In best practice, should you use all lowercase, all uppercase or a mixture of cases in HTML tag names?

a
All lowercase

b
The first letter should be uppercase, the rest lowercase.

c
A mixture is fine.

d
All uppercase

Answers

Answer 1
B considering it’s proper english, we went through this about a week ago

Related Questions

how do I fix when it hits the second session it skips scanf..
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}​

Answers

Answer:

the answer can be found HERE:

https://stackoverflow.com/a/13473767

put a leading space in the scanf(" %c", &op)

Explanation:

#include <stdio.h>

#include <unistd.h>

#include <ctype.h>

main() {

double first, second;

char op;

while(1){

printf(" Calculator\n");

printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");

scanf(" %c", &op); //entering operators such as + - \ *

printf("Enter two operands:");

scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414

switch (op) { // printing the math

case '+'://if its +

   printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);

   break;

case '-'://if its -

   printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);

   break;

case '*'://if its *

   printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);

   break;

case '/'://if its :

   printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);

   break;

default://if its not + - / *

   printf("error!");

}

}

}

The page that appears when you first open your Internet browser is the _____.


opening page
opening page

launch page
launch page

home page
home page

first page
first page

Answers

Answer:

i think it's opening page

Answer:

i think its also opening page

Explanation:

Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?

Answers

The section of a PCM that is responsible for sending the proper reference voltage to many of the sensors is the input sensor section.

What are PCM inputs?

The Powertrain Control Module (PCM) is known to be an input section of the PCM.

It is made up of the engine's ignition system, fuel injection system and also emission controls. The PCM is known to receives inputs a lot from different kinds  of sensors and switches.

Learn more about sensors from

https://brainly.com/question/26320121

Which discipline focuses on the design of computer hardware?

information technology

computer engineering

information systems

computer science

Answers

computer engineering

Answer:

Computer Engineering

Explanation:

People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.

what are computer networks​

Answers

Answer:

A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

Explanation:

:)

____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second

Answers

Fiber optic cable (FOC) is a very fast network media and it comprises multiple clear glass or plastic fibers.

What is a fiber optic cable?

A fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.

In Computer technology, fiber optic cables (FOCs) are commonly produced through the use of several concentric layers of transparent material such as glass or plastic, with each having a slightly different index of refraction for light waves and about the thickness of a human hair.

Read more on fiberoptic cables here: https://brainly.com/question/116766

Which one of these actions isn't a valid way to update the status of a lead? A. Click "Mark Status as Complete" in Path. B. Click the desired step on the Path, then click "Mark Current Status." C. View the lead record, click "Edit," and change the Status field. D. Change the Kanban settings Group By to "status." Drag the record to a different column. E. In any list view, click "Shuffle" to change up every record's status.

Answers

The action that is not  a valid way to update the status of a lead is that In any list, click "Shuffle" to change up every record's status.

How do I update lead status?

To update any  lead from a list view such as one that is found in Salesforce One has to select the leads that the person want to edit and then by double-clicking the specified field value and then make the change that you want.

Note that the update  differs for others and the action that is not a valid way to update the status of a lead is that In any list, click "Shuffle" to change up every record's status. This is wrong.

Learn more about update from

https://brainly.com/question/10106963

Match up each definition and term. Please help asap

Answers

Answer:

Query - Definition - Search by specific information Example - Find T-shirt in a specific size

Flat File Database - Definition - Simple database where each row is a record Example - Excel file of names and addresses

Fields - Definition - Different types of data for each record (columns) Example - Type of clothing, colour, size, price

Sort - Definition - Show records in different order based on its fields Example - Arrange all records alphabetically by colour

Record - Definition - Main item in a list (row) Example - Jeans

Text Field - Definition - Any number, letter, and all symbols Example - Levi's 518

Date Field - Definition - Date in a specific format Example - 2020-06-30

TIME Field - Definition - Any format of a timestamp Example - 10:42 PM

Graphic Field - Definition - Any kind of image Example - Logo

Calculated Field - Definition - Contains a formula to work something out Example - Length of time item has been in inventory

Number Field - Definition - Contains numbers that may be used in future calculations Example - $237.42

Brainlist Pls!

100 points.
Don't answer unless you know.

Answers

Answer:

On windows 10,

Open the Start menu.

Type “restore files” and hit Enter on your keyboard.

Look for the folder where you deleted files were stored.

Select the “Restore” button in the middle to undelete Windows 10 files to their original location.

Mac:

Option 1: Use Undo Command on Mac

Option 2: Recover Files from Trash on Mac

Option 3: Recover Deleted Files Using Terminal

Option 4: Recover Files from Backups

Option 5: Try Mac Data Recovery Software

Option 6: Use App-Specific Recovery Features

Option 7: Apply to data recovery services

Explanation:

Your transactions data set contains more than 10,000 rows. Some rows contain the same transaction. How would you remove the rows containing the identical transactions?.

Answers

To remove the rows containing the identical transactions, first click on the data tab that is displayed at the top of the screen. Then you select the range by highlighting it.

Later on check the top of the screen and then click on the data tab. The various commands will be displayed to you, and you should then click the 'remove duplicates'.

What does duplicate transactions implies?

Duplicate transactions is known to take place when a customer is said to refreshes their checkout page or when they had clicked on the buy button in a lot of times.

Note that identical transaction implies that there is a transaction about an items with some identical attributes or technical characteristics.

Learn more about identical transactions from

https://brainly.com/question/7176767

In a single processor system running Windows, when the kernel accesses a global resource, it A) uses spinlocks. B) masks all interrupts. C) uses a dispatcher object. D) atomic integers.

Answers

In a single processor system running Windows, If the kernel accesses a global resource, it masks all interrupts.

What does it implies to mask an interrupt?

An internal switch setting is known to often controls if an interrupt can be worked on or not.

The act of a Maskable interrupt is known to be when a hardware is said to interrupt and as such, it can disabled or left like that by the instructions of CPU.

Learn more about Windows from

https://brainly.com/question/25243683

4. is the disappearance of the individual a bad thing?

Answers

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

Answers

Answer:

Cash-out fraudsters

Explanation:

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?

Answers

Answer:

details tab

Explanation:

i am looking for some code to write 1,1,1 to 1,1,20 then switch to 1,2,1 to 1,2,20 all the way up to 20,20,20. any info would help alot thanks.

Answers

Answer:

press [Alt]+[F3] to open the create new building block dialog box. AutoText is listed in the Quick Parts dropdown, which is in the Text group on the insert tab.

lynn wants to share parts of an essay she wrote in her slide presentation

Answers

Answer:

no

Explanation:

No she should not  because it might be for a test

Answer: Use bullet points to summarize the main parts of your essay

Explanation: I took the test myself

W
tickets for tsg airlines are coded as follows:
• united kingdom flights are coded a, european flights b, asian
flights c, and american flights d.
overnight flights between 10pm and 6am use the same codes,
but with lower case letters (a, b, c, d)
• male passengers are coded x and female passengers are coded
y
• children under 16 are coded lowercase (x, y)
• meals are coded vegetarian v, beef b, and chicken k
• first class passengers are a, business class are b, and economy
is c
what is the code for a flight from chicago to new york at 5am for a
vegetarian 8 year old girl traveling in economy class?

Answers

The flight code of the tsg airlines is an illustration of computer coding

The code of the flight is AayvC

How to determine the code of the flight?

From the question, we have the following parameters:

UK = A, Europe = B, Asian = C, and the Americas = D.Flight between 10 pm and 6 am = (a,b,c, and d)Male passengers = X;  Female passengers = Y.Children under 16 = (x.y)Vegetarian Meal  = v; Beef = b, Children = KFirst Class = A, Business Class = P; Economy = C

To code the flight of the girl, we have the following parameters:

Destination =UK; UK code is ATime = 5AM; UK flight before 6AM is coded aFemale children under 16 is coded yMeal = vegetarian; The code for this is vEconomy class is coded C

Hence, the code of the flight is AayvC

Read more about coding at:

https://brainly.com/question/24735155

100 POINTS PLEASE HELP
Create and initialize a 5 x 5 array as shown below.
0 2 0 0 0
0 2 0 0 0
0 2 2 0 0
0 2 0 2 0
0 2 0 0 2

First, write a printArray() function that prints out the array. Use a single parameter in the definition of the function, and pass the array you created above as the parameter. Call the function so it prints the original array.

Then write a flipHorizontal() function that flips the contents of the array horizontally and prints the result. This means that the values in each row should be reversed (look at the second array in the sample run of the program for clarity). Again, this function should pass the original array as the parameter. Within your flipHorizontal() function, call the printArray() function to print the new array that has been horizontally flipped.

Reset the array back to the original 5 x 5 array we started with.

Then write a flipVertical() function that flips the contents of the array vertically and prints the result. This means that the values in each column should be reversed (look at the third array in the sample run of the program for clarity). Again, this function should pass the original array as the parameter. Within your flipVertical() function, call the printArray() function to print the new array that has been vertically flipped.

The sample run below shows how your code should print the original array, followed by the horizontally-flipped array, followed by the vertically-flipped array. Notice that the output below includes blank lines between each of the three arrays - yours should do the same.

Code should be able to do this

0 2 0 0 0
0 2 0 0 0
0 2 2 0 0
0 2 0 2 0
0 2 0 0 2


0 0 0 2 0
0 0 0 2 0
0 0 2 2 0
0 2 0 2 0
2 0 0 2 0


0 2 0 0 2
0 2 0 2 0
0 2 2 0 0
0 2 0 0 0
0 2 0 0 0

Answers

Answer:

hope this helped ,do consider giving brainliest

Explanation:

import numpy as np

#PrintArray Function

def printArray(array):

for i in range(len(array)):

for j in range(len(array[i])):

print(array[i][j], end= " ")

print()

#Flip horizontal function

def flipHorizontal(array):

#reversing the order of arrays

array2 = np.fliplr(array).copy() printArray(array2)

#Flip Vertical function

def flipVertical(array):

#Preserving the order of array and reversing each array.

array3 = np.flipud(array).copy() printArray(array3)

#Main() function def main():

array = [[0,2,0,0,0],[0,2,0,0,0],[0,2,2,0,0],[0,2,0,2,0],[0,2,0,0,2]]

print("The array: \n")

printArray(array)

print("\nFlipped horizontally: \n") flipHorizontal(array)

print("\nFlipped vertically: \n") flipVertical(array)

if __name__=="__main__":

main()Explanation:

Answer:

Answer:

hope this helped ,do consider giving brainliest

Explanation:

import numpy as np

#PrintArray Function

def printArray(array):

for i in range(len(array)):

for j in range(len(array[i])):

print(array[i][j], end= " ")

print()

#Flip horizontal function

def flipHorizontal(array):

#reversing the order of arrays

array2 = np.fliplr(array).copy() printArray(array2)

#Flip Vertical function

def flipVertical(array):

#Preserving the order of array and reversing each array.

array3 = np.flipud(array).copy() printArray(array3)

#Main() function def main():

array = [[0,2,0,0,0],[0,2,0,0,0],[0,2,2,0,0],[0,2,0,2,0],[0,2,0,0,2]]

print("The array: \n")

printArray(array)

print("\nFlipped horizontally: \n") flipHorizontal(array)

print("\nFlipped vertically: \n") flipVertical(array)

if __name__=="__main__":

main()Explanation:

Explanation:

A programmer ensures the user inputs valid data by setting algorithms boundaries data output

Answers

Answer:

boundries

Explanation:

i did the test so trust me its right

The proper type of data is required. Users must, for instance, enter a figure in the field labeled “Total purchase units.” There must be a limit on the data's range of values. For instance, customers can only select a legitimate loan type from a list of possibilities.

What is the input's valid data by setting algorithms?

An input validation approach is used to ensure that the data given by a user is accurate.

A software might ask for a score between 0 and 50, for instance, and employ an input validation technique to make sure that numbers below 0 and beyond 50 are rejected.

Any Value—This nullifies any previous data validation. Whole Number—Only whole numbers are permitted. You might stipulate, for instance, that the user must enter a value between 0 and 30. Decimal: The user must provide a decimal-valued number.

Therefore, boundaries programmer ensures the user inputs valid data by setting algorithms boundaries data output.

Learn more about algorithms here:

https://brainly.com/question/28283722

#SPJ5

(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​

Answers

Answer:

(b) 64000

Explanation:

Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.

According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."

Please put "Brainliest" on my answer if it helped you out the most!

(Further Reading) If you're still confused, I suggest you search up the following:

- Microsoft Access Long Text character limit

Question 17 of 40
What should you do before an interview?
A. Come up with one or two questiono for the Interviewer.
B. Eat a large meal.
C. Study as if for a final.
D. Stay up late the night before trying to guess what the interviewer
will ask.

Answers

C.

Because when you are getting interviewed you need to first study up on what you'd say!

Answer:

I think A

Explanation:

because need a question before your interview

Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are they called

Answers

Answer:

riesige Pyramide

Explanation:

riesige Pyramide

A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life.

What are Lattice-based access controls?

In computer security, lattice-based access control exists as a complex access control model established on the relations between any assortment of objects and subjects.

A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life. The binomial tree plots out the potential values graphically that alternative prices can have over additional time periods.

Three primary kinds of access control systems exist Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC).

There are two kinds of access control: physical and logical. Physical access control limitations access to campuses, buildings, rooms, and physical IT assets. Logical access control limitations connections to computer networks, system files, and data.

To learn more about Lattice-based access controls refer to:

https://brainly.com/question/14982444

#SPJ2

python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.

Answers

The program illustrates the use of loops .

Loops are used for operations that must be repeated until a certain condition is met.

How to write the program?

The program written in Python, where comments are used to explain each action is as follows:

#This defines the int_to_reverse_binary function

def int_to_reverse_binary(integer_value):

   #This initializes the string output

   strNum = ""

   #The following loop calculates the string output

   while (integer_value > 0):

       strNum += str(integer_value % 2)

       integer_value //= 2

   #This passes the string output to the string_reverse function

   string_reverse(strNum)

#This defines the string_reverse function

def string_reverse(input_string):

   #This reverses the string

   strRev = input_string[::-1]

   #This prints the reversed string

   print("Binary number:",strRev)

# The main begins here

if __name__ == '__main__':

   #This gets the decimal value

   dec_val = int(input("Decimal value: "))

   #This calls the int_to_reverse_binary function

   int_to_reverse_binary(dec_val)

   

Read more about Python programs at:

https://brainly.com/question/24833629

Which of the following is an example of effective nonverbal communication?
O presenting information about the status of a project in a team meeting
O an e-mail congratulating a team for attaining their goal
O eye contact and a smile
Opointing, frowning, and turning away

Answers

Answer:

Eye contact and a smile

Explanation:

There are only two nonverbal communication options in the list you gave:

eye contact and a smilepointing, frowning, and turning away

Pointing, frowning, and turning away would not be effective nonverbal communication because it seems uninviting and disrespectful. Eye contact and a smile is effective nonverbal communication because it shows that you're respectful, paying attention, and understanding.

i really need the answer now!!

3. Which is the path through which an electric current flow? *
1 point
A. close circuit
B. electric circuit
C. parallel circuit
D. series circuit
4. Which of the following is a device that acts as an automatic switch that opens the circuit if too much current flows through it? *
1 point
A. battery
B. circuit breaker
C. switch
D. volts
5. Which statement is true about parallel circuit? *
1 point
A. All parts are connected in a single path.
B. Current flows through more than one path.
C. Same amount of current passes through each load.
D. One electrical device goes out, the rest will not work anymore.
6. Which of the following can cause electrical fire? *
1 point
A. Play with the switches.
B. Insufficient supply of current.
C. Excessive current may overheat the wires.
D. Turn off the appliances when nobody is using it.
7. How many volts of electric energy do the outlets in the Philippines commonly have? *
1 point
A. 50 to 100 volts
B. 100 to 150 volts
C. 110 to 150 volts
D. 200 to 220 volts
8. When a short circuit takes place, the fuse wires melt and break __________? *
1 point
A. battery
B. breaker
C. circuit
D. wires
9. Which of the following shows the proper way in using electricity? *
1 point
A. Use damaged appliances.
B. Use overloaded extension wires.
C. Turn off the lights when not in use.
D. Plug appliances when nobody left in the house.
10. Gemma ironed their clothes. She stopped it when she smells burnt wires. Why did she stop ironing the clothes? *
1 point
A. Check if the extension wire is in good condition.
B. Search any busted bulb or outlet.
C. Find the burnt wires.
D. All of these

Answers

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

The first time you save a file, there is no difference between the Blank Space __________ and Save As commands.

Answers

I think the answer is save.

Hope that helps!

HURRY IM TAKING A TEST, WORTH 50 POINTS
Bar graphs compare values across categories using BLANK to display their information Fill in the blank:
1 Lines
2 Colums
3 Maps
4 Circle

Answers

Answer: Colums

Explanation:

Quizlet

Answer:

the answer your looking for is 2/B columns

Explanation:

Problem: Write the Python code of a program called ComputeSquare that asks the user to enter the length of the side of the square and displays the area and perimeter of the square. Check that the side length is greater than zero, and if it is not, display an informative error message to the user. ​

Answers

Solution :

The given problem is solved in Python.

def ComputeSquare():

side = float(input('Enter the side of the square: '))

if side > 0:

perimeter = 4 * side

area = side * side

print('Perimeter of the square is:',

perimeter, 'unit.')

print('Area of the square is:', area, 'square unit.')

else:

print('Invalid input.')

ComputeSquare()

Explanation :-

In this program, we create a function ComputeSquare() to calculate the perimeter and area of a square.

The function asks the user to enter the side of the square. The side is then stored in a variable.

Now, we check whether the side is greater than 0 or not using if-else statement.

If the condition is true, the perimeter and area is calculated which is displayed using print() statement.

If the condition is false, the else blocks executes printing the error message.

Refer to the attachment for output.

Why didn’t social media become popular when the first cell phone hit the market in the late 1990s and early 2000s?
a.
using phones for communication was a cultural shift.
b.
the first cell phones were not connected to the internet.
c.
people often ignorde call from individuals they do not know.
d.
it was very unusual for individuals to have access to cell phones.

Answers

Answer:

b. the first cell phones were not connected to the internet.

Explanation:

Social media has only risen in popularity in the last decade. Additionally,  the first cell phones were not touch screens as they are nowadays. On some, you only called people you couldn't even text. Some did not even have caller ID's let alone other apps

The first cell phones were not connected to the internet. The correct option is B.

What is social media?

Online platforms and tools that enable individuals and groups to create, share, and exchange user-generated content, as well as participate in online communication and social networking, are referred to as social media.

People use social media for communication, entertainment, news consumption, and social interactions, and it has become an increasingly important part of their daily lives.

The first cell phones did not have internet access. Early cell phones were primarily used for voice calls and text messaging and had limited functionality.

With the introduction of smartphones and the expansion of cellular data networks, widespread use of social media on mobile devices became possible.

Thus, the correct option is B.

For more details regarding social media, visit:

https://brainly.com/question/30326484

#SPJ2

The traditional ROM-BIOS has been replaced with __________. ELAM Boot Secure Boot Unified Extensible Firmware Interface (UEFI) Trusted Machine Platform

Answers

The traditional ROM-BIOS has been replaced with Unified Extensible Firmware Interface (UEFI).

Why the use of traditional BIOS?

This type of BIOS is one that is known to have drive support that is saved in its ROM, which makes updating BIOS firmware a little hard .

The use of a BIOS is known to be a kind of firmware that often gives  one runtime services mainly for operating systems and programs.

Learn more about ROM from

https://brainly.com/question/24688176

Other Questions
In The Decameron by Boccaccio...In Florence, despite all that human _________________ and _____________________ could invent...they were unable to prevent the devastating effects of the pestilence. Shows striving against fortuneWho did Boccaccio say called the tumors gavoccioli? Shows literacy and Scientific Interest in NatureWhat did Boccaccio think was the problem with many of the men and women who practiced healing?What does Boccaccio call the plague when describing how it spread by speech, association or bytouching the clothes of the sick or anything else they had touched or used? This shows his feelings The middle value of a data set that is ordered from least to greatest is called the Answer OptionsMEANMODEMEDIANRANGE Which people nominate and appoint federal judges?A) Supreme Court justices, if the majority of Congress approvesB) the president, with the approval of the majority of the SenateC) Congress, if the president does not veto the appointmentD) magistrates, if the majority of the Senate and the president approve Georgia is a coffee enthusiast and drinks three coffee drinks a day from a local coffee shop costing $1.25 each. Being concerned with the expense of her coffee habit Georgia looks into making her own manual brewed coffee. A bag of premium coffee beans costs $70.00, a coffee grinder costs $120.00, and the manual coffee brewer costs $40.00. If a bag of coffee makes enough for 100 cups, how many full bags of coffee does she need to consume before saving money. when occurring in the atlantic ocean they are known as hurricanes. what are they known as when occurring in the western pacific? the ratio of the length of shantels pool to the length of juan's pool is 3 to 5 shantels pool is 30 meters how long is Juans pool Please help like right now Compared to the Pacific ocean a cup of hot chocolate has a.more thermal energy and a higher temperature)b.less thermal energy and a higher temperature)c.more thermal energy and a lower temperature)d. less thermal energy and lower temperature (i'll try to give brainliest) How might political , military, and economic interests combine or conflict to affect U.S. diplomatic relationships? How did calders work and moores work , two very different styles of modern sculpture,connectHelp me Giovanni drops a rock from the Leaning Tower of Pisa in Italy. The height in feet (h) of the falling rock above the ground isgiven by the following equation, where t represents the time, in seconds.h = -16t2 + 186Approximately how long will it take the rock to reach the ground? Find the volume of the sphere. Round your answer to the nearest tenth.Use 3.14 for it.A sphere has a diameter of 3.8 centimeters.The volume of the sphere is aboutcm3HELP ME PLSS I WILL MARK BRAINLIEST Write y 3 = (x 6) in standard form. Two objects of the same mass travel in the same direction along a horizontal surface. Object X has a speed of 5 ms and object Y has a speed of 2 ms, as shown in the figure. After a period of time, object X collides with object Y.Consider the situation in which the objects collide but do not stick together. Which of the following predictions is true about the center of mass of the two-object system immediately after the collision? 1. Describe how you identified an area of need in your community. Explain what you learned from your local health departments website. Explain what you learned from any other government agencies or nonprofit organizations websites. If you made phone calls or emails, describe what you learned from them. Refer to the notes you took for lesson 8.02. Make sure to explain how you used the information to reach a conclusion about an area of need. (please include the website links in your answer) Answer (5 sentence minimum): (Score for Question 2: 10 points) 2. Describe the data you found. Explain what you learned from your communitys or a nearby communitys Community Health Improvement Plan. Explain what you learned from the data you found on the state department of healths webpage for health behaviors. Describe general trends and also give specific information and numbers. Refer to the notes you took for lesson 8.03. Answer (3 sentence minimum): (Score for Question 3: 10 points) 3. Describe the plan you created to address a community environmental health or safety issue. Make sure to explain why you chose to address that issue, who is going to help you, what you are going to do, when you are going to do it, and where your plan will be put into place. Answer (3 sentence minimum): (Score for Question 4: 10 points) 4. Describe how you plan to monitor and measure progress. Make sure to explain how you set up smaller tasks to accomplish, schedules, and deadlines. Also explain your plan to check on your goals at regular intervals. Answer (3 sentence minimum): A person injures an elbow playing tennis. What kind of rehabilitative care would this person most likely need?A. physical therapyB. occupational therapyC. cardiac rehabilitationD. speech therapy URGENT! 7. At what rate was an investment made that obtains $359.80 in interest compounded annually on $668 over five years?[compound interest rate] find the measure of angles 2, 3, and 4. input the measures then click done. i-readyplease help i missed a day of class i cant figure this out Can I Get Some Help PLEASEEEE i Will Give Brainliest if you tell how to do it after you answer it correctly3. Summarize patient A's history: Chromosomes obtained from a nearly full term fetus of a 40 year old female.Which chromosome set has an extra? _diagnosis______What diagnosis would you give this patient (what abnormality)? ______________Summarize patient B's history:Summarize the history of patient: Which civilizations were the first to record measurements.