Can 10 people please answer these questions for my survey.

What’s your age?

How many siblings do you have?

How many hours did you sleep yesterday?

How many quizzes did you complete last week?

Answers

Answer 1
13, 1, maybe like 5, and maybe around 1-2
Answer 2

Answer:

17ys

12s

8h

0q

Explanation:


Related Questions

Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report results or to compare with acquisition requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.C. An organization may utilize a Target Profile to express cybersecurity risk management requirements to an external service provider (for example, a cloud provider to which it is exporting data).D. A critical infrastructure owner/operator, having identified an external partner on whom that infrastructure depends, may use a Target Profile to convey required categories and subcategories.

Answers

Answer: B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.

Explanation:

Of the options given in the question, the option that is false is option B "requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles".

This is not true as the establishment of a target profile is not meant for the critical infrastructure agencies alone. Other infrastructural agencies or companies can also establish the target profile.

Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players. MPEG-4 and H.264 are known as video editors. video codecs. video streamers. video monitors.

Answers

Answer:

video codecs

Explanation:

A video converter can be defined as a software application or program designed to avail end users the ability to convert video files from one digital format to another. After the conversion of the video is complete, the components of the video format such as aspect ratio (e.g 16:9, 4:3 etc), resolution (e.g 1028×760, 640×320), audio and video codecs (e.g mp3, mp4, H.264 etc), the bit rate are also converted depending on the choice of the user.

Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players. MPEG-4 and H.264 are known as video codecs.

Answer:

Video codecs

Explanation:

Match each phase of the cyber kill chain with its correct definition

1. Coupling a remote access trojan with an exploit into a deliverable payload,typically by means of an automated tool (weaponizer). Increasingly, client application data files suchas Adobe Portable Document Format (PDF) or Microsoft Office documents serve as the weaponizeddeliverable.
2. Transmission of the weapon to the targeted environment. The three most prevalentdelivery vectors for weaponized payloads by APT actors, as observed by the Lockheed MartinComputer Incident Response Team (LM-CIRT) for the years 2004-2010, are email attachments,websites, and USB removable media.

3. After the weapon is delivered to victim host, exploitation triggers intruders’ code.Most often, exploitation targets an application or operating system vulnerability, but it could alsomore simply exploit the users themselves or leverage an operating system feature that auto-executescode.

4. Installation of a remote access trojan or backdoor on the victim system allows theadversary to maintain persistence inside the environment.
5. Typically, compromised hosts must beacon outbound to anInternet controller server to establish a C2 channel.APT malware especially requires manualinteraction rather than conduct activity automatically. Once the C2 channel establishes, intrudershave "hands on the keyboard" access inside the target environment.

6. Only now, after progressing through the first six phases, can intruderstake actions to achieve their original objectives. Typically, this objective is data exfiltration whichinvolves collecting, encrypting and extracting information from the victim environment; violationsof data integrity or availability are potential objectives as well. Alternatively, the intruders mayonly desire access to the initial victim box for use as a hop point to compromise additional systemsand move laterally inside the network.


a. Weaponization
b. Delivery
c. Exploitation
d. Installation
e. Command and Control (C2)
f. Actions on Objectives

Answers

Answer:

1. Weaponization.

2. Delivery.

3. Exploitation.

4. Installation.

5. Command and Control (C2).

6. Actions on Objectives.

Explanation:

1. Weaponization: Coupling a remote access trojan with an exploit into a deliverable payload,typically by means of an automated tool (weaponizer). Increasingly, client application data files such as Adobe Portable Document Format (PDF) or Microsoft Office documents serve as the weaponized deliverable.

2. Delivery: Transmission of the weapon to the targeted environment. The three most prevalent delivery vectors for weaponized payloads by APT actors, as observed by the Lockheed MartinComputer Incident Response Team (LM-CIRT) for the years 2004-2010, are email attachments,websites, and USB removable media.

3. Exploitation: After the weapon is delivered to victim host, exploitation triggers intruders’ code.Most often, exploitation targets an application or operating system vulnerability, but it could also more simply exploit the users themselves or leverage an operating system feature that auto-executes code.

4. Installation: Installation of a remote access trojan or backdoor on the victim system allows the adversary to maintain persistence inside the environment.

5. Command and Control (C2): Typically, compromised hosts must beacon outbound to an Internet controller server to establish a C2 channel.APT malware especially requires manual interaction rather than conduct activity automatically. Once the C2 channel establishes, intruders have "hands on the keyboard" access inside the target environment.

6. Actions on Objectives: only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives. Typically, this objective is data exfiltration which involves collecting, encrypting and extracting information from the victim environment; violations of data integrity or availability are potential objectives as well. Alternatively, the intruders may only desire access to the initial victim box for use as a hop point to compromise additional systems and move laterally inside the network.

Explain the three major Subassembly
of a computer Keyboard​

Answers

The keyboard is divided into four sections: alphabetical keys, function keys, cursor keys, and the numeric keypad.  Additional special-purpose keys perform specialized functions.  The mouse is a pointing device used to input data.  Input devices enable you to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

What are the three major Subassembly of a computer Keyboard​?

The keyboard is divided into four components as; alphabetical keys, function keys, cursor keys, and the numeric keypad.

An Keyboard is an input Device used to enter characters and functions into the computer system by pressing buttons.

An Keyboard is a panel of keys that operate a computer or typewriter.

Additional special-purpose keys perform specialized functions.

The mouse is a pointing device used to input data.

The Input devices enable to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

Learn more about the keybord here;

https://brainly.com/question/24921064

#SPJ2

Create a Python program that will calculate the user’s net pay based on the tax bracket he/she is in.

Answers

Answer:

PLeas check the Explanation below for the python code

should you need further information let me know ASAP

Explanation:

Create a Python program that will calculate the user’s net pay based on the tax bracket he/she is in.

Let the user's pay be y

say the user earns x amount

Let us say the tax brackets are 0-25, 26-50, 51-100 in percentage

0-25= 10% tax

26-50= 20% tax

51-100= 30% tax

The expression for the cost is

y= x+(x*t/100)

x= int(input("enter your pay here: "))

t= int(input("enter your tax rate here: "))

#calculates the pay after 10% deduction

if t in range(0,26):

   y=x-(x*10/100)   #this is the cost function

   print("your net pay after tax deduction is ", y)

#calculates the pay after 10% deduction

elif t in range(26,51):

   y=x-(x*20/100)   #this is the cost function

   print("your net pay after tax deduction is ", y)

#calculates the pay after 10% deduction

elif t in range(51,101):

   y=x-(x*30/100)   #this is the cost function

   print("your net pay after tax deduction is ", y)

else:

   print("you have entered incorrect values")

   



Ramsay is a miscreant who has sent a keylogger spyware to his friend's computer. What is the likely consequence of this?

OA. Trojan horses will gain entry in his friend's system.

OB.

Viruses will be automatically removed from his friend's system.

Ос.

He can trace the keystrokes used by his friend to log into his account, and then hack it.

OD.

A demilitarized zone will be created in his friend's system.

Answers

Answer:

C. He can trace the keystrokes used by his friend to log into his account, and then hack it.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device. A keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In this scenario, Ramsay sent a keylogger spyware to his friend's computer. Thus, the likely consequence of this is that he can trace the keystrokes used by his friend to log into his account, and then hack it.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky etc.

a. Convert decimal 37 to binary
b. Convert decimal 37 to hex decimal (Hint begin from binary above)
c. Convert binary 10111100111 to hexadecimal
d. Convert hexadecimal A1C to binary

Answers

Answer:

100101

25

5E7

101000011100

Explanation:

Which presentation feature would allow a business to include employees in other countries to participate in monthly status meetings?

A-video from website
B-format painter
C-video from file
D-broadcast slide show

Answers

Answer:

Explanation:

Broadcast slide show

Answer:

Broadcast Slide Show (D)

Which of the following statements is true regarding a user account? Once a user account has been created, it cannot be completely deleted. Once a user account has been assigned to a group, it cannot be completely deleted. Files created by a user in a group must be assigned to another group member if the original user account is deleted. Files created by a user account can be completely removed if they are no longer needed.

Answers

Answer:

Files created by a user account can be completely removed if they are no longer needed.

Explanation:

A user account can be defined as a profile or identity created for the users of a computer system. There are various types of user accounts and these includes administrator, guest, and standard user.

The statements which is true regarding a user account is that, files created by a user account can be completely removed if they are no longer needed.

Provide a class Letter for authoring a simple letter. In the constructor, supply the names of the sender and the recipient: def __init__(self, letterFrom, letterTo) Supply a method

Answers

Answer:

class Letter:

   header="Dear "

   footer="Sincerely, \n"

   text=""

   def __init__(self,letterFrom,letterTo):

       self.header+=letterTo + ":\n\n"

       self.footer+=letterFrom + "\n"

   

   def getText(self):

       return self.header+self.text+self.footer

   def addLine(self,line):

       self.text+=line+"\n\n"

l = Letter("Cain", "Abel")

l.addLine("I am very happy to be writing to you at this joyful moment of my life.")

I.addLine("I am really sorry i killed you, I was a saddist back then.")

print(l.getText())

Explanation:

The Letter class a used to write a letter. The magic method "__init__" is used as a constructor to accept the sender and the recipient of the letter. The addLine method is called on an instance of the class to add string lines to the object while the getText method returns the entire written letter.

Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.

Answers

Answer:

public class Invitation {

 private String hostname;

 private String address;

  public Invitation(String n, String a) {  // constructor that accepts two strings.

   hostname = n;

   address = a;

 }

  public String getHostname() {

   return hostname;

 }

 public void setAddress(String a) {

   address = a;

 }  

 public String invite(String guest) {

   return "Hello" +guest+ ", you are invited to my party at " +address+". "+hostname+".";

 }

 public Invitation(String host, String address) {

   this.address = address;

   this.hostname = host;

 }

}

Explanation:

The Java program defines a class called "Invitation". The class constructor has two string arguments or parameters for the host of the event and the address. The invite method is used to generate the string invite message with the name of the guest as the argument. Use the "setAddress" method to set a new location of the event and the "getHostname" to get the name of the event host.

To implement this task, I will be using Native Android code with Kotlin and the recent JetPack Compose Library, you will need Android studio to be able to run this code

//To mange the UI State we will be using view-model

class InviteViewModel: ViewModel() {

  // LiveData holds state which is observed by the UI

  // (state flows down from ViewModel)

  private val _name = MutableLiveData("")

  val name: LiveData<String> = _name

  // onNameChanged is an event we're defining that the UI can invoke

  // (events flow up from UI)

  fun Invite (newName: String) {

      _name.value = newName

  }

}

//Here is the MainActivity class where the code will run from

class Invitation : AppCompatActivity() {

  private val inviteViewModel by viewModels<InviteViewModel>()

  override fun onCreate(savedInstanceState: Bundle?) {

      /* ... */

      binding.textInput.doAfterTextChanged {

          inviteViewModel.onNameChanged(it.toString())

      }

      inviteViewModel.name.observe(this) { name ->

          binding.helloText.text = "Hello, $name"

      }

  }

}

Learn more:

https://brainly.com/question/24551910

In a study to add a new feature to a software program, the programmer introduced two categories, men and women, in the survey she conducted. Is the study observational or experimental

Answers

Answer:

Observational

Explanation:

In an observational study, the researcher simply conducts the observation of certain factors without intervening. This is unlike an experimental study where the researcher introduces controls in the research so as to compare the changes between the treated and the untreated groups.

The study above is an observational study because only two groups were surveyed and no control was used in the experiment to compare changes.

If a company becomes a technology company ,what does this mean to employees

Answers

A place to work. Of course

There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so on. Give an example of two design goals that may contradict one another

Answers

Answer:

1. Real time support design goal

2. Fairness design goal

Explanation:

These two design goals contradict themselves.

1. Real time support design goal

2. Fairness design goal

1. Real time design goal:

In real time resource allocation are based on time. The processes have just a limited time for the control of the CPU. When the task is not completed after a fixed time, the control would then jump to the next process.

2. Fairness system design;

In fairness system, resource allocation to all processes are on the basis of fairness. No system would retrieve resources that are more than its share.

Write a function that accepts two pointers; one to the first element and one to the last element of an integer array. The function returns how many numbers are negative in the array. Use only pointer notation.

Answers

Answer:

The code to this question can be defined as follows:

int count(int *first, int *last)//defining a method count that accepts two integer pointer    

{

   int c=0;//defining integer variable c

   while (first <= last)//defining a while loop that counts first to last value  

   {

       if (*first < 0)//use if block to check negative value

           c++;//increment variable value

       first++;//increment first parameter value

   }

   return c;//return c value

}

Explanation:

In this code, a method "count" is declared that accepts two pointer variable "first and last" as the parameter, inside the method an integer variable "c", and a while loop is declared that counts values, and inside this an if block is used that counts the negative value and increment its value, and also increments the first parameter value, and return c value.      

True/False: not is evaluated first; and is evaluated next; or is evaluated last.
Is the answer True or False

HELP PLS THIS IS DUE TODAY!!!

Answers

Evaluation should be first when approaching a new method

(True/False) Windows 1903 and higher has an option for changing the cursor color to a user defined color.

Answers

Answer:

True.

Explanation:

What is characteristic of the Computer?

Answer: Speed, a computer works with much higher speed.

Answers

Answer:

storage to store the data and files

accuracy, diligence, versatility and storage capacity.

Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ___________. Group of answer choices

Answers

Answer:

adjusted exponential smoothing; linear regression.

Explanation:

A time series can be defined as a technique used in statistical analysis and it involves indexing sets of data elements in a timely or successive order i.e sequentially.

Two time series techniques that are appropriate when the data display a strong upward or downward trend are adjusted exponential smoothing and linear regression.

An adjusted exponential smoothing is a statistical technique used for forecasting through the calculation of the weighted average of an actual value.

the cause of french revolution and anayze the reason for significane out come

Answers

Answer:

The French Revolution, which occurred from 1789 to 1799, was a time in French history when republicans overthrew the monarchy and the Roman Catholic Church went through a period of fundamental restructuring in France. While France swapped back and forth between republic, empire and kingship for 75 years following the fall of the First Republic into the hands of Napoleon Bonaparte, the revolution nevertheless marked the end of the ancient regime and put its followers in the shadows of the imagination of the French people.

The French Revolution began as a protest by the aristocrats against Louis XVI, the king of France and his absolute monarchy, and evolved as a major revolution that changed Europe's history and outlook.

A group called the Girondins, from the Bordeaux area, came to power but was opposed by the Jacobins group. The Jacobins were replaced by the Directoire, a middle-class group that had merged with the Girondins, and a new moderate government was formed. They came to power in 1794 but by 1799 they were considered corrupt and Napoleon took over. Napoleon came to the power with the support of the army and ruled as a tyrant. It was the need for stability and the disposition of the corrupt revolution that made the people willing to accept Napoleon even though he was a dictator. Napoleon brought a new order but many old institutions were also re-established.

What is the full meaning of Internet and WiFi

Answers

Answer:

Internet-a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

Wifi-a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet. ... Internet connectivity occurs through a wireless router.

Explanation:

Answer:

WiFi is a short name for Wireless Fidelity". ... To connect to a WiFI LAN, a computer must be equipped with a wireless network interface controller

What are ways to access Tasks view in Outlook? Check all that apply. Select To-Do List or Task Folder. View daily task lists in the calendar. Select the Tasks button in the Message view. Open the Tasks view in the Navigation bar. Use the Current View command group to choose which tasks are shown.

Answers

Answer:

A. B. D. E.

Explanation:

edg 2021

Answer:

a,b,d,e are the correct answer got the answers from the other person and they where right.

Explanation:

If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means

Answers

Answer:

Explanation:

This probably means that your browser has saved your username and password into the browser's password manager. This usually occurs the first time you enter your username and password into a new website. The browser will detect this and request to save this information into the password manager. If you agree to do so it will save it and automatically enter this information when opening the site in the future.

If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means your username/password was stored as a COOKIE.

Cookies are small pieces of text (e.g., username/password, website logins, shopping carts, etc) used to identify a computer when using a computer network.

Cookies are useful to save you from having to type your own username or password every time.

However, these cookies may represent a vulnerability to privacy, although they cannot be used for obtaining personal information from your device.

In conclusion, if you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means your username/password was stored as a COOKIE.

Learn more in:

https://brainly.com/question/1308950

Discussed the economic and ideological causes of the American, the French, and the Chinese Revolutions, and to see the larger historical contexts in which these events took place?

Answers

Answer:

Explanate The social, political, and economic causes of the American Revolution inevitably helped shape the country we live in today. A social cause that occurred was the disagreement between America and Britain and how poorly they were treated. A political cause that occurred was the implantation of legislatures on the colonies ion:

Inevitably, the social, political, and economic factors that led to the American Revolution influenced the nation we live in today. The conflict between America and Britain and how horribly they were treated were societal causes.

What is the French Revolution?

The imposition of taxes on the colonies, which they refused to pay, is one of the economic and intellectual roots of the American Revolution. The primary objective of taxation was to pay back the debt the colonists owed as a result of the conflict.

The idea behind this revolt was that an unbalanced government was being caused by crooked politics. Poor economic policies that led to bankruptcy and the lavish spending of the French royal family, which resulted in the imposition of exorbitant taxes on the populace, are the economic and ideological reasons for the French Revolutions.

The Enlightenment, which was influenced by the British political system, was the ideological cause.

Therefore, the increasing imperialist demand from the west and Japan as well as the desire to see a united China were the main drivers behind the economic and ideological causes of the Chinese revolutions.

To learn more about French Revolution, refer to the link:

https://brainly.com/question/27833385

#SPJ2

What are relevant considerations on the role government could play to resolve differences between carriers and websites?

Answers

Answer:

This is an ongoing battle of neutrality between the Carriers and Websites.

The government can primarily be responsible for protecting the rights of the users of the websites. However it is also important for the government to ensure equality of rights to carriers and websites, at times carriers are not provided much attention and are often neglected but they play an important role and therefore should have equal rights.

Explanation:

This is an ongoing battle of neutrality between the Carriers and Websites.

The government can primarily be responsible for protecting the rights of the users of the websites. However it is also important for the government to ensure equality of rights to carriers and websites, at times carriers are not provided much attention and are often neglected but they play an important role and therefore should have equal rights.

_________ is a variety of mechanisms used to assure the integrity of a data unit or stream of data units.

Answers

Answer:

Data integrity.

Explanation:

Data integrity is a variety of mechanisms used to assure the integrity of a data unit or stream of data units.

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

For example, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, any integrity constraint ensures that the relationship between the data in a table is consistent and valid.

Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a computer or information system, in fact, are today. There are obvious benefits, but are there risks as well? For instance, would you feel more or less comfortable riding on a roller coaster that was computer controlled? Do the benefits of computerizing an increasing number of everyday objects outweigh the potential risks? Why or why not?

Answers

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

Dione has created a PowerPoint presentation that has several common nouns, names of products, etc. He is
running Spell Checker and does not want to be notified in regard to these words in this presentation or in any other
presentation created on this computer. Which option should he choose?

A.Ignore
B.Ignore All
C.Change All
D.Add

Answers

Answer:

D. Add

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

In this scenario, Dione has created a PowerPoint presentation that has several common nouns, names of products, etc. He is running Spell Checker and does not want to be notified in regard to these words in this presentation or in any other presentation created on this computer. Hence, the option he should choose is Add. This would be used to automatically add a list of all the common nouns.

Answer:

On e2020 its D. add

Explanation:

Got it  correct

Pls help I really don’t know

Answers

Answer:

Routine decisions are nothing complicated. They are simply decisions that you make everyday, sometimes without thinking, because you've been making them for a long time.

Just relax and think of decisions you made today that you've been making for a long time.

For instance:

Waking up and checking to see if someone texted you. Brushing your teethWhat footwear to wear. What breakfast to have.What time to sleep.

What is Moodle in information communication and Technology?​

Answers

Explanation:

MOODLE is an open source e-learning system. MOODLE can be used as a tool for delivering content to students and more interestingly, it can be used to build rich collaborative learning communities. MO

Other Questions
Tara Company owns 80 percent of the common stock of Stodd Inc. In the current year, Tara reports sales of $5,000,000 and cost of goods sold of $3,500,000. For the same period, Stodd has sales of $500,000 and cost of goods sold of $400,000. During the year, Stodd sold merchandise to Tara for $40,000 at a price based on the normal markup. At the end of the year, Tara still possesses 20 percent of this inventory. Prepare the consolidation entry to defer intra-entity gross profit. Photo attached please help 43x+2 = 64 + 455 - 766 PLEASE HELP ME I WILL MARK BRAINLIEST IF YOUR RIGHT..A y = 3x - 5B y = 3x + 5C y=-3x - 5D y=-3x + 5 I NEED HELP PLEASE IM GOING TO FAIL A file that is 233 megabytes is being downloaded. If the download is 14.1% complete, how many megabytes have beendownloaded? Round your answer to the nearest tenth. someone help me ill mark you the brainliest 1.Cuntas horas duermes cada noche? 2.Cuntas horas crees que debes dormir cada noche? 3.Crees que estos consejos son buenos? Por qu? I need help with this Where is water vapor found on Earth? Why was the county unit system created?to ensure all votes were equalto prevent the Democrats from winningto support the Republican Partyto increase rural voting power Suppose a quilt made up of squares has a length-to-width ratio of 5 to 4. The length of the quilt is 5x inches. The quilt can be made slightly larger by adding a border of 1-inch squares all the way around the perimeter of the quilt. Write a polynomial expression for the area of the larger quilt. Read the excerpt of a poem below:DaffodilsI wandered lonely as a cloudThat floats on high over the hills,When all at once I saw a crowd,A host of golden daffodils;Beside the lake, beneath the trees,Fluttering and dancing in the breezeContinuous as the stars that shineAnd twinkle on the milky way,They stretched in never-ending lineAlong the side of the bay:Which line is an example of personification?When all at once I saw a crowd,Along the side of the bay:A host of golden daffodils;Fluttering and dancing in the breeze A problem is usually posed in the form of A ExperimentB MethodC Question why has SI system been developed?? give reason plzz help i have exam tmr PLEASE HELP ME!!!!!!!! what is one diffenece between the Gupta Golden Age and the Islamic Golden Age ? Charger Company's most recent balance sheet reports total assets of $29,133,000, total liabilities of $16,683,000 and total equity of $12,450,000. The debt to equity ratio for the period is (rounded to two decimals): What kind of waves can travel through a vacuum?Mechanical wavesElectromagnetic wavesAll of the aboveNone of the abovePlease help ASAP Write a story in which, with the help of someone else, your character manages to succeed against the odds