Calculate the following binary sum
and write your answer in binary.
1101011 + 1010110 (Do not add
extra 0's at the start of your answer)

please help !!

Calculate The Following Binary Sumand Write Your Answer In Binary.1101011 + 1010110 (Do Not Addextra

Answers

Answer 1

Answer:

11000001

Explanation:

1 plus 0 1

1 pl 1 ,10 put 0 carry 1

1pl 1, 10put 0 carry 1

1pl 1,10put 0 carry 1

1pl 1,10 put 0 carry 1

1pl 1,10 put 0 carry 1

1pl 1pl 1 =11

ans is 11000001


Related Questions

true or false the dyn attack would have been prevented if the company patched their apache web-servers properly to avoid the sql injection attack.

Answers

True. The DYN attack likely would have been prevented if the company had properly patched their Apache web servers to avoid SQL injection attacks.

What is the DYN attack?

The DYN attack is a distributed denial-of-service (DDoS) attack that occurred in October 2016 against DNS provider Dyn. The attack resulted in major websites such as Twi_tter, Spo_tify, and Red_dit becoming unavailable for several hours.

The attack was launched using a botnet of Internet of Things (IoT) devices, such as routers and security cameras, which were infected with malware and controlled remotely to flood the Dyn servers with traffic, causing them to become overwhelmed and unable to process legitimate traffic.

The DYN attack is considered one of the largest and most significant DDoS attacks to date, highlighting the vulnerability of IoT devices and the importance of securing them properly.

To learn more about denial-of-service (DDoS), visit: https://brainly.com/question/18687584

#SPJ4

ursula wants to freeze the header row so that it remains visible while she scrolls down the worksheet. to do so, she can click the view tab and then click freeze top row. true false

Answers

True, To keep the header row visible as she scrolls down the spreadsheet, Ursula wishes to freeze it. She can accomplish this by selecting the View tab, then selecting Freeze Top Row.

A spreadsheet is a sort of software program that can store, display, and alter data using rows and columns of information. A spreadsheets is one of the most popular tools that can be used on personal computers. Usually, spreadsheets are employed to record numerical data and short sections of text. A spreadsheet program called Microsoft Excel was created and is supported by Microsoft. You can carry out a wide range of tasks with Excel, including making charts, lists, and calculations. As well as tracking financial data, it aids in information analysis and sorting. Microsoft Excel is the right response. Data can be arranged, formatted, and calculated using Excel, a spreadsheet tool from Microsoft.

Learn more about spreadsheet here

https://brainly.com/question/4965119

#SPJ4

The form and keying style that a typist uses while operating the keyboard is called?

Answers

move forward as well as back as each key is struck. b. move from side - to - side because each code is struck

What is a keying style?

the manner in which a typist uses the keyboard when using it. Touch technique. To the right of a monitor and keyboard, to key using touch rather than the hunt-and-peck approach. Use short, sharp strokes for the right typing technique. In order to type correctly, one must stand somewhat straight ahead of the keyboard.

Your fingertips rest on the keys in the middle row, often known as the home row, of the computer keyboard when you aren't typing. For instance, the first row keys for your left hand on the common QWERTY American keyboard are A,S,D &F

To learn more about keying style refers to:

brainly.com/question/23245311

#SPJ4

given list: ( 7, 11, 21, 23, 31, 55, 64, 70 )which list elements will be compared to key 11 using binary search? enter elements in the order checked.

Answers

The elements that will be compared to the key 11 using binary search are 7, 21, 23, and 31.

What is binary search?

Binary search is a search algorithm that is used to locate an item in a sorted array. It works by repeatedly dividing the search interval in half until the value is found. The algorithm begins by comparing the middle element of the array with the target value. If the target value matches the middle element, its position in the array is returned.

This is because binary search works by first finding the middle element (in this case, 31) and then comparing the key to the middle element. If the key is greater than the middle element, then the search continues on the right side of the list, which contains 21, 23, and 31. If the key is less than the middle element, then the search continues on the left side of the list, which contains 7.

To learn more about binary search
https://brainly.com/question/20411780
#SPJ4

Desktop computers are used by people all around the world. One of the challenges faced by computer manufacturing companies is to overcome the cultural and economic differences across communities that make it difficult for them to sell their products. Given this information, it can be said that desktop computers are

Answers

To overcome the cultural and economic differences across communities that make it difficult for them to sell their products for this it can be said that desktop computers are consumer products.

What are consumer products?

Consumer goods, also called finished products, are products purchased by individuals or households for their personal use. In other words, consumer goods are goods that the average consumer purchases for consumption. From a marketing perspective, there are four types of consumer products, he said, each with different marketing considerations.

Types of consumer goods:

Convenience productsShopping productsSpecialty productsUnsought products

To know more about consumer products, visit:

https://brainly.com/question/10540122

#SPJ4

which of the following sql data types should not be used to define the numeric data: 111.11? select one: a. integer(3,2) b. numeric(3,2) c. numeric(4,2) d. numeric(5,2)

Answers

An database is a grouping of material that makes sense together logically.For illustration, consider a database of details on Elon University.People (students, professors, members of staff), courses taught, facilities, finances, and other things might be tracked in this database.

What's an example of a database name?

The username is indeed the name of a user who is linked to the database, and the database name seems to be the name of a database itself.John Smith, for instance, might access Database1, a database.John Smith was the username and Database1 was the database name.

Which database is the most basic?

Calling fsync will ensure that the file was saved to the hard drive, which is what we think of when we talk about persistent storage. File systems provide the simplest database capability to reliably persist data.

To know more about  data visit:

https://brainly.com/question/10980404

#SPJ4

Question 2 of 20
The first paragraph or part of a business letter is the

Answers

Answer:

Sorry but please I dont understand the question

in excel desktop, what is one of the function categories on the formulas tab, in the function library group? 1 point medical lookup

Answers

One of the function categories on the formulas tab, in the function library group, is Lookup & Reference. The correct option is B.

What is an Excel desktop?

The greatest option for using sophisticated graphs and charts is the Excel Desktop App. Because of the many varied functions, this group is one of the most used.

The Insert Function, Autosum, Recently Used, and other buttons are included in the Function Library group, to start. The Date & Time, Financial, Logical, Text, and other buttons are also included.

Therefore, the correct option is B. Lookup & Reference.

To learn more about excel desktop, refer to the link:

https://brainly.com/question/30052750

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Analytical

Lookup & Reference

Medical

Functional

Select the correct locations on the image.
Choose the paragraph that follows the guidelines of DTP publishing.
Traditional delivery. These methods of
delivery rely on creating physical copies of
the project For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery These methods of
delivery rely on creating physical copies of
the project
. For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery. These methods of
delivery rely on creating physical copies of
the project. For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery: These
methods of delivery rely on
creating pliysical copies of the
project. For example, business cards,
greeting cars, brochures, and the like will
have to be printed
out on respective
materials of appropriate size and
distributed
All rights reserved

Answers

Paragraph A is one that adheres to DTP Publishing's rules. DTP publishing guidelines for traditional delivery. These methods of delivery rely on making physical copies of the project.

Desktop publishing (DTP) is using personal computers to create books and booklets that will be printed using laser or inkjet printers. The desktop publishing program offers a WYSIWYG graphical user interface (GUI) to make publication setup as simple as possible. Desktop publishing is a very useful independent publishing choice and may be used to create content on various topics.

For many small enterprises and groups, desktop publishing makes it possible to produce informative books and papers of high quality and professional appearance for subjects a traditional publisher might not be interested in, possibly for ethical or practical considerations. Desktop publishing may be used to create content on a variety of themes and is a highly helpful independent publishing option.

Learn more about DTP here:

https://brainly.com/question/29518188

#SPJ4

digital devices may be collected in a broken state with files already deleted. what methods can digital forensic practitioners employ to extract or recover these lost files?

Answers

If it appears likely that the evidence on the website might be lost by a delay in carrying out the above procedures then the person reporting may be asked to make a copy of the evidence by whatever means they are capable of (either printing, screenshot or saving pages).

What are digital forensic practitioners?

The Digital Forensic Practitioner uses a wide range of digital forensics methods to support the investigative strategy while supporting and advising on the delivery of digital offerings for major crimes, incidents, operations, or any investigation that needs specialized digital forensic investigative assistance. A subfield of forensic science called "digital forensics" is dedicated to finding, obtaining, processing, analyzing, and documenting electronically stored material. Nearly all illegal acts involve the use of electronic evidence, making digital forensics support essential for police investigations. Disk/data capture programs, file viewing tools, networks and database forensic tools, and specialized analysis tools for file, registry, web, email, and mobile device research are among the primary categories of digital forensics tools.

To know more about digital forensic practitioners, visit:

https://brainly.com/question/26694391

#SPJ4

what method would be the best way to search for an item in the list below? elimination tool select one answer a linear search because a linear search can only be used to search a sorted list. b linear search because a linear search can be used to search any list. c binary search because a binary search can be used to search a sorted list. d binary search because a binary search can be used to search any list.

Answers

The correct response is a. linear search because a linear search can only be used to search a sorted list.

A method for locating an element within a list in computer science is called a linear search or sequential search. Up until a match is discovered or the entire list has been searched, it sequentially examines each element in the list. A linear search operates in worst-case linear time and performs up to n comparisons, where n is the list length. If the search probabilities for each element are different, the average case may be impacted by linear search. Linear search has an average case of comparisons when each element is equally likely to be searched. Since other search algorithms and schemes, such as hash tables and the binary search algorithm, provide substantially faster searching for all but short lists, linear search is rarely useful.

Learn more about linear search here

https://brainly.com/question/28319213

#SPJ4

you have an azure container registry that stores an image named image1 and a windows server 2022 azure virtual machine named vm1. you need to ensure that you can run image1 in vm1. what should you install in vm1? select only one answer. docker hyper-v role azure portal .net framework 4.7

Answers

You must install Docker in VM1 in order to use an image from an Azure container registry inside of it. VM1 is a Windows Server 2022 Azure virtual machine.

Describe the Azure.

Microsoft's public cloud platform is called Azure. Platform as a Services (PaaS), Infrastructure as a Services (IaaS), and Managed Database Service abilities are just a few of the many services that Azure provides.

Is Azure owned by Amazon?

No, Azure is a cloud - based platform that Microsoft introduced in 2010, while AWS is a cloud platform that Amazon introduced in 2006. Although both systems are widely used and have comparable use cases, their parent firms are distinct from one another.

To know more about azure visit :

https://brainly.com/question/13144160

#SPJ4

redistribution programs are means-tested. to qualify for such a program, a person must demonstrate that:

Answers

A means-tested program is one for which the recipient qualifies based on income, so option C is right.

The process of determining who qualifies for financial assistance to get a good or service, such as welfare payments, is known as a means test. The ability to pay for a particular service or item is the first factor taken into account when determining a person's eligibility for financial assistance. Means-tested programs only enable individuals and families with incomes and/or assets below a certain cutoff to participate. When you require care services, the government will determine your subsidies based on your financial situation. Patients from lower-income families are guaranteed to receive more financial assistance than those from higher-income families.

Learn more about Means-tested program here:

https://brainly.com/question/29990876

#SPJ4

How did writing evolve

Answers

Answer: Writing Evolved By:

Explanation:    Scholars generally agree that the earliest form of writing appeared almost 5,500 years ago in Mesopotamia (present-day Iraq). Early pictorial signs were gradually substituted by a complex system of characters representing the sounds of Sumerian (the language of Sumer in Southern Mesopotamia) and other languages

A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic.
Which of the following would BEST accomplish this goal?
A. Continuous integration and deployment
B. Automation and orchestration
C. Static and dynamic analysis
D. Information sharing and analysis

Answers

Automation and orchestration would be to BEST accomplish this goal for  cybersecurity analyst. Thus, option B is correct.

What are cybersecurity analyst?

Computer networks are shielded from hacker attacks and unauthorised access by cybersecurity analysts. They achieve this by attempting to foresee and defend against cyber threats and by responding to security breaches when they do occur. You are responsible for protecting the crucial data of your company in this position.

Protecting the hardware, software, and networks of your business from loss, theft, or unauthorised access is one of your responsibilities as a cybersecurity analyst. You might anticipate performing a variety of cybersecurity tasks at a small business or organisation.

You might specialise as a member of a bigger security team at larger organisations. Cybersecurity analysts need to be familiar with both their company's IT infrastructure and the most recent cyber threat landscape.

Learn more about cybersecurity analyst

https://brainly.com/question/28463999

#SPJ4

snap uses a block called report for functions that output a value. what command do some other languages use?

Answers

The values (arguments) sent to a custom block are stored in input variables (parameters). Size is one of the input variables for the draw square block, for instance.

What does a snap command block do?

Commands are the term used in Snap! for actions. Because command blocks are computer instructions that are meant to be connected sequentially, they have a rectangle, puzzle-piece shape.

What does a snap function mean?

When working in the Project window, the Snap feature makes it easier to locate precise positions. It accomplishes this by limiting positioning and horizontal movement to particular positions. Moving, copying, drawing, scaling, splitting, range selection, and other operations are impacted by Snap.

To know more about computer functions visit:

https://brainly.com/question/29797102

#SPJ4

What is the binary code for line 6? *
1 point
A
O 0111111111110
O 100000000001
O 0101000101010

helppp

Answers

Answer:

1st answer

Explanation:

black 1

white 0

what can you do with the data that you import from an excel workbook into access? select all the options that apply. a. import the data into a new table. b. link to the workbook by creating a linked table. c. import the data into a new report. d. append the data to an existing table.

Answers

Click Open after selecting that OlympicMedals.accdb file you downloaded. All tables discovered in the database are displayed in the Select Table window that follows.

What distinguishes a workbook from a worksheet?

Created in Excel, a workbooks is a spreadsheets program file. Two or more worksheets can be found in a workbook. Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.

The Excel workbook is where?

You can open a workbooks within the Excel program, or you can select a workbooks on your computer and then double it to open it. On the File tab, click. Click Open. To rapidly see the Open tab in the Backstage view, press Ctrl + O.

To know more about workbook visit:

https://brainly.com/question/16845506

#SPJ4

Which of the following allow you to select more than one slide in a presentation?
A. Alt + Click each slide

B. Shift + drag each slide

C. Shift + Click each slide

D. Ctrl + Click each slide

Answers

Hot-swappable hard drives are considerably less expensive than standard hard drives.

Users of computers with hot swap storage hard drives can replace or remove a hard drive without disturbing or turning off the system. When a hard disk in a storage array dies, a backup drive can be used right away without shutting down the entire system, saving time and money. Technologies have made storage device maintenance and applications simpler with the introduction of hot-swappable hard drives. Hard drives designed for hot swapping often cost more than standard hard drives. The supplied statement is untrue as a result. A swap file is a hard disk area used by computers to expand their virtual memory (RAM). By using a swap file, a computer might use more memory than what is actually placed in it. Data from RAM is "swapped" onto a file or region on the hard drive to free up space.

Learn more about Hard drives here:

https://brainly.com/question/29749375

#SPJ4

chloe notices that when she inserts a tab character, her insertion point moves to the right side of the page and the text she enters is right-justified. she does not want tab characters to behave this way. she should do which of the following? a. change the paragraph spacing. b. change the paragraph justification. c. remove the paragraph. d. remove the tab stop.

Answers

Option d: When Chloe adds a tab character, the insertion point shifts to the right side of the page. She doesn't want the tab characters acting in this manner. She needs to take the tab stop off.

To align text in a word processor by dragging the cursor to a predetermined point, use the tab key. The tab key or options in the word processor are typically used to complete it. It is a function of the paragraph formatting capability. Tabs are used for indenting text and for distributing it between the margins uniformly.

Typically, five normal spaces are equivalent to one tab. The tab can also refer to a horizontal tab. The word processor's tab key, the tab dialogue box, or the word processor's markup tools can all be used to access the tab capability. The tab key is used to activate the tab functionality, which causes the pointer to shift to the right.

Learn more about tab here:

https://brainly.com/question/29480805

#SPJ4

Windows defender credential guard does not allow using saved credentials.a. Trueb. False

Answers

Enterprise was actually enabled in Win 11 Pro as well. - great, great start. New "features" override long-standing and widely-used features of critical management tools.

What is Windows?

The only way to turn it off is through a policy update or registry setting. This is because the new "feature" cannot be turned off in settings. I'm pretty sure this won't cause any bugs or problems.

As far as I can see, no one online has commented on how useful this feature is.

Many people are removing this now, and may be disabling it more than they should, actually making their system less secure.

Therefore, Enterprise was actually enabled in Win 11 Pro as well. - great, great start. New "features" override long-standing and widely-used features of critical management tools.

To learn more about Management tools, refer to the link:

https://brainly.com/question/29850766

#SPJ1

question 6 you're browsing the web, and type in www. in the address line. instead of the website, an error screen appears. you type in 216.58.214.4, and the website comes up. what's the most likely reason for this?

Answers

The act of navigating through web pages of content is referred to as web viewing or web surfing. There are four popular web browsers: Safari, Firefox, Netscape, and Internet Explorer.

What are the types of a web browser?

A web browser, usually referred to as a "browser," is software that users can use to locate, access, exhibit, and view webpages. Popular online browsers include Apple Safari, Chrome, Browser, and Microsoft Internet Explorer.

Describe what web browsing is?

Reading is the process of skimming over a collection of facts without having a clear goal in mind. It typically refers to accessing the internet and the web as a whole. The phrase may suggest that the individual is simply squandering time online without any real purpose.

To know more about web browsing visit:

https://brainly.com/question/28900507

#SPJ4

how do the difference in polyatomin ios so4 and so3 help to determine whether each ends in the -ite or -ate

Answers

When an element splits into two polyatomin  oxyanions, the one with less oxygen is called oxyite and the one with more oxygen is called oxyate.

What does a polyatomic ion or an ITE mean?

Only polyatomic anions containing oxygen are allowed to have an ending (suffix), and only when the polyatomic ion is present in the following.... Remember that -ate polyatomic ions contain one more oxygen than -ite polyatomic ions, which only have the polyatomic anion, in order to tell them apart from one another.

What distinguishes acids ending in ous from acids ending in IC?

B. Identify the polyatomic anion's name if the acid contains an oxygen atom. If the anion's last component is "-ite," the suffix "-ous" is utilized.

To know more about polyatomin  visit:-

https://brainly.com/question/25055220

#SPJ4

What are examples of controlled unclassified information?

Answers

Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified.

What is controlled unclassified material?A law, rule, or government-wide policy that specifically requires or authorises an agency to handle CUI through safeguarding or dissemination controls is information that the government develops or owns. MS-DOS, Windows Command Prompt, Terminal, and Linux Command Line are a few examples of CUI operating systems. Any task that needs to be completed requires a command to be written on the interface. NARA lists 125 CUI categories, which are noted in DoDI 5200.48. The categories are divided into 20 groupings according to the organisational index (OIG). Information that needs to be safeguarded or disseminated under controls in accordance with and consistent with existing legislation, regulations is known as controlled unclassified information (CUI).

To learn more about controlled unclassified  refer to:

https://brainly.com/question/29640106

#SPJ4

Write an expression that prints "Special number" if specialNum is -99, 0, or 44.

#include
using namespace std;

int main() {
int specialNum = 0;

specialNum = 17;

if / * YOUR SOLUTION GOES HERE */
cout << "Special number" << endl;
}
else {
cout << "Not special number" << endl;
}

return 0;
}

Answers

The monitor, or output, is printed on the computer's copy machine frequently. A member of the iostream class, the defined item cout is an instance.

In C, can we invoke the main function?

Yes, within the main() function, we can invoke the main(). Recursion is the practice of calling a procedure by the function itself. You can call main() from within the main() function, but if you want to end the application, you should provide a condition that prevents calling main().

What is the C++ main function's return type?

The C++ standard mandates the same result as the C standard and states expressly that "It [the main purposes] must have a return statement of type int, but its type is application determined."

To know more about main visit:

https://brainly.com/question/22844219

#SPJ4

write a method for the customer class that returns the value of the next account number that will be assigned.

Answers

It is feasible to create a method in Java code for the Customer class that returns the value of the subsequent account number that will be assigned by using knowledge of computational languages.

What is Java?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the object-oriented programming language and software platform known as Java. Java is a programming language with rules and syntax derived from C and C++.

The Java code is:

public class Customer

{

private static int nextAccNum = 1;

private String name;

private int currAccNum;

public Customer(String n)

{

name = n;

currAccNum = nextAccNum;

nextAccNum++;

}

public String getNotice(double amt) {

return this.name+", account number "+this.currAccNum+", please pay $"+amt;

}

public int getNextAccountNumber() {

return nextAccNum;

}

public void updateName(String name){

this.name = name;//this makes sure we are setting value to the class variable

}

}

To learn more about Java, visit:

https://brainly.com/question/12978370

#SPJ4

what is the best way to include questions for your instructor in your emails?multiple choice question.write them out in the subject line.put them in a numbered list.add them as an attachment.write them each in a separate paragraph.

Answers

What qualities make a subject line for an email to a teacher effective. Be straightforward, concise, and specific. Just use one or two sentences in the subject line.

What information should your include in your email to your professor?

The course number and section number should both be included. closing and salutation.

How do you format a professor's email subject?

Insert the course number or description of the class you are completing with the instructor in the opening sentence of the email. information in the email's subject line (or one of the opening lines). They won't have to waste years searching for it that way.

To know more about emails visit:

https://brainly.com/question/14380317

#SPJ4

why do you think so much of the software that ran on large-scale computers was custom-written by programmers, whereas today most personal computer software is purchased off-the-shelf?

Answers

I think this is true because of how software was created in the past and how much demand there is for it today.

A computer is what kind of software?

A set of apps, data, and instructions used in the hardware of a computer's laptop to simplify use and task completion. The term "hardware" describes a computer's physical parts, such as the motherboard, graphics card, the data storage.

What makes us utilize software?

Software can increase your company's efficiency in addition to enabling your hardware devices to do essential tasks. The right software can even lead to the development of new working techniques. As a result, you should carefully choose your software as it is a crucial corporate asset.

To know more about software visit :

brainly.com/question/1022352

#SPJ4

you have an azure subscription that contains the following virtual machines: vm1, a virtual machine that runs windows server 2019 vm2, a virtual machine that runs red hat enterprise linux vm3, a virtual machine that is configure with azure disk encryption and runs windows server 2022 you use azure backup to back up the three virtual machines. which virtual machine or virtual machines can use file-level restore?

Answers

Only Azure VMs deployed to use the Resource Manager model and secured to a Recovery Services vault are capable of restoring files and folders.

What is Azure Backup?

Azure Backup is a pay-per-use business model and uses automatic allocation and management of backup storage. As a result, you only spend for the storage you use. Study up on pricing. Azure Backup provides three different forms of replication to keep our storage and data highly available. Log into the Azure website. Open the dashboard for the vault. Choose Azure Virtual Machine from the Backup Items tile. You may examine the list of protected virtual machines and the status of the most recent backup along with the time stamp just on Backup Items pane. a central backup service or solution that aids in ransomware defense. Azure Backup is a one-click backup solution that is affordable, secure, and scalable based on your data backup requirements.

To know more about azure visit:

https://brainly.com/question/30065809

#SPJ4

northern trail outfitters wants to compile a report of email metrics across all jobs deployed in the last six months and correlate those metrics to single subscribers and their corresponding data from data extensions. what should be used to pull this data per the requirements?

Answers

The best tool to use for pulling this data would be the Email Studio in Salesforce Marketing Cloud.

What is Salesforce Marketing Cloud?

Salesforce Marketing Cloud is a cloud-based customer relationship management (CRM) platform designed for businesses to manage their marketing operations. It enables companies to create, track and optimize marketing campaigns, build relationships with customers and prospects, and measure the success of their efforts.

This tool provides detailed reporting and analytics on all email campaigns sent in the last six months, including open rate, click-through rate, and bounce rate. It also allows you to segment data extensions and view individual subscriber data, allowing you to analyze data at a more granular level.

To learn more about Salesforce Marketing Cloud
https://brainly.com/question/16693657
#SPJ4

Other Questions
genes a, b and c are located on the same chromosome. testcrosses show that the recombination frequency between a and b is 28% and between a and c is 12%. can you determine the linear order of the genes? what is the term that describes a type of substance use disorder when a person has an addiction to alcohol and continues to drink it despite negative health effects? why do juvenile offenders would receive a lighter sentence for their crimes. Do you think this is fair? Why or why not? Do you think that juvenile should be tried as adults or sentenced to life in prison without parole ? Why or why not ? "1. A closer look - Food insecurity in the United StatesAccording to the United Nations Food and Agriculture Organization, approximately 795 million people are chronically undernourished worldwide. Undernutrition means that a person consumes insufficient energy to meet his or her metabolic needs. Many food security organizations set this minimum at 2,000 kcal/day for a person to be well nourished.Examine the figure depicting the food security status of U.S. households and then answer the question that follows.1. According to the definitions used by the USDA Economic Resource Service, what percentage of U.S. households had access, at all times, to enough food for an active, healthy life for all members?86%5.6%8.4%14%2. According to the U.S. Department of Agriculture, a rib eye steak has an energy density of approximately 2,650 kcal/kg. A person could conceivably consume 730,000 kcal/year simply by eating 275.5 kg of steak over the course of a year, or 26.5 oz every day. Would a person who did this be likely to be properly nourished, and why or why not?No; 730,000 kcal/year is not enough food to avoid undernutrition.No; beef is too fattening. The person would probably suffer from overnutrition.Yes; 730,000 kcal/year is a reasonable minimum level of consumption to avoid undernutrition.No; beef lacks some essential nutrients. The person would probably suffer from malnutrition.3. There are many federal and local programs in the United States that aim to prevent or relieve malnutrition or undernutrition, thereby reducing the prevalence of food insecurity. Match the programs below with their major role in promoting adequate nutrition and increasing the prevalence of food security in the United States.OrganizationsDescriptionsfeeding america, food pantry, or national school lunch programMeal centers which provide food at no charge to reduce food insecurity.feeding america, food pantry, or national school lunch programNationwide network of food banks servicing food pantries.feeding america, food pantry, or national school lunch programFederally assisted meal program operating in public and nonprofit private schools and residential childcare institutions.4. The following two images show maps of the United States: The map on the left depicts prevalence of food insecurity relative to the U.S. average from 20122014; the map on the right depicts poverty rates throughout the United States from 2014.5. Which region of the United States has the highest prevalence of food insecurity?SouthSouthwestNorthwestNortheast6. Which region of the United States has the highest level of poverty?NorthwestSouthwestSouthNortheast7. After analyzing the maps, one can conclude that higher poverty levels are linked with:Higher levels of food securityHave no effect on food securityLower levels of food security" Put each word in the right column the leases on a 10-story building require that the tenants pay a pro rata share of pass-through expenses based on the tenant's percentage of the occupied space. the expenses to be prorated are $245,000 this year. how much will the tenant who occupies the first floor pay if only seven floors are rented? two forces f1 and f2 are acting on a box shown below causing the box to move to the right across a surface. the two force vectors are drawn to the same scale. which force does more work on the box? justify your answer. You are now about to make a Collage showing the different interactions that exist among organisms. Then, in 3-5 sentences explain the following1. One of the interactions that exist in the environment.2. Effects of your chosen interaction among organisms in their environment.3. Cite an example to support your chosen interaction. which eastern people adapted to their hilly environment by terrace farming- making step-like ridges on mountain slopes? John drives his car on two roads for a total of 6 hours. On one road, he can drive at 100 km/h and on the other, he drives at a speed of 80 km/h. If he drives a total distance of 530 km, how long does he drive on each road?Show steps. Qualification, Certification, and Credentialing Personnel are part of which NIMS Management Characteristic?answer choicesAccountabilityInformation and Intelligence ManagementIncident Facilities and LocationsComprehensive Resource Management given that the values of the formation constants are large, what can you deduce about the equilibrium concentration of cu(nh3)4 21 versus the equilibrium concentration of cu21? do you think del lago owed a duty to its patrons to protect them from being harmed by a bar fight? why or why not? Why is it important for presidents like Jeffersons to change theirthinking on certain issues? what are the two red flags that frank abagnale tells consumers to look out for? the marketing function's main concern is with a. procuring materials, supplies, and equipment building and b. maintaining positive image c. generating the demand for the organization's products or services d. producing goods or providing services e. securing monetary resources On a team, 7 girls and 6 boys scored a total of 79 points. The difference between the number of points scored by the 7 girls and the number of points scored by the 6 boys is 19. Each girl scored thesame number of points and each boy scored the same number of points. Find the number of points scored by each girl and each boy. Question 24 (2 points) Forms of the Ras protein found in tumors usually cause which of the following? Cell-to-cell adhesion to be nonfunctional DNA replication to stop Excessive cell division DNA replication to be hyperactive Cell division to cease the nurse is explaining the joint commission's (tjc's) universal protocol for preventing wrong-site, wrong-procedure, and wrong-person surgery to a group of nursing students. the nurse explains that site marking involves which action? (02.05 HC)The functions f(x) = -(x + 4)2+2 and g(x) = (x - 2)2-2 have been rewritten using the completing-the-square method. Apply your knowledge offunctions in vertex form to determine if the vertex for each function is a minimum or a maximum and explain your reasoningX544