Which statement about broadcasting a slideshow online is true?

All transitions are properly displayed to the audience when broadcasting online.
Broadcasting a slideshow online is not an option for most PowerPoint users.
Third-party desktop sharing software must be used to broadcast online.
PowerPoint has a free, built-in service for broadcasting online.

Answers

Answer 1

The statement about broadcasting a slideshow online that is true is D. PowerPoint has a free, built-in service for broadcasting online.

What is a Slideshow?

This refers to the presentation feature in a presentation-based system or software that makes use of images, and diagrams moving sequentially in a pre-timed manner.

Hence, we can see that based on the broadcast of slideshows online, one can see that the true statement from the list of options is option D which states that PowerPoint has a free, built-in service for broadcasting online.

Read more about slideshows here:

https://brainly.com/question/23427121

#SPJ1


Related Questions

How the (i)?? Help me to slove this

Answers

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.

What is a Supervised Machine Learning?

Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.

In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.

see more about computing at: brainly.com/question/2175764

#SPJ1

What three files do you need to perform a mail merge in a word document

Answers

The three files do you need to perform a mail merge in a word document are:

the main documentthe data source the merged document

What are the files needed for mail merge?

They includes:

The Document types.The Letters that is made up of a personalized greeting. The Email of which each recipient's address is the key address on the to line, etc.

Hence, The three files do you need to perform a mail merge in a word document are:

the main documentthe data source the merged document

Learn more about mail merge from

https://brainly.com/question/17731136

#SPJ1

Write a program to demonstrate circular linked list with operations using pointers – insert
(beginning, end, middle), delete (beginning, end, middle),view)

Answers

A program to demonstrate circular linked list with operations using pointers is:

struct Node *addToEmpty(struct Node *last, int data)

{

   // This function is only for empty list

   if (last != NULL)

     return last;

 

   // Creating a node dynamically.

   struct Node *temp =

         (struct Node*)malloc(sizeof(struct Node));

 

   // Assigning the data.

   temp -> data = data;

   last = temp;

   // Note : list was empty. We link single node

   // to itself.

   temp -> next = last;

 

   return last;

}

What is a Circular Linked List?

This refers to the type of linked list in which the first and the last nodes are also joined together other to form a circle

Read more about circular linked list here:

https://brainly.com/question/12974434

#SPJ1

Which term describes a Cloud provider allowing more than one company to share or rent the same server?

Answers

The term which describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy

The term that describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy.

What is a cloud?

A third-party business offering a cloud-based platform, infrastructure, application, or storage services is known as a cloud service provider.

Companies often only pay for the cloud services they use, as business demands dictate, similar to how a homeowner would pay for a utility like electricity or gas.

Data for each renter is separated and inaccessible to other tenants. Users have their own space in a multi-tenant cloud system to store their projects and data. Multi-tenant cloud system helps in the clouding of private and public sectors.

Thus, Multitenancy is the term used to describe a cloud service that permits many businesses to share or rent the same server.

To learn more about cloud, refer to the link:

https://brainly.com/question/27960113

#SPJ2

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to transfer a good file to the computer?

Answers

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

What is C$ administrative share?

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

https://brainly.com/question/15267859

#SPJ1

Convert the following number of decimal to hexadecimal (10110)

Answers

Answer:277E

Explanation:

The graphic representation below will clarify how it unfolded.

The SQL SELECT built-in function COUNT ____.

Answers

The SQL SELECT built-in function COUNT none of the above options.

What is a SELECT query?

A select query is known to be a kind of a database object that depicts the information that is shown in Datasheet view.

Note that A query does not save data, it shows data that is saved in tables.  The SELECT statement is known to be one that is often used to select data from what we call a database.

Hence, The data returned is said to be saved in a result table, known to be the result-set.

Based on the above, the SQL SELECT built-in function COUNT none of the above options.

Learn more about  SQL SELECT from

https://brainly.com/question/10097523

#SPJ1

13. Document the purpose of the
Managed pipeline mode settings.

Answers

The purpose of the Managed pipeline mode settings is to enable backward compatibility.

What is a Managed Pipeline?

This refers to the process that is in use in most CMS systems to process and direct sales that would be made at a later date.

Hence, we can see that when using a managed pipeline, the mode settings have the function to enable backward compatibility and the queue length can be set by using the "Queue Length" option

Read more about backward compatibility here:

https://brainly.com/question/13684627

#SPJ1

______ uses the internet to shift activities from the user's computer to computers on the internet.

Answers

Answer:

internet

Explanation:

this is called networking

1.1 Define what is a Big data and what is loT in detail? ​

Answers

The definition of big data is data that includes greater variety, coming in increasing volumes and with more velocity. This is also known as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

What is Lot and big data?

IoT and Big Data are two independent technologies that are indivisible from each other, to enable well-known technical advances. While the IoT would mostly collect data from physical objects through various sensors, Big Data would allow faster and more efficient warehouse and processing of this data.

What is big data?

The definition of big data is data that includes greater variety, arriving in increasing importance and with more velocity. This is also understood as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

To learn more about Big Data, refer

https://brainly.com/question/19049345

#SPJ9

Line formatting can be accomplished by using

Answers

Answer:

How can line formatting be accomplished?

To format line spacing:

Select the text you want to format. Selecting text to format.

On the Home tab, click the Line and Paragraph Spacing command. A drop-down menu will appear.

Move the mouse over the various options. A live preview of the line spacing will appear in the document. Select the line spacing you want to use.

The line spacing will change in the document.

Write the Python code that will create a list with 50 elements. Populate (fill) the list using a
loop that will get an integer value from the user for each element in the list.

Answers

Answer:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

Explanation:

So there is a very useful object or class in python that is called range, and this is primarily used to traverse certain values using a for loop. The syntax is defined as:

"range(start, stop, increment)"

where start is included, stop is excluded, and increment is how much the value increases after each iteration, although it is an optional value, just like stop"

So if you simply do:

"range(a)"

the start value will default to 0

the end value will be equal to "a"

the increment will default to 1

If you provide the following values:

"range(a, b)"

start will be equal to "a"

end value will be equal to "b"

increment will default to 1

If you provide all three values as such:

range(a, b, c)

start, end, and increment will be assigned to the variable values in their respective order.

You don't need to know all these 3 cases for this example, but it's best ton know in case you need to do something similar but slightly different in the future.

So, since we want to fill a list with 50 elements, and we want user input, we can loop a code 50 times and ask them to input an integer value and then append it to the list.

To run a piece of code 50 times, we can simply do:

"

for _ in range(50)

"

the "_" variable will be assigned to numeric values from 0-49 (50 is excluded), so it will run 50 times. I named it "_", because we really don't need these numeric values, we just need the for loop so we can have the code run 50 times.

So the next thing to do is initialize an empty list which we will append values to. This can simply be done by writing:

"

integers = []

"

and the variable name can really be anything (besides keywords), but I think it's the most appropriate given the context

So in the for loop, we want to ask for input using the input function, which asks the user for input, and then returns the input they input. Using this, we want to convert it to an integer using int (this is technically not a function, it's a class, you may learn about this more later if you haven't but it's not necessary to know for now), which converts strings to integers.

So using this we get the following code:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

the variable isn't necessary and you could just directly do

"

integers.append(int(input("Input an integer: ")))

"

but it's really for somewhat better readability, but both are equally valid, since the second statement isn't really to complicated.

One thing to note, is if the user inputs a non-integer string, the code will raise an error.

   

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

What is Edge computing ?

Edge computing can be regarded as the process that involves the  analyes as well as the, and storage of data closer to where it is generated .

This is been done to  enable rapid analysis and response in the process that is been used by some companies  to have consolidated operations , hence, An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

Learn more about edge computing solutions on:

https://brainly.com/question/23858023

#SPJ1

You get in your car after work and turn
on the radio. What type of communication does the
radio use?

Answers

Answer:

Radio Waves

Explanation:

Pretty self-explanatory.

Radio is a technology that uses radio waves for signaling and communication. Between 30 hertz (Hz) and 300 gigahertz, radio waves are electromagnetic waves (GHz).

What is the process of radio communication?

Electromagnetic waves are sent and received by radio equipment to operate. An extremely fast-moving electrical current is what makes up the radio signal. This field is broadcast by a transmitter using an antenna; a receiver picks up the field and converts it to the audio heard on the radio.

Radio technology is the transmission and reception of communication signals made of electromagnetic waves that bounce off the ionosphere or a communications satellite or pass through the air in a straight line.

Modern technology uses radio waves for a wide range of purposes, including broadcasting, radar and radio navigation systems, fixed and mobile radio communication, wireless computer networks, and communication satellites.

Learn more about Radio waves here:

https://brainly.com/question/21995826

#SPJ2

Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?

Answers

The troubleshooting step that you should take next is to Question User.

What is Troubleshooting?

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

https://brainly.com/question/13818690

#SPJ1

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position. What shooting technique should he use?
A.
low angle
B.
high angle
C.
Dutch tilt
D.
front angle

Answers

answer is high angle so it hits better lighting

Why multiprocessing operating system is more suitable for modern life?

Answers

Answer:

multiple processors and they are connected with the physical memory computer buses clocks and periprial devices the main objective of using a multiprocessor operating system is to increase the exclusion speed of the system and consume high computing power

If you had to tell that employee why it was not a good idea to send that e-mail, which of the following would you mention? (select all that apply)
The language was not professional.
The e-mail was not work-related.
The e-mail did not include an appropriate greeting.
The e-mail shows that the employee has been surfing the Internet instead of working.

the answers are A,B, and D. thats the only way I can give the answers on brainly.

Answers

The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Check more about email below.

What is non work email?

In Email Management Guidelines, the term non-work related emails are known to be “those that are not related to either private or government business.

Note that if one is sent this email during working hours, one is obligated to live it and not open it.

Hence, The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
10,9,8,7,6,5,4,3,2,1 – Worst case - Sorted in reverse order
1,3,2,5,4,7,9 ,6,8,10 – Avg case – numbers are in random order

For the given numbers, please use the following algorithms (bubble sort, insertion sort & selection
sort) to sort in ascending order. Please also find out number of comparisons and data movements
for each algorithm. Based on comparisons and data movements please rate algorithm for each input
case.

Answers

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

Writting the code in python:

def shellSort(array, n):

   # Rearrange elements at each n/2, n/4, n/8, ... intervals

   interval = n // 2

   while interval > 0:

       for i in range(interval, n):

           temp = array[i]

           j = i

           while j >= interval and array[j - interval] > temp:

               array[j] = array[j - interval]

               j -= interval

           array[j] = temp

       interval //= 2

data = [10,9,8,7,6,5,4,3,2,1]

size = len(data)

shellSort(data, size)

print('Sorted Array in Ascending Order:')

print(data)

See more about python at brainly.com/question/18502436

#SPJ1

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

I need this problem solved in C++ progamming

Answers

Using the knowledge in computational language in C++ it is possible to write a code that prompt user for a file name and read the data containing information for a course, store and process the data

Writting in C++ code:

#include<iostream>

#include<cstring>

#include<fstream>

using namespace std;

struct Student{

string lastName,firstName;

char subject;

int marks1,marks2,marks3;

};

char calcGrade(double avg){

char grade;

if(avg>=90.0&&avg<=100.0)

grade='A';

else if(avg>=80&&avg<=89.99)

grade='B';

else if(avg>=70&&avg<=79.99)

grade='C';

else if(avg>=60&&avg<=69.99)

grade='D';

else

grade='E';

return grade;

}

int main(){

char inFilename[20],outFilename[20];

int noOfRec,i,sum,count;

double avg,classAvg;

char grade;

cout<<"Please enter the name of the input file: ";

cin>>inFilename;

cout<<"Please enter the name of the output file: ";

cin>>outFilename;

ifstream ifile;

ifile.open(inFilename);

ofstream ofile;

ofile.open(outFilename);

if(!ifile){

cout<<inFilename<<" cannot be opened";

return -1;

}else{

ifile>>noOfRec;

struct Student s[noOfRec];

for(i=0;i<noOfRec;i++){

ifile>>s[i].lastName,s[i].firstName,s[i].subject,s[i].marks1,s[i].marks2,s[i].marks3;

}

if(!ofile){

cout<<outFilename<<" cannot be opened";

}else{

ofile<<"Student Grade Summary\n";

ofile<<"---------------------\n";

ofile<<"ENGLISH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='E'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"HISTORY CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='H'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"MATH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='M'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ifile.close();

ofile.close();

}

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person's BMI is calculated with the following formula: BMI = Weight × 703 ÷ Height²​

Answers

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

What is a flowchart?

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

What is a pseudocode?

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

Read more on pseudocode here: https://brainly.com/question/13208346

#SPJ1

What would be the most professional choice of words for your response:

A. THIS WASN’T FOR ME.

B. Please stop spamming me with these messages for my coworker.
C. I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.


the answer is C. ur welcome

Answers

The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Check more about writing below.

What is “Word Choice” in Writing?

'Word Choice” in writing is known to be a term that connote the ways or the usage of words that is said to be effective and precise use of language.

This is one that often conveys information and it also tends to enlighten the reader.

Note that option C is correct because it is best and most professional way to respond to a statement.

Hence, The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Learn more about word choices from

https://brainly.com/question/1619714

#SPJ1

Jessica is training to be a cinematographer. It is her first experience shooting a scene. Where do you think she should focus the camera?
A.
focus on the subject’s expressions
B.
focus on the subject’s face
C.
focus on the subject’s eyes
D.
focus on the subject’s body language

Answers

It should be all of the above

The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​

Answers

Option A is the main component

What are authorization rules?

Answers

An authorization rule specifies the policy that applies to an object and that is based on various conditions, such as context and environment. Each authorization rule has a unique name and can be applied to multiple objects in a domain.

In python please.
You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes
will be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Answer:

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

Explanation:

Python kind of haves private data attributes, although technically they don't.

Take for example the following code:

"

class A:

   def __init__(self):

       self.__privateAttribute = 0

x = A()

print(x.__privateAttribute)

"

all this really does is rename the variable name, and if you run the following code:

print(dir(x))

it will print the attributes of "x" which include "_A__privateAttribute" which is the attribute that was initialized.

Anyways getting that out of the way, you need to now about the __init__ method, which runs each time you initialize a new instance of the class. It's a way of setting up some necessary values that will be used in the objects methods (the functions inside the class)

So, because we simply cannot know what the book_title, book_author, and book_publisher are (since they vary book to book...), we take them as arguments using the __init__ method, and then initialize their values in their.

"

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

"

I just realized I completely forgot to even mention what the "self" variable stands for. Whenever you initialize a variable, or call a method from an instance of the class, the first argument passed will be the instance of the class. Take for example the following class

"

class A:

   def __init__(self, b):
       self.b = b

   def printB(self):
       print(self.b)

def printB(self):

   print(self.b)

c = A(3)

d = A(4)

c.printB()

printB(c)

d.printB()

printB(d)

"

The two lines

c.printB() and printB(c) are the same exact thing, the only difference is when you call c.printB(), you automatically pass the "c" as the first argument, and the same thing for d.printD(), it's implicitly passed whenever you call a method from an instance of the class.

What are the two most desired characteristics of a cellular network?

Answers

A cellular communication system consists of four major components—namely, a public switched telephone network (PSTN), a mobile telephone switching office (MTSO), cell sites with antenna systems, and mobile subscriber units (MSU).

There are four main parts that make up a cellular communication system: mobile subscriber units (MSUs), public switched telephone network (PSTN), and mobile telephone switching office (MTSO) (MSU).

What desired characteristics of a cellular network?

No direct mobile to mobile communication exists; all communication takes place between a mobile and a base station. Within each base station's cell, which is a specific geographical area, there is a dedicated set of radio channels or frequencies.

These networks are becoming used for purposes other than entertainment and phone calls as cellular devices become more and more common.

Cellular networks are high-speed, high-capacity voice and data communication networks that can handle cellular devices and have increased multimedia and seamless roaming capabilities.

Therefore, The ability of a cellular network to reuse frequencies to boost capacity and coverage is its major feature.

Learn more about cellular network here:

https://brainly.com/question/27960045

#SPJ2

What is a use case of factorization in quantum computing?

Answers

Answer:

Shor's algorithm is a quantum computer algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor. . The efficiency of Shor's algorithm is due to the efficiency of the quantum Fourier transform, and modular exponentiation by repeated squaring.

Other Questions
What changes to the welding machine are required to change between short-circuiting and axial spray or between axial spray and buried arc transfer methods? What answer should be reported, with the correct number of significant figures, for the following calculation? (433.621 - 333.9) 11.900 Read the following excerpt from The Turn of the Screw by Henry James. Then answer the question that follows.He had been left, by the death of their parents in India, guardian to a small nephew and a small niece, children of a younger, a military brother, whom he had lost twoyears before. These children were, by the strangest of chances for a man in his position-a lone man without the right sort of experience or a grain of patience-veryheavily on his hands. It had all been a great worry and, on his own part doubtless, a series of blunders, but he immensely pitied the poor chicks and haddone all he could; had in particular sent them down to his other house, the proper place for them being of course the country, and kept them there, fromthe first, with the best people he could find to look after them, parting even with his own servants to wait on them and going down himself, whenever hemight, to see how they were doing.What effect does the sentence structure have on the bolded sentence?The long, drawn-out syntax signals the lengthy, two-year journey of the uncle caring for his niece and nephew.The lack of punctuation marks in the sentence reveals the uncle's rambling thoughts about not liking the children.The long, drawn-out syntax is the same length as the first two sentences, so it does not mean anything.The short, choppy syntax reflects the uncertainty over who will care for the children after their parents' death. ________ is the enthalpy change when 1 mole of water is produced by the reaction of an acid and a base under standard conditions. According to your text, sales promotions such as free samples and point-of-purchase displays are designed to build. Students in Ms. Valendras science class planted 13 in different places around the school yard. After one month, they measured the heights of the conifers. They rounded each measurement to the nearest 1/4 Need help please... Graduate management aptitude test (gmat) scores are widely used by graduate schools of business as an entrance requirement. suppose that in one particular year, the mean score for the gmat was 473, with a standard deviation of 104. what values are three standard deviations within the mean? 5 examples of feelings that are likely to describe help Your teammate has strong evidence to support an idea during a meeting. however, the teammate has trouble articulating it. this is an example of which area of lescant? Michael is constructing a circle circumscribed about a triangle. he has partially completed the construction. what should be his next step in the construction? Let x = a bi and y = c di and z = f gi. which statements are true? check all of the boxes that apply. x y = y x (x y) z = x (y z) x y = y x (x y) z = x (y z) (x y) z = x (y z) During action potential, positively charged ________ ions move inside the cell. a. potassium b. bromine c. chloride d. sodium Our credit card company quotes you a rate of 14.9%. interest is billed monthly.What is the actual rate of interest you are paying? The leading cause of accidental ingestion fatalities among children is an overdose of:____. In what area of a long bone would it probably be easiest to observe the cartilage the orthopedic doctor refers to? Individuals with narcissistic personality disorder are characterized by:_____.A. avoidance. B. anxiety. C. arrogance. D. indecisiveness. In the diagram, q1 = +6.39*10^-9 C andq2 = +3.22*10^-9 C. What is the electricfield at point P? Include a + or - sign toindicate the direction.P910.424 m-0.636 m-92(Remember, E points away from + charges,and toward charges.)(Unit = N/C) What is the maximum speed you can be traveling to stop before hitting a child that runs into the street 60-65 feet ahead of your car 6n8(n+4)= what? Please help me