You answer a call from a number of users who cannot access the mail server. Which utility would you use to quickly see if the sendmail service is running?

Answers

Answer 1

If you want to check whether the sendmail service is active rapidly, use the ps program.

Which command shows the most specific information about each active process?

Processes are active at all times that the system is active. The ps command allows you to see a list of currently active processes as well as their status and other details. You can define which processes to list using a number of flags in the ps command.

What does a process with no nice command execute as by default?

The default increment of the nice command is 10, so if you do not supply an increment value, that is what happens. If you want to run a command with a higher priority, you must be a root user. A process's pleasant value, or priority, is frequently referred to.

To know more about ps program visit :-

https://brainly.com/question/15057124

#SPJ4


Related Questions

What is the color for marking telephone, cable, and communication lines in a community infrastructure

Answers

Answer:

Orange marks

Explanation: Are usually for telephone, TV and other communication lines.

A B. 51 Red Yes 52 Red Yes 53 Red Yes 54 Blue No 55 Red Yes a Image not displaying? =IFNA(A51="Red","Yes","No") O=COUNTIF(A51="Red", "Yes","No") =SUMIF(A51="Red", "Yes","No") O=IF(A51="Red", "Yes","No") =SHOWIF(A51="Red", "Yes","No") E F Staff ID 19106 D 42 Conference Room Location 43 D East 44 C North 45 A South 46 E South 47 B South 48 49 =$D$44 19122 19107 19104 19147 Image not displaying? O C, North, 19122 O CA, E Ос, С, С C, South, South O C, South, 19104

Answers

The choice is =IF. (A51="Red","Yes","No") Print "Yes" in cell B51 if cell A51's content is Red; otherwise, print "No." The true response is C,C,C. The data of number D49 is taken exactly as the cell's content is linked to.

What do you mean by image?

A digital picture is a binary description of visual data, whereas a photo is just a pictorial display of anything. These visuals could be ideas, graphics, or still shots from a video. An image seems to be a photograph that has been produced, copied, and saved electronically.

How come it's called an image?

Images are assessed according to how well they depict the individual or thing they depict; the word "image" originates from the Latin phrase imitari, which means "to copy or imitate."

To know more about Image visit :

https://brainly.com/question/28730943

#SPJ4

Which loop(s) would happen after another loop of movement?

Answers

The loop(s) that would happen after another loop of movement differs.

What is the  loop of movement?

In the above case, It is difficult to accurately answer this question without having more context.

Loops in programming are used to execute a block of code multiple times, and the specific order in which they are executed can depend on a variety of factors, such as the structure of the code, the values of variables, and the conditions specified within the loop.

Without more information about the specific loops in question, it is not possible to determine which loop(s) would happen after another loop of movement.

Learn more about loop from

https://brainly.com/question/19344465

#SPJ1

Assume that you are the data scientist for the online auction site superbids. To increase bidding activity, you want to display items to a user that people with similar characteristics and buying patterns have bid on. Which technique are you most likely to use

Answers

You're most likely to employ linear regression as a method.

How does linear regression work?

When predicting a variable's value based on the value of another variable, linear regression analysis is utilized. The dependent variable is the one you're trying to forecast. The independent variable is the one that you are utilizing to forecast the value of the other variable.

Where does linear regression work best?

In order to more precisely assess the nature and strength of the between a dependent variable and a number of other independent variables, linear regression is used. It aids in the development of predictive models, such as those that forecast stock prices for businesses.

To know more about linear regression visit:-

brainly.com/question/15583518

#SPJ4

write a summary 6-7 sentences on how cell phones work (include the EM spectrum and radio waves in your answer.

Answers

When a cell phone is used, it emits an electromagnetic radio wave known as a radio frequency, which is picked up by the antenna of the nearest cell tower.

What are radio waves?

Radio waves are the longest wavelengths in the electromagnetic spectrum and are a type of electromagnetic radiation.

Using the electrical signal, a microchip in the phone modulates (or varies) a radio wave.

Therefore, the radio wave travels through the air to a nearby cell tower, which sends your voice to the person you're calling, and the process is reversed so that the person on the other end can hear you.

To learn more about radio waves, visit here:

https://brainly.com/question/827165

#SPJ1

URGENT: What questions would you ask a USER when in a requirements-gathering session? Multiple answers may be selected.

1. Are there any websites that you like or dislike?
2. What key information do you expect to find on the site?
3. What kind of security would you like to be implemented for the transactions you might do?
4. What might help you to navigate the sire?

Answers

The questions would you ask a user when in a requirements-gathering session are:

2. What key information do you expect to find on the site?

3. What kind of security would you like to be implemented for the transactions you might do?

What is a requirements-gathering session?

The act of developing a list of requirements to explain what a project is about and its aim is known as requirement gathering. Stakeholders, whether clients, employee users, consumers, or vendors, can provide insights.

Requirement gathering is frequently used to create project blueprints. Developers, for example, adjust requirements between iterations.

Therefore, the correct options are 2 and 3.

To learn more about the requirements-gathering session, refer to the link:

https://brainly.com/question/29768295

#SPJ1

TRUE OR FALSE : with pointer variables you can access, but you cannot modify, data in other variables.

Answers

True,  with pointer variables you can access, but you cannot modify, data in other variables.

Which regarding a pointer variable is true?

A pointer variable, also referred to as a pointer or just a pointer, functions similarly to other variables that can hold data. A pointer saves a memory address instead of a value like a conventional variable would (such as an int, double, or char). Similar to a regular variable, pointers must be declared before they may be utilized.

Why not use variables instead of pointers?

In essence, a pointer can be used to point to any variable of the same type (e.g. any integer, double, char, etc.).

                            The values of numerous distinct variables of the same type can be updated or changed using this method. Using pointers speeds up execution as well. More quickly can be accessed memory.

Learn more about pointers

brainly.com/question/19570024

#SPJ4

Which of these plays an important role in keeping attack traffic off your systems and helps to protect users

Answers

Software or firmware used as a firewall limits illegal access to a network. Using a set of rules, it examines incoming and outgoing communications to look for dangers and prevent them.

What offers resistance against data theft and can stop an attacker from stealing private data from a stolen hard drive?

Encrypting the entire disk (FDE). Systems with completely encrypted hard drives are resistant to data theft, preventing an attacker from taking private data from a hard disk that has been taken or misplaced.

What connections do attack surfaces and attack vectors have?

An attack vector is a technique for breaking into a network or computer system without authorization.

To know more about firewall visit :-

https://brainly.com/question/13098598

#SPJ4

An apple cake recipe calls for 454 grams of apples and 50 grams of raisins. How many kilograms of fruit are needed to make 12 cakes?

Answers

Answer:

9.08

Explanation:

Because 454 divided by 50 is 9.08

Advantages of a computer ​

Answers

Answer:

What are the advantages of using a computer?

Explanation:

Increase your productivity. ...

Connects you to the Internet. ...

Can store vast amounts of information and reduce waste. ...

Helps sort, organize, and search through information. ...

Get a better understanding of data. ...

Keeps you connected. ...

Help you learn and keep you informed. ...

Can make you money.

______ is a set of function and call programs that allow clients and servers to intercommunicate. Select one: a. IaaS b. SQL c. API d. Middleware

Answers

Clients and servers can connect with one another thanks to the IaaS suite of function and call programs. (Selection a)

Is there such a thing as intrapersonal?

A key concept in psychology is what is known as the intrapersonal, which refers to internal elements that affect a person, such as their attitudes, self-esteem, self-regulation, and decision-making. The word intrapersonal communication frequently makes use of it.

Are those who are intrapersonal intelligent?

Knowing one's inner self, including one's sentiments, range of emotional reactions, thought processes, and capacity for self-reflection, is a key component of the SELF SMART approach. We can take a step back and view ourselves objectively thanks to this intellect.

To know more about Intercommunicate visit:

https://brainly.com/question/8178248

#SPJ4

16. What's the difference between a footnote and endnote?
A. Footnotes are typically at the bottom of the page, while endnotes are at the bottom of the
document.
B. Footnotes are typically within the document, while endnotes are at the bottom of the
page.
O C. There's no difference; footnotes and endnotes are the same thing.
O D. Endnotes are typically at the bottom of the page, while footnotes are at the end of the
document.

Answers

Answer:

I believe it is 'A'

Explanation:

Footnotes appear at the bottom of the relevant page. Endnotes appear in a list at the end of the text, just before the bibliography.

The one difference between footnotes and endnotes is that footnotes appear at the bottom of the same page, while endnotes appear at the end of the paper.

What is footnote?

A footnotes is known to be a short sentence or words that are often written in the bottom of a given or same page.

Note that the endnotes only shows at the end of the paper and as such The one difference between footnotes and endnotes is that footnotes appear at the bottom of the same page, while endnotes appear at the end of the paper.

Learn more about footnote from

https://brainly.com/question/1481437

#SPJ2

HELP FAST PLEASE

You find a photo online, taken by someone else, and want to include it in your math presentation. What should you do?

Use the image without concern.
Use the image without concern.

Find a different image to use.
Find a different image to use.

Include a citation with the image.
Include a citation with the image.

Do not include an image.
Do not include an image.

Answers

Answer:

I am not sure can you explain a little more

Answer:

you will need to use the image without consern

Select the correct answer. crystal detected a problem in a computer network, due to which she could not send or receive data within the network. she pings computers from the administrator computer. which problem is she trying to detect?
a. incorrect password
b. same ip address of two computers
c. faulty network interface card (nic)
d. erroneous changes in the configuration settings

Answers

Faulty network interface card (nic). A network interface card (NIC) is a piece of hardware required for network connectivity on a computer.

What is network interface card ?A computer's connection to a computer network is made possible by a network interface controller, a piece of hardware. Expansion cards that hooked into a computer bus were frequently used to create early network interface controllers.A dedicated, permanent connection to a network is provided by a NIC for a computer. It puts into practise the physical layer hardware required for interacting with a data link layer standard, like Ethernet or Wi-Fi. Each card serves as a device and has the ability to prepare, transmit, and manage data flow on the network.An unstable network connection should be one of the first signs that NIC problems are about to start. You probably have a NIC problem if you find that your connection constantly dropping out for lengths of time that can range from a few seconds to hours.

To learn more about NIC refer :

https://brainly.com/question/20689912

#SPJ4

Is there anything I can do to fix my laptop? It is a chrome book and my school provided it. Everything is still working.If anyone knows how can you please help me.

Answers

it’s the ink inside of the screen. something must have forced pressure onto the screen for the ink inside to spill. i suggest taking it to a computer shop and ask for them to help you. they’res really nothing you can do if you don’t have to proper accessories.

Answer:

If you dropped it im assuming that is is broken. em You could try turning your chrome book off or restarting it. I wish i could be more help

Explanation:

Consider your program for the Spinning Out section. How might you adjust your code to stop your SDV after spiraling outward on a 5 x 5 grid? How about a 7 x 7 grid?

Answers

Answer:

To adjust the code for the Spinning Out section to stop the SDV after spiraling outward on a 5 x 5 grid, you could add a conditional statement that checks the current position of the SDV and stops the program if the position exceeds the limits of the grid.

For example, you could add the following code to the end of the main loop:

if (x > 5 || y > 5) {

 break;

}

This will stop the program once the SDV has moved beyond the 5 x 5 grid.

To stop the program after spiraling outward on a 7 x 7 grid, you would simply need to update the conditional statement to check for a maximum position of 7 in both the x and y directions:

if (x > 7 || y > 7) {

 break;

}

This will stop the program once the SDV has moved beyond the 7 x 7 grid.

Need answer ASAP

In which phrase does software coding and testing happen in the spiral model?

The spiral model does not have a separate testing phase. Both software coding and testing occurs during the _____ phase.

Answers

both software coding and testing occurs during Engineering phase

Which key will s the ring finger located on

Answers

Each hand's fingers should rest on four different keys. The "A" key is pressed with the pinky finger of the left hand, the "S" key with the ring finger, the "D" with the middle finger, and the "F" with the index finger.

Which hand should the ring be on?

right hand, Just prior to the wedding ceremony, the wedding band is exchanged for the engagement ring on the right hand so that it can be worn on the left hand, which is closest to the heart. Following the ceremony, the wedding band is replaced with the engagement ring.

On what letter or key is the left ring finger placed?

The home row keys on an English keyboard are A-S-D-F and J-K-L-;. The left hand's pointer is on the F, the ring finger is on the S, the middle finger is on the D, and the little finger is on the A.

to know more about keys here:

brainly.com/question/16860977

#SPJ1

when choosing a programming language , whihc orf the following will not be deteremined by the choice of language

Answers

The language used should not determine if a solution is present or not.

What elements are important to take into account when selecting a programming language?

The ecology, community, and availability of programmers should all be taken into account when deciding which programming languages to use. Many developers make the error of selecting programming languages simply because they are more well-liked, fashionable, and cool.

Which five steps make up the programming process?

Application program development is the process of making programs. The process that includes the five stages of program development—analyzing, designing, coding, debugging and testing, and implementing and managing application software—is known as the program development life cycle (PDLC).

To know more about language visit :-

https://brainly.com/question/28266804

#SPJ4

during cpr, when there are four rescuers present, which of the following ventilation devices would be best for ventilating a patient

Answers

The best device for ventilating a patient with four rescuers present is a bag-valve-mask (BVM) device. This device is used to deliver positive pressure ventilation to a patient and can be operated by one rescuer, while the other three provide chest compressions.

Using a Bag-Valve-Mask Device for Ventilating a Patient with Four Rescuers Present During CPR

A bag-valve-mask (BVM) device is the best device for delivering positive pressure ventilation to a patient when four rescuers are present. This device is operated by one rescuer, while the other three rescuers provide chest compressions. The BVM device is a handheld device that consists of a face mask, a bag, and a valve that allows for the rescuer to manually control the flow of air from the bag to the patient. The device is used to deliver breaths to the patient during CPR, allowing for oxygen to enter the lungs and helping to maintain blood flow to the rest of the body.

Learn more about CPR: https://brainly.com/question/3725035

#SPJ4

Write a static method named evenBeforeOdd that accepts an array of integers as a parameter and rearranges its elements so that all even values appear before all odds. For example, if the following array is passed to your method:
int[] numbers = {5, 2, 4, 9, 3, 6, 2, 1, 11, 1, 10, 4, 7, 3};
Then after the method has been called, one acceptable ordering of the elements would be:
{4, 2, 4, 10, 2, 6, 3, 1, 11, 1, 9, 5, 7, 3}
The exact order of the elements does not matter, so long as all even values appear before all odd values. For example, the following would also be an acceptable ordering:
{2, 2, 4, 4, 6, 10, 1, 1, 3, 3, 5, 7, 9, 11}
Do not make any assumptions about the length of the array or the range of values it might contain. For example, the array might contain no even elements or no odd elements. You may assume that the array is not null.
If the method is modeled after a bubble sort, expected output is:
[2, 4, 6, 2, 10, 4, 5, 9, 3, 1, 11, 1, 7, 3]
import java.util.*;
public class EvenBeforeOdd {
public static void main(String[] args) {
int[] numbers = {5, 2, 4, 9, 3, 6, 2, 1, 11, 1, 10, 4, 7, 3};
evenBeforeOdd(numbers);
System.out.println(Arrays.toString(numbers));
}
// *** Your method code goes here ***
} // End of EvenBeforeOdd class

Answers

We have a static method called before odd that, in accordance with the query, rearranges the elements of an array with integer once all even values come before all odds.

What sort of parameter would that be?

To describe the total population under study, a parameter is utilized. For instance, we are interested in learning the typical wingspan of a butterfly. This information about the total butterfly population makes it a parameter.

import java.util.*;

public class EvenBeforeOdd {

public static void main(String[] args) {

int[] numbers = {5, 2, 4, 9, 3, 6, 2, 1, 11, 1, 10, 4, 7, 3};

evenBeforeOdd(numbers);

System.out.println(Arrays.toString(numbers));

}

// *** Your method code goes here ***

public static void evenBeforeOdd(int[] arr)

{

int start=0, end=arr.length-1;

while(start < end)

{

if(arr[start] % 2 == 0) // Even

{

start++;

}

else // Odd

{

int t = arr[start];

arr[start] = arr[end];

arr[end] = t;

end--;

}

}

}

} // End of EvenBeforeOdd class

To know more about Parameters visit :

https://brainly.com/question/29741846

#SPJ4

What type of error is raised when the Python virtual machine runs out of memory resources to manage a process

Answers

Stack overflow error is the  type of error is raised when the Python virtual machine runs out of memory resources to manage a process.

How can you define a stack overflow error example?

JVM will generate a StackOverflowError during this process if there is not enough room to store the new stack frames that must be constructed. Consider this: improper or nonexistent termination conditions This is mostly what leads to the condition known as unterminated or infinite recursion.

Why do Java stack overflow errors occur?

The Javadoc description for StackOverflowError notes that the error is generated as a result of too deep recursion in a specific code snippet as the most frequent cause for the JVM to experience this circumstance.

To know more about Stack overflow visit

brainly.com/question/28198079

#SPJ4

The Transport Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers

Answers

C) By accepting and organizing the packets sent to and by the application, you can establish communication with it.

What obligations does the transport layer have?

Through flow, segmentation and lack of discipline, and error management, the transport layer manages the dependability of a specific link.Some protocols focus on connections and states.This implies that the tcp protocol can monitor the segments and resend any that are unsuccessful.

Is the transport layer in charge of routing?

Controlling flow is the responsibility of the transport layer.It makes use of the sliding window protocol, which speeds up data transfer and regulates data flow to prevent overstimulation of the receiver.

To know more about  TCP/IP visit:

https://brainly.com/question/27742993

#SPJ4

LAB: User-Defined Functions: Step counter A pedometer treats walking 2,000 steps as walking 1 mile. Define a function named Steps To Miles that takes an integer as a parameter, representing the number of steps, and returns a float that represents the number of miles walked. Then, write a main program that reads the number of steps as an input, calls function Steps ToMiles with the input as an argument, and outputs the miles walked, Output the result with four digits after the decimal point, which can be achieved as follows: Put result to output with 4 decimal places If the input of the program is: 5345 the function returns and the output of the program is: 2.6725 Your program should define and call a function: Function Steps ToMiles(integer userSteps) returns float numMiles 361108 2293206.qx3zay LAB ACTIVITY 5.9.1: LAB: User-Defined Functions: Step counter 0/10 1 Variables Not shown when editing Input Output Code Flowchart ENTER EXECUTION STEP RUN Execution speed Medium Submit for grading Signature of your work What is this?

Answers

The function StepsToMiles(userSteps) takes an integer as a parameter, representing the number of steps and returns a float that represents the number of miles walked by converting the steps into miles by dividing it by 2000.

What is the significance of the function StepsToMiles?

The function StepsToMiles is used to convert the number of steps taken by a person into miles by dividing the number of steps taken by 2000. It is useful for tracking the distance covered by a person during walking or jogging. It takes an integer as a parameter, representing the number of steps and returns a float that represents the number of miles walked.

What is the role of main program in the given scenario?

The main program is responsible for reading the number of steps as an input, calling the function StepsToMiles with the input as an argument, and outputting the miles walked. It takes input from the user, passes the input to the function StepsToMiles and receives the output in the form of miles walked. It then displays the output with four decimal places. The main program is responsible for driving the entire process by calling the function StepsToMiles and displaying the result to the user.

To know more about StepsToMiles(userSteps) Visit:

brainly.com/question/19263323

#SPJ4

he print statement uses values such as \t and \n to control how output appears. These sequences of keystrokes are referred to as: The print statement uses values such as \t and \n to control how output appears. These sequences of keystrokes are referred to as: print formats line characters escape sequences special sequences

Answers

It is used to represent a few whitespace characters, including the tab, new line, and carriage return (abbreviated as "t", "n," and "r," respectively).

What does \n and \t do in Python?The backslash (""), commonly known as the "escape" character, is a special character used in Python strings. It is used to represent a few whitespace characters, including the tab, new line, and carriage return (abbreviated as "t", "n," and "r," respectively). The actual backslash character, "," can be used to escape itself.We use the symbol n (New line) to move the cursor to the new line. We use the horizontal tab key, or t, to move the pointer a few spaces to the right on the same line. (Audible bell) - A beep is produced to tell the user that the software is running.In the printf() function of C, the special format specifier %n forces printf() to load the variable referenced to by the corresponding argument with a value equal to how many characters were printed by printf() before to the occurrence of %n, rather than writing anything.

To learn more about Python refer :

https://brainly.com/question/28379867

#SPJ4

Projects that spend much time ________ are sometimes said to be in analysis O paralysis.
O Systems development
O Requirements analysis
O Documenting requirements
O Assess project feasibility

Answers

projects that require a lot of time Requirements documentation is allegedly paralysed by analytical paralysis.

What does SDLC analysis paralysis mean?

When the goal is to complete the analysis phase perfectly and completely, analysis paralysis arises. This AntiPattern is characterised by turnover, model updating, and the creation of intricate models that are not very helpful to processes farther down the line.

What is an example of analytical paralysis?

Analysis paralysis is the term for this kind of excessive pondering. When you have analysis paralysis, you could spend a lot of time weighing your options to ensure that you're selecting the best one. This occurs even whether choosing a microwave or a coffee shop croissant, which are both pretty minor selections.

To know more about  analytical paralysis visit:

https://brainly.com/question/30077507

#SPJ4

Knowing that the central portion of link bd has a uniform cross sectional area of 800 mm2 , determine the magnitude of the load p for which the normal stress in link bd is 50 mpa. (hint: link bd is a two-force member. ) ans: p = 62. 7 kn

Answers

The magnitude of the load p is 62.7kn. The x, y, and z directions are all possible for load magnitude.

How do you determine the size of a load?

5.3 The load's size and composition, The result of multiplying the weight to be transported by the equipment weight (tare) is the value [N], which indicates the size of the load. Q represents each wheel's load capacity Pu stands for pounds to move. P = tare of the equipment n is the number of wheels making contact with the surface.

The x, y, and z directions are all possible for load magnitude. The current work plane's coordinate system is the same. The direction of the load is indicated by positive coordinates. Shifting the work plane, for instance, enables you to precisely apply loads when you create loads perpendicular to sloped portions.

The magnitude of a two-dimensional vector, a=(a1,a2), can be calculated using the formula a=a21+a22.

Explanation: p = 800 mm2+50mpa = 62.7kn.

To learn more about magnitude refer to:

brainly.com/question/24256733

#SPJ4

In which view of PowerPoint is the Annotation tools menu available?

1. Slide Show
2. Normal
3. Slide Sorter
4. Notes

Answers

Answer:

2.

Explanation:

Annotating in PowerPoint is the create notes while delivering a PowerPoint presentation. This could be done in two ways.

First, right click with the mouse and select 'pointer options'. Then you can choose either pen or highlighter to circle certain word or highlight any line.

The second way of creating annotation is by going to View→Normal→Notes.

After you select 'notes', a pane will appear at the bottom of your presentation.

So, the correct answer that annotation tools menu is available in Normal. Thus option 2 is correct.

Answer:

Normal

Explanation:

gabriel just got hired to be in charge of all social media presence for Gibson's doughnut shop

Answers

Gabriel should be building deeper customer relationships and positive word-of-mouth communication. Building deeper customer relationships means creating a connection with the customers that goes beyond just selling them doughnuts.

It can involve getting to know them, understanding their needs and preferences, and creating a sense of community. By fostering deeper relationships with customers, Gibson's doughnut shop will be able to retain their customers and attract new ones through positive word-of-mouth communication. Positive word-of-mouth communication refers to when customers talk about their experiences with the shop to their friends and family, which can have a significant impact on the shop's reputation and success.

The missing part in the question is shown below.

Gabriel just got hired to be in charge of all social media presence for Gibson's doughnut shop. His two ultimate goals for the shop's social media presence (according to your text) should be building deeper customer relationships and

Post humorous content

Get more retweets

Responding to complaining customers

Get more followers

Positive word-of-mouth-communication

Learn more about social media, here https://brainly.com/question/29036499

#SPJ4

Which of the following can be used to roll back a faulty printer driver?
a. Print Management Console
b. Device Manager
c. Activity Center
d. Rollback.exe

Answers

You can restore a broken printer driver using Device Manager of the following.

Which of the following choices will make it easiest for you to restore your computer to its prior state in the event that the new driver is incorrect?

You are able to roll back a driver so that the old version is used in place of the new one. Device Manager is a tool that you can use to roll back a driver.

A driver package contains what exactly?

For your device to be supported by Windows, you must provide a driver package that contains all the necessary software parts. In a driver bundle, you'll often find the following items: an INF file. the catalog file.

To know more about Device Manager visit :-

https://brainly.com/question/11599959

#SPJ4

Other Questions
On a business's income statement, inventory affects PLEASW HELP WILL GIVE BRAINLIEST!!! What are the inputs and outputs of trees? Upon returning to the pre-fugue state, an individual will most likely __________. A. lose all memories and sense of self-identity, then create a new identity B. seek medical care due to the time that was lost C. forget all events or experiences that occurred during the fugue state D. remember only the events that occurred during the fugue state Please select the best answer from the choices provided A B C D find the volume of the cylinder. use 3.14 for . 5ft 10ft (10 is the radius) PLS HELP :( The fourth term of an arithmetic sequence is 20. The common difference is -1/5 times the first term. What is the first term? Graph the sequence. Can anyone please help with this? The following is a partially completed departmental expense allocation spreadsheet for Brickland. It reports the total amounts of direct and indirect expenses for its four departments. Purchasing department expenses are allocated to the operating departments on the basis of purchase orders. Maintenance department expenses are allocated based on square footage. Compute the amount of Maintenance department expense to be allocated to Fabrication. (Do not round your intermediate calculations.) Purchasing Maintenance Fabrication Assembly Operating costs $ 35,000 $ 19,800 $ 99,000 $ 65,000 No. of purchase orders 16 4 Sq. ft. of space 3,450 2,5 Find the 35th term for the sequence: 12, 9.5, 7, 4.5... CAN SOMEONE PLZ HELP ME!!! Help!! find the inequality represented by the graph Patients with damage in the left hemisphere often exhibit aphasia (inability to use or comprehend words). This is an example of Is the set of rational expressions closed under subtraction? ExplainP(x) /q(x) - r(x)/s(x) = Find the value of X. Round your answer to the nearest tenth... I just need the answer nothing more thx 1. Hitler and Stalin established firm control over Germany and Russia. What strategies did they useto gain so much power and maintain it? List at least two. *(2 points) A research scientist wants to know how many times per hour a certain strand of bacteria reproduces. The mean is found to be 4 reproductions and the populationstandard deviation is known to be 1.9. If a sample of 283 was used for the study, construct the 95% confidence interval for the true mean number of reproductionsper hour for the bacteria. Round your answers to one decimal place. For problems 14, solve the given system of equations using either substitution or elimination. Can someone please type me up a 3 paragraph essay about: should students be allowed to wear religious attire at school? Your firm has a risk-free investment opportunity where it can invest $160,000 today and receive $170,000 in one year. For what level of interest rates is this project attractive Write 5 sentences with this words