when the title slide is the current slide, what happens when you click the new slide button? a. a dialog box opens asking you to select the layout for the new slide that will be added. b. a new slide with the title slide layout is added after the title slide. c. a new slide with the blank layout is added after the title slide, and then a dialog box opens asking if you want to keep or change the layout. d. a new slide with the title and content layout is added after the title slide.

Answers

Answer 1

When you click the new slide button, a new slide with the Title and Content layout is added after the title slide. Thus, the correct option D.

What is title slide?



The term "title slide" in PowerPoint has a wide range of meanings, but generally speaking, it refers to the first slide in the presentation's slide deck that is displayed in the workspace of the PowerPoint programme when the presentation is opened.

Two text boxes for a title and subtitle are available by default on the title slide in PowerPoint. The title slide establishes the tone for the subsequent presentation, similar to the opening credits of a movie or the flyleaf of a book.

The Think Outside the Slide website estimates that 30 million PowerPoint presentations were broadcast to audiences in 2010. Title slides are the only thing that would prevent all of those presentations from blending into one another and becoming a nightmare electronic slide show.

Learn more about PowerPoint

https://brainly.com/question/14498361

#SPJ4


Related Questions

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3
Group of answer choices

3

4

6

7

9

2

10

5

12

8

1

11

Answers

Answer:

output:

2

5

8

11

Explanation:

first round: 2

second round: 2+3 = 5

third round: 5+3 = 8

fourth round: 8+3 = 11

fifth round: 11+3 > 12 then stop

Connection speed is technically a measure of capacity.true or false

Answers

The connection speed is technically a measure of capacity is a false statement. Connection speed and capacity are not the same.

Differentiate between connection speed and capacity.

The bandwidth sometimes referred to as connection speed, is a measurement of how quickly data can be moved across a network connection. In most cases, it is expressed in bits per second (bps) or bytes per second (Bps). It measures the speed of data transfer and is frequently used to gauge the performance of internet connections.

The amount of data that can be stored or sent through a network connection is measured by capacity, on the other hand. Usually, it is expressed in bits or bytes (b). It is a measurement of the quantity of data that can be moved over a network connection and is frequently used to assess the hard drive's storage capacity or the number of users that can

To learn more about bandwidth, visit:

https://brainly.com/question/14895616

#SPJ4

(Simple computation) The formula for computing the discriminant of a quadratic equation ax^2 + bx + c = 0 is b^2 – 4ac. Write a program that computes the discriminant for the equation 3x^2 + 4x + 5 = 0. Class Name: Exercise01_01Extra

Answers

bjj is a transformation of f and the significance of those places in your neighbourhood which are named after famous personalities and prepare a chart or table on

what is every vessel operator required to do? pass both a written and an operating test. buy new pfds before each outing. check the wind speed and the water current. take all necessary action to avoid a collision.

Answers

Switch the engine off.

What is required of every vessel owner in Florida?

The owner or operator of the vessel shall carry, store, maintain, and utilize the U.S. Coast Guard safety equipment (USCG).Successfully finish a boating safety course, and the FWC will grant you a Boating Training And safety Identification Card.

What should the captain of a ship do?

Every operator must always keep a proper vigil, employing both his eyes and hearing.

Observe and listen for other boats, radio communications, navigational hazards, and other water users.

Observe the posted speed limit.

To know more about vessel operator visit:

brainly.com/question/27005915

#SPJ4

marketing users at cloud kicks should be able to view and edit converted leads. the administrator has assigned them permission set with the view and edit converted leads permission. which two ways can the marketing users now access converted leads for editing? choose 2 answers

Answers

A) From the Leads tab, click on the Converted Leads view, which will provide a list of converted leads. From here, users can click on a lead to view and edit the details.

What is Converted Leads?

Converted leads are leads that have gone through the conversion process and have resulted in a sale or other desired action. This could be a customer making a purchase, signing up for a service, completing a survey, or any other desired outcome. In marketing and sales, the goal is to turn prospects into customers, so converted leads are the ultimate goal. A lead is considered converted when the desired action has been taken. It’s important to track and measure this metric in order to improve marketing and sales efforts and to optimize the customer journey.

B) From the Reports tab, select a report to view converted leads. From here, users can click on a lead to view and edit the details.

To learn more about Converted Leads
https://brainly.com/question/30143148
#SPJ4

Exercise 4.4.1: Tracing a monitor execution. About While a process is executing inside the function A of the monitor m, the following calls are issued by different processes: m.A(); m.B(); m.B(); m.B(); m.B(); m.A(); m.A(); (2) monitor m{ int x = 10, y = 2 conditionc A() { x++ c.signal y = x - 2 } BO{ if (x > 10) X-- else {c.wait X--} } (5) (7) (a) Using the line numbers in the code, trace the sequence of instruction execution. Show any changes of x and y at the end of each instruction. Feedback?

Answers

The tracing of the sequence of instructions as per the execution is well determined by the fact that is processed by the processing unit and displayed over the monitor.

What is the tracing of the sequence?

The tracing of the sequence contains the raw data output from sequencers employing automated Sanger-based sequencing. This sequencing methodology and file format have largely been replaced by next-generation sequencing and BAM or FASTQ formatted data.

This file type can be found in the GDC Legacy Archive. A trace that starts a long trace sequence should keep relevant information for the whole sequence. The monitor enables only one process in order to execute the sequencing of one data information separately with respect to another.

Therefore, the tracing of the sequence of instructions as per the execution is well determined by the fact that is processed by the processing unit and displayed over the monitor.

To learn more about Tracing the sequence, refer to the link;

https://brainly.com/question/18956070

#SPJ1

Is the following statement true or false? Allowing your biases to influence you makes your knowledge an unreliable source.

Answers

Answer:

True

Explanation:

Knowledge is based on facts, not a person's feelings about subject matter.

when the stranded wire begins to spread apart in the installation process, this is referred to as ? .

Answers

On the installation process, splay is referred as when the stranded wire begins to spread apart.

How to install a stranded wire?

The electronic installation require the connection between electricity resource to the device. It is necessary to install a wire to make them work. Stranded wire is a type of wire that is fit for connecting electronic components in cramped spaces where its installation process are:

Choose the terminal that you want to use.Cut the wire protector as neededConnect it with terminalScrew the wire to locked it. Make sure wire on the cathode and anode did not met to avoid short circuit

Learn more about stranded wire here

https://brainly.com/question/20961968

#SPJ4

Determine if the given statements are true or false.

the hexadecimal equivalent
of 22210 is de.
the binary equivalent of
d7 is 11010011.
the decimal equivalent of
1316 is 19.

Answers

The given statements are the hexadecimal equivalent of 22210 is de is false, the binary equivalent of d7 is 11010011 is true & the decimal equivalent of 1316 is 19 is true

What is hexadecimal equivalent?

Hexadecimal equivalent is a way of expressing numbers using the base-16 numbering system. This system uses the characters 0-9, and the letters A-F to represent a numerical value. Each character in the hexadecimal representation of a number is called a "digit". Each digit has a value that is 16 times the value of the digit to its right. For example, the hexadecimal number A2 would be equivalent to the decimal number 162 (A = 10 and 2 = 2). Hexadecimal numbers are widely used in computing and programming as they are easier to read and use than binary numbers.

The hexadecimal equivalent of 22210 is 561E. The binary equivalent of d7 is 11010111, and the decimal equivalent of 1316 is 19. Hexadecimal and binary numbers are both base 16 and base 2 number systems, respectively. The decimal number system is base 10. To convert from one number system to another, the number must be converted from its original base to base 10, then from base 10 to the desired base. For example, to convert from hexadecimal to binary, you would first convert the hexadecimal number to decimal, then convert the decimal number to binary.

To know more about hexadecimal equivalent visit :

brainly.com/question/30196907

#SPJ4

what is wrong with the following erd meant to show a relationship between two entities? a.) there is nothing wrong with the erd. b.) there is no relationship between the entities. c.) both of the objects are attributes. d.) one of the items is set up as an attribute.

Answers

The correct answer is (b) there is no relationship between the entities. ER diagrams help to explain the logical structure of databases.

What is ER diagram?

Entity Relationship Diagrams (ER Diagrams), often called Entity Relationship Diagrams (ERDs), are diagrams that show the relationships between entity sets that are maintained in databases.

Entities, attributes, and relationships are the three fundamental ideas on which ER diagrams are built.

ER diagrams have a variety of symbols, such as rectangles for entities, ovals for characteristics, and diamond shapes for relationships.

An ER diagram initially resembles a flowchart quite a bit. However, the particular symbols and their meanings in the ER Diagram make this paradigm distinct.

The entity framework infrastructure is depicted in the ER Diagram for representational purposes.

To create a well-designed database, you can assess your data requirements methodically with the use of ER modelling.

Therefore, it is recommended that you finish your ER modelling before putting your database into operation.

To know more about database design, visit:-

https://brainly.com/question/29741944

#SPJ4

in which instance would an individual not be allowed escorted entry into a restricted/controlled area?

Answers

An individual would not be allowed escorted entry into a restricted/controlled area if they do not have the necessary authorization or credentials to gain access to the area.

Additionally, if the individual is perceived as a security risk or threat, then they may not be allowed to access the restricted/controlled area even with an escort.

If the individual is perceived as a security risk or threat, then they may not be allowed to access the restricted/controlled area even with an escort, regardless of their credentials or authorization. Additionally, they may be asked to go through additional security measures or screenings before they are allowed access to the restricted/controlled area.

Learn more about restricted/controlled area:

https://brainly.com/question/1155133

#SPJ4

88.4% complete question through what method can malware evade antivirus software detection, so that the software no longer identifies the malware by its signature?

Answers

One way to prevent malware from being detected by antivirus software is to employ perplexing automated technologies.

This is believed to be the use of perplexing automated techniques, which is said to help malware dodge any sort of detection technologies like any sort of antivirus with signature-based protection. Therefore, one could argue that the employment of perplexing automated tools is an effective way for malware to avoid being detected by antivirus software. Keeping our computers and data secure requires antivirus software. It employs specific methods like: detection based on signatures. Using heuristics for detection. the use of sand boxing to find harmful software. Signature-based Detection: Using this method, a suspicious file is scanned and compared to a database of known malware signatures. The antivirus program will mark a file as harmful if its signature matches one in the database.

Learn more about Malware here:

https://brainly.com/question/27853949

#SPJ4

what monitors emails for spam and other unwanted content to prevent these messages from being delivered?

Answers

In order to stop these messages from being distributed, the mail gateway checks emails for spam and other undesired information.

Using electronic devices, people can exchange messages (also known as "mail") using electronic mail, also known as "email" or "e-mail." Therefore, emails were initially intended to be the electronic (digital) equivalent of, or counterpart to, mail at a time when "mail" solely referred to physical mail (therefore, e- + mail). An email address is now frequently seen as a fundamental and essential component of many operations in business, trade, government, education, entertainment, and other areas of everyday life in most nations since email has become a ubiquitous (extremely extensively used) communication tool.

The medium is email, and every message transmitted via email is referred to as an email. The phrase is a collective noun.

Learn more about emails here:

https://brainly.com/question/15403726

#SPJ4

An electronics wholesaler must sell at least $4000 worth of computers and printers per day to stay profitable. Each printer costs $300 and each computer costs $900. The store can ship a maximum of 25 items per day. If c represents the number of computers and p represents the number printers, which three statements are correct?.

Answers

Data is represented by binary digit sets in computers. The representation is made up of bits, which are then organized into bigger groups like bytes.

Number of values in a bit string, Table 2. A binary digit called a bit designates one of two states. The way that we stored, processed, and transferred data is referred to as data representation. We can utilize any device, including computers, smartphones, and iPads, to save data in digital format. The stored data is handled by electronic circuitry. The int type, also referred to as an integer, can store a variety of non-fractional numeric values. Java specifically uses 32 bits of memory to hold it.

Learn more about string here-

https://brainly.com/question/14528583

#SPJ4

What do these coordinates lead to?
40.720059,-89,273147

Answers

Answer:

This is wrong because it’s not the coordinates

Explanation:

It appears that there is a typographical error in the coordinates you provided.

What is coordinate?

A coordinate is a collection of numbers that describes the location of a point or object in space. The numbers in geographic coordinates represent latitude, longitude, and, in some cases, elevation.

Coordinates are used in a variety of applications, including mapping, navigation, and astronomy, among others.

The coordinates you provided appear to have a typographical error. The second coordinate (-89,273147) appears to have a comma between the integer and fractional parts rather than a period or decimal point.

Thus, assuming the second coordinate is -89.273147, the coordinates (40.720059, -89.273147) point to the town of Lacon in central Illinois, USA.

For more details regarding coordinates, visit:

https://brainly.com/question/16634867

#SPJ2

when a xen based guest vm makes a request for a hardware resource, such as reading from a disk, where is the request sent to?

Answers

The host operating system receives it and processes the request. It is delivered directly to the host machine's hardware.

 

What is Xen based?

Xen is a hypervisor that enables the simultaneous creation, execution, and management of multiple virtual machines on one physical computer.

Where the request is delivered when a Xen-based guest VM requests a hardware resource, such as reading from a disk.

XenServer offers a per-server license and is open-source and free. The licensing for VMware, on the other hand, is proprietary and is based on the number of processors.

Therefore, delivered directly to the host machine's hardware.

Learn more about hypervisor, here:

https://brainly.com/question/30077423

#SPJ1

if they apply huffman coding to the temperature data, which digit is the most likely to be represented with a shorter bit code?

Answers

The right response is selection 2. The LZ77 algorithm and Huffman coding are combined to create the lossless data compression technology and file format known as Deflate.

It is widely believed that it is possible to develop an algorithm that creates deflated files in a way that is not governed by patents. Data compression, source coding, or bit-rate reduction are terms used in information theory to describe the act of encoding information using fewer bits than the original representation. There are two types of compression: lossy and lossless. By locating and removing statistical redundancy, lossless compression lowers the number of bits. Yes, provided that the "The Lion King" video is compressed using an unrestricted, open standard.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?
A. Emergency Repair Disk
B. Restore from OEM image
C. System Recovery
D. Restore from backup

Answers

Answer: The answer is C, system recovery

Explanation: This is correct answer. If you put C you will get it right

renzo uses his computer to access an online meeting room where he takes part in meetings with his department members. in this meeting room, participants are able to present powerpoint slides and word documents, share spreadsheets, demonstrate products, visit web pages, and use a white board. renzo and his colleagues are using what type of collaboration technology? a. web conferencing b. a blog c. audioconferencing d. instant messaging

Answers

Participants can share spreadsheets, demonstrate goods, present PowerPoint slides and Word documents, and browse the Internet in this meeting room.

Which of the following describes a standard ground rule for online meetings?

Common ground standards include following the agenda, being helpful, listening intently, participating fully, and confronting disagreement honestly. Most of us listen with an efficiency of about 75%.

What does vertical communication look like in practice?

Sharing information vertically, from top to bottom or bottom to top, involves a hierarchy. Most of us are likely most accustomed to this kind of communication: Budgets, objectives, feedback, and goals are shared by senior management with middle managers, who subsequently communicate these details to their staff.

To know more about online meeting visit:-

https://brainly.com/question/13239106

#SPJ4

delroy is a technician for a telecom company that installs new fiberoptic lines for cable tv. what pathway of the arts, av technology, and communication cluster does delroy's job fall into? question 21 options: av technology and film printing technology journalism and broadcasting telecommunications

Answers

Delroy's job falls into the Telecommunications and Networking pathway of the Arts, AV Technology, and Communication Cluster.

What is network ?

A network is a set of connected computers, devices, and/or other resources that can communicate and share data with each other. Networks can be as small as two computers connected with a cable, or as large as millions of computers and devices connected all over the world. Networks can be wired (using cables, Ethernet, and fiber optics) or wireless (Wi-Fi). Networking is the exchange of information and ideas among people with a common interest, typically by meeting in person or through digital media. Networking is often used in business to build relationships and develop contacts that can help grow a company, find a job, or gain new customers.

To know more about network
https://brainly.com/question/13102717

#SPJ4

how to write things on the right of the page but it doesnt go to the next line and move left instead

Answers

Learn the basics of left, right, and center text alignment in HTML so you can build logical, attractive website layouts from scratch.

Text align right means what?

Right align, right align, or right justify are all terms used to describe text or page styling that aligns content down the right side of a page or contained element. The right edge of this text appears jagged because it is aligned to the left rather than the right.

In HTML, how do you shift elements to the right?

By combining the position property with the two values top and left, an HTML element can be moved anywhere on the HTML page. To move to the left, provide a negative number for left. Move right and use a positive value for left. When heading upward, use a negative value for the summit.

To know more about right page visit:-

https://brainly.com/question/30000090

#SPJ4

which describe the important roles bill gates has played in the production and promotion of the janicki omni processor?

Answers

The bill Gates Foundation has promoted innovative technology and the idea that how we produce our food should have a significant impact on how much we consume.

Which US government agency was set up to watch the Internet and look for cyberthreats?

The agency links its business and government stakeholders to one another as well as to information, analysis, and tools to assist them in enhancing their physical, cyber, and communications security and resilience, which improves the nation's cybersecurity posture.

Why is the population of China declining?

The population of China continues to decline as more people leave than enter the country each year. China has had a net negative number of migrants since at least 1950, when the UN started keeping records, which means more people are leaving the nation than are arriving.

To know more about bill gates visit:-

https://brainly.com/question/30208279

#SPJ4

choose the figure that is missing from the series of figures in the top row.

Answers

The upper-left corner's light triangle can be seen as we move from the first to the second photograph.

How can the missing number in a figure be located?

There will be a missing term in a figure-based series, and you will be expected to solve the series using the available figures and alphabets.

Which phrase in the sequence is missing?

To locate the missing term in a series of numbers, first determine the rule that the numbers in the sequence adhere to. Then, apply this rule to locate the missing term. The rule that the numbers in the example above adhere to is "Add 8."

To know more about light triangle visit :-

https://brainly.com/question/28987421

#SPJ4

describe an example of cluster analysis that you use (or have used before) that you did not realize was k-nearest neighbor analysis, or provide a real-world example of a situation where k-nearest neighbor classification could be most advantageous in addressing a business problem. for example, gps technology and your cell phone use cluster analysis to locate the closest dunkin donuts to your current location. the search engine takes your coordinates and then compares with the addresses of the company (e.g., dunkin) you are looking for and reports back with your nearest neighbor. include the advantages of using the k-nearest neighbor vs. other modeling techniques that have more assumptions. be sure to cite your source(s).

Answers

An example of a situation where k-nearest neighbor classification is most useful to address a business problem: K-nearest neighbor algorithm classification and spot pattern recognition can be used in grocery stores to identify key customer patterns.

What is the K-Nearest Neighbors approach with examples?

The KNN (K-Nearest Neighbors) algorithm stores only the training phase dataset, and upon receiving new data, classifies the data into categories that are very similar to the new data. Example: suppose you have an image of a creature that resembles a cat and a dog, but you want to know if it is a cat or a dog.

What are the practical applications of KNN algorithm?

KNNs can be used for recommendation systems. In the real world, more sophisticated algorithms are used for recommendation systems. KNNs can search for documents that are semantically similar. Each document is displayed as a vector. KNN can be effectively used to detect outliers.

To learn more about KNN algorithm visit:

https://brainly.com/question/15086889

#SPJ4

chris is a marketing manager at the pet box, which offers subscription boxes for pet owners. chris wants to increase traffic to the pet box's main product page. right now that page ranks on the second page of search results for their target keyword. chris has started improving the on-page seo of the page, optimizing it for their target keyword, and seeking backlinks from popular pet care blogs. in order to track progress towards their goal, which metrics should chris track?

Answers

Organic traffic, position, impressions, backlinks are the required metrics the should be tracked by chris.

What is Organic traffic?

Organic traffic refers to visitors who arrive at your website through unpaid channels, i.e. free traffic. Search engines such as Go-ogle, Ya-hoo, and Bi-ng are examples of organic sources or organic searches.

Search Engine Optimization is a type of digital marketing that focuses on increasing organic traffic. It boosts website trust and has higher conversion rates than paid traffic because organic searches have higher intent. Organic traffic has a very high ROI because it is semi-permanent in nature, as opposed to paid ads.

To learn more about Organic traffic, visit: https://brainly.com/question/29358124

#SPJ4

northern trail outfitters uses automation studio to import their master subscriber list. they want to enable their regional marketers to refresh their subscribers from the master subscriber list prior to each send. their regional marketers are not technical and prefer to avoid writing code. which automation studio activity should be recommended?

Answers

One way to prevent malware from being detected by antivirus software is to employ perplexing automated technologies.

This is believed to be the use of perplexing automated techniques, which is said to help malware dodge any sort of detection technologies like any sort of antivirus with signature-based protection. Therefore, one could argue that the employment of perplexing automated tools is an effective way for malware to avoid being detected by antivirus software. Keeping our computers and data secure requires antivirus software. It employs specific methods like: detection based on signatures. Using heuristics for detection. the use of sandboxing to find harmful software. Signature-based Detection: Using this method, a suspicious file is scanned and compared to a database of known malware signatures. The antivirus program will mark a file as harmful if its signature matches one in the database.

Learn more about Malware here:

https://brainly.com/question/27853949

#SPJ4

Computer A wants to send some data to computer B. Computer A knows that Computer B is not on its local network, so it sends the packet to the router between Network A and Network B. Based on how many network hops have happened, how much will the TTL field be decremented by

Answers

A is NOT required to know the location of Computer B. To establish whether the target is on the local network or elsewhere on the LAN, the router utilizes its subnet mask. There is a 1 decrease in the TTL field.

Between a computer and a network, what sends data?

 A router is a real-world or virtual device that links networks by sending the data packets' contents. A router's analysis of the data included in the packets determines the best path for the information to take in order to reach its destination. Routers keep sending data packets until they reach their final node.

To know more about Network  visit:-

brainly.com/question/29650626

#SPJ4

jasmine needs a double underline to appear beneath a word. she should change the underline style. true false

Answers

To appear behind a word, jasmine requires a double underline. She ought to adjust the underlining. true

What should you do if you want to resize a photo without distorting it?

Holding Shift while dragging a corner sizing handle will keep the object's dimensions in tact. Holding down Ctrl and Shift while dragging a corner sizing handle can help you keep the object's proportions and center in the same spot.

Which option is utilized to alter the text's color?

Choose the text you want to edit. Choose the arrow next to Font Color in the Font group on the Home tab, and then choose a color. The formatting choices are also available.

To know more about  underline style visit:-

https://brainly.com/question/1270297

#SPJ4

how i can update my dual screen settings so that my window doesnt resize when i move from one monitor to another?

Answers

To change the size of text, apps, and other items, choose Display > Change the size of items, and then move the slider for each monitor. Disable display scaling on high DPI settings by clicking the application, choosing Properties, selecting the Compatibility tab, and finally clicking the checkbox.

Why does my computer perceive the second monitor as being less large?

This typically results from a resolution or settings problem that can be fixed. Check the resolution's settings: Make sure your resolution settings are compatible with the monitors you are using by reading our resolution section above. When possible, choose recommended or screen-fitting options.

How do I fit my screen with my monitor?

Change the Scale drop-down menu under Scale & Layout to a higher percentage by selecting the Start button, Settings > System > Display, and Display.

To know more about display scaling visit:-

brainly.com/question/13532395

#SPJ4

You want to monitor the timing of high CPU usage by an application.Which Oracle Cloud Infrastructure (OCI) service should you use?

Answers

Answer:

To monitor the timing of high CPU usage by an application on Oracle Cloud Infrastructure (OCI), you should use the OCI Monitoring service. This service allows you to collect and analyze metrics, such as CPU utilization, for your OCI resources and applications. The service provides real-time and historical data, alerts, and customizable dashboards to help you understand and optimize your resource usage. Additionally, you can use the Metrics API to programmatically access the data for further analysis.

Uday Tahlan

Other Questions
Why portraits were considered extremely important in early history? what is the term used to describe elaborately organized sets of political attitudes? group of answer choices partisanship socialization ideologies realignments A pair of 10-N vectors at right angles to each other has a resultant of about?A. 10N. B. 14 N. C. 20 N. D. none of the above 17 A customer wants to make screen wash from concentrate and water.The diagram shows the amount of concentrate she puts into a container.ml 1000-800600400200The customer adds water into the container up to the 1000 ml division.W67780A the point deep beneath earth's surface where rock breeaks under stress and triggers an earthquake is called tan40*cot50-sec40*csc50I know the answer is -1, but I'm not sure how to get it. Select one:O a. it shifts the AD curve in the long-termOb. it shifts the AD curve in the short-termOc. it shifts the AS curve in the short-termO d. it shifts the AS curve in the long-term after the capacitor is charged to its maximum value, the capacitor and resistor are disconnected from the battery and from each other. then they are connected in parallel, so that the capacitor discharges through the resistor. how long will it take for the voltage across the capacitor to drop to 2.50 v? Give an example of a numerical, absolute goal you have worked towards in the past 1-3 years. If you have experience teaching, please refer to student achievement from grade levels you have taught/managed; preferably results from state assessments. a light, inextensible cord passes over a light, frictionless pulley with a radius of 13 cm. it has a(n) 13 kg mass on the left and a(n) 4.8 kg mass on the right, both hanging freely. initially their center of masses are a vertical distance 3.3 m apart. the acceleration of gravity is 9.8 m/s 2 .at what rate are the two masses accelerating when they pass each other? answer in units of m/s 2 . question 1 of 15 which need did the first universities in medieval europe seek to meet? a. education of the masses b. instruction of knights in the chivalric code c. preparation of monarchs to rule d. training for members of the clergy Beths father asked her to buy party favors for her little brothers birthday party. Party hats cost $1.60 each, balloons cost $.75 each, and noisemakers cost $.89 each. If each of the nine children receives one of each of the favors, find a reasonable estimate of the total cost of the party favors by rounding each amount to the nearest dollar.Beths father asked her to buy party favors for her little brothers birthday party. Party hats cost $1.60 each, balloons cost $.75 each, and noisemakers cost $.89 each. If each of the nine children receives one of each of the favors, find a reasonable estimate of the total cost of the party favors by rounding each amount to the nearest dollar. a feeder circuit with no motor load has a continuous load of 10a and a noncontinuous load of 10a. the feeder overcurrent protective device should be sized at ? Fran is from Country B. Use the data below to help Fran discover the GDP per capita in her home country. Note that population is expressed in millions of people, whereas Real GDP is expressed in billions of U.S. dollars.Country - Population (in millions) - Real GDP (in billions of U.S. dollars)A = 310 | $1,240B = 595 | $29,155C = 1,025 | $3,570D = 1,020 | $35,700 young adult male claims to have had sexual relationships mostly with other men, although he has been attracted to women at times. what would be his most likely score on the kinsey scale? Lennie then imagines a huge rabbit sitting in front of him. (Lennie's trippin) Why doesLennie think of it and how do the rabbit's words compare to Aunt Clara's? Is there time t, for 5 < t < 10,at which the rate of change of the volume of water in the tub changes from positive to negative? Give reason for your answer What is called absolute? a rotcaf is the number that results from adding a number and the greatest factor of the number that is less than the number. for example, the rotcaf of 9 is 9 3, or 12. what is the sum of the rotcafs of all the even numbers between 1 and 25? What is the standard form of the equation of a quadratic function with roots of 3 and 1 that passes through (1, 10)? y = 2.5x2 5x + 7.5 y = 2.5x2 5x 7.5 y = 2.5x2 5x + 7.5 y = 2.5x2 5x 7.5