1 megabyte is equal to 1024 gigabyte. True/False​

Answers

Answer 1

Answer:

false

Explanation:

1 MB = 0.001 GB


Related Questions


A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS

Answers

Answer:

DNS

Explanation:

Hope this helps

DNS I thin hope that helps

Suppose one machine, A, executes a program with an average CPI of 1.9. Suppose another machine, B (with the same instruction set and an enhanced compiler), executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz. In order for the two machines to have the same performance, what does the clock rate of the first machine need to be

Answers

Answer:

the clock rate of the first machine need to be 1.7 GHz

Explanation:

Given:

CPI of A = 1.9

CPI of B = 1.1

machine, B executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz

To find:

In order for the two machines to have the same performance, what does the clock rate of the first machine need to be

Solution:

CPU execution time = Instruction Count * Cycles per Instruction/ clock rate

CPU execution time = (IC * CPI) / clock rate

(IC * CPI) (A) / clock rate(A) =  (IC * CPI)B / clock rate(B)

(IC * 1.9) (A) / clock rate(A) = (IC * (1.1 * (1.0 - 0.20)))(B) / 800 * 10⁶ (B)

Notice that 0.20 is basically from 20% less instructions

(IC * 1.9)  / clock rate = (IC * (1.1 * (1.0 - 0.20))) / 800 * 10⁶

(IC * 1.9)  / clock rate =  (IC*(1.1 * ( 0.8))/800 * 10⁶

(IC * 1.9)  / clock rate =  (IC * 0.88) / 800 * 10⁶

clock rate (A) =  (IC * 1.9) / (IC * 0.88) / 800 * 10⁶

clock rate (A) =  (IC * 1.9) (800 * 10⁶) /  (IC * 0.88)

clock rate (A) = 1.9(800)(1000000)  / 0.88

clock rate (A) =  (1.9)(800000000)  / 0.88

clock rate (A) = 1520000000  / 0.88

clock rate (A) = 1727272727.272727

clock rate (A) = 1.7 GHz

Plz answer me will mark as brainliest ​

Answers

1 plus 1 is too and three to four is 111

If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder

Answers

Answer:

270 nsec

Explanation:

Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.

Formula to calculate the delay of a ripple-carry adder is;

  = 2( n + 1 ) x D

delay in a full-adder = 150 nsec.

number of full-adders = number of ripple-carry bits = 8

 = 2 ( 8 + 1 ) x 150

 = 18 x 150

 = 270 nsec

Online Privacy
1.)Explain why is online privacy a controversial topic?
2.)Explain why this issue is applicable to you and your peers.
3.)Explain why this issue is a federal issue and not a state or local issue.

Answers

Answer:

Yes

Explanation:

Online privacy is a controversial topic due to the fact that it's a very hard thing to navigate. Some websites use cookies that are used to store your data so in a way there taking your privacy away which is controversial because of the way they use the information. Some websites store it for use of ads while others sell it. This issue is applicable to me and my peers because of the way we use technology. It can be used to steal my information about where I live and what I look up online. Also, the information stored could have my credit or debit card credentials. This issue should be a federal and nationwide issue because this is an everyday occurrence and leaves tons of people in crushing   debt every year.

3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation

Answers

Answer:

speed and storage

Explanation:

The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.

Array Implementation:

Pros: Much Faster and Easier to target a specific elementCons: Much More Space needed

Linked Implementation

Pros: Less overall space neededCons: Much slower speed.

Write code that prints: Ready! numVal ... 2 1 Start! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal

Answers

Answer:

Written in Python

numVal = int(input("Input: "))

for i in range(numVal,0,-1):

    print(i)

print("Ready!")

Explanation:

This line prompts user for numVal

numVal = int(input("Input: "))

This line iterates from numVal to 1

for i in range(numVal,0,-1):

This line prints digits in descending order

    print(i)

This line prints the string "Ready!"

print("Ready!")

how many basic element makes up a computer system​

Answers

Answer:

4

Explanation:

Input/output, datapath, control, and memory

There wrong its C bold it.

:)))))

Jake or Peggy Zale must fix quickly the fax.

Answers

Answer:

Sentence: Jack or Peggy Zale must fix quickly the fax.

Correct: Either Jack or Peggy Zale must quickly fix the fax.

There are 2 errors in these sentence construction. In stating two persons as an option we must use the word "either" to indicate that you only have two choose from the two of them. The word "

Explanation:

The correct sentence would be "either Jake or Peggy Zale must quickly fix the fax".

In the question construction, there is a conjunction and misarrangement error.

In conclusion, the word " "either Jake or Peggy Zale must quickly fix the fax" is correct

Read more about conjunction

brainly.com/question/8094735

B1:B4 is a search table or a lookup value

Answers

Answer:

lookup value

Explanation:

My Mac is stuck on this screen? How to fix?

Answers

Answer:

Press and hold the power button for up to 10 seconds, until your Mac turns off. If that doesn't work, try using a cellular device to contact Apple Support.

Explanation:

If that also doesn't work try click the following keys altogether:

(press Command-Control-Eject on your keyboard)

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

This makes the laptop (macOS) instruct to restart immediately.

Hopefully this helps! If you need any additional help, feel free and don't hesitate to comment here or private message me!. Have a nice day/night! :))))

Another Tip:

(Press the shift, control, and option keys at the same time. While you are pressing those keys, also hold the power button along with that.)

(For at least 10 seconds)

What are two examples of items in Outlook?

a task and a calendar entry
an e-mail message and an e-mail address
an e-mail address and a button
a button and a tool bar

Answers

Answer:

a task and a calendar entry

Explanation:

ITS RIGHT

Answer:

its A) a task and a calendar entry

Explanation:

correct on e2020

Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0.

Answers

Answer:

import random

decisions = int(input("How many decisions: "))

for i in range(decisions):

   number = random.randint(0, 1)

   if number == 0:

       print("heads")

   else:

       print("tails")

Explanation:

*The code is in Python.

import the random to be able to generate random numbers

Ask the user to enter the number of decisions

Create a for loop that iterates number of decisions times. For each round; generate a number between 0 and 1 using the randint() method. Check the number. If it is equal to 0, print "heads". Otherwise, print "tails"

In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.

Answers

Answer:

B. The process will be terminated by the operating system.

Explanation:

When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.

So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.

Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.

It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.

It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.

Learn more about CPU scheduling on:

https://brainly.com/question/19999569

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

5-5. Design an Ethernet network to connect a single client P C to a single server. Both the client and the server will connect to their workgroup switches via U T P. The two devices are 900 meters apart. They need to communicate at 800 M b p s. Your design will specify the locations of any switches and the transmission link between the switches.


5-6. Add to your design in the previous question. Add another client next to the first client. Both connect to the same switch. This second client will also communicate with the server and will also need 800 M b p s in transmission speed. Again, your design will specify the locations of switches and the transmission link between the switches.

Answers

Answer:

ok so u have take the 5 and put 6

Explanation:

5-5. Ethernet network design: UTP connections from client PC and server to workgroup switches, 900m fiber optic link between switches, 800 Mbps communication.

5-6. Additional client connects to the same switch, UTP connection, maintains existing fiber optic link, 800 Mbps communication with the server.

What is the explanation for this?

5-5. For connecting a single client PC to a single server, both located 900 meters apart and requiring communication at 800 Mbps, the following Ethernet network design can be implemented:

- Client PC and server connect to their respective workgroup switches via UTP.

- Use fiber optic cables for the 900-meter transmission link between the switches.

- Install switches at the client PC and server locations.

- Ensure that the switches support at least 1 Gbps Ethernet speeds to accommodate the required transmission speed.

5-6. In addition to the previous design, for adding another client next to the first client:

- Connect both clients to the same switch.

- Use UTP cables to connect the second client to the switch.

- Ensure the switch supports 1 Gbps Ethernet speeds.

- Maintain the existing fiber optic transmission link between the switches.

- The second client can also communicate with the server at the required 800 Mbps transmission speed.

Learn more about Network Design at:

https://brainly.com/question/7181203

#SPJ2

In Microsoft windows which of the following typically happens by default when I file is double clicked

Answers

Answer:

when a file is double clicked it opens so you can see the file.

Explanation:

Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort that array – continuously pushing the largest elements to the right side

Answers

Answer:

The solution is provided in the explanation section.

Detailed explanation is provided using comments within the code

Explanation:

import java.util.*;

public class Main {

//The Bubble sort method

public static void bb_Sort(int[] arr) {  

   int n = 10; //Length of array  

   int temp = 0; // create a temporal variable  

   for(int i=0; i < n; i++){  

         for(int j=1; j < (n-i); j++){  

           if(arr[j-1] > arr[j]){  

               // The bubble sort algorithm swaps elements  

               temp = arr[j-1];  

               arr[j-1] = arr[j];  

               arr[j] = temp;  

             }  

         }            

         }  

        }

 public static void main(String[] args) {

   //declaring the array of integers

   int [] array = new int[10];

   //Prompt user to add elements into the array

   Scanner in = new Scanner(System.in);

   //Use for loop to receive all 10 elements

   for(int i = 0; i<array.length; i++){

     System.out.println("Enter the next array Element");

     array[i] = in.nextInt();

   }

   //Print the array elements before bubble sort

   System.out.println("The Array before bubble sort");

   System.out.println(Arrays.toString(array));

   //Call bubble sort method

   bb_Sort(array);  

               

   System.out.println("Array After Bubble Sort");  

   System.out.println(Arrays.toString(array));

 }

}

How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development

Answers

Answer:

Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.

Explanation:

The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.

Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("Amount: $%.2f\n", dollars); Ex: If the input is: 4 3 2 1 where 4 is the number of quarters, 3 is the number of dimes, 2 is the number of nickels, and 1 is the number of pennies, the output is: Amount: $1.41 For simplicity, assume input is non-negative.
LAB ACTIVITY 2.32.1: LAB: Convert to dollars 0/10 LabProgram.java Load default template. 1 import java.util.Scanner; 2 3 public class LabProgram 4 public static void main(String[] args) { 5 Scanner scnr = new Scanner(System.in); 6 7 /* Type your code here. */|| 8 9) Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed input values in the first box, then click Run program and observe the program's output in the second box Enter program input (optional) If your code requires input values, provide them here. Run program Input (from above) 1 LabProgram.java (Your program) Output (shown below) Program output displayed here

Answers

Answer:

The corrected program is:

import java.util.Scanner;

public class LabProgram{

public static void main(String[] args) {

Scanner scnr = new Scanner(System.in);

int qtr, dime, nickel, penny;

double dollars;

System.out.print("Quarters: ");

qtr =scnr.nextInt();

System.out.print("Dimes: ");

dime = scnr.nextInt();

System.out.print("Nickel: ");

nickel = scnr.nextInt();

System.out.print("Penny: ");

penny = scnr.nextInt();

dollars = qtr * 0.25 + dime * 0.1 + nickel * 0.05 + penny * 0.01;

System.out.printf("Amount: $%.2f\n", dollars);

System.out.print((dollars * 100)+" cents");

}

}

Explanation:

I've added the full program as an attachment where I used comments as explanation

(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.

Answers

Answer:

See solution below

See comments for explanations

Explanation:

import java.util.*;

class Main {

 public static void main(String[] args) {

   //PrompT the User to enter a String

   System.out.println("Enter a sentence or phrase: ");

   //Receiving the string entered with the Scanner Object

   Scanner input = new Scanner (System.in);

   String string_input = input.nextLine();

   //Print out string entered by user

   System.out.println("You entered: "+string_input);

   //Call the first method (GetNumOfCharacters)

   System.out.println("Number of characters: "+ GetNumOfCharacters(string_input));

   //Call the second method (OutputWithoutWhitespace)

   System.out.println("String with no whitespace: "+OutputWithoutWhitespace(string_input));

   }

 //Create the method GetNumOfCharacters

   public static int GetNumOfCharacters (String word) {

   //Variable to hold number of characters

   int noOfCharactersCount = 0;

   //Use a for loop to iterate the entire string

   for(int i = 0; i< word.length(); i++){

     //Increase th number of characters each time

     noOfCharactersCount++;

   }

   return noOfCharactersCount;

 }

 //Creating the OutputWithoutWhitespace() method

 //This method will remove all tabs and spaces from the original string

 public static String OutputWithoutWhitespace(String word){

   //Use the replaceAll all method of strings to replace all whitespaces

   String stringWithoutWhiteSpace = word.replaceAll(" ","");

   return stringWithoutWhiteSpace;

 }

}

The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0, which is no wind, up to 12, which is a hurricane. The following script first generates a random force value. Then, it prints a message regarding what type of wind that force represents, using a switch statement. If random number generated is 0, then print "there is no wind", if 1 to 6 then print "this is a breeze", if 7 to 9 "this is a gale", if 10 to 11 print "this is a storm", if 12 print "this is a hurricane!". (Hint: use range or multiple values in case statements like case {1,2,3,4,5,6})

Required:
Re-write this switch statement as one nested if-else statement that accomplishes exactly the same thing. You may use else and/or elseif clauses.

ranforce = randi([0, 12]);
switch ranforce
case 0
disp('There is no wind')
case {1,2,3,4,5,6}
disp('There is a breeze')
case {7,8,9}
disp('This is a gale')
case {10,11}
disp('It is a storm')
case 12
disp('Hello, Hurricane!')
end

Answers

Answer:

The equivalent if statements is:

ranforce = randi([0, 12]);

if (ranforce == 0)

     disp('There is no wind')

else  if(ranforce>0 && ranforce <7)

     disp('There is a breeze')

else  if(ranforce>6 && ranforce <10)

     disp('This is a gale')

else  if(ranforce>9 && ranforce <12)

     disp('It is a storm')

else  if(ranforce==12)

     disp('Hello, Hurricane!')

end

Explanation:

The solution is straight forward.

All you need to do is to replace the case statements with corresponding if or else if statements as shown in the answer section

the language is Java! please help

Answers

public class Drive {

   int miles;

   int gas;

   String carType;

   public String getGas(){

       return Integer.toBinaryString(gas);

   }

   public Drive(String driveCarType){

       carType = driveCarType;

   }

   public static void main(String [] args){

       System.out.println("Hello World!");

   }

   

}

I'm pretty new to Java myself, but I think this is what you wanted. I hope this helps!

Plz answer me will mark as brainliest ​

Answers

Answer:

True

Operating System

Booting

What is his resolution amount

Answers

I think it’s 92 I mean yh

Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate the risks associated with future investment decisions, and offers his clients real-time information immediately. Which type of data processing is Jason following in the transaction processing system?

A.
online decision support system
B.
online transaction processing
C.
online office support processing
D.
online batch processing
E.
online executive processing

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is an online decision support system. Because the decision support systems process the data, evaluate and predict the decision, and helps the decision-makers,  and offer real-time information immediately in making the decision in an organization. So the correct answer to this question is the decision supports system.

Why other options are not correct

Because the transaction processing system can only process the transaction and have not the capability to make the decision for the future. Office support processing system support office work, while the batch processing system process the task into the batch without user involvement.   however, online executive processing does not make decisions and offer timely information to decision-makers in an organization.

Answer: the answer is A.

Explanation: He has to listen to what the people tell him and think about the information he has and make a choice on what to reply with.

what is scientific and​

Answers

Answer:

And what??????????????

And what? You didn’t finish

What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?

Answers

Answer:

4096 VLANs

Explanation:

A VLAN (virtual LAN) is a group of devices on one or more LAN connected to each other without physical connections. VLANs help reduce collisions.

An 802.1Q Ethernet frame header has VLAN ID of 12 bit VLAN field. Hence the maximum number of possible VLAN ID is 4096 (2¹²).  This means that a switch supporting the 802.1Q protocol can have a maximum of 4096 VLANs

A lot of VLANs ID are supported by a switch. The maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol is 4,094 VLANS.

All the VLAN needs an ID that is given by the VID field as stated in the IEEE 802.1Q specification. The VID field is known to be of  12 bits giving a total of 4,096 combinations.

But that of 0x000 and 0xFFF are set apart. This therefore makes or leaves it as 4,094 possible VLANS limits. Under IEEE 802.1Q, the maximum number of VLANs that is found on an Ethernet network is 4,094.

Learn more about VLANs from

https://brainly.com/question/25867685

Other Questions
Your TV has a resistance of 10 ohms and a wall voltage of 120 V. How much current and power does it use I WILL GIVE YOU BRAINLIESTT!!!!!Which sentence reflects the theme of "Invictus" by William Ernest Henley?One must face hardship and pain with resolve and strength.Sometimes giving up is the smartest choice. Freedom from suffering makes life more meaningful.A sense of humor can make even the worst times bearable. ead the legend titled "The Little Mice."Once upon a time, a prairie mouse busied herself all fall storing away a cache of beans. Every morning she was out early with her empty cast-off snakeskin, which she filled with ground beans and dragged home with her teeth.The little mouse had a cousin who was fond of dancing and talk but did not like to work. She was not careful to get her cache of beans, and the season was already well gone before she thought to bestir herself. When she came to realize her need, she found she had no packing bag. So she went to her hardworking cousin and said:"Cousin, I have no beans stored for winter and the season is nearly gone. But I have no snakeskin to gather the beans in. Will you lend me one?""But why have you no packing bag? Where were you in the moon when the snakes cast off their skins?""I was here.""What were you doing?""I was busy talking and dancing.""And now you are punished," said the other. "It is always so with lazy, careless people. But I will let you have the snakeskin. And now go, and by hard work and industry, try to recover your wasted time."Which statement best identifies the purpose and theme of this legend?The legend aims to teach readers a lesson about understanding, revealing the theme "honesty is greatly respected."The legend aims to teach readers a lesson about responsibility, revealing the theme "you get out of something what you put into it."The legend aims to teach readers a lesson about determination, revealing the theme "any job can be completed with effort and cooperation."The legend aims to teach readers a lesson about free time, revealing the theme "life's pleasures must equal life's work." A bag contains 12 blue blue marbles and 8 red marbles what is the ratio of the blue marbles to red marbles A 30 foot ladder is leaned against a wall. If the base of the ladder is 6 feet from the wall, how high up the wall will the ladder reach? Which of the following explains why antibiotics will not work against a viral infection? aViruses replicate at such an accelerated rate that antibiotics are unable to control colonization and growth. bViruses create highly resistant endospores that preserve their genetic material against antibiotics. cViruses are not cellular and do not contain the lipid and protein markers targeted by antibiotics. dViruses exchange genetic material with nearby bacteria that have become resistant to antibiotics. Which statement describes the inverse of m(x) = x^2 17x?a. The domain restriction x StartFraction 17 Over 2 EndFraction results in m1(x) =StartFraction 17 Over 2 EndFraction minus StartRoot x + StartFraction 289 Over 4 EndFraction EndRoot .b. The domain restriction x StartFraction 17 Over 2 EndFraction results in m1(x) =StartFraction 17 Over 2 EndFraction + StartRoot x + StartFraction 289 Over 4 EndFraction EndRoot .c. The domain restriction x Negative StartFraction 17 Over 2 EndFraction results in m1(x) =StartFraction 17 Over 2 EndFraction minus StartRoot x + StartFraction 289 Over 4 EndFraction EndRoot .d.The domain restriction x Negative StartFraction 17 Over 2 EndFraction results in m1(x) =StartFraction 17 Over 2 EndFraction + StartRoot x + StartFraction 289 Over 4 EndFraction EndRoot . SOMEONE PLEASE HELPPP How did the way the Persian government handled religion throughout the empire help preserve social and political order? Add my snaq k1nglean if anyone wants to ttrade you gotta be 16+ A fishing boat with two people on it runs out of gas while out in a bay. The people set off an emergency flare from a height of 2 meters above the water. The flare has an initial vertical velocity og 30 meters per second. How long does it take the flare to reach its maximum height? What is that height? Find the equation of the line passing through the points (-2,-4) and (7,23) Shannon's little brother is 7 weeks old. She is exactly3 years and 3 days older than he is. How old is Shannon in days?Assume that a year is 365 days. How did Charlemagne become a rival to the Byzatineemperors and the Abbasid caliphs? 4.The nerve center of the Executive Office of the President is the A. Office of Management and BudgetB. Office of National Drug Control PolicyC. White House OfficeD. Council of Economic Advisers5. The job of the National Security Council is to A. Advise the President about foreign affairs B. prepare the federal budgetc. supervise the civil serviceD. advice the President about the nations safety6. Which is the title of the head of the justice Department?A. secretaryB. chief justiceC. attorney general D. Chief bureaucrat7. How many Cabinet departments are there?a. 15b. 25C. 100D. 1508. Independent regulatory commissions A. Supervise federal workersB. have some legislative -like and judicial- powersC. serve federal workersD. may resemble businesses9. After President James Garfields assassination, the government began reforms in A. a number of cabinet departmentsB. the civil service systemC. the ConstitutionD. the executive branch10. Civil servants may notA. VoteB. belong to a political partyC. be promotedD. run in their partys election11. By definition, bureaucracy is a system of organization built on .. principlesA, ThreeB. FifteenC. TenD. Twenty 12. This is the 12 month period used by a government or business for financial managementA. free market enterpriseB. fiscal yearc. CapitalismD. The spoils system How to make my parents proud of me? Plz answer me will mark as brainliest When was the Washington State Grange founded and where? Who were some of the original members or founders? PLS PLS PLS ANSWER DUE SOON PLEASE HELP PLEASE!!Complete the following statement to estimate the root of 75 to the nearest tenth. Use numbers that are closest to the root of 75 6(x-2=4(x+3) what does x equal