What happens when you leave a tablet charging for two days?

Answers

Answer 1

I am sure it will get 100% on the tablet. Maybe if you leave it charging for 2 days it might overheat and cause a fire.

Explanation:

Left the tablet charging for 2 days.


Related Questions

The Windows ________ utility returns your computer to the state it was in when it came from the factory.

Answers

Answer:

Windows system Restore.

Which of the following statements about yield management systems (YMS) is true?a.The first use of YMS was in the U.S. car industry as it looked for ways to compete withimports.b.YMS eliminate the problem of simultaneous production and consumption from services.c.YMS cannot be used by any other businesses but services.d.YMS are complex pricing systems used to set equilibrium pricing points.e.YMS are mathematically complex systems to make use of underutilized capacity andreduce the cost of perishability.

Answers

The statements about yield management systems (YMS) is true is e. YMS are mathematically complex systems to make use of underutilized capacity and reduce the cost of perishability.

Yield management systems (YMS) are a set of mathematical and analytical techniques used to optimize the revenue and profits of businesses that have a limited capacity, perishable inventory, and uncertain demand. They are used by a wide range of industries, such as airlines, hotels, car rental companies, and event venues, to set prices that reflect the level of demand and the urgency of the purchase. YMS are designed to make use of underutilized capacity and reduce the cost of perishability by adjusting prices based on demand patterns and historical data, and by offering different prices for different types of customers.

Learn more about yield management systems here:https://brainly.com/question/17003985

#SPJ4

The claim that yield management systems (YMS) are mathematically complicated systems that exploit underutilised capacity and lower perishability costs is valid.

A collection of quantitative and analytical methods known as yield management systems (YMS) are used to maximize sales and profitability for companies with constrained capacity, perishable inventory, and erratic demand.

They are used by a variety of businesses, including travel agencies, lodging establishments, vehicle rental agencies, and locations for special events, to determine rates that account for the level of demand and the urgency of the transaction.

YMS are made to modify pricing depending on historical data and demand patterns, and to provide various prices for various products in order to take advantage of underutilized capacity and lower the cost of perishability.

To know more about yield management systems brainly.com/question/17003985

#SPJ4

what do you mean by radix of a number system​

Answers

Answer:

The description on the given topic is summarized in the below explanation segment.

Explanation:

One concept is known as the radix, always seemed to denote the sequence of numbers or digits included throughout a spot numbering scheme before actually "moving over" towards the next number.There would be a variety of different components or figures throughout a place number system scheme, plus the point zero.

An Information Technology department is looking for a new inventory management system. Which of the following would be the most accurate choice: A) Schematic
B) Spreadsheet
C) Network Diagram
D) Radio Frequency Identification (RFID) database system

Answers

The D: "Radio Frequency Identification (RFID) database system" is an Information Technology department looking for a new inventory management system.

Radio Frequency Identification (RFID) technology has been designed to keep track of individual elements in inventory, even if these items are not visible or are moving around quite a bit, Radio Frequency Identification (RFID) database system is a perfect tool for practicing airtight inventory control. After all, this technology can sense when an element leaves a warehouse or store, provided the RFID tag remains in place.

Thus, Radio Frequency Identification (RFID) database system offers an optimal inventory control.

You can learn more about Radio Frequency Identification (RFID) at

https://brainly.com/question/1933883

#SPJ

A professor went to a website for rating professors and looked up the quality rating and also the​ "easiness" of the six​ full-time professors in one department. The ratings are 1​ (lowest quality) to 5​ (highest quality) and 1​ (hardest) to 5​ (easiest). The numbers given are averages for each professor. Assume the trend is​ linear, find the​ correlation, and comment on what it means

Answers

The result of the statistical software for this issue is r = 0.862. As a result, there is a 0.86232315 link between quality and ease.

Is a website reliable?

Look at the website's URL. If the URL starts with "https" rather than "http," the site is secured with a TLS/SSL certificates (the s in https stands for secure). All of your data is protected by TLS certificates when it is transmitted from computer browser to the webpage servers.

What drives our use of websites?

A web page is frequently used to give viewers information, including images or videos to better explain crucial subjects. A website can be utilised to market goods and services to visitors. A site, like our website Computer Hope, is made up of several web pages.

To know more about Website visit :

https://brainly.com/question/19459381

#SPJ4

What is 90x8-78x0
help me pls

Answers

Answer:

720 - 0 = 720

Therefore, your answer is 720

Answer:

720

Hope it helps:)

Single-Select Questions with Reading Passage #1 Grocery Grabbr The following passage will be used to answer questions #1 - #5 Markus is finding that it takes too long to track down all of the groceries he needs to buy from a given store. Grocery Grabbr to the rescue! The app allows Markus to input his shopping list and search for his local grocery store in Grocery Grabbr's database. If his grocery store is there, Markus is all set to go! The database stores grocery items, cost, and item location information for each grocery store. When Markus walks into the store, a notification pops up on his smartphone letting him know that Grocery Grabbr is ready to get to work. Each of Markus' grocery items is displayed one at a time, along with the aisle number and shelf location. After Markus grabs his items off the shelf, he hits a button on the app to navigate to the next item. The list of items is arranged so that Markus follows the most efficient path through the grocery store. When Markus finishes shopping, the total amount of money his groceries cost is displayed, which allows him to double check the total cost with the cashier. Grocery Grabbr pays grocery stores a small amount of money for each user who successfully uses the app and checks out of the store with over one hundred dollars worth of groceries.
Question: Which of the following data must be obtained from the user's smartphone in order for Grocery Grabbr to suggest the order for picking up groceries?
A. the grocery list the user input
B. the location of the grocery store
C. the user's photo album on their smartphone
D. the user's current location

Answers

Answer:

A. the grocery list the user input

D. the user's current location

Explanation:

In the passage provided the only actual user inputs that is needed is the grocery list and then the user must choose from a list of available grocery stores. They do not need to enter the location of the grocery store. Therefore, the only actual pieces of data that the app would need are the grocery list that the user inputs and the user's current location in order to provide the list of available nearby grocery stores for picking up the groceries. This is done through the GPS on the smartphone.

Which step of the Department of Defense Risk Management Process consists of the activities to develop, implement, implement and document

Answers

The program's activities to create, put into practice, and record the procedures it will take to mitigate certain risks make up the risk management process planning process.

What are the steps in the risk management procedure for the Department of Defense?

The five key steps of the risk management process are planning, identification, analysis, mitigating risk, and monitoring.

Which of the following phrases describes the procedure of monitoring and evaluating risk as you get more knowledge about risk in projects?

The process of locating and evaluating potential problems that can adversely affect important corporate endeavors or projects is known as risk analysis. This process is used to help businesses avoid or reduce particular risks.

To know more about program's  visit:-

https://brainly.com/question/11023419

#SPJ4

Based on the output from your switches, answer the following questions: Which switch is the root bridge

Answers

The output from a switch is the process of forwarding a packet from one port to another port on the same switch or to another network device. The switch uses the MAC address of the destination device to determine the correct port to forward the packet to.

To choose the root bridge on a switch, the switch uses a protocol called the Spanning Tree Protocol (STP). The STP algorithm selects one switch in the network to be the root bridge, which is the central point for the network topology. The root bridge is responsible for sending out bridge protocol data units (BPDUs) and determining the best path for data to travel through the network.

To choose the root bridge, the switch uses a process called the election process, in which the switch with the lowest bridge ID (BID) is chosen as the root bridge. The BID is a combination of the switch's MAC address and a configurable priority value. The switch with the lowest BID is chosen as the root bridge and the other switches in the network will adjust their paths to forward traffic through the root bridge.

You can choose the root bridge in the switch by configuring the switch's priority value. A lower priority value will increase the chances of the switch being elected as the root bridge.

The answer has to be general since the question is incomplete.

Learn more about root bridge here: brainly.com/question/29417452

#SPJ4

A user calls the help desk stating a laptop is performing slowly and the hard drive activity lights are blinking continuously. A technician checks for enough hard drive space, disables antivirus and indexing services, and runs a full-system diagnostics check, which returns no failure. Which of the following should the technician do NEXT?
A. Install a new hard drive
B. Check for hard-drive firmware updates
C. Replace the hard drive with a solid state drive
D. Configure the laptop in high-performance mode
E. Change the boot order in the system BIOS

Answers

Check for hard-drive firmware updates. Without requiring any hardware upgrades, a firmware update will provide your device new, sophisticated working instructions.

What is firmware ?Firmware is a particular type of computer software that in computers controls the hardware at the lowest level. Firmware can serve as the entire operating system for simpler devices, handling all control, monitoring, and data manipulation tasks. Computers, home and personal appliances, embedded systems, and computer peripherals are common examples of gadgets that contain firmware. Non-volatile memory systems like flash memory, ROM, EPROM, and EEPROM store firmware. Firmware updates necessitate the actual replacement of ROM integrated circuits or the reprogramming of EPROM or flash memory using a unique technique. Some firmware memory devices have pre-installed software that cannot be removed after purchase. Firmware updates are frequently performed to address bugs or add features.

To learn more about Firmware refer :

https://brainly.com/question/18000907

#SPJ4

Drag each label to the correct location on the image.Match the file formats with the types of multimedia they can store.GIFFLVMP4AACPNGRM

Answers

A technique of delivering information or entertainment that incorporates several communication modalities is known as multimedia.

What is meant by multimedia?A system for transmitting information or entertainment that uses a variety of communication methods is known as multimedia. To present at school, you might use multimedia. For instance, multimedia could include audio clips, still images, and video.Contrary to traditional mass media, which includes little to no user interaction like printed material or audio recordings, multimedia is a form of communication that combines various content forms like text, audio, images, animations, or video into a single interactive presentation. Video podcasts, audio slideshows, and animated videos are a few common forms of multimedia.The fundamentals of software, hardware, and other technologies, as well as their applications in interactive communication, are all included in multimedia.

Matched the file formats :

JPEG - IMAGE

WMA - AUDIO

MP4 -VIDEO

MNG- ANIMATION

Learn more about multimedia refer to :

https://brainly.com/question/24138353

#SPJ4

A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem?
A. Video RAM
B. Power supply wattage
C. CPU frequency
D. Monitor resolution

Answers

The most likely cause of the problem is the power supply wattage.

What type of graphics card was installed in the new computer? The type of graphics card installed in the new computer depends on the specific model of the computer and its intended use. For example, a gaming computer may require a more powerful graphics card than a basic office computer. If the new computer is used mainly for gaming or video editing, it may require a dedicated graphics card such as an NVIDIA GeForce or AMD Radeon. For basic office work, a basic integrated graphics card is sufficient. When selecting a graphics card, it is important to consider the types of games or programs that will be used with the computer. Some games or programs may require a more powerful graphics card to run smoothly. Additionally, if the computer is used for video editing, an additional graphics card such as a Quadro or FirePro may be required. When shopping for a new computer, it is important to research the specific graphics card that will be required for the intended use of the computer. This will help to ensure that the computer is equipped with the necessary hardware to run the desired programs or games. Additionally, it is important to consider the power supply of the computer when selecting a graphics card.Some graphics cards require more power than the standard power supply can provide, so a higher wattage power supply may be necessary.

To learn more about graphics card refer to:

https://brainly.com/question/30097997

#SPJ4

You can include ____ in calculations to indicate which calculation should be done first.
a.brackets [ ]
b.curly braces { }
c.slashes //
d.parentheses ( )

Answers

parentheses ( )

What is an illustration of a parenthesis?

Parentheses () are used to surround additional, non-essential material in a sentence to clarify, explain, or add a footnote. To avoid breaking the flow of a statement, use parenthesis. Examples: She’ll be arriving at our place after work (about six o’clock). Today I’m going to see my grandmother (my father’s mother).

Parentheses are a type of punctuation mark that is commonly used to add extraneous information or an aside to a phrase. Parentheses are represented by two curved vertical lines: ( ). A parenthesis is a single one of these punctuation symbols.

To learn more about parenthesis to refer:

https://brainly.com/question/28190753

#SPJ4

state three advantages of using a printer​

Answers

Answer:

Advantage: Convenience. One of the key advantages of printing out material is that it is convenient.

Advantage: Secure Delivery. Paper records can be anonymously delivered

Advantage: Ease of Reading

I hope It helps

You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use

Answers

Answer:

The answer is "ifconfig".

Explanation:

The ifconfig. me is indeed a website that shows basic network packets, like IP address, hostname, user agent string. It provides a simple interface that may be queried with the assistance of the command prompt to obtain the required information. The whole function provides the essential information about a certain program's interface.

Account_Info Account_Info_ID auto number Account_Info_Name varchar2(100) Account_Removal Account_Removal_ID auto number Account_Info_ID number Account_Removal_Name varchar2(100) Account_Info contains all records in the system Account_Removal contains all removed records in the system Please write a SQL statement to retrieve only records that are not in the Account_Removal table

Answers

The SQL statement to retrieve only records that are not in the Account_Removal table is:

SELECT * FROM Account_Info WHERE Account_Info_ID NOT IN (SELECT Account_Info_ID FROM Account_Removal);

How to write a SQL statement?A SQL statement is a type of query used to interact with databases and retrieve data. The statement is written in Structured Query Language (SQL) and is often used by developers, data analysts, and other professionals who need to access and manipulate data. To write a SQL statement, the first step is to determine the type of query required. For example, SELECT statements are used to retrieve data, INSERT statements are used to add new data, and UPDATE statements are used to modify existing data. Once the query type is identified, the statement is written using the appropriate keywords, such as SELECT, FROM, WHERE, ORDER BY, and other keywords. Furthermore, the statement should include the specific columns and tables that the query should target, as well as any parameters that should be used to filter the results.After the statement is written, it should be tested before it is executed. This is to ensure that the statement is working correctly and that the data being retrieved is accurate and up-to-date. Once the statement is tested and confirmed to be working correctly, it can be executed to retrieve the desired results.

To learn more about sql statement refer to:

https://brainly.com/question/19538735

#SPJ4

is it true or false graphics created in a computer are computer graphics​

Answers

Answer:

True because it just makes sense

Explanation:

Answer: true

Explanation: its computer graphics

__________ is a design principle that addresses the agreement or visual connection among design elements in a drawing.

Answers

Harmony the effectiveness with which a composition's visual components interact with one another. One of the most fundamental and crucial design elements is alignment. Through the creation of a visual link between them, it aids in unifying the elements on a page.

Which of the following best describes the visual route that the eye takes?

The eye of the viewer travels around the work of art, usually focusing on certain areas. Within the artwork, this visual components might be focused on the lines, borders, shapes, and colours.

What visual aspect describes the space surrounding, above, or beneath an object or objects?

The area between and around objects is known as space. Negative space is the term for the area surrounding objects; negative space

To know more about visual components visit:-

https://brainly.com/question/19584494

#SPJ4

Users are mentioning that a file share on a Windows server is no longer accessible. You check the server and see the share is still in place. You decide to check to see if any related ports are currently blocked on the server. What command can you use to investigate the ports

Answers

You can examine the ports using the other address command.

Which of the following presents a security risk following the installation of a new app on a mobile device?

storage of data. The data that you save on the device and whether other apps can access it is the most frequent security worry for Android applications.

What management tool may be used to investigate often unresponsive applications?

What management tool may be used to investigate often unresponsive applications? A log of issue events connected to system stability can be viewed using the Windows Reliability Monitor.

To know more about address command visit :-

https://brainly.com/question/29990582

#SPJ4

Pls answer as fast as you can I will give brainliest

What aspect of the initial database planning process would the formula
(0 + Pt × 3 + p)/5 be used in?

A. Time estimation
B. Budgeting
C. Workforce forecasting
D. Entity prediction

Answers

I believe it would be “A” it would make the most sense...

Need help

What are the two types of requirements needed for analysis?

A. Operational and system

B. Software and system

C. Technical and system

D. Operational and technical

Answers

I think the answer is D

Select the correct answer from each job down menu

Ben is writing an assignment on feasibility study. Help him complete the following sentences

The _____ feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is ______ and ready to use.

Options for the first box are: operational, social, and technical

Options for the second box: researched, installed, and proposed

Answers

Answer:

The Operational feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is installed and ready to use.

Explanation:

A feasibility study is an inquest on the possibility of launching a project. It determines whether a project should be continued or discontinued. The operational feasibility study determines the usability of the project by clients after it is completed.

If the project will not meet the client's requirement, then the project has failed the operational feasibility study and should be discontinued. We also have the technical and economical feasibility studies.

the security team was eventually able to write a better rule to match the sql injection technique that the attacker had used.

Answers

Input validation and parametrized queries with prepared statements are the only effective defences against SQL Injection attacks. Not just web form inputs like login forms must be sanitised by the developer.

What is SQL Injection attacks ?In computer science, SQL injection is a method of attacking data-driven systems by injecting malicious SQL statements into entry fields for execution. Although SQL injection is primarily recognised as a website attack vector, it may be used to target any kind of SQL database.Attackers can become administrators of the database server, spoof identities, alter already-existing data, cause repudiation problems like cancelling transactions or changing balances, allow full disclosure of all data on the system, destroy data or otherwise make it unavailable, and cause repudiation issues.In fields like login boxes, search boxes, or "sign up" fields, hackers input SQL commands. The goal is to access a system using intricate code sequences and divulge the data stored inside.

To learn more about SQL Injection refer :

https://brainly.com/question/15685996

#SPJ4

all of the following are principles essential to a secure information system except A. Integrity B. Accountability C. Availability D. Confidentiality

Answers

The following are principles essential to a secure information system except for accountability.

Which is an essential principle of a secure information system?

An essential principle of a secure information system is the concept of defense in depth. This is a multi-layered approach to security, which involves the use of multiple layers of security controls. These security controls can include technical measures, such as firewalls, encryption, and authentication protocols; physical measures, such as locked doors and access cards; and administrative measures, such as policies and procedures.

By using multiple layers of security controls, it becomes much more difficult for an attacker to penetrate the system.

Furthermore, the presence of multiple layers of security also makes it easier to detect and respond to any attempts at unauthorized access.

The defense-in-depth approach is essential for protecting sensitive data and ensuring the integrity of information systems.

To learn more about information systems refer to:

brainly.com/question/24944623

#SPJ4

What is the name of the process which permits a continous tone image to be printed simultaneously with text

Answers

The Halftone process is the name of the process which permits a continous tone image to be printed simultaneously with text.

An image in halftones is what?

Halftones are used most frequently to print photographs, paintings, or other comparable pictorial works that are reprinted in books, periodicals, and newspapers. In a halftone, the picture's continuous tones are divided into a sequence of evenly spaced, varying-sized dots and printed using just one ink colour.

In image processing, what is halftoning?

By changing the size of teeny black dots placed in a regular pattern, halftoning, also known as analogue halftoning, simulates different shades of grey. Printing companies and the publishing business both employ this method.

To know more about Halftone visit

brainly.com/question/10678312

#SPJ4

When this operator is used with string operands it concatenates them, or joins them together.
Select one:
a. &
b. *
c. %
d. +
e. None of these

Answers

+ concatenates or joins string operands together when used with string operands.

Does C++ attempt to convert the operands to the same type when using an operator?

A preprocessor directive must contain the iosetwidth header file when a program uses the setw manipulator. It is difficult to display the number 34.789 with two decimal places in a field of 9 spaces in C++.

when there are two different data types as operands for an operator?

Before completing the operation, C++ always converts both of the operands of an operator that has two operands of a different data type to a double. 3.5 will be displayed as a result of the next two C++ statements.

To know more about string operands visit :-

https://brainly.com/question/29602356

#SPJ4

which of the following is a characteristic of a college savings plan

Answers

Answer:

where are the options for the question

Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issue

Answers

It confirms connection and highlights any potential application issues. You make an effort to print a test page.

What does fundamental problem-solving entail?

A methodical approach to problem-solving is troubleshooting. The objectives of troubleshooting include identifying the root of an issue and offering suggestions for fixing it. A clear explanation of the issue serves as the initial step in the troubleshooting procedure.

Troubleshoot or Troubleshot, which is it?

The past tenses of the verbs troubleshoot and troubleshooted are both valid. Troubleshot may be used more frequently because shooted is not the past tense of shoot. Example: Despite my efforts to fix the program, it simply isn't functioning properly.

To know more about troubleshoot visit:

https://brainly.com/question/30048504

#SPJ4

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function ?
A. UpnP
B. Power Spike
C. Power Surge
D. Disk Management

Answers

UpnP option (A) must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function .

How do firewalls work?

In a private network, firewalls act as gated barriers or gateways to regulate the flow of authorized and unauthorized web traffic. The phrase refers to actual structures that serve as barriers to contain fires until rescue services can put them out.

Can a firewall be breached by hackers?

A firewall might be safe, but if it's guarding a vulnerable program or operating system, a hacker will quickly get over it. There are countless instances of software flaws that hackers can reap the benefits of to penetrate the firewall.

To know more about Firewall visit :

https://brainly.com/question/28411552

#SPJ4

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use

Answers

Using rapid, snappy strokes is the proper keystroke technique. The body should be sufficiently upright in front of the keyboard for proper keyboarding posture.

Why is accurate keying so crucial?

Your general health will benefit from touch typing as well. It stops you from hunching over your keyboard in order to find the proper keys. Instead, you maintain eye contact with the screen in front of you. Correct typing encourages excellent posture and helps to avoid back or neck pain.

What is an example of a keystroke?

The pressing of a single key on a keyboard, whether real or virtual, or on any other input device is referred to as a keystroke. In other words, a single key push is regarded as a keystroke.

To know more about proper keystroke technique visit :-

https://brainly.com/question/29808656

#SPJ4

Other Questions
PEACH is to FRUIT as ...O RIB is to BONEO GRASS is to TREEO SCOFF is to CHIDEO MOVE is to SWAPO BLUE is to SAD Read the roots and root words. Decide which ones can stand alone and which ones cannot stand alone. Sort the words into the correct category bene Can Stand Alone Cannot Stand Alone proportional or not proportional? Which of the following tools can help narrow your Internet search to make your results more relevant and useful?A. use quotation marks in the search boxB. always select the first result option listedC. use social media to find accurate informationD. use only images instead of web result Why aren't authors always as explicit as possible in stating their meaning or purpose? Why do you think they often leave evidence to be inferred? What is another way to describe the vector 100 m/s down A size 8 kid's shoe measures 9 2/3 inches. If 5 size 8 shoes are lined endto end, then how many inches will they cover? * What event instigated the current population explosion? A 140 meter rope is cut into two pieces. One piece is four time as long as the other. How long is each piece? Solve using substitution or elimination. Which negative angle is equivalent to a 75 angle?O A. An angle measuring -105B. An angle measuring -275C. An angle measuring -75D. An angle measuring -285 Social media is a tool, and like any other tool it can be used properly or misused. Here are a few questions to ask yourself to see if you could be in danger of letting social media control you. Are you afraid to stop checking your social networking sites because you might miss out on something amazing? Do you find yourself planning your next social media post before you have even done something worth posting? Are you competitive or insecure about how many "likes" you get on your posts? Do you stay up late into the night scrolling through your news feedseven causing you to miss sleep? If after answering yes to several of these you feel that you might have a social media addiction, there are ways to break free from it.Who is the intended audience for this passage?People who develop social media software.People who use social media to advertise their businesses.People who regularly use social media for fun.People who are attending a social media workshop. How do we know a particular lineage of prokaryote exists in a natural habitat without first isolating and growing it in laboratory culture Why is Avogadro's number 6.02 x10 23? Create a Metric Conversion application that displays a menu of conversion choices and then prompts the user to choose a conversion. Conversion choices should include inches to centimeters, feet to centimeters, yards to meters, miles to kilometers, and vice versa. The application should include separate methods for doing each of the conversions. Application output should look similar to: Since President Lincoln had guaranteed to protect slavery in the states where it existed, why did the seven southern states secede as soon as he was elected QUESTION 10Which sentence uses capital letters correctly?.O a. We are going to the McDonald Observatory where we will try to see Mars and other planets.O b. we are going to the McDonald observatory where we will try to see mars and other planets.O c. We are going to the McDonald observatory where we will try to see Mars and other planets.O d. we are going to the McDonald Observatory where we will try to see Mars and other Planets. Jesss fish hook was 12 feet below the top of the water. He let out some of his line and the hook sunk another 3 feet. What is the depth of the fish hook now?HELP ME PLEASE PlastiPharm performs a process capability analysis for all processes for new products and repeats the process every six months thereafter. During the analysis, equipment is evaluated to determine if it operates within quality standards. Additionally, the production environment is evaluated to ensure that all factors affecting the process meet the same standards. Which of the following statements best explains why the analyses are conducted?A process capability analysis helps determine how well a process meets the needs of a customer.A process capability analysis shows the extent of improvements being made.A process capability analysis compares the performance of a process to determine improvement.A process capability analysis demonstrates when a process is stable and performing well.|\ a parallelogram has sides that are in the ratio of 7:5 the premeter of the parallelogram is 48 how long does the longer side ILL GIVE BRAINLIEST PLS HELP IMMEDIATELY -- The ages of trees in a forest are normally distributed with a mean of 25 years and a standard deviation of 4. Approximately what percent of the trees are between 20 and 30 years old? (2 points)