Answers

Answer 1

Around 1 billion bytes, or 1000 megabytes, make up one gigabyte. 4 GB of Memory is possible for a computer.

GB or MB, which is larger?

When compared to the gigabyte, the megabyte is a smaller unit. More than the megabyte is the gigabyte. Million bytes are equal to one MB. A gigabyte (GB) is equal to one billion bytes.

What memory size has the most capacity?

yottabyte

The greatest unit accepted as a standard size by the International System of Units is a yottabyte (SI). The yottabyte is roughly 1 septillion bytes, or 1,000,000,000,000,000,000,000,000 as an integer. A million trillion megabytes (MB) or a quadrillion gigabytes (GB) are used to describe the storage volume.

To know more about megabytes visit:

https://brainly.com/question/30356515

#SPJ4


Related Questions

how is brenna murphy's rainbow array 1 different than traditional prints? question 2 options: it is not an impression. it is part of an edition. it is a valuable work. it is mass-produced.

Answers

Rainbow Array 1 by Brenna Murphy and conventional prints. Rainbow Array 1 does not directly address any of the options offered, making it impossible to make a comparison to conventional prints.

What is printing an array?

The text section of the console in the Processing environment is where the printArray() method outputs array data. Between each element of the array, a new line is added. This function can only output arrays that are one dimensional. Be aware that the console is not fast.

Describe a one-based array.

The first item in an array is indexed as 0 when using zero-based array indexing, while the first item in an array using one-based array indexing is indexed as 1.

To know more about Array visit:-

https://brainly.com/question/13107940

#SPJ1

[4] b.A sequential data file called "Record.txt" has stored data under the field heading RollNo., Name, Gender, English, Nepali Maths and Computer. Write a program to display all the information of male
students whose obtained marks in computer is more than 90.​

Answers

Answer:

Explanation:

Assuming that the data in the "Record.txt" file is stored in the following format:

RollNo. Name Gender English Nepali Maths Computer

101 John M 80 85 90 95

102 Jane F 85 80 75 92

103 David M 90 95 85 89

104 Mary F 75 90 80 94

105 Peter M 95 85 90 98

Here is a Python program that reads the data from the file and displays the information of male students whose obtained marks in computer is more than 90:

# Open the Record.txt file for reading

with open("Record.txt", "r") as file:

   # Read the file line by line

   for line in file:

       # Split the line into fields

       fields = line.strip().split()

       # Check if the student is male and has obtained more than 90 marks in Computer

       if fields[2] == "M" and int(fields[6]) > 90:

           # Display the student's information

           print("RollNo.:", fields[0])

           print("Name:", fields[1])

           print("Gender:", fields[2])

           print("English:", fields[3])

           print("Nepali:", fields[4])

           print("Maths:", fields[5])

           print("Computer:", fields[6])

           print()

This program reads each line of the "Record.txt" file and splits it into fields. It then checks if the student is male and has obtained more than 90 marks in Computer. If so, it displays the student's information on the console.

The program to display all the information of male students whose obtained marks in computer is more than 90. is in the explanation part.

What is programming?

Computer programming is the process of performing specific computations, typically through the design and development of executable computer programmes.

Assuming that the data in the "Record.txt" file is structured in a specific format and separated by commas, here is an example Python programme that reads the data from the file and displays information about male students who received more than 90 points in Computer:

# Open the file for reading

with open('Record.txt', 'r') as f:

   # Read each line of the file

   for line in f:

       

       # Split the line by commas

       data = line.split(',')

       # Check if the student is male and has obtained more than 90 marks in Computer

       if data[2] == 'M' and int(data[6]) > 90:

           # Display the information of the student

           print(f"Roll No.: {data[0]}\nName: {data[1]}\nGender: {data[2]}\nEnglish: {data[3]}\nNepali: {data[4]}\nMaths: {data[5]}\nComputer: {data[6]}\n")

Thus, in this program, we use the open() function to open the "Record.txt" file for reading.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

What is an advantage of an hidps?

Answers

An advantage of an hidps (host-based intrusion detection and prevention system) is that it can monitor and protect individual systems or hosts within a network.

This allows for more granular control and the ability to detect and prevent intrusions on a specific device, rather than just at the network level. Additionally, hidps can provide insight into the behavior of individual users and applications, helping to identify potential security risks.

Overall, hidps is a valuable tool for securing individual systems within a larger network.

For more information about advantage of an hidps, visit:

https://brainly.com/question/27804374

#SPJ11

what is chicago to new york flights

Answers

Flights from Chicago to New York are airplane trips that connect the two major cities.

There are several airlines that offer non-stop and connecting flights between the two destinations, including United Airlines, American Airlines, and Delta Airlines. The flight duration typically ranges from 2 to 3 hours, depending on the specific airline and route.

It is important to note that flight times and availability may vary based on the time of year and other factors. It is recommended to check with the specific airline for the most up-to-date information.

Learn more about flights from chicago to new york:

brainly.com/question/29766777

#SPJ11

what knowledge permissions do article contributors need

Answers

Article contributors require Customize Application privilege as well as Read, Create, and Edit article actions.

Who are some of the contributors?

A contributor is someone who participates in or makes a contribution to something. Contributors are writers and those who contribute money in particular. Contributors are writers whose work appears in a book, magazine, or newspaper. Contributors are third-party contacts participating in your client's work, such as a lawyer or a client's consultant. If you have any connections or third-party firms with a stake or engagement in a job or a company, you can easily keep them updated by adding them as Contributors.

Know more about  Application Visit:

https://brainly.com/question/28650148

#SPJ4

in calculating the time spent on reading or writing a disk block, all the factors below should be considered except a. how long it takes to transfer the data b. how long it takes to decrypt the data that is encrypted. c. how long it takes for the proper sector to appear under the reading/writing head d. how long it takes to move the arm to the proper cylinder

Answers

In calculating the time spent on reading or writing a disk block, all the factors below should be considered except, how long it takes to move the arm to the proper cylinder. Thus, option D is correct.

What is block?

In data storage and transmission block is called as physical record contains whole number of records, and it is a sequence of bits having maximum length called block size.

When data is placed into the blocks it is called as blocking, and process of extracting data is called as a deblocking. Blocking reduces amount of external storage required for data in some devices.

Therefore,  how long it takes to move the arm to the proper cylinder is not considered in calculating the time spent on reading or writing a disk block. Hence, option D is correct.

 

Learn more about block, here:

https://brainly.com/question/16614000

#SPJ1

what is the number for august?

Answers

August is the eighth month of the year, so the number for August is 8.

What is year?

Year is a unit of time that is defined as the length of one orbital revolution of the Earth around the Sun. It is typically used to measure the duration of events, such as birthdays, anniversaries, or other calendar events. A year consists of 365.2425 days, or 8,765.82 hours, or 525,949.2 minutes, or 31,536,000 seconds. It is divided into 12 months, each with its own distinct characteristics. The months of the year are January, February, March, April, May, June, July, August, September, October, November, and December. Each year, the Earth completes its orbit around the Sun, bringing us from one season to the next.

To learn more about year

https://brainly.com/question/28792227

#SPJ4

explain green economy and briefly discuss its elements

Answers

Green economy is the use of computers and other electronic devices and equipment used in energy-efficient and eco- friendly ways.

According to Karl there are 6 sectors-Renewable Energy, Green Buildings, Sustainable Transport, Water Management and Waste Management.

Renewable energy comes from non-finite sources within the environment that cannot run out

Green buildings are buildings that, because of it's construction and features, can maintain or improve the quality of life of the environment in which it is located.

Sustainable Transport is any transportation that is 'green' and has low impact on the environment.

Water Management is the process of planning, developing, and managing water resources.

Waster Management involves the processes of waste collection, transportation, processing, as well as waste recycling or disposal.

what is the most common connector used with utp cabling carrying ethernet traffic?

Answers

The most common connector used with UTP cabling carrying Ethernet traffic is the RJ-45 connector, which is a standard connector for network cables in most modern Ethernet networks.

The most common connector used with UTP (unshielded twisted pair) cabling carrying Ethernet traffic is the RJ-45 (registered jack) connector. This is a standard connector used in most modern Ethernet networks, and it is compatible with various networking standards, including 10BASE-T, 100BASE-TX, and 1000BASE-T. The RJ-45 connector is a modular connector that features eight pins and is designed to terminate UTP cabling in a structured wiring system. The connector is easy to install and replace, making it a popular choice for network administrators. It is also widely available and relatively inexpensive, making it an affordable option for both home and commercial networking applications.

Learn more about common connector here:

https://brainly.com/question/16963770

#SPJ4

mike is a commercial landscaping specialist who wants to use the internet for job hunting. which one of the following tactics is the least likely to be successful?

Answers

mike is commercial landscaping use the internet for job hunting. Send a tweet to people he is following and followers saying that is hungry work.

Using a friend, a larger corporate network, your personal network, or social media to find a job Utilizing a job-hunting website search engines for job postings. reading the classifieds in the newspaper .utilising a private or public recruiter or employment agency .searching for available positions on a company's website, usually through its application tracking system visiting a job fair. using expert advice, such as outplacement firms that provide training in résumé writing, job application, and interview success.

learn more about job hunting. here:

https://brainly.com/question/12408261

#SPJ4

What is the format for the while clause in Python?A. while conditionB. while condition : statementC. while condition statementD. while condition :

Answers

Option B describes the syntax for the while clause in Python: "while condition: statement." While a specific condition is true, a block of code is continuously run in Python while using the while loop.

The word "while" precedes the condition in the while clause, which is then surrounded by parentheses. The while loop executes the code inside if the condition is met. The statement or collection of statements that are indented and come just after the colon (:) after the condition describe this code block. When x is less than or equal to 5, for instance, the following Python code illustrates a straightforward while loop that outputs the values of x: When x = 5, x = 1: x += 1 and print(x). In this example, the condition is "x = 5", and the statement inside the while loop is "print(x)," which is followed by an increase of x by 1 (x += 1). The result of this code will be: 1 \s2 \s3 \s4 \s5.

learn more about Python here:

brainly.com/question/30391554

#SPJ4

How to get a confusion matrix helps?

Answers

To get a confusion matrix, you can follow these steps:
1. Start by creating a table with two rows and two columns.
2. Label the columns as "Predicted Positive" and "Predicted Negative".
3. Label the rows as "Actual Positive" and "Actual Negative".
4. Fill in the cells of the table with the number of true positives, false positives, false negatives, and true negatives.
5. Calculate the accuracy, precision, recall, and F1 score using the values in the confusion matrix.


A confusion matrix is a table that is often used to describe the performance of a classification model (or "classifier") on a set of test data for which the true values are known. It allows you to see which types of predictions your model is getting correct and which types it is misclassifying. This helps you to identify potential issues with your model, and gives you insight into how to improve it.

To get a confusion matrix, you will need to pass the true values and the predictions from your classifier into a confusion matrix function such as scikit-learn's confusion_matrix(). A confusion matrix helps in evaluating the performance of a classification model. It is a table that is used to describe the performance of a classification model on a set of test data for which the true values are known.

Learn more about the confusion matrix helps: https://brainly.com/question/23480556

#SPJ11

what is the serach engine who integrated to artificial intelligence software from openai, the maker of the popular chatbot chatgpt from microsoft,

Answers

The search engine that has been integrated with OpenAI's Artificial Intelligence software is Microsoft Bing.

What is OpenAI?

OpenAI is a nonprofit artificial intelligence research company that works to develop and promote friendly AI in order to benefit humanity as a whole. OpenAI is focused on creating an AI-powered future that is safe, prosperous, and inclusive.

Microsoft Bing is a web search engine developed by Microsoft, and it is the second largest search engine in the world. It has been integrated with OpenAI's Artificial Intelligence software to deliver more accurate and personalized results. Microsoft has also integrated its own chatbot, ChatGPT, into Microsoft Bing's AI-powered search engine. This integration has allowed Bing to return more detailed and relevant search results to users, while also providing a more natural conversation experience.

To learn more about OpenAI
https://brainly.com/question/26101173
#SPJ1

what is store of value?

Answers

A store of value, as used in technology, is a particular kind of digital asset or cryptocurrency that is intended to serve as both a medium of exchange and a store of value, much like conventional forms of money.

How do you calculate a store's worth?

Sum up the value of all the company's assets, including all of its inventory and equipment. Subtract any liabilities or debts. The balance sheet value of the company is at least a place to start when figuring out how much the company is worth.

What are the three methods for valuing a company?

Three basic valuation methods are employed by business professionals when determining a company's value as a continuing concern: (1) DCF analysis, (2) similar company analysis, and (3) precedent transactions.

To know more about technology visit:-

https://brainly.com/question/9171028

#SPJ4

What is the difference between A * and Dijkstra's algorithm?

Answers

The sole difference between the A* algorithm and Dijkstra's algorithm is that the A* method uses a heuristic function to try to find a better path by giving priority to nodes that are thought to be better than others.

Why not substitute A * for Dijkstra?

By utilizing heuristics to direct its search, A* is able to perform better. In contrast to Dijkstra's method, the A* algorithm simply determines the shortest path from a given source to a given goal; it does not determine the shortest-path tree from a given source to all potential goals. a

Is A* always preferable than Dijkstra?

Moreover, A* always outperforms Dijkstra because it conducts educated rather than uninformed search: Because A* takes into account more information on the minimum distance to the target, it extends more promising vertices than Dijkstra.

To know more about algorithm visit:-

https://brainly.com/question/30025677

#SPJ4

what total number of compartments are located inside a collective protection system

Answers

Within a collective protection system, there are four compartments.

What exactly is a system of collective protection?

A ship's HVAC system incorporates the Collective Protection System (CPS), a permanent air filtration system. It generates pressure in some places, which will force air outward in the case of a chemical outbreak. Unfortunately, the existing CPS was not created with energy efficiency in mind.

What is an instance of group defense?

The aim of the safety strategy known as collective protection is to simultaneously protect a number of workers who are exposed to a certain risk. The systems used to prevent falls from heights serve as an illustration.

To know more about collective protection system visit:-

https://brainly.com/question/14471213

#SPJ4

How do you sort an array in C++?

Answers

A C++ STL includes a built-in function called sort an array in C++ With this function, the range's items can be arranged in either ascending or descending order.

How is a list sorted?

Using the sort() method of the Arrays class, we may arrange arrays in ascending order. The array that has to be sorted is passed as a parameter to the function sort(). ReverseOrder(), a function offered by the Collections class, was used to sort an array in descending order.

In C++, how do you sort an array?

First is the index (pointer) of the first element in the range that needs to be sorted in this case. In the range to be sorted, last is the index (pointer) of the last element.

To know more about sort an array in C++ visit :-

https://brainly.com/question/29035434

#SPJ4

how are while loops and for loops different in python?

Answers

With Python, you can use for loops to loop once over list data and while loops to run the same task multiple times. You will learn about the two types of loops and when to use each one in this module.

Which is superior—a for loop or a while loop?

While loops and for loops both have different ways to be executed and can be useful if used appropriately. For loops are used when the number of iterations is known, while while loops are used when they are unknown. When the initialization is complex, the while loop is used, and if the initialization is complex, the for loop is used.

In Python, why do we use while loops?

This order trusts that an occasion will occur. Python is instructed to repeat the action if a particular condition is met. When you don't know how many times your code needs to run, use this loop.

To know more about Python visit :-

https://brainly.com/question/30427047

#SPJ4

After packets of information have passed through multiple routers on the internet, what happens to them when they arrive at your home network?

Answers

When packets of information arrive at your home network, they are routed to the correct device based on their destination address.

What is network?

Network is a system of computers, smartphones, and other devices that are connected together to facilitate the exchange of data. It is a communication infrastructure that allows devices to communicate with each other. Networks can be used to send and receive data, share resources, and provide access to the internet. A network can either be local or wide area, depending on the geographical location of the devices. Networks can also be wired or wireless and support various protocols such as Ethernet, Wi-Fi, and Bluetooth.

Once the packets have reached their destination, they are reassembled and the data is made available to the recipient. Depending on the type of data, it may be displayed on the screen, stored, or used for some other purpose.

To learn more about network
https://brainly.com/question/29506804
#SPJ1

how to chicago in text citation

Answers

In-text citations in Chicago are formatted differently depending on whether you are using notes or author-date style. Notes-Bibliography Style: Use superscript numbers in the text to designate sources.

and then include matching numbered footnotes or endnotes with bibliographic information in the notes-bibliography style. Here's an example of an in-text reference formatted in this manner: "The quote goes here," says the author. 1. The notion being expressed (Author's last name, year) 1. Author-Date Format: Include the author's last name and the year of publication in parenthesis in the text when using the author-date format. Here's an example of an in-text reference formatted in this manner: "The quote goes here," says the author (last name, year, page number). The formalized paraphrase  idea being conveyed (Author's last name year, page number) Remember that in both styles, the full citation information must be included in the reference list or bibliography at the end of the paper. It's important to check with your instructor or publisher for specific guidelines, as there are variations within the Chicago citation style.

learn more about Chicago  here:

https://brainly.com/question/9349051

#SPJ4

Is Typescript better than Javascipt?

Answers

Every one of these dialects are excellent, but TypeScript stands out from the competition in a significant manner that renders it more suited for front-end development.

Describe Java?

Operates on millions of devices, include laptops, smartphones, game consoles, medical equipment, and many more. Java's syntax and principles are derived from the C / C++ dialects. Java is used to create the Android operating system. itself. While Kotlin has lately emerged as a Java-free alternative for Android development, it still makes usage of the Jvm and can communicate with Java code.

Describe a computer?

A computer is a machine that processes data in form of data based on a programme, piece of software, or a collection of instructions regarding how to accomplish something.

To know more about java visit :

https://brainly.com/question/29897053

#SPJ4

Which device will create broadcast domains and raise effective bandwidth?
A. Firewall
B. Hub
C. Router
D. Switch

Answers

The router will increase the effective bandwidth and create broadcast domains.

At layer 3 of the OSI reference model, which of the following is a device that is used to divide or segment broadcast domains?

At layer 3 of the Open Systems Interconnect (OSI) model, routers decide how to forward data based on layer 3 networking data, or IP addresses.

Which gadget increases network performance by creating distinct collision domains for a given network segment?

The bridge increases network performance by decreasing the amount of collisions that could possibly happen on a LAN segment (fewer LAN speakers on the same segment) by dividing two or more LAN segments into distinct collision zones. The network switch was the subsequent evolution.

To know more about router visit:-

https://brainly.com/question/29869351

#SPJ4

routers do not forward broadcast packets. (T/F)

Answers

Yes, it is true to say that routers do not forward broadcast packets.

What is a router used for?

One or more packet-switched networks or subnets can be connected by a gateway. By sending data packets to one‘s intended IP addresses, it manages traffic between these networks and permits numerous devices to share an Internet connection.

Is wireless router the same as WiFi?

The most popular method of connecting to the internet is WiFi, but this method requires an active internet link. When a WiFi router is directly linked to an internet source, it takes a certain internet connection and makes it available to devices so they can connect to the WiFi signal and access the internet.

To know more about router visit :

https://brainly.com/question/30010401

#SPJ4

CODEHS Exercise 7.8.2 Usernames and Passwords: Pseudocode
Using the AP style pseudocode, write a program that displays a list of 5 usernames. The program will then ask the user to create a password for each user that will be stored in a separate list. Once all the passwords are entered the program should display the list of passwords.

Answers

Answer:

Here's an example pseudocode program using AP style:

DECLARE usernames AS ARRAY OF STRINGS WITH 5 ELEMENTS

DECLARE passwords AS ARRAY OF STRINGS WITH 5 ELEMENTS

SET usernames[0] = "johndoe"

SET usernames[1] = "janedoe"

SET usernames[2] = "bobsmith"

SET usernames[3] = "sarahlee"

SET usernames[4] = "alexjones"

DISPLAY "The following usernames have been created:"

FOR i FROM 0 TO 4

   DISPLAY usernames[i]

FOR i FROM 0 TO 4

   DISPLAY "Please enter a password for " + usernames[i]

   SET password = GET USER INPUT

   SET passwords[i] = password

DISPLAY "The following passwords have been set:"

FOR i FROM 0 TO 4

   DISPLAY passwords[i]

This program declares two arrays: one for the usernames and one for the passwords. It sets the values of the usernames array and displays them for the user. It then prompts the user to create a password for each username, and stores the passwords in the passwords array. Finally, it displays the passwords for the user. Note that this is just a pseudocode program and may need to be modified or adapted for use in a specific programming language or environment.

when a coder is following up on submitted claims the coder should sepearte

Answers

In medical coding follow up on all claims should begin as soon as 7 to 10 days after your claim has been submitted to the insurance company.

Simple medical coding mistakes could result in lost income of more than $100,000 for your emergency medicine business. when errors in medical billing and coding cause the government and insurance companies to reject claims. Unless you can amend and resubmit a clean claim, your EM group will not receive any payment.

High denial rates are caused by the most frequent billing and coding mistakes in medicine, which could jeopardize patient treatment. Yet, the more severe repercussions of upcoding and instances of medical abuse and fraud could result in your organization paying costly fines and facing federal penalties.

Now is the moment to start reducing medical coding errors, lowering denied claims, and increasing reimbursements.

learn more about medical coding here;

https://brainly.com/question/28325655

#SPJ4

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?A. It ensures network resources such as printers are used correctlyB. It allows individualized configuration through manual inputC. It increases physical access to all network devicesD. It automates configuration, policy management and other tasks

Answers

Software-defined networking (SDN) reduces both the risk of human error and overall network support and operations costs by automating many of the manual configuration and policy management tasks that are traditionally completed by humans.

What is Networking ?

Networking is the process of connecting computer systems and other electronic devices together to allow the transfer of data between them. It is the basis for digital communication, allowing devices to communicate with each other over a physical or wireless network. This type of communication is useful for sharing information between users, allowing for more efficient collaboration and the sharing of resources.

This automation ensures that network resources such as printers are used correctly and that individualized configurations can be applied with minimal manual input. Additionally, SDN increases physical access to all network devices, allowing for more efficient and cost-effective management of the network.

To learn more about Networking

https://brainly.com/question/29338740

#SPJ4

What would happen if the AV node failed to delay transmission of signals from the SA node? A. The atria and ventricles would contract at the same time B. The ventricles would start squeezing from the top to the bottom C. The AV node and the SA node would be unable to communicate C. Neuronal regulation of heart rate would be impaired E. None of the above are correct

Answers

A. The atria and ventricles would contract at the same time.

The AV (atrioventricular) node is responsible for delaying the electrical impulses that are generated by the SA (sinoatrial) node, which is the natural pacemaker of the heart. This delay allows the atria to contract and pump blood into the ventricles before the ventricles contract and pump blood out of the heart.

If the AV node fails to delay the signals from the SA node, the atria and ventricles would contract at the same time, which would result in inefficient pumping of blood and a decrease in cardiac output. This condition is called atrioventricular dissociation, or AV dissociation. It can be caused by a number of factors, including damage to the AV node, certain medications, and certain medical conditions such as heart block.

Therefore, option A is the correct answer. The other options are not correct because they do not describe the consequences of AV node failure in delaying the transmission of signals from the SA node.

Please brainliest

Hardware and software work ______ to allow user to form of function?
jointly
repeatedly
separately
independently

Answers

Answer:

Explanation:

seprately

the _______ animation animates the object leaving the slide; starts with the object visible and ends with the object not visible. entrance emphasis exit motion paths

Answers

The animation described in the statement is Exit animation.

What are the different types of exit animations available in presentation software?

Different presentation software may have different types of exit animations available, but some common types include Fade, Dissolve, Wipe, Zoom, and Fly Out. Each type of exit animation can be customized to adjust the direction, speed, and other properties of the animation.

What is the purpose of using exit animations in a presentation?

Exit animations can help to add visual interest and engagement to a presentation, by animating objects as they leave the slide. This can help to emphasize the end of a point or transition, and can also help to create a sense of movement and progression within the presentation. However, it is important to use exit animations sparingly and appropriately, as too many or overly complex animations can be distracting and detract from the content of the presentation.

Learn more about animation here:

brainly.com/question/29996953

#SPJ4

how did engineers use prototypes to improve the accuracy of touch screens?

Answers

Prototypes are used by engineers to identify specific design unknowns.

What are prototypes?

A prototype is a model of a product that is used to investigate several design options, test theories, confirm performance, and make sure the product is secure and easy to use.

Engineers employ prototypes to pinpoint specific design unknowns.

It's not always easy to see a design's flaws on paper or a computer screen.

By building a prototype, you can actually handle a working example of your proposed product and assess which elements are effective and which ones require improvement.

This is your opportunity to collect more precise requirements and market input.

Thus, this way, engineers use prototypes to improve the accuracy of touch screens.

For more details regarding prototype, visit:

https://brainly.com/question/28187820

#SPJ1

Other Questions
which bond portfolio construction is based on a phase in of purchases in installments over time Which instrument family is not heard in this example played by a concert band?Sousa: Stars and Stripes ForeverA. strings B. Percussion C. Brass In a physiological system operating with positive feedback, _____. Write the equation of the circle given center: (1,-3) and diameter:20I put it as (x-1)^2+(y+3)^2=400 why is spacing and timing of vaccines important? A games console costs 255 in the uk. The same one costs 300 euros in france.The exchange rate is 1 - 1.16 is it cheaper to buy the games console in the uk or france show your working A fruit company packages its fruit into two types of boxes: large and small. This morning, the company made two deliveries. The table below shows the numberof boxes in each delivery and the total weight (in kilograms). True or False: When possible, it is best to always travel with a cell phone. "Because of resistance, slavery came to an end" Do you agree or disagree with the statement (6). Opposing view for 60-100 points!!!! Rob is concluding his speech. What should he do in the conclusion?A) Tie everything togetherB) Avoid repeating visuals used earlierC) Completely repeat the introductionD) Introduce his main points if the arm processor has a circuit optimized for addition and subtraction, e.g., the alu adder/subtractor, and it has the ability to set a flag if the output of the alu is negative, write a pseudo-code algorithm for implementing the absolute subtraction routine on the arm processor. assume that you do not have the ability to multiply by -1 (you only have addition and subtraction capabilities). The social science term "self-serving bias" is most closely related to which common perceptual error? a. Judging ourselves more charitably b. Being influenced by the most obvious stimulic. Clinging to first impressions d. Assuming others are similar to us the ultimate power to determine how much the government will tax and spend lies with QuestionWhy is AC used for long distance power transmission instead of DC?AAC dissipates lower power than DC in a current carrying wireBIt is more convenient to step up/down voltage for AC than DCCPower dissipation in AC is lower since frequency is highDAC has lower risk of shock than DC 5.11 Unit Test: Molecular Genetics - Part 1 for K-12I need the answers please pattern of fluctuations in bodily processes that occur regularly each day Transition metal elements have atoms or ions with partially filled ________.a. s subshellsb. p subshellsc. d subshellsd. f subshellse. g subshells which motion is used to stop a debate immediatly at an ffa meeting find the value of a in the number 6a subtract 4 a+ 5a=210 What was the legal basis for the government's involvement in desegregating the University of Mississippi?answer choicesJames Meredith and the NAACP won a federal court case.The Constitution allows federal involvement in education.The government had sued the University of Mississippi.The NAACP had sued the University of Mississippi in a state court.