversight, and safety. Children rely on their parents to give them the care they require to just be healthy and happy as well as to develop and grow properly, from the moment they are born.

A decent mother is an individual who supports their child in doing what they enjoy, instills in them a strong moral code, corrects them when they behave , and instills in them the value of respect and hard work.

To know more about parent visit :

https://brainly.com/question/29560845

#SPJ4

all communication occurs within what contexts?

Answers

Intrapersonal, personal, corporate, public, and information distribution are all examples of communication contexts. Each main decision pros and cons as well as appropriate and improper usage.

What are communications through computers?

All communication operations that involve a computer software are referred to as computer interactions. In order for the recipient to deliver a message back, the computer sends data to one or several other computers, which decode it.

What are the uses of communications?

Computer connections are used to browse and post content on computer message boards, transmit and receive e - mails, participate in online conferences (computer, tele, or video conferences), and more.

To know more about communication visit:

https://brainly.com/question/14809617

#SPJ4

Companies use ________ in an attempt to move up their Web sites in the organic search engine results.a) search engine image protectionb) search engine keyword insertionc) domain stackingd) search engine optimizatione) search-oriented architecture

Answers

Businesses employ search engine optimization in an effort to boost the position of their websites in natural search engine results.

What type of electronic conferencing tool is this, for instance?

Zoom is one of the video meeting services that has become well-known. It offers free and paid solutions as well as premium programs for companies of all kinds, from tiny businesses to large multinationals.

Which of the following is a crowdsourcing example?

Members are encouraged to publish their reviews and user manuals on the website Electrogadgets.com, which offers information on a variety of electronic devices.

To know more about search engine optimization visit:-

https://brainly.com/question/14097391

#SPJ1

how to cite a video in apa

Answers

The person or group that uploaded the video, their channel name, the upload date, the title of the video, "Video" in square brackets, the name of the website, and link to the video are all required for citing videos in APA style.

How do you properly in-text cite a video in APA 7th edition without an author?

In place of the page number when directly quoting from a movie, include the timestamp for the quotation's start. Put the media type in square brackets after the title part of the reference, for example, "[Film]".

What is the proper way to reference a movie?

Sort movies by their titles. Add the title of the movie, the studio or distributor, and the year it was released. After the director's name, if appropriate, list the performers' names.

To know more about APA visit:-

https://brainly.com/question/30403495

#SPJ4

in the palindromes program, the inner loop evaluates one string to see if it is a palindrome.True False

Answers

in the palindromes program, the inner loop evaluates one string to see if its a palindrome. TRUE.

A palindrome is a string of letters that would read exactly the same if they were reversed.

Consider the word "rotator," which still appears when written backwards. Hence, it is a palindrome!

Palindromes can be found in both words and numerals. We've covered several methods for determining whether a string is a palindrome or not below. In the code above, we begin by declaring the is Palindrome() method and supplying the string parameter.

Then, using the slice operator string[::-1] in the function body, we obtain the input string's reverse. The step option in this case is -1, which guarantees that the string will be cut each time from the end, moving one step backward.

learn more about palindromes here:

https://brainly.com/question/24304125

#SPJ4

what is long beach dmv?

Answers

The DMV office in Long Beach is open to help clients with upcoming appointments and with tasks that cannot be done online.

What is the US DMV?

A DMV is what? An organisation in charge of managing driver licencing and car registration is the Department of Motor Vehicles. They include title transfers, vehicle registration, safety and emission checks, issuance of ID cards and driver's licences, driving records, etc.

Who oversees the California DMV?

As of January 2021, Trina Washington has been the Deputy Director of the Licensing Operations Division. Washington's responsibilities include managing the DMV's operations and licencing programmes, which include the Driver Safety, Occupational Licensing, Policy and Automation Development, and Motor Voter programmes.

To know more about online visit:-

https://brainly.com/question/1395133

#SPJ4

hw4a.3. floating point precision for a binary floating point system of the form , with an exponent range from to , what is the minimum for which the number can be represented exactly?

Answers

An exponent value of 127 reflects the actual zero, while the exponent is an 8-bit unsigned integer with a skewed range of 0 to 255. Since exponents of 127 (all 0s) and +128 (all 1s) are reserved for exceptional numbers, the exponent ranges from 126 to +127.

What is the exponential function's range?

All real numbers comprise the exponential function's domain. Any real integers greater than zero fall inside the range.

How can I convert from 32-bit binary to decimal?

In binary, what is 32? Binary 32 equals 100000. To convert 32 to binary, divide it by 2 in successive iterations until the quotient equals 0.

To know more about binary visit:-

https://brainly.com/question/19802955

#SPJ1

which items are most easily replaced in a laptop A. Display B. RAM C. Motherboard

Answers

Which components of a laptop are the most easily replaced? The fixed drive, system memory (RAM), and plug-in wireless card are the easiest to upgrade and install.

What exactly is a component example?

Components include a single button in a graphical user interface, a small interest calculator, and an interface to a database manager. A network's components can be deployed on different servers and communicate with one another to provide required services. A component property is a feature that enables you to create multiple options for each component without the need for multiple variants. We used to have to create a variant for each option. Component properties can be used to create logic within the component that offers the same options but with fewer variants.

Know more about wireless Visit:

https://brainly.com/question/29730597

#SPJ4

how to convert bits to bytes

Answers

To convert bits to bytes, you need to divide the number of bits by 8. This is because there are 8 bits in a byte. For example, if you have 16 bits, you would divide 16 by 8 to get 2 bytes. Here is the formula:

Number of bytes = Number of bits / 8

So, if you want to convert 32 bits to bytes, you would do the following calculation:

32 bits / 8 = 4 bytes

Therefore, 32 bits is equal to 4 bytes.

Difference between bit and byte

We can say that 1 byte is 8 bits, therefore, 1 byte can represent 28 (256) different states.

For more information about bit and byte, visit:

https://brainly.com/question/28261277

#SPJ11

describe how android uses a unique virtual machine for running java programs.

Answers

Android uses a unique virtual machine called the Dalvik Virtual Machine (DVM).

When a Java application is compiled, it is compiled into Java bytecode, which is a platform-independent format that can be executed on any Java Virtual Machine (JVM). However, the DVM is not a standard JVM, and cannot directly execute Java bytecode. Instead, the Java bytecode is converted to a special format called Dalvik Executable (DEX) format, which is optimized for the DVM.

The DEX format is designed to reduce the memory footprint of Java applications, which is particularly important for mobile devices with limited memory. It does this by using a compact representation of bytecode instructions and optimizing the organization of data structures.

When an Android application is installed on a device, the DEX files are packaged into an application package (APK) file. When the application is launched, the DEX files are loaded into memory and executed by the DVM. Each application runs in its own instance of the DVM, which provides a layer of isolation between applications and helps to ensure that one application cannot interfere with another.

In addition to running Java programs, the DVM also provides a number of other features that are specific to Android, such as garbage collection, interprocess communication, and access to Android's core libraries and services.

Overall, the use of a unique virtual machine for running Java programs allows Android to provide a secure, efficient, and scalable platform for mobile application development.

Learn more about DVM here:

https://brainly.com/question/13567761

#SPJ4

Creating processes for all programs that may need to be executed on a computer when the computer is started up may be appropriate for an _______ system, but not for a ____ _____computer like a laptop.

Answers

Creating processes is appropriate for an operating system, but not for a mobile device like a laptop.

Operating system, mobile device. An operating system is a set of programs that manage the resources of a computer and provide a platform for applications to run on. It provides an interface for users to interact with the computer, and it controls the operations of the hardware. By creating processes for all programs that may need to be executed on a computer when the computer is started up, an operating system can ensure that all programs are running correctly and efficiently. This is appropriate for a desktop or server computer, but not for a mobile device like a laptop, because the laptop's hardware is typically much more limited, and the operating system would need to be optimized to work well on the limited hardware. Additionally, mobile devices typically don't need to run as many programs as a desktop or server, so the same processes don't need to be created.

Learn more about laptop here:

brainly.com/question/15244123

#SPJ4

the tendency of people to associate twoevents when there is no connection is referred to as ;A) Affect intensityB) Focusing effectC) Distinction biasD) Omission bias

Answers

Illusory correlation refers to people's tendency to correlate two occurrences when there is no connection between them.

The process of detecting a link between variables (usually individuals, events, or actions) even when no such relationship exists is known as illusory correlation. A mistaken connection may be created because infrequent or unique occurrences are more noticeable and hence attract one's attention. This is one way stereotypes emerge and persist. According to Hamilton and Rose, stereotypes can encourage individuals to expect specific groups and features to fit together and then exaggerate the frequency with which these connections occur. These prejudices can be learned and reinforced without any real contact between the stereotype holder and the group being stereotyped.

Learn more about connections here-

brainly.com/question/14327370

#SPJ4

Constructing a decision tree to visually represent the logic in a multi-outcome IF problem is often recommended before translating it into Excel pseudo code and then the nested IF function. (True/False)

Answers

True. Before translating a multi-outcome IF problem into Excel pseudo code and then the nested IF function, building a decision tree is frequently advised.

What Excel feature is used to make a decision based on comparisons?

The IF function in Excel, which enables you to compare values rationally to expectations, is one of the most popular functions. Hence, an IF statement can result in two different results.

What procedure do you employ to decide based on a condition?

A programme is guided to make decisions based on predetermined criteria using the IF statement, which is a decision-making statement. If a certain condition is met (true) or another piece of code evaluates to a certain value, the IF statement executes one set of code.

To know more about pseudo code visit:-

https://brainly.com/question/12905902

#SPJ1

what term was used to describe using the digging tool to examine the underlying data, such as when coplink allows you to examine data for a specific neighborhood or time period?

Answers

COPLINK is the term was used to describe using the digging tool to examine the underlying data, such as when coplink allows you to examine data for a specific neighborhood or time period.

What is COPLINK?


Using natural language speech phrases and concepts, law enforcement can search data from agencies all around the United States utilizing the robust search engine and information platform known as COPLINK X.

A brand-new, free detective game that requires the top Forensic Masters to crack small-time crimes. As a detective, track down the concealed clue and suspicious items to ultimately solve the murder case. Every mini-game is a riddle in itself.

Thus, COPLINK is the term.

For more information about COPLINK, click here:

https://brainly.com/question/28904563

#SPJ1

what is megabytes in gb

Answers

Around 1 billion bytes, or 1000 megabytes, make up one gigabyte. 4 GB of Memory is possible for a computer.

GB or MB, which is larger?

When compared to the gigabyte, the megabyte is a smaller unit. More than the megabyte is the gigabyte. Million bytes are equal to one MB. A gigabyte (GB) is equal to one billion bytes.

What memory size has the most capacity?

yottabyte

The greatest unit accepted as a standard size by the International System of Units is a yottabyte (SI). The yottabyte is roughly 1 septillion bytes, or 1,000,000,000,000,000,000,000,000 as an integer. A million trillion megabytes (MB) or a quadrillion gigabytes (GB) are used to describe the storage volume.

To know more about megabytes visit:

https://brainly.com/question/30356515

#SPJ4

when you click a date content control on a cover page, a calendar icon will appear next to the text area. true false

Answers

A calendar icon will appear next to the text area is true.

A date content control in Word is a type of form field that allows users to input a date into a document. When a date content control is inserted into a document and clicked, a calendar icon will appear next to the text area.

The calendar icon is a visual aid that helps users select a date from a calendar instead of typing it in manually. When the user clicks on the calendar icon, a calendar control pops up, allowing the user to select a date from the calendar. The selected date is then automatically inserted into the date content control.

The appearance of the calendar icon next to the date content control can be customized in Word. Users can choose to display the calendar icon only, or they can display both the calendar icon and the date format.

In summary, the statement is true. When you click on a date content control in Microsoft Word, a calendar icon will appear next to the text area, which allows users to easily select a date from a calendar.

Learn more about calendar icon here:

https://brainly.com/question/4681965

#SPJ4

Other Questions
Please help me with the blank box :] A normal assessment of the neck would include palpation of the thyroid isthmus. Where would the nurse find the isthmus?A) Just above the thyroid cartilageB) Between the thyroid and the cricoid cartilagesC) Just below the cricoid cartilageD) In front of the sternocleidomastoid muscle how do you make nestle toll house chocolate chip cookie? What Do Economists Think about the Minimum Wage? Please answer correct A B C D which statement describes a key difference between meiosis and mitosis The correct mix for a batch of concrete is 5:4:2 in terms of sand, gravel, and cement.The batch is to have 2200 pounds of these ingredients. How many of each are needed?Sand Gravel Cement which instrument would be used by tractor? Is the exact time it takes to evaluate 27 + 72 a discrete random variable, a continuous random variable, or not a random variable? Which continent would you be visiting if you were standing at these coordinates: -20 Latitude, 120 Longitude TIC OCEA BARCTIC OCERA SOUTH Africa Europe South America North America QUESTIONS Click Save and Submit to save and submit. Click Save All Arowers to save all answers Type here to search O ELBe w 54. 7 of HCl gas is dissolved to make 1L of solution what is the molarity of the solution Which one of the following types of stress strain relationship best describes the behavior of brittle materials such as ceramics and thermosetting plastics (a) elastic and perfectly plastic, (b) elastic and strain hardening, (c) perfectly elastic, or (d) none of the above What is the input value other than -7, for which h(x)=3 In a certain city, E Street, W Street, C Street, and D Street are parallel streets that intersect K Street and M Street. How long is K Street between C Street and D Street? the psychophysical property of sound that corresponds to the amplitude of a sound wave.(measured in decibels. the higher the amplitude, the more pressure is exerted on the eardrum, the louder the sound is)over 85b has the potential to damage your hearing with prolonged exposure what is ureteropelvic junction Which sleep stage is characterized by rapid low amplitude brain waves? which nafta member country has been most interested in eliminating corn subsidies? A. Mexico B. America C. Canada you have been tasked with creating a virtual machine that will be providing hosted services on the physical network, and possibly the internet. what network mode should be used? what special instructions does the nurse include while teaching kegel exercises