________ is the study and reconstruction of past climates through the use of proxy data.

Answers

Answer 1

The answer to your question is paleoclimatology. This field of study uses various proxy data sources such as ice cores, tree rings, sediment cores, and pollen records to reconstruct climate patterns from hundreds to millions of years ago.

Paleoclimatologists analyze these data sources to understand how the Earth's climate has changed over time, including shifts in temperature, precipitation, and atmospheric conditions. By studying past climate patterns, scientists can gain insights into the natural variability of the Earth's climate system and better predict future changes. Paleoclimatology has also been used to investigate the impact of human activity on the climate, such as the burning of fossil fuels and deforestation.

To know more about paleoclimatology visit:

https://brainly.com/question/31800070

#SPJ11


Related Questions

The 74HC85 comparator has three extra inputs used for cascading comparators.
True
False

Answers

The statement is true. The 74HC85 comparator has three extra inputs: Vref2, Vref1, and Vref0, which are used for cascading comparators.

These inputs allow multiple comparators to be connected together to compare a larger number of inputs. When cascading comparators, the output of one comparator is connected to the inputs of the next comparator and the reference voltage of each comparator is set using the Vref2, Vref1, and Vref0 inputs. By using these inputs, the comparators can be cascaded to compare more than two inputs. In conclusion, the 74HC85 comparator has three extra inputs used for cascading comparators, which allow for multiple comparators to be connected together and used to compare a larger number of inputs.

To know more about cascading comparators visit:

brainly.com/question/29660335

#SPJ11

git commit -m 'my notes' ./name_of_file.ext

Answers

The command you provided is used in Git version control to commit changes to a specific file with a message describing the changes made. Let me break it down into different parts:

- "git commit" is the command used to commit changes in Git.
- "-m" is a flag used to specify the message describing the changes made. It is followed by the message enclosed in single quotes.
- "'my notes'" is the message enclosed in single quotes that you want to add to describe the changes made to the file.
- "./name_of_file.ext" specifies the path to the file you want to commit changes to. The "./" indicates that the file is in the current directory, and "name_of_file.ext" refers to the actual name of the file and its extension.

In summary, the command "git commit -m 'my notes' ./name_of_file.ext" is used to commit changes made to a specific file in Git with a message describing the changes made. Hope that helps! If you have any further questions, feel free to ask.

for information on using the `git commit` command. The command you provided, `git commit -m 'my notes' ./name_of_file.ext`, is used to commit changes in a specified file to a Git repository.

Here's a breakdown of the command:

- `git commit`: This is the command used to create a new commit (a snapshot of the changes you made) in the repository.
- `-m 'my notes'`: This is an option flag for the `git commit` command. The `-m` flag allows you to add a message describing the changes you made in the commit. In this case, the message is 'my notes'.
- `./name_of_file.ext`: This is the file path for the specific file you want to commit. Replace `name_of_file.ext` with the actual name and extension of the file you are working on.  When you execute this command, Git will create a new commit containing the changes made to the specified file, along with the message 'my notes' as the commit message. Remember to stage the changes using `git add` before committing.

To know more about git commit visit:-

https://brainly.com/question/31356177

#SPJ11

If buttonl references a JButton object, which of the following statements will make its background blue? A) buttonl.makeBackgroand (Color.BLJE) : B) buttonl.setBackground (Color.BLUE) ; C) buttonl.makeBackground (BLUE): D) buttonl.set.Background (BLUE) :

Answers

The correct statement to make the background of button1 blue is:

B) buttonl.setBackground(Color.BLUE);

Learn more about button here:

brainly.com/question/32139984

#SPJ11

in a paged memory allocation scheme, a page size that is too small will generate ____.

Answers

In a paged memory allocation scheme, a page size that is too small will generate an overhead in terms of the number of page table entries required to keep track of the page frames. As the page size decreases, the number of pages increases, leading to a larger page table size and increased overhead. Additionally, small page sizes can lead to internal fragmentation, as the amount of memory allocated to a process may be larger than required, leaving unused space in the allocated pages.

Key points about allocation include:

Optimal Resource Utilization: Allocation aims to allocate resources in a manner that optimizes their utilization and maximizes productivity. It involves assessing needs, priorities, and constraints to ensure resources are allocated where they are most needed and can deliver the highest value.

Budget Allocation: In financial terms, allocation refers to the distribution of funds or budgets among various departments, projects, or initiatives. It involves determining how much financial resources should be allocated to each area based on factors such as priority, expected returns, and resource availability.

Time Allocation: Time allocation involves planning and assigning time slots or schedules for different activities or tasks. It ensures that adequate time is allocated to complete tasks within deadlines and manage workloads efficiently.

Resource Allocation in Project Management: In project management, allocation involves assigning resources, such as personnel, equipment, and materials, to specific project tasks or activities. It aims to balance resource availability, expertise, and workload to ensure project success.

Fairness and Equity: Allocation should consider fairness and equity to ensure that resources are distributed in a just and equitable manner. It may involve considering factors such as need, merit, or equal distribution to avoid bias or favoritism.

Learn more about fragmentation here:

brainly.com/question/32139966

#SPJ11

the adwords application programming interface (api) allows developers to use applications that:

Answers

A Promise always exists in one of two states: resolved or rejected. The resolved state indicates that the operation was completed successfully, while the rejected state indicates that the operation failed.

A Promise is an object in JavaScript that represents the eventual completion (or failure) of an asynchronous operation and its resulting value. Promises have three states: pending, resolved, or rejected. The pending state indicates that the operation is still in progress and has not yet been resolved or rejected. The resolved state means that the operation is completed successfully and the Promise has a value, which can be accessed through the Promise.then() method. On the other hand, the rejected state indicates that the operation failed, and the Promise has a reason for the failure, which can be accessed through the Promise.catch() method.

When a Promise is in the rejected state, it means that an error occurred during the execution of the asynchronous operation. This could be due to various reasons, such as a network failure, an invalid input, or a programming error. In such cases, the Promise.catch() method is used to handle the error and take appropriate action, such as displaying an error message or retrying the operation. Overall, understanding the states of a Promise and how to handle them is crucial for writing reliable and robust asynchronous code in JavaScript.

Learn more about JavaScript here:

https://brainly.com/question/16698901

#SPJ11

as discussed in the chapter case, what is the primary reason why spacebook failed?

Answers

Answer:

It was designed and developed without taking the organization's culture into consideration.

Explanation:

cut -d' ' -f 3 stripes

Answers

So, "cut -d' ' -f 3 stripes" is a command in Unix/Linux systems that is used to extract the third column of data from a file or input stream that is separated by spaces.

The "cut" command is used to remove sections from each line of a file or input stream, and the "-d' '" option specifies that the delimiter between columns is a space. The "-f 3" option specifies that the third column should be extracted, and "stripes" is the name of the file or input stream from which the data will be extracted.

I could go into more detail about how the "cut" command works, the various options that can be used with it, and how it can be used in combination with other commands to process data in Unix/Linux systems. I could also provide examples of how the "cut" command might be used in different scenarios, such as extracting data from log files, processing CSV files, or working with data from APIs. Let me know if you have any further questions or if there's anything else you'd like me to cover.

To know more about Unix/Linux systems visit:-

https://brainly.com/question/24215439

#SPJ11

what option, when added to the crontab command, opens the vi editor with a user's cron table?

Answers

The option "-e" added to the crontab command opens the vi editor with a user's cron table. The crontab command in Linux is used to manage cron jobs for a user.

The crontab command is used to create, edit, and view the cron table for a specific user. The default editor for crontab is usually set to vi. However, if you want to explicitly open the vi editor to edit your cron table, you can use the "-e" option. This option is added to the crontab command followed by the username whose cron table you want to edit.

For example, if you want to edit the cron table for the user "john", you would type "crontab -e john" in the terminal. This will open the vi editor with the user's cron table. You can then make the necessary changes to the cron table and save the file. Using the "-e" option is a quick and easy way to edit your cron table in the vi editor.

Learn more about crontab here:

https://brainly.com/question/30173074

#SPJ11

which type of ipv6 address is not routable and used only for communication on a single subnet

Answers

The type of IPv6 address that is not routable and used only for communication on a single subnet is called a link-local address. These addresses are automatically assigned to network interfaces when they are initialized and are used for communication between devices on the same local network segment.

Link-local addresses are not routable, meaning they cannot be used for communication outside of the local network or subnet.

These addresses are automatically assigned to network interfaces when they are initialized and are used for communication between devices on the same local network segment.

Link-local addresses always start with the prefix "fe80::/10."

They are not globally unique, which means multiple devices within different local networks can have the same link-local address without causing conflicts.

Link-local addresses are typically generated automatically by the devices and do not require manual configuration.

In summary, link-local addresses in IPv6 are specific to a single subnet and are not routable, making them suitable for communication within a local network segment.

Learn more about link-local address:

https://brainly.com/question/31237108

#SPJ11

______ is a templating engine designed for use with Node.js. It offers a simplified syntax to specify the type of page (an HTML5 page, in our case) and to display content.

Answers

The templating engine that is designed for use with Node.js is called "Express." It simplifies the process of building web applications by offering a simplified syntax for displaying content on an HTML5 page.

This makes it easier for developers to create dynamic web pages without having to worry about writing complex code. Express also provides a number of other features, such as middleware and routing, which make it a popular choice among developers. Overall, if you are looking to build a Node.js web application, using Express as your templating engine is a great choice.

learn more about Node.js here:

https://brainly.com/question/28333664

#SPJ11

what is the minimum number of physical disks required to create a raid 5 volume?

Answers

To create a RAID 5 volume, the minimum number of physical disks required is three. RAID 5 is a data storage technology that uses block-level data striping with distributed parity. It provides fault tolerance by using parity data across all disks in the array, allowing the system to continue functioning even if one disk fails.

When a RAID 5 volume is created, the data is distributed evenly across all the disks in the array, with one disk dedicated to storing parity information. This means that if one disk fails, the data can be reconstructed using the parity information on the remaining disks. The parity data is distributed across all the disks, which provides better performance than RAID 4, where the parity data is stored on a single dedicated disk.

RAID 5 is a popular choice for servers and other mission-critical applications that require high levels of data availability and fault tolerance. It is a cost-effective solution that provides good performance and reliability. However, it is important to note that while RAID 5 can tolerate the failure of one disk, it does not provide protection against multiple disk failures. In such cases, a higher level of RAID, such as RAID 6, may be necessary.

Which of the following settings are not configurable on a Generation 2 Hyper-V virtual machine?
A. SCSI controller
B. IDE controllers
C. COM ports
D. Diskette drive

Answers

B. IDE controllers are not configurable on a Generation 2 Hyper-V virtual machine.Generation 2 virtual machines are a newer type of virtual machine that was introduced in Windows Server 2012 R2. They offer several advantages over the older Generation 1 virtual machines, including better performance, reduced boot time, and improved security features. However, they also have some limitations and differences in terms of their configuration options.

One of the main differences is that Generation 2 virtual machines only support SCSI controllers and not IDE controllers. This means that you cannot attach IDE-based virtual disks or virtual DVD drives to a Generation 2 virtual machine. However, you can attach SCSI-based virtual disks and virtual DVD drives, as well as other virtual hardware components such as network adapters, virtual floppy drives, and more.

The other settings listed - SCSI controller, COM ports, and Diskette drive - are all configurable on a Generation 2 Hyper-V virtual machine.

Learn more about network adapters, here:

https://brainly.com/question/30932605
#SPJ11

How would you make sure anyone with a zendesk email address could submit tickets, but no one else?

Answers

To ensure that only individuals with a zendesk email address are able to submit tickets, you can set up an authentication system. This can be done by creating an email whitelist that includes only the zendesk email domain.

When someone tries to submit a ticket, the system will check if the email address is on the whitelist. If it is, the ticket will be submitted. If not, the system will reject the ticket. This method ensures that only authorized individuals can access the ticket submission system, and helps prevent spam or unauthorized use of the system. In conclusion, implementing an email whitelist is a simple and effective way to restrict ticket submissions to those with a zendesk email address. The explanation above outlines the steps you can take to ensure that only authorized individuals can access the system.

To know more about email address visit:

brainly.com/question/8771496

#SPJ11

if you’re a command-line user, what command will encrypt files and folders?

Answers

If you're a command-line user, the command commonly used to encrypt files and folders is GPG (GNU Privacy Guard).

GPG is a free and open-source encryption software that provides cryptographic privacy and authentication for data. It is commonly available on various operating systems, including Linux, macOS, and Windows.

To encrypt files and folders using GPG from the command line, you would typically use the following command:

gpg --encrypt <file_or_folder>

Replace <file_or_folder> with the name or path of the file or folder you want to encrypt. GPG will encrypt the specified file or folder using the recipient's public key or a symmetric key, depending on the encryption method chosen.

GPG provides various options and configurations for encryption, such as specifying the encryption algorithm, key management, and more. You can refer to the GPG documentation or use the man gpg command in the command line for more details on specific usage and options.

learn more about command-line here

https://brainly.com/question/30415344

#SPJ11

a link between tables in a relational database that defines how the data is related is called a .

Answers

A link between tables in a relational database that defines how the data is related is called a "relationship". This relationship is established through the use of keys - primary keys and foreign keys.


In a relational database, the relationship between tables can be of different types, including one-to-one, one-to-many, and many-to-many. A one-to-one relationship is where each record in one table is related to one record in another table. A one-to-many relationship is where each record in one table can be related to multiple records in another table. A many-to-many relationship is where multiple records in one table can be related to multiple records in another table.

The relationship between tables is crucial in a relational database as it ensures data integrity and consistency. When data is updated in one table, it automatically updates related data in other tables. This makes it easier to manage and organize data in a database.

To know more about database  visit:-

https://brainly.com/question/30285495

#SPJ11

question 9 when examining the permissions on a file in linux you find the the first four bits are -rwx. what does this mean?

Answers

In Linux, file permissions are represented by a series of ten characters. The first character represents the file type, and the remaining nine characters represent the permissions for the owner, group, and others.

four characters of the permission string represent the read, write, and execute permissions for the owner of the file. In the case of "-rwx", this means that the owner has read, write, and execute permissions for the file.

The "r" character represents read permission, the "w" character represents write permission, and the "x" character represents execute permission. If a particular permission is not granted, it is represented by a "-" character.

So, in this case, the file is readable, writable, and executable by its owner, but the permissions for the group and others are not known based on the given information.

Learn more about information here:

 https://brainly.com/question/3100288

#SPJ11

Which of the following uses everyday language to ask users questions and interpret their answers?
a. fuzzy logic
c. decision trees
b. CBR
d. QBE

Answers

CBR (case-based reasoning). CBR uses everyday language to ask users questions and interpret their answers.

CBR is a problem-solving methodology that relies on past experiences to solve new problems. It asks users questions in natural language and uses their responses to find relevant solutions from a case library. This approach is user-friendly and accessible, as it does not require specialized technical language or knowledge.

QBE (Query by Example) is a system that allows users to interact with a database using everyday language, making it easier for them to ask questions and interpret the answers. The other options, such as fuzzy logic, decision trees, and CBR, do not primarily focus on using everyday language for user interaction.

To know more about language visit:-

https://brainly.com/question/31259663

#SPJ11

PL/SQL commands have a certain format and cannot include any blank lines in the code. True and False

Answers

False. PL/SQL commands do not have a specific format and can be written with blank lines to improve readability. However, they do follow a syntax and structure that must be adhered to in order for the code to execute properly.

PL/SQL is a procedural language used to interact with Oracle databases. It allows for the creation of stored procedures, functions, and triggers. PL/SQL code can be written in any text editor or integrated development environment (IDE) and is executed using SQL*Plus or another command-line tool. While there are guidelines for formatting PL/SQL code to improve readability, including the use of whitespace and indentation, blank lines are not prohibited. Proper syntax and structure are still required, including the use of semicolons to terminate commands and the proper placement of keywords and variables.

Learn more about indentation here: brainly.com/question/32140379

#SPJ11

documentation that describes the steps to perform a task or a checklist of steps is

Answers

The documentation that describes the steps to perform a task or a checklist of steps is known as a "procedure".

A procedure is a document that provides a detailed set of instructions for carrying out a particular task or process. It is a step-by-step guide that outlines the necessary actions to be taken in order to achieve a specific outcome. Procedures are often used in a variety of settings, such as in healthcare, manufacturing, and information technology, to ensure consistency and quality in the execution of tasks. They may also be used to comply with regulations or to ensure safety.

You can learn more about documentation at

https://brainly.com/question/30457175

#SPJ11

which of the following is not a step under the traditional network design approach?

Answers

The step that is not a part of the traditional network design approach is "continuous monitoring and evaluation" of the network design. The traditional network design approach includes several steps, such as gathering requirements, designing the network topology.

Selecting network hardware and software, and testing and implementing the design. However, the step that is not typically included in the traditional approach is continuous monitoring and evaluation. This step involves regularly reviewing the network performance and making adjustments as needed to improve its functionality, security, and efficiency.

Although this step is critical for ensuring the ongoing success of the network, it is often overlooked in traditional network design methodologies. To address this issue, some modern network design approaches incorporate ongoing monitoring and evaluation into their processes, such as the agile network design approach.

To know more about traditional network design visit :

https://brainly.com/question/31837900

#SPJ11

why would an emt be concerned about a partial-thickness burn circumferentially to the chest?

Answers

EMT would be concerned about a partial-thickness burn circumferentially to the chest because it can lead to respiratory distress and compromise the patient's ability to breathe properly.

This is because the chest wall is involved in the process of breathing and burns in this area can cause swelling and fluid accumulation, making it difficult for the patient to take deep breaths. Additionally, the burn can cause scarring which can further impede breathing in the long-term.


1. Partial-thickness burns involve damage to both the epidermis and the dermis layers of the skin. This type of burn can be painful and cause blisters, swelling, and redness. When a burn is circumferential, it means it wraps around the entire area of the body part, in this case, the chest.

To know more about Partial-thickness visit:-

https://brainly.com/question/32079018

#SPJ11

How do you allow an address or domain to still submit tickets, but start in the suspended view?

Answers

Answer:

The suspended tickets view is visible to any agent with access to all tickets.

Explanation:

What common data type is used to store decimal numbers such as 3.14 and 7.07? a) money b) integer c) float d) varchar and more.

Answers

The common data type used to store decimal numbers such as 3.14 and 7.07 is a float.

So, the correct answer is C.

A float is a data type that is used to store floating-point numbers, which means that the numbers can have a decimal point and can be either positive or negative.

This data type is commonly used in programming languages like Java, Python, and C++.

It is important to note that floats have limitations in terms of precision, so they may not always be the best choice for extremely precise calculations.

However, for most applications that require decimal numbers, a float is a reliable and efficient choice.

Hence, the answer of the question is C.

Learn more about data type at https://brainly.com/question/30756297

#SPJ11

which type of tape cartridge can hold up to 3.0 tb of compressed data?

Answers

LTO-8 tape cartridge can hold up to 3.0 TB of compressed data. LTO-8 (Linear Tape-Open 8) is a magnetic tape data storage technology. It is the eighth generation of the LTO tape format.

LTO-8 tape cartridge can hold up to 12.0 TB of uncompressed data or up to 30.0 TB of compressed data with a compression ratio of 2.5:1. Therefore, LTO-8 tape cartridge can hold up to 3.0 TB of compressed data when the compression ratio is 2.5:1. The LTO tape format is widely used in the data storage industry due to its high storage capacity, reliability, and cost effectiveness. The LTO technology is designed for backup and archive purposes and offers a long term data retention solution.

LTO-8 tape cartridge is backward compatible with LTO-7 drives and can be read by LTO-9 drives, providing a seamless upgrade path for customers. Linear Tape-Open (LTO) is a tape storage technology that comes in various generations. The LTO-5 tape cartridge, which is the fifth generation, can store up to 3.0 TB of compressed data. This is achieved through its improved data compression techniques and higher storage capacity compared to its predecessors. Each subsequent LTO generation offers greater storage capacity and faster data transfer rates.

To know more about compressed data visit:

https://brainly.com/question/31923652

#SPJ11

which of the following statements is true?encryption is sufficient to protect confidentiality and privacy.cookies are text files that only store information. they cannot perform any actions.the controls for protecting confidentiality are not effective for protecting privacy.all of the above are true.

Answers

Out of the provided statements, the one that is true is: "Cookies are text files that only store information. They cannot perform any actions."

Cookies are small text files created by websites and stored on your device to help the site remember your preferences, login details, or other relevant information. These text files store data and do not have the capability to perform actions themselves. However, they can be used by websites to enhance user experience or track user behavior.

Encryption, while important for protecting confidentiality, is not sufficient by itself to ensure complete privacy. Additional measures, such as access controls and secure communication protocols, are also required to achieve comprehensive protection.

Similarly, controls for protecting confidentiality may not always be effective in protecting privacy. Confidentiality aims to ensure that only authorized individuals have access to certain information. Privacy, on the other hand, focuses on how personal information is collected, used, and shared. While these two concepts may overlap, they are not the same, and different measures might be needed to ensure both confidentiality and privacy are protected.

Learn more about Cookies here :-

https://brainly.com/question/30666940

#SPJ11

what is the name by which a client uniquely identifies an instance of a service?

Answers

The name by which a client uniquely identifies an instance of a service is called a service instance identifier.

This identifier is unique to each instance of the service and allows the client to distinguish between multiple instances of the same service. It is often assigned by the service provider and can be used in communication between the client and the service instance. The service instance identifier can also be used for load balancing and scaling purposes, as it allows the client to direct requests to a specific instance of the service. Overall, the service instance identifier is an essential component of service-oriented architecture, enabling efficient and effective communication between clients and services.

learn more about instance identifier here:

https://brainly.com/question/31533898

#SPJ11

quick search lets you refine or narrow your search results using links under tweak my results. why might you use this tool to limit your search result

Answers

The "quick search" feature in search engines allows you to quickly narrow down your search results by providing links to different categories or topics related to your search query.

By using these links, you can quickly refine your search and find the specific information you are looking for. Additionally, the "tweak my results" tool allows you to further customize your search results by filtering out irrelevant information or focusing on specific types of content. You might use this tool to limit your search results if you are looking for very specific information or if you want to avoid being overwhelmed by a large number of search results. By limiting your search results, you can save time and focus your efforts on finding the most relevant information.

learn more about "quick search" here:

https://brainly.com/question/30530799

#SPJ11

which command is used to configure a collecting computer to receive an event subscription?

Answers

The "winrm quickconfig" command is used to configure a collecting computer to receive event subscriptions and should be used in conjunction with proper configuration on the remote computers sending the subscriptions.

The command used to configure a collecting computer to receive an event subscription is "winrm quickconfig". This command is used to enable the Windows Remote Management service on the collecting computer and allows it to receive event subscriptions from remote computers.

To use this command, open Command Prompt as an administrator and type "winrm quickconfig" without the quotes. Press Enter and follow the prompts to enable the Windows Remote Management service. Once this is done, the collecting computer will be able to receive event subscriptions from remote computers.

It is important to note that the remote computers must also have the Windows Remote Management service enabled and be configured to send event subscriptions to the collecting computer. This can be done using the "wecutil" command or through the Event Viewer interface.

Learn more about configuration here:-

https://brainly.com/question/30278465

#SPJ11

what type of disk can be stored in a single file on a physical disk?

Answers

A type of disk that can be stored in a single file on a physical disk is a virtual disk.


A virtual disk is created using virtualization software, which allows multiple operating systems or applications to run on the same physical machine. The virtualization software creates a virtual machine, which is like a computer within a computer.

A virtual disk, also known as a disk image or virtual hard drive, is a single file that represents the structure and content of a physical disk. This file can be stored on a physical disk and is often used in virtual machines and disk backup systems. By storing a virtual disk in a single file, it allows for easier management, portability, and backup of the entire disk's data.

To know more about physical disk visit:-

https://brainly.com/question/30510345

#SPJ11

suppose that a system uses 32-bit memory words and its memory is built from 16-bit 1x 16m ram chips. how large, in words, is the memory on this system? (alternatively: how many distinct addresses are there in such a memory system?)

Answers

If the system uses 32-bit memory words and its memory is built from 16-bit 1x16M RAM chips, we can calculate the size of the memory by determining the number of distinct addresses in the system.

Each 16-bit RAM chip can store 2^16 distinct addresses (since it has a 16-bit address bus)

Since the system uses 1x16M RAM chips, the total number of distinct addresses in the memory system can be calculated as follows

Number of distinct addresses = (Number of RAM chips) * (Number of distinct addresses per chip)

= 1 * (2^16)

= 2^16

= 65,536Therefore, the memory on this system, in terms of words, is 65,536 words or it has 65,536 distinct addresses.

To learn more about  memory click on the link below:

brainly.com/question/14717610

#SPJ11

Other Questions
________ that result from the conversations between customers, users, Product Owners and developers, including non-functional requirements. One product only has one Product Backlog. the hawley-smoot tariff act of 1930 led to other nations increasing their tariffs on u.s. goods. these higher foreign tariffs, by themselves, caused the short-run u.s. unemployment to question 2 options: decrease. not change. increase. change uncertainly. Raj cannot seem to stay on track when he makes a workout plan. He forgets what he has decided to do and ends up skipping most of his workouts.Which tool will MOST likely help him stay on track?A. a calorie counting applicationB. a GPS applicationC. a task management application D. a social media application If we don't leave now,. 2. When I go to Rome,. 3. Tom won't pass the exam. 4. You won't be able to see properly. 5. I'm sure Alice will feel better. A. If he. (not /study) b. We. For a walk. (go) c. If she. Her medicine. (take) d. I. The washing up. (do) e. I. Her the good news. (tell) you find a rock layer that contains dinosaur bones, immediately above it there is an ash layer with minerals that you can radiometrically date to 77 million years old. what can you most accurately say about the age of the dinosaur bones? In the Promotion Budget Resource, teams can select which of the following media areas.A. Print Media and Television. B. Email and Telephone Contact. C. Trade and Road Shows.D. Web Media and Direct Mail. The ? copies of gene for each feature can be diffrent versions(called ? )and provide instructions for two typezs of proteins when ben left the corporate rat race to start his own pottery business, he used some of his retirement savings to finance the business. this practice is known as: a. cashing out. b. folly. c. bootstrapping. d. self-starting. does the magnitude of the field remain relatively uniform, increase, or decrease substantially as you move away from the center while still inside the solenoid? you can assume a change of less than 25% is fairly constant. Which of the following statements regarding newspaper as an advertising medium is most accurate?A) There are no newspapers with national distribution; all newspapers are local.B) Online news services have rekindled an interest in print media news.C) More cities are increasing the number of newspapers available in kiosks at mass transit stations and "Park 'n Ride" locations for commuters.D) Recycling newsprint has led to dramatic costs reductions in production costs.E) National ad campaigns for major advertisers like P&G rarely include newspapers unless it is in conjunction with local distributors of their products, such as when they use cooperative advertising. each unique i-10 diagnosis code may be reported more than once for an encounter. T/F kwik-e-mart, inc. is considering the purchase of a $500,000 computer that has an economic life of 5 years. the computer falls into the macrs 5-year class and will be sold in 5 years for $100,000. the use of the computer will save five office employees whose combined annual salaries are $120,000. it also contributes to lower net working capital by $100,000 when they buy the computer. the net working capital will be recovered at the end of the project. the corporate tax rate is 34%. is it worthwhile to buy the computer if the appropriate discount rate is 12%? use the internal rate of return method. an insurance company decides on the cost of a policy for a natural hazard by Cooking a food in liberal amounts of water is least likely to affect its content ofa. folate.b. thiamin.c. vitamin A.d. riboflavin. suppose you purchased an income-producing property for $395,000 five years ago. in year 1, you were able to negotiate a lease that paid $30,000 per year at the end of each year. if you are able to sell the property at the end of year 5 for $420,000 (after receiving our final lease payment), what was the internal rate of return (irr) on this investment? need help pls!!!!!!!!!!!!!!!! ASAP PLEASEWhich phrase describes 9y8=31?Responses1: an equation with a constant term of 92: an expression with a constant term of 93: an equation with a variable that has a coefficient of 94: an expression with a variable that has a coefficient of 9 Casey buys a bracelet. she pays for the bracelet and pays $0.72 in sales tax. The sales tax is 6% what is the original price of the bracelet , before tax The final temperature of 1 liter of 40C water poured into 1 liter of 20C water isSelect one:a. more than 30Cb. less than 30Cc. at or around 30C Look at picture below