How To Fix Modern Warfare 2 "unable to access online services reason puget altus"?

Answers

Answer 1

Here's all the potential solutions:Go to the Activision Internet Services page to check the server status.your router, restart it.Unplug your gaming system, hold the power button down for ten seconds, and then switch it back on after waiting for around two minutes.Switch the DNS servers.

What is Puget Altus' rationale?

Sounding is a connection error messages, which means you may be dealing with either one of two issues: either client-side problems, which you can typically fix on your own, or the dreaded server-side problems, which are completely beyond your control.

Why does MW state that it cannot access the internet?

Warzone's "unable to access online services" error manifests whenever the game client experiences connectivity problems.The player's connection, network gear, or server problems are typically to blame.

To know more about online services visit:

https://brainly.com/question/29896912

#SPJ4


Related Questions

write one line of code that declares an instance field named amount of type int and initializes it with the value 101.

Answers

A variable is a name connected to a piece of computer memory. A value can be stored in computer memory, and that value may change or fluctuate.

In Java, there are two different sorts of variables: object variables, which store a reference to an object of a class, and primitive variables, which store primitive types. A reference can help you locate the thing (like a UPS tracking number helps you find your package)

class Questionz {

   late String questionText;

   late bool questionAnswer;

   Questionz({required String t, required bool a}) {

       questionText = t;

       questionAnswer = a;

   }

}

Learn more about variable here-

https://brainly.com/question/13375207

#SPJ4

question 8 why is it risky if you wanted to make an exception to the application policy to allow file sharing software?

Answers

It is risky if you wanted to make an exception to the application policy to allow file-sharing software because the software could be infected with malware.

What is the application policy?

It's crucial to set up some sort of application policy. These regulations have two objectives.

They not only outline restrictions on which apps are allowed or not, but they also assist in educating users on safer software usage.

Therefore, making an exemption to the application policy to permit file-sharing software is dangerous because the software may be malware-infected.

To learn more about the application policy, refer to the link:

https://brainly.com/question/28528067

#SPJ1

11) Email clients, FTP clients, and web browsers are different ways of accessing information on the web.

True

False

Answers

Answer: tech- this is true but..

Explanation:

email clients are a way to send information but it has to access information before it sends information

ftp clients are the same

and the web is, well you know the world wide web the biggest library for information.

hope it helps

last final anwser is Yes Its True

NEED HELP ASP WILL GIVE BRAINLIEST

The title screen of Eduardo’s original game features a grayscale cityscape with a bright blue river. What technique is Eduardo using in his title screen? (1 point) Responses

foreshadowing the game’s aesthetics and the environment of the game world

teaching the player how to move the player object

creating the emotion of suspense

splitting the screen to show the pre-game information

Answers

The technique that Eduardo us using in his title screen is A. foreshadowing the game’s aesthetics and the environment of the game world

What is foreshadowing about?

A storyteller uses foreshadowing as a narrative device to give a sneak preview of what will happen later on. A story's opening frequently contains foreshadowing, which aids in shaping or defying the audience's expectations regarding forthcoming events.

In this case, the cityscape and river are depicted in grayscale on Eduardo's original game's title screen.

In conclusion, it should be noted that the correct option is A

Learn more about foreshadowing on:

https://brainly.com/question/96170

#SPJ1

A vending machine serves chips, fruit, nuts, juice, water, and coffee. The machine owner wants a daily report indicating what items sold that day. Given boolean values (1 or 0) indicating whether or not at least one of each item was sold, output a list for the owner. If all three snacks were sold, output "All snacks" instead of individual snacks. Likewise, output "All drinks" if appropriate. For coding simplicity, output a space after every item, even the last item. Ex: If the input is 0 0 1 1 1 0, output: Nuts Juice Water Ex: If the input is 1 1 1 0 0 1, output: All-snacks Coffee Ex: If the input is 1 1 1 1 1 1, output: All-snacks All-drinks Ex: If the input is 0 0 0 0 0 0, output: No items

Answers

Answer:

bool chipsSold, fruitSold, nutsSold; // Snack items

bool juiceSold, waterSold, coffeeSold; // Drink items

cin >> chipsSold;

cin >> fruitSold;

cin >> nutsSold;

cin >> juiceSold;

cin >> waterSold;

cin >> coffeeSold;

if(chipsSold == 1)

{

cout<<"Chips ";

}

else

{

return 0;

}

if(fruitSold == 1)

{

cout<<"Fruit ";

}

else

{

return 0;

}

if(nutsSold==1)

{

cout<<"Sold ";

}

else

{

return 0;

}

return 0;

}

which components of the microservices arch are compliant to activities when implemented in the spring boot application

Answers

The routing, response formats, and even the system cache are handled by the API gateway. By utilizing API gateway, internal microservices can use several communication protocols.

The service mesh develops a dynamic communications layer in a microservices architecture to streamline communication. Developers don't have to write in inter-process communication when they construct the program because it abstracts the communication layer. The "new normal" is microservice architectures. Small, standalone programs that are ready to launch can give your code more flexibility and durability. The numerous purpose-built capabilities of Spring Boot make it simple to design and manage your microservices in scaled-up production.

Learn more about communication here-

https://brainly.com/question/14809617

#SPJ4

What was the first model of the Remington typewriter to include the visible "upstrike" design?Question 2 options:Remington 1 Remington 2 Remington 3 Remington 10

Answers

The first model of the Remington typewriter to include the visible "upstrike" design was the B. Remington 2

What is a Typewriter?

This refers to the term that is used to describe and define the use of a machine that types out words and numbers on a piece of paper and is a primitive printer.

Hence, it can be seen that the Remington No. 2, which was originally sold in 1878, was the first typewriter to achieve commercial success. You must raise the platen to see the lettering since the type-bars strike it from below. It is also known as an upstrike machine or a blind writer.

Read more about typewriters here:

https://brainly.com/question/485590

#SPJ1

what is the difference between vlookup and hlookup?

Answers

You can use VLOOKUP to perform a vertical data range search. The HLOOKUP function searches through data that has been formatted in rows rather than columns. For business analytics in Excel, LOOKUP and related functions are frequently used to slice and dice data for analysis.

Hlookup or VLOOKUP: Which is superior?

In comparison to the HLookup function, we much prefer the VLookup function. When the data is organised into rows, we use this function. When the data is organised into columns, we use this function.

Why choose Hlookup over VLOOKUP?

Use HLOOKUP if the data table has row headers and you need to search across the rows horizontally for a "match."

To know more about data visit:-

brainly.com/question/21927058

#SPJ4

99) an attacker in an offside position at the moment of the touch by a teammate receives the ball from a deflection by a defender. is this an offside offense?

Answers

YES: A ball deflected by a defender is received by an attacker who is offside at the time of a teammate's touch. This is an offside offense.

Explain the term offside offense?

In plain English, a player gets offside if they're in the offensive half as well as closer to the goal line of the opposing team than the ball and the player after them.

Any part of a player's head, body, or feet that is inside of the opponent's half (outside of the halfway line) or that is closer to the opponent's goal line than both ball and the last opponent are considered to be in an offside position.Example: When the ball is passed, the red attacking player has already passed the final defence. This is against the rules and is not permitted. That blue team will receive the ball after the referee blows his whistle.

Thus, a ball deflected by a defender is received by an attacker who is offside at the time of a teammate's touch. Offside is being violated here.

To know more about the offside offense, here

https://brainly.com/question/14283763

#SPJ4

true or false? corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

Answers

Answer:

True

Explanation:

Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

what is a data dictionary useful for? it is a tool for transforming data into a relational database.

Answers

A data dictionary is used to organize and explain the organization and substance of data, and it offers descriptive headings for specifically defined data objects.

What is a database's data dictionary?

In a database, information system, or as a component of a research effort, data components are used or recorded. A data dictionary is a collection of names, definitions, and properties regarding those data elements.

Tools for a data dictionary are what?

The tools used to retrieve data from any repository and access the information stored there are known as data dictionary tools. The term "data dictionary" refers to a certain kind of dictionary that gathers all the information about data, including its meaning, relationships, structure, and uses.

To know more about data dictionary visit :-

https://brainly.com/question/8897251

#SPJ4

which type of test simulates an insider threat by giving the tester partial information about the network and computer systems?

Answers

Answer:

Penetration test

what term describes a one-word name with no embedded spaces that references a variable in a program?

Answers

The correct option c) identifier, is the name for a one-word name that specifies a variable in a programme and has no embedded spaces.

Explain the term identifier and its features?

One of the tokens used in the C programming language is identifier. Factors, variables, functions, arrays, and user-defined data are all identified by this term.

Because keywords were reserved for specific uses, we are unable to utilise them as identifiers. Once declared, the identifier can be used to refer to a associated value in later programme statements.

The following are the guidelines for naming identifiers:

Names for identifiers are special.No keywords may be used as identifiers.The name of the object must start with just a letter or an underscore ( ).There shouldn't be any white space in it.There are no permitted special characters.Identifiers may only be made up of letters, numbers, or underscores.There are just 31 characters that matter.They take case into account.

Thus, identifier, is the name for a one-word name that specifies a variable in a programme and has no embedded spaces.

To know more about the identifier, here

https://brainly.com/question/13437427

#SPJ4

The complete question is-

What term describes a one-word name with no embedded spaces that references a variable in a program?

a) attribute

b) behavior

c) identifier

d) bug

what hardware and/or operating system support do you think would be needed to protect an application's data structures in memory from being corrupted by other applications?

Answers

It is needed to do fault isolation requires a guard. app memory is guarded by hardware, disk is guarded by the operating system kernel, while spam is harder to prevent. The correct option is C.

What is corrupted memory?

Memory corruption, also known as a violation of memory safety, happens when the contents of a memory location are changed as a result of programmed action that deviates from the original programmer's purpose or from program/language constructs.

A guard is necessary to perform fault isolation. Hardware protects app memory, the operating system kernel protects the disc, but spam is more difficult to stop.

Thus, the correct option is C.

For more details regarding memory corruption, visit:

https://brainly.com/question/2944613

#SPJ1

- Protect an application's data structures in memory from being corrupted by other apps

-Protecting one user's disk files from being accessed or corrupted by another user

-Protecting the network from a virus trying to use your computer to send spam

write a statement that calculates the average of 12 and 40, and assigns the result to a variable named avg.

Answers

A statement that computes the average between 12 and 40 and stores the result in the avg. variable.

Program:

import os

def calculateGrade(students_marks):

   grade = []

   for x in range(len(students_marks)):

       avg = (sum(students_marks[x]))//len(students_marks[x])

       print(avg)

       if(avg >= 90):

           grade.append('A+')

       elif avg in range(80,90):

           grade.append('A')

       elif avg in range(70,80):

           grade.append('B')

       elif avg in range(60,70):

           grade.append('C')

       elif avg in range(50,60):

           grade.append('D')

       elif (avg < 40):

           grade.append('F')

   return grade

students_marks_rows = int(input().strip())

students_marks_columns = int(input().strip())

students_marks = []

for _ in range(students_marks_rows):

   students_marks.append(list(map(int, input().rstrip().split())))

result = calculateGrade(students_marks)

print(result)

fptr = open("text.txt","w")

fptr.write('\n'.join(result))

fptr.write('\n')

fptr.close()

Is used to provide values for variables?

The assignment (=) operator can be used to assign a value to a variable. The operation of assignment produced the assigned value. The assignment operator can be chained to assign a single value to several variables.

What statement is used to give a computer variable a value?

The assignment operator, =, and either an expression or a constant are used to assign a value to a variable in the most typical kind of statement in a programme: Variables are expressions and constants. Although the assignment operator's symbol resembles the mathematical equality operator, it has a different meaning in C++.

To know more about Variables visit:-

https://brainly.com/question/13375207

#SPJ4

you install windows on a new ssd that fits in an m.2 socket in a modern high-end motherboard. after installing the os, the system will not boot as expected. what could be the problem?

Answers

The CMOS, a memory chip that stores setting configurations and is powered by the onboard battery, is a real component of the motherboard. In the event that the battery dies, the CMOS is reset and all user settings are lost. The system clock is also reset when the CMOS loses power.

What is CMOS ?

There are several additional names for the complementary metal-oxide semiconductors that make up CMOS, including NVRAM (non-volatile RAM), RTC (real-time clock), and CMOS RAM.

A built-in, battery-operated semiconductor chip called CMOS acts as a data storage device in computers.

The hardware configurations of your machine and the system time and date are included in this data.

The image shows the Panasonic CR 2032 3V coin cell battery, which is the most common type used to power CMOS memory.

The Motorola 146818 chip, the first RTC and CMOS RAM component utilized in early IBM systems, could hold 64 bytes of information. As the system clock only used 14 bytes, the remaining 50 bytes of RAM could be used to store system settings.

Most of the computers in use today have settings built in.

Hence, The CMOS, a memory chip that stores setting configurations and is powered by the onboard battery, is a real component of the motherboard

learn more about CMOS click here:

https://brainly.com/question/14767803

#SPJ4

which of the following is not a valid statement? a. online analytical processing is a set of tools that work together to provide an advanced data analysis environment for retrieving, processing, and modeling data from the data warehouse. b. the data warehouse is a specialized database that stores data in a format optimized for decision support. c. production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making. d. a database that is designed primarily to support a company's day-to-day operations is classified as an operational database.

Answers

C. Production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making.

What is databases?

A database is a collection of information that is organized for easy access and manipulation. It typically contains data organized in a table, which is a two-dimensional structure with columns and rows. The columns represent the various elements of data, while the rows represent each individual record. Databases can be used to store and retrieve information quickly and securely. They are used in almost every industry and are essential for businesses to keep track of customer information, inventory, and more.

This statement is not valid because production databases are not used exclusively for tactical or strategic decision making. They are used to store the data that is used for day-to-day operations.

To learn more about databases
https://brainly.com/question/518894
#SPJ4

] assuming there is a growth function f(n), what does the value of f(0) represent in terms of an algorithm?

Answers

Assuming a growth function f(n) exists, f(0) denotes the growth function's starting point (n). To put it another way, f(0) stands for the general cost of running the algorithm on an empty input.

What is a growth function in data structures?

Growth functions are used to predict how many steps an algorithm will take as its input increases. The order of growth of an algorithm provides a rough estimate of the amount of time needed to run a computer program as the quantity of the input rises.

The sequence of growth ignores the constant factor required for fixed processes in favor of the operations whose output size grows proportionately. Exponential algorithms are only effective for minor issues since exponential functions expand rapidly.

To learn more about computer program, visit:

https://brainly.com/question/28874085

#SPJ4

you may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or cui to unauthorized persons.T/F

Answers

The claim that if you intentionally, recklessly, or negligently disclose classified information to unauthorized people, you risk losing access to classified information, is true.

Can you be punished for accidentally disclosing sensitive information?

If you unintentionally reveal CUI or classified material to unauthorized people, you could face legal, administrative, or even criminal repercussions.

Of the following, which are reviewed before publication?

Any DoD-related content that is meant for distribution to the general public must go through a prepublication security and policy review. To name a few, but not all of them: Theses, books, and manuscripts. brochures, conference papers, and briefings.

To know more about termination visit:-

brainly.com/question/27349244

#SPJ4

how much did the printer that came with the first univac system cost?

Answers

between $1,250,000 and $1,500,000

that’s your answer

tenant sue wanted to install a grab bar in the bathroom to accommodate a handicap. which statement is false?

Answers

According to ADA regulations, grab bars must be installed on the side wall that is closest to the toilet (604.5). Someone who needs assistance sitting, standing, or getting from a wheelchair to the toilet seat can use this. The wall behind the toilet needs to have a grab bar as well.

What distinguishes a towel bar from a grab bar?

Grab bars are genuine safety products that are strong, long-lasting, and designed to support the weight of a falling adult in order to help prevent injury.

How can a person with a disability use a computer?

Another choice for people with disabilities is speech input.

To know more about speech input visit:-

brainly.com/question/22134491

#SPJ4

How to Fix ‘Unable to Connect to Playstation Network’?

Answers

Your router and console should be turned on and off repeatedly. If you are using WiFi to connect your console to the internet, try utilizing a cable connection.

I can't access PlayStation Network; why is that?

If you are using WiFi to connect your console to the internet, try utilizing a cable connection. For further connection troubleshooting information, go to PlayStation Repairs.

Why does my PS4 always report that it can't access the network?

Then, restart your PS4, network, and modem. Unplug your modem/router, PS4, and PS4 for around two minutes. Restart the console after reconnecting the modem/router. Check to determine whether you have internet access.

To know more about console visit:-

https://brainly.com/question/28702732

#SPJ4

"the application has failed to start side-by-side configuration is incorrect'' how to solve?

Answers

Start > Control Panel > Add or Remove Programs should be chosen. Track down the programme by scrolling down. After selecting it, select Repair. Launch the software or perform the update once more when the repair procedure is finished.

What does it indicate when something is set up side by side incorrectly?

The "side-by-side" error is a problem with the C++ Redistributable Package that affects Windows operating systems. Operating systems without the Microsoft Visual C++ 2005 Redistributable Package frequently experience this.

How can I open two files simultaneously?

The files you want to compare should be opened. Click View Side by Side under the Window group on the View tab. in the View tab, in the Window group. Click Window if you don't see Synchronous Scrolling.

To know more about  programme visit:-

https://brainly.com/question/29835824

#SPJ4

there are seven essential components of communication: source, message, channel, receiver, a. feedback, structure and purpose. b. feedback, context and noise. c. feedback, grammar and organization. d. feedback, grammar and body language.

Answers

The seven essential components of communication are source, message, channel, receiver, feedback, context and noise.

Feedback is a response from the receiver regarding the message that was sent, and it helps to ensure that the message was received and understood correctly.

Context is the environment or circumstances in which the communication is taking place, and noise is anything (including physical or psychological factors) that can interfere with the communication process.

Feedback can be verbal or non-verbal, and it can be positive or negative. Positive feedback indicates that the message has been received and understood, while negative feedback suggests that the message was not received or understood.

Learn more about Feedback:

https://brainly.com/question/28070508

#SPJ4

which type of malware is a fully contained program that self-replicates and spreads through networks?

Answers

A PC worm is a sort of malware whose essential capability is to taint different PCs while staying dynamic on contaminated frameworks. A PC worm copies itself to spread to uninfected PCs.

Is a sort of malware that is connected to a host record and can reproduce?

Worms. Like an infection, a worm can likewise self-reproduce and spread full duplicates and sections of itself by means of organization associations, email connections, and texts. Dissimilar to infections, nonetheless, a worm doesn't need a host program to run, self-recreate, and spread.

What is a sort of malware which is intended to report action on your PC to another party?

Spyware is a particular sort of malware that is intended to gather data about the client or their PC clandestinely. Perhaps of the most widely recognized way spyware is introduced on a PC is through tainted email connections or by tapping on noxious connections.

To know more about frameworks visit :-

https://brainly.com/question/13262553

#SPJ4

how to find margin of error from confidence interval?

Answers

The confidence interval, commonly referred to as the margin error, provides details on how closely your survey results are likely to resemble those of the wider public.

How can I calculate the margin of error using the confidence interval?

Half of the breadth of the total confidence interval is the margin of error. The confidence interval's width is 18.5 – 12.5 = 6. The error margin is equal to the breadth in half, or 6/2 = 3.

Multiplying a key factor (for a specific confidence level) and the population standard deviation yields the calculation for the margin of error. The square root of the sample's observational count is then used to divide the outcome.

To know more about margin error visit:-

https://brainly.com/question/29537987

#SPJ4

25 points each!!!
(Graphic Design)
You may add any image, text or video to your document if you are ____ directly to the work instead of copying, pasting or downloading it. (Also the answer is NOT "citing")

Answers

Not “citing?” That’s the first word it came to my mind. Because it is plagiarism if you copy anything but don’t cite.
But reading the problem again, the second part says “instead of copying, pasting, or downloading,” and the first part says “you may.” So I figured it must mean that it’s allowed, which means it won’t be plagiarism because you’re not copying and pasting or downloading. Or it means you are citing, but not copying and pasting or downloading the cite.
I have two answers I can think of: “insert” and “type.”
Insert because it just sounds right. Though I’m pretty sure it’s no different than copy and paste or download, it’s still plagiarism without citing.
Typing because you might be typing what you see on another article or website to your document instead of copy and paste or download, you might also change some words to avoid 100% copy. I believe that is allowed and avoids plagiarism.

iceland was name that to deter outsiders to conquer it, but it is not at all as ice-covered like greenland or parts of siberia even though it's near the arctic circle. why is the average temperature in winter much higher in iceland than in similar latitude parts of greenland and siberia?

Answers

In the winter, heat is transferred from the air above the ocean surface to the air above.Air above it heats up as a result, moving in Iceland's direction to the east.

Why is the average winter temperature in Iceland significantly higher than it is in regions of Greenland and Siberia that are at a comparable latitude? In the winter, heat is transferred from the air above the ocean surface to the air above.Air above it heats up as a result, moving in Iceland's direction to the east.Consequently, compared to eastern Greenland and central Siberia, this warm air delivers heat and warmth during the typical winter.Not just hot water in a pot but a variety of fluids can be heated or cooled using convection currents.Convection currents, for instance, transmit heat through the atmosphere, the oceans, and the molten rock beneath the surface of the Earth.In the winter, heat is transferred from the air above the ocean surface to the air above.Air above it heats up as a result, moving in Iceland's direction to the east.

To learn more about Iceland refer

https://brainly.com/question/19809568

#SPJ4

which sharing method should you use if you want to configure share and ntfs permissions for a user in a single process?

Answers

Answer:

If you want to configure share and NTFS permissions for a user in a single process, you should use the Security tab in the Properties window for the shared folder.

To access the Security tab:

Right-click on the folder you want to share and select Properties

Click on the Sharing tab and then click on the Advanced Sharing button

Click on the Permissions button to access the share permissions

Click on the Security tab to access the NTFS permissions

By using the Security tab, you can add or remove users and groups, and set their corresponding permissions for both the share and NTFS levels. This allows you to configure both types of permissions in a single process, rather than having to do them separately.

Note that while this method allows you to manage both permissions in one place, it's important to keep in mind that Share and NTFS permissions are different and that the most restrictive permission will always apply. It's important to test and ensure the correct permissions are set up.

define a function named sortvector that takes a vector of integers as a parameter. function sortvector() modifies the vector parameter by sorting the elements in descending order (highest to lowest). then write a main program that reads a list of integers from input, stores the integers in a vector, calls sortvector(), and outputs the sorted vector. the first input integer indicates how many numbers are in the list. ex: if the input is: 5 10 4 39 12 2 the output is: 39,12,10,4,2,

Answers

An illustration of functions, loops, and vectors or lists is a type of vector program. To better analyze data, sorting is the process of arranging it in meaningful order.

How can a sorting program be written?

A method for rearranging a large number of items in a predetermined order, such as alphabetically, highest to lowest value, or shortest to longest distance, is called a sorting algorithm. Sorting algorithms take lists of items as their input, carry out particular operations on those lists, and then return ordered arrays as their output.

The program  :

#include <iostream>

#include <vector>

#include <algorithm>

template<typename tip>

auto Compare(std::vector<tip>&a, std::vector<tip>&b) {

auto sum_a = 0, sum_b = 0;

for (int i = 0; i < a.size(); i++)

  sum_a += a[i];

for (int i = 0; i < b.size(); i++)

  sum_b += b[i];

return sum_a > sum_b;

}

template <typename tip>

void sort_sum_of_rows(std::vector<std::vector<tip>> &mat) {

std::sort(mat.begin(), mat.end(), Compare);

}

int main() {

std::vector<std::vector<int>> a{{2, 5, 1, 3, 4},

  {9, 8, 9},

  {3, 3, 2, 3},

 {4, 5, 2, 1, 1, 3, 2}};

sort_sum_of_rows(a);

for (auto &v : a) {

  for (int j : v)

    std::cout << j << " ";

  std::cout << std::endl;

}

return 0;

}

Learn more about sort vector function :

brainly.com/question/23671682

#SPJ4

Other Questions
30 POINTS!A eyeglasses store is checking their inventory. The table shows the relationship between the number of days since the opening of the eyeglasses store and the total amount of sunglasses in their inventory.Sunglasses InventoryNumber of Days Total Amount of Sunglasses2 525 467 4210 36Which graph shows the relationship given in the table? graph with the x axis labeled number of days and the y axis labeled total amount of sunglasses and a line going from the point 0 comma 52 through the point 1 comma 50 graph with the x axis labeled number of days and the y axis labeled total amount of sunglasses and a line going from the point 0 comma 56 through the point 1 comma 54 graph with the x axis labeled number of days and the y axis labeled total amount of sunglasses and a line going from the point 0 comma 52 through the point 1 comma 49 graph with the x axis labeled number of days and the y axis labeled total amount of sunglasses and a line going from the point 0 comma 56 through the point 1 comma 53The images are also the answers please help!! I need this done really quick!! Please help GIVING 50 POINTS 55.7.C.3.8 (High)How did the US Supreme Court affect the juvenile justice system during the1960s and 1970s?ADit refused to hear cases on the matter, saying that juvenile offenders werethe responsibility of the state.Bit ruled that due process rights for juveniles are the same as those foradults.CIt ruled that juvenile offenders were to be treated as they had been treatedin the pastIt set up programs meant to rehabilitate juvenile offenders so the courtswould be less crowded. what is the minimum weekly goal of energy expenditure from combined physical activity and exercise for obese clients? 5) Analysis: Do you think the authors of the Anti-Federalist Papers would argue that ordinary man should be heavilyinvolved in government, or that an elite class of educated men should be heavily involved in the government? Find the surface area of this rectangular prism. Be sure to include the correct unit in your answer. when was the kansas nebraska act published? find the distance from the given point to each of the following. (3, 9, -7) (a) the xy-plane 7 correct: your answer is correct. (b) the yz-plane 3 correct: your answer is correct. (c) the xz-plane 9 correct: your answer is correct. (d) the x-axis correct: your answer is correct. (e) the y-axis correct: your answer is correct. (f) the z-axis correct: your answer is correct. the term refers to a transport process involving pseudopod formation and amoeboid movement, whereas the term refers to a transport process involving the formation of a furrow or depression in the plasma membrane and the formation of a vesicle. Victorville, CA is located at 34.53o north latitude. On which day of the year does Victorville experience the most daylight hours?Group of answer choicesA. Winter SolsticeB. Summer SolsticeC. Autumn/Spring Equinox Assume the US is relatively scarce in labor and relatively abundant in capital. According to the Heckscher-Ohlin theory, which of the following will occur in the US in the presence of trade?The price of capital will rise and the price of labor will fall. Widespread atelectasis, non-cardiogenic pulmonary edema, and diffuse, fluffy alveolar infiltrates on chest radiograph are characteristic of a. acute respiratory distress syndrome. b. chronic obstructive pulmonary disease. c. asthma. d. cor pulmonale. **EXTRA POINTS!!**What's the solution to Biden delivering remarks with Mexicos Lpez Obrador? Could someone please tell me what 18x+1 equals. which type of data has database format (how it is stored in the database) that is known in advance and is consistent for each type? when a system reaches equilibrium, the transition of individual molecules from reactants to products or products to reactants stops, and all molecules remain in the respective states they were in when equilibrium was reached. TrueFalse note: enter your answer and show all the steps that you use to solve this problem in the space provided. use the circle graph shown below to answer the question. the image is a color pie chart divided into 5 portions, and is titled pets owned by sixth graders. starting from the 12 o'clock position at the top and going clockwise toward the right is dark blue portion labeled dogs, 45 percent. next portion if 30 sixth graders own birds, how many sixth graders were surveyed? saac Newton was consulted about the following problem by Samuel Pepys, who wanted the information for gambling purposes. Which of the following events has the highest probability?A: At least one 6 appears when 6 fair dice are rolled.B: At least two 6s appear when 12 fair dice are rolled.C: At least three 6s appear when 18 fair dice are rolled The Conventions of a number of the States, having at thetime of their adopting the Constitution, expressed a desire,in order to prevent misconstruction or abuse of its powers,that further declaratory and restrictive clauses should beadded: And as extending the ground of public confidencein the Government, will best ensure the beneficent ends ofits institution.What is meant by the phrase *further declaratory and restrictive clauses*?O A. The amendments list what citizens can and can't do.O B. The amendments have been passed by Congress. C. The amendments replace existing constitutional rights.O D. The amendments are valid and legally binding.