If background option when creating file. the color of the background is

Answers

Answer 1

Answer:

Light Grey.

Explanation:

I guess because mostly I have seen document background colour is Grey.

Answer 2
Light grey...........

Related Questions

if a touch screen chrome is not charging what is wrong with it



sis chromebook aint charging plz help you get 10 points

Answers

look it up on a best buy website ion know

Answer:

A try buying a new charger if that dont work then try going to best buy to fix it after that ion rlly know

Choose the correct term to finish the program. When done, the contents of info will be as shown.

{3: 10.4:23, 11:31}

>>> info = {3:10, 4:23, 7:10, 11:31}

>>> info

(7

delete

pop

remove

Answers

Answer:

The correct term is info.pop(7)

Explanation:

Given:

info = {3:10, 4:23, 7:10, 11:31}

Required

Which term removes 7:10 from the dictionary

To remove an item from a dictionary in Python, you follow the syntax below:

[dictionary-name].pop(key)

In this case:

The dictionary name is info and the key is 7

So, the term that implements the syntax is: info.pop(7)

After the instruction info.pop(7) is executed, the content of the dictionary becomes: {3: 10.4:23, 11:31}



For a business that is properly using a social media information system, the system can

generate information about what competitors are doing.

True

False

Answers

Answer:

True

Explanation:

Social media information system is an information system that support the sharing of content among network of users. This enables users to form tribes, that is , a group of people with common interest.

This then allows the opportunity to gather information about what competitors are doing.

How do you think the people responsible for the web server, the web pages, and scripts could have prevented these vulnerabilities

Answers

Incomplete question. However, I provided definitions of key terms.

Explanation:

One may wonder: what is a web server? In simple terms and this context, it is a software application that web users access hosted files. In other words, it serves what is on the web to end-users.

Web pages, on the other hand, is a unique document format opened on the web.

While scripts are customized computer language that determines how contents on web pages interact and how they are shown to users, examples include;

JavaScript,PHPXML, etc.

Many web experts recommend that in other to protect web pages from vulnerabilities, they should ensure their website should be issued an HTTPS (HyperText Transfer Protocol) certificate.

To lose weight, you must _______.

a.
increase exercise and increase caloric intake
b.
increase exercise and decrease caloric intake
c.
decrease exercise and increase caloric intake
d.
decrease exercise and decrease caloric intake

Answers

Answer:

B

Explanation:

because you need to exercise and eat or drink less calories

Answer: b. increase exercise and decrease caloric intake

Explanation:

Compared with a star topology, a hierarchical topology: a. is more effective at handling heavy but short bursts of traffic. b. allows network expansion more easily. c. offers a great deal of network control and lower cost. d. has cable layouts that are easy to modify.

Answers

Answer:

c. offers a great deal of network control and lower cost.

Explanation:

A network topology can be defined as a graphical representation of the various networking devices used to create and manage a network.

Compared with a star topology, a hierarchical topology offers a great deal of network control and lower cost.

Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program should then display a square on the screen using the character ‘X’. The number entered by the user will be the length of each side of the square. For example, if the user enters 5, the program should display the following:

XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
INPUT and PROMPTS. The program prompts for an integer as follows: "Enter an integer in the range of 1-15: ".

OUTPUT. The output should be a square of X characters as described above.

CLASS NAMES. Your program class should be called SquareDisplay

Answers

Answer:

import java.util.Scanner;

class SquareDisplay {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.print("Enter an integer in the range of 1-15: ");

   int num = scan.nextInt();

   if ((num > 0) && (num <= 15)) {

     String s = "X".repeat(num) + "\n";

     System.out.print(s.repeat(num));

   } else {

     // your error handling

   }

   scan.close();

 }

}

Explanation:

Click this link to view O'NET's Work Styles section for Veterinarians.

Note that common work styles are listed toward the top, and less common work styles are listed toward the bottom.

According to O'NET, what are common work styles needed by Veterinarians? Check all that apply.

efficiency

attention to detail

integrity

dependability

self control

enterprising

analytical thinking

artistic

Answers

Answer: efficiency

attention to detail

integrity

self control

analytical thinking

Explanation:

Veterinarians are simply called the doctor's that attend to the needs of animals. They treat and take care of animals such as cats, pigs, dogs, and birds.

According to O'NET, the common work styles needed by Veterinarians include

efficiency, attention to detail, integrity, self control and analytical thinking.

Answer:

its

attention to detail

integrity

dependability

self control

analytical thinking

Explanation:

just took it its right :)

What would provide structured content that would indicate what the code is
describing?
A. HTML
B. XML
C. DHTML
D. WYSIWYG

Answers

i believe the answer is b.XML

XML is the application programming interface that provides structured content that would indicate what the code is describing. Thus, the correct option is B.

What is XML?

XML stands for Extensible Markup Language. It is a type of markup language that is significantly utilized for storing, transmitting, and reconstructing arbitrary data.

Apart from this, XML also characterizes a sequence or series of rules for and regulations that encode documents in a format that is both human-readable and machine-readable. This programming interface is a simple text-based format and is used for representing structured information like documents, data, configuration, books, transactions, invoices, etc.

Therefore, XML is the application programming interface that provides structured content that would indicate what the code is describing. Thus, the correct option is B.

To learn more about XML, refer to the link:

https://brainly.com/question/22792206

#SPJ7

What is Machine Learning (ML)?​

Answers

Answer:

its where you learn about machines

What is the missing line?

>>> myDeque = deque('math')

>>> myDeque

deque(['m', 'a', 'f'])

O >>> myDeque popleft

O >>> myDeque.clear()

O >>> my Deque pop

O >>> myDeque.clear()

Answers

Correct question:

What is the missing line?

>>> myDeque = deque('math')

>>> myDeque

deque(['m', 'a', 't'])

Answer:

myDeque.pop()

Explanation:

The double ended queue, deque found in the python collection module is very similar to a python list and can perform operations such as delete items, append and so on.

In the program written above, the missing line is the myDeque.pop() as the pop() method is used to delete items in the created list from the right end of the list. Hence, the 'h' at the right end is deleted and we have the output deque(['m', 'a', 't'])

myDeque.popleft () deletes items from the right.

Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.

Answers

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

A user from the financial aid office is having trouble interacting with the finaid directory on the university's ERP system. The systems administrator who took the call ran a command and received the following output:
Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the ERP system.
Which of the following is the MOST likely reason for the issue?
A. The permissions on the finaid directory should be drwxrwxrwx.
B. The problem is local to the user, and the user should reboot the machine.
C. The files on the finaid directory have become corrupted.
D. The finaid directory is not formatted correctly

Answers

Answer:

A. The permissions on the finaid directory should be drwxrwxrwx.

Explanation:

The financial aid system is developed to record the fund inflow and outflows. The ERP system of the university has finaid system on which commands are run and output is received. The permissions on the finaid directory should be drwxr to enable the users to run the commands.

def find_max(nums: [int]) -> int:
'''
Finds the maximum value in the given list of integers,
or None if the list is empty
'''
largest = None

for num in nums:
if largest == None or num > largest:
largest = num

return largest

Rewrite the find_max function so that it uses recursion to work its way through the list instead of using a loop. Your rewritten function should accept the same kinds of inputs (i.e., a one-dimensional list of integers) and generate the same outputs. In your view, is this a problem that's well-suited to a recursive solution in Python.

Answers

Answer:

The program in recursion is:

def find_max(nums):

    if len(nums) == 0:

         return "None"

    elif len(nums) == 1:

         return nums[0]

    else:

         return max(nums[0],find_max(nums[1:]))

Explanation:

This line defines the function

def find_max(nums):

This checks if the list is empty.

    if len(nums) == 0:

If yes, it returns "None"

         return "None"

If the list has just one element

    elif len(nums) == 1:

It returns the only element as the maximum

         return nums[0]

If the list has numerous elemente

    else:

The maximum is determined recursively

         return max(nums[0],find_max(nums[1:]))

To the (b) part:

This program does not necessarily need to be done recursively because the max built-in function can be used to determine the maximum of the list in just one line of code and it is more efficient.

_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authentication Protocol d. Internet Protocol

Answers

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

I need help please!!!!

Answers

Just restart it and it will be fixed
unplug the whole thing and then plug it back in maybe?

>>> phrase = "abcdefgh"

>>> phrase[3:6]

Answers

Answer:

Following are the correct code to this question:

phrase = "abcdefgh"#defining a variable phrase that holds a string value

print(phrase[3:6])#use print method for slicing and print its value

Output:

def

Explanation:

In the above code, a variable "phrase" is defined that holds a string value, and use a print method, inside the method, the variable is used as a list and use slicing.

It is a characteristic that enables you to access the series parts like strings, tuples, and lists. It also uses for modifying or removing objects in series, in the above slicing it starts from 3 and ends when it equal to the 6th letter, that's why it will print "def".

Write a method that takes a Regular Polygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclusive, and sets its side length to a random decimal number greater than or equal to 5 and less than 12. Use Math.random() to generate random numbers. This method must be called randomize() and it must take a Regular Polygon perimeter.

Answers

Answer:

Answered below

Explanation:

//Program is written in Java programming language

Class RegularPolygon{

int sides = 0;

int length = 0;

}

public void randomize(RegularPolygon polygon){

int randomSides = (int) 10 + (Math.random() * 20);

double randomLength = 5 + (Math.random() * 11);

polygon.sides = randomSides;

polygon.length = randomLength;

}

Write a for loop with a range function that prints the following output. Name the target variable number. 0 1 2 3 4 5

Answers

Answer:

The program in Python is as follows:

for number in range(6):

    print(number, end=' ')

Explanation:

From the program, the range is 0 to 5.

The following line iterates from 0 to 5 using "number" as its iterating variable

for number in range(6):

This prints each number in the range followed by a blank space

    print(number, end=' ')

The for loop with a range function that prints the following output 0 1 2 3 4 5 is as follows:

for i in range(6):

   print(i)

The code is expected to print the values 0 1 2 3 4 5.

A for loop is used to loop through the range values of 6. The range value of 6

are 0 1 2 3 4 and 5.

The range function is used as required to get the value.

Finally, we print the looped values

The code will output 0 1 2 3 4 5

learn more: https://brainly.com/question/19007993?referrer=searchResults

The best known multiple letter encryption cipher is the __________ , which treats digrams in the plaintext as single units and translates these units into ciphertext digrams

Answers

Answer:

Playfair Cipher.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

The best known multiple letter encryption cipher is the Playfair Cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.

In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.

The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writing the constructor. Write a method called: public BaseballPlayer() The constructor should take three parameters to match the three instance variables in the class and then initialize the instance variables with these parameters. The parameters should be ordered so that the name of the baseball player is input first, then their hits, and at bats. In the BaseballTester class, print a call to printBattingAverage to test your constructor.

Answers

Answer:

Answered below

Explanation:

Class BaseballPlayer{

//Instance variables

string name;

int hits;

int bats;

//Constructor

BaseballPlayer (string a, int b, int c){

name = a;

hits = b;

bats = c

}

public void printBattingDetails( ){

System.out.print(name, hits, bats)

}

}

//Demo class

Class BaseballTester{

public static void main (String args []){

BaseballPlayer player = new BaseballPlayer("Joe", 8, 4)

player.printBattingDetails( )

}

}

The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the variable appears.

Answers

Answer:

postincrement.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

The postincrement operator increases the value of the variable by 1 after the original value is used in the expression in which the variable appears.

Assume the following:

1. An organizational unit has 2 database servers, 2 application servers, and 15 clients.
2. Database server performs data storage and data access logic.
3. Application server performs business (or application) logic.
4. One database server and one application server are used to address any client's request.

Question: Such a client-server architecture would be typically classified as:

a. 4-tier architecture (because there are four servers in this network).
b. 5-tier architecture (because there are four servers and one client in the network).
c. 3-tier architecture (because the database server, the application server, and the client each represent one tier respectively).
d. n-tier architecture, where n=19 (because there are 19 computers in the network).

Answers

Answer:

c. 3-tier architecture (because the database server, the application server, and the client each represent one tier respectively).

Explanation:

This is a 3 tier client server architecture, it has the 3 major components that makes up this system

It has the client server, an application server and lastly it has the backend database server.

Each of these 3 tiers in this question are assigned one particular task. This would make functionality to be improved and can also help to find issues that may arise during the testing and production stages.

what is the job of a bootloader?

Answers

Answer:

A bootloader, also known as a boot program or bootstrap loader, is a special operating system software that loads into the working memory of a computer after start-up.

Explanation:

A boot loader is a special operations system that makes your computer remember stuff. It’s programmed into storage which you used to save files and many other things. Without the boot laser you computer would not be able to start up, run at full capacity, and so many more things

The Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called

Answers

Answer:

Mail Merge.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, the Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called Mail Merge.

software products that would be beneficial to both small and large businesses.
Find software that would be beneficial to a small business only.
Find software that would be beneficial to a large business only.​

Answers

Answer:

HTML,C++,Maya for animation..etc including DoC apps etc

Give atleast 10 examples of wearable technologies and its functions​

Answers

Answer:

Wearable technologies are a form of technology designed and manufactured in such a way that people can wear them around.

Explanation:

Examples of smart wearable technologies and their functions are:

1. Smart wrist watch: this serves as both wrist watch and mobile gadgets that can make calls and some other functions like calculator, calendar, etc.

2. Fitness tracker: this helps in monitoring body activity level

3. Smarts clothIng: this can work with smart watch or phones to monitor the body activity

4. Smart headset: asides from using it to listen to music, it can also filter then the information within the environment

5. Artificial Intelligence hearing aid: this can help remove unnecessary noise level

5. Artificial Intelligence hearing aid: this can help remove unnecessary noise level

6. Smart jewelry: just like smart watches, it helps in measuring health activities in the human body system.

7. Implantable: this is for internal use and can also monitor the functioning rate of the body.

8. Head Mounted display: this is attached to the head, but one will be able to see the things the device is seeing.

9. Smart Chést stràp: this measures the level of heart rate in the body

10. Goógle glass: a user to make a call or browse the intérnet, and easily share what you ve seen

Wearable are part of the technology that is made to wear and use.

technology also includes activity trackers and skin electronics. The electronics such as software sensors and other things enable them to exchange quality data.They include rings, pens, watches, bracelets, trackers, earbuds, lens and contact less devices.

Hence the above mentioned are some of the examples of wearables technologies.

learn more about at least 10 examples of wearable technologies and their functions​.

brainly.ph/question/11249287.

Write a Java program that asks the user to enter an array of integers in the main method. The program will ask the user for the number of integer elements to be put in the array, and then ask the user for each element of the array. The program then calls a method named isSorted() that accepts an array of integers and returns true if the list is in sorted (increasing) order and false otherwise. For example, if arrays named arr1 and arr2 store [10, 20, 30, 41, 56] and [2, 5, 3, 12, 10] respectively, the calls isSorted(arr1) and isSorted(arr2) should return true and false respectively. Assume the array has at least one integer element. A one-element array is considered to be sorted.

Answers

Answer:

The program is as follows:

import java.util.Scanner;

public class MyClass {

   public static Boolean isSorted(int [] arr){

       Boolean sorted = true;

       for(int i = 0;i<arr.length;i++){

       for(int j = i;j<arr.length;j++){

           if(arr[i]>arr[j]){

               sorted = false;

               break;

           }

       }    

       }

       return sorted;

   }

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       int n;

       System.out.print("Length of array: ");

       n = input.nextInt();

       int[] arr = new int[n];

       System.out.println("Enter array elements:");

       for(int i = 0; i<n;i++){

           arr[i] = input.nextInt();

       }

      Boolean chk = isSorted(arr);

     System.out.print(chk);

   }

}

Explanation:

The method begins here

This line defines a method named isSorted

   public static Boolean isSorted(int [] arr){

This line declares a boolean variable and initializes it to true

       Boolean sorted = true;

The next two iterations iterate through elements of the array

       for(int i = 0;i<arr.length;i++){

       for(int j = i;j<arr.length;j++){

This compares an array element with next elements (to the right)

           if(arr[i]>arr[j]){

If the next element is smaller than the previous array element, then the array is not sorted

               sorted = false; The boolean variable is updated to false

               break; This breaks the loop

           }

       }    

       }

This returns true or false, depending on the order of the array

       return sorted;

   }

The main method begins here

public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       int n;

This prompts user for length of array

       System.out.print("Length of array: ");

This gets length of array from user

       n = input.nextInt();

This declares an array

       int[] arr = new int[n];

This prompts user for array elements

       System.out.println("Enter array elements:");

The following iteration gets the array elements

       for(int i = 0; i<n;i++){

           arr[i] = input.nextInt();

       }

This calls the isSorted array      

     Boolean chk = isSorted(arr);

This prints true or false, depending if the array is sorted or not

     System.out.print(chk);      

   }

Match the soft skills with their descriptions.


to foster approachability among team members

to come up with creative but practical solution

to set priorities and accomplish goals

to identify and effectively use a team’s potential

to accomplish goals


leadership

analytical thinking

coordination

time management

Answers

Answer:

1. Leadership.

2. Analytical thinking.

3. Time management.

4. Coordination.

Explanation:

1. Leadership: to foster approachability among team members. A leader can be defined as an individual who is saddled with the responsibility of controlling, managing and maintaining a group of people under him or her.

Some types of power expressed by leaders are referent power, Coercive,

Leaders use their powers to get other people to follow them. Some forms of power result from a formalized position in the organization, while others derive from personal characteristics or knowledge.

2. Analytical thinking: to come up with creative but practical solution. It is a creativity and problem-solving technique adopted by individuals or group of people by spontaneously gathering ideas through intensive thinking and analysis of a situation.

3. Time management: to set priorities and accomplish goals. It typically involves the process of allocating time frames to enhance the level of performance.

4. Coordination: to identify and effectively use a team’s potential. It is a leadership quality that involves creating harmony between teammates and exploiting available opportunities.

As a security measure, you implement time and date stamps in a payroll application program while transactions are being recorded. What is the role of this security measure

Answers

Answer:

Explanation:

The main role of this security measure is to maintain the integrity and validity of the recorded transactions. Implementing these timestamps and dates allows for transactions to be completely organized and easily found by simply searching for the time that the transaction took place. This also helps prevent anyone from making false transactions as they can be easily traced using these time stamps to make sure that they actually happened.

Other Questions
Draw the major product for the reaction of 1-butyne with water in the presence of catalytic TfOH (i.e., CF3SO3H). Then answer the additional question regarding this transformation. hiyou gotta say it back with love ok? Shopping While shopping for clothes, Jaclyn spent $17 less than 2 times what Daniel spent. Jaclyn spent $11. Write and solve an equation to find how much Daniel spent. Let x represent how much Daniel spent. The equation that can be used to determine how much Daniel has spent is 2 X- 17 = 11 A high speed train travels with an average speed of 227 km/h. The train travels for 2 h.how far does the train travel in meters? A person has a mass of 70.0 kg on Earth,what would their mass be on the Moon,which has 1/6 the gravity of Earth?A. more than on the EarthB. less than on the EarthC. the same as on Earth Who invented the first car? find the mean median mode and range. 8, 10, 15, 17, 17, 22 What is the anagram for warned. Why do the balls react differently when you drop them together? Which category of gymnosperm is thought to have given rise to flower-bearing plants?Select one:a.Cycadophytab.ginkgophytac.Coniferophytad.gnetophyta Peer-reviewed papers are considered trustworthy because theyA.Have more than one author incorrect answerB.Prove their hypotheses incorrect answerC.Have been checked by other scientistsD.are published frequently PLEASE HELP!! 25 POINTS!!!!!!!!!!!!!Use the scenario to answer the parts that follows. Lee can purchase gas for his rental car for $2.50 per gallon. It will cost him $160 to rent the car. The rate of change is ____________ . *Enter this answer as money. Ex. 3.5 should be entered as 3.50 or 3 should be entered as 3.00The y-intercept is ______________ . *Enter this answer as money. Ex. 3.5 should be entered as 3.50 or 3 should be entered as 3.00If Lee purchases 15 gallons of gas the total cost will be $ _______ . *Enter this answer as money. Ex. 3.5 should be entered as 3.50 or 3 should be entered as 3.00If the total cost of Lee's trip is $1,480.00 then Lee used gallons of gas. ___________ Guests at a picnic try to guess the number of candies in a jar. The distribution of guesses has a mean of 858585 candies and a standard deviation of 121212 candies.Suppose the jar actually holds 105105105 candies, and we want to convert each guess to its errorthat is, we'll subtract 105105105 from each guess to see how far above or how far below the guess was from the correct number. If anyone need to study for anything evolving presidency here are some facts Fact #1: In 1801, Thomas Jefferson decided to walk to his inauguration to show how down-to-earth he was. He thought his predecessors had been too showy, and he wanted to show Republican simplicity. He wore clothes of a plain citizen without any distinctive badge of office.Fact #2: As mentioned above, Adams chose not to attend the inauguration of Jefferson. Hours before the ceremony, Adams left Washington to head back to his home in Massachusetts. This made Adams the first president to skip his successors swearing in. (Adams and Jefferson eventually reconciled and over the last 15 years of their lives, the two ex-presidents exchanged over 150 letters.)Fact #3: John Quincy Adams (the son of John Adams) boycotted Andrew Jacksons inauguration on March 4, 1829.Fact #4: In 1849, Inauguration Day fell on a Sunday. Zachary Taylor refused to be sworn in on that day because he was strict about keeping holy the Sabbath. Since the office of the president could not be empty even for a day (the Constitution doesnt allow it), president pro tempore of the Senate, David Rice Atchison was brought in to substitute. Some argue this makes Atchison the 12th president of the United States and Taylor is the 13th. Most people do not include Atchison in the count though. The inscription on Atchisons headstone humorously states President of the United States for One Day. I WILL GIVE BRAINLIEST TO WHOEVER ANSWERS FIRST WITH WORK SHOWN!!!Due to inflation there were two demand increases. After the second increase the price for a certain item became twice as big as the original. By what percent was the first increase, if the second increase was 25%? 1. What is the approximate world population? There are 7.674 billion people on earth.2. What is the approximate world refugee population? 3.6 million3. What percent of the world population consists of refugees? Round your answer to the nearest tenth.4. Roughly 3.5 billion people have wealth of less than US $10,000. What percentage of the global population does this represent? Round your answer to the nearest hundredth.5. Approximately 50% of all refugees are children (under the age of 18). How many refugees are children? Round your answer to the nearest whole number Which statement best describes how Hamlets ideas progress in his soliloquy?A. Hamlet yells at his mother for her choices, explores with his rage toward his fathers death, and ends his soliloquy by accusing his mother of sin.B. Hamlet expresses despair over life, remembers his mother and fathers relationship, and then expresses his frustration with the current state of his family.C. Hamlet describes his fathers death in detail and dwells on the quick marriage of his mother and her new husband, although he does not blame her.D. Hamlet compares himself to a hero in Greek mythology who finds himself facing an impossible task, which he later reveals to be the grief he feels for his father. Which of the following best summarizes the text's depiction of theancient Indus Valley cities (namely Harappa and Mohenjo-Daro)? What is the sexual reproduction process of angiosperms? The function of an enzyme depends on its ......HELP