which meaning does the abbreviation c/c represent?

Answers

Answer 1

The abbreviation c/c represents; "carbon copy"

In email and letter writing, it is used to indicate that a copy of the message or letter is also being sent to one or more additional recipients.

When used in the context of email and letter writing, the abbreviation "c/c" stands for "carbon copy." It is used to indicate that a copy of the message or letter is being sent to one or more additional recipients in addition to the primary recipient. This is useful when a person wants to keep other people informed of a conversation or correspondence they are having with someone else.

When sending an email or letter with a carbon copy, the primary recipient's address is included in the "To" field, while the addresses of the additional recipients are included in the "cc" (carbon copy) field. The additional recipients will receive a copy of the email or letter and will be able to see the names of other recipients.

Carbon copy is different from "blind carbon copy" (bcc) where the recipients in the bcc field are not visible to the other recipients, this is used for privacy or security reasons.

To learn more about carbon copy, use the link:

brainly.com/question/1417131

#SPJ4


Related Questions

Can i get help with these two questions

Answers

An algorithm shall be free of any ambiquity.

What is algorithm?An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media.

To learn more about algorithm refer to:

https://brainly.com/question/24953880

#SPJ1

What force would a scale in an elevator on earth exert on a 53-kg person standing on it during the following situations?.

Answers

You can weigh yourself on a scale inside an elevator. Your mass is unaffected is happening to you or around you, but gravitational pulls you downward swiftly.

What occurs if a scale is placed in an elevator?

You and your scale move forward at the same rate as the elevator when it begins to ascend. You and the scale are propelled higher by the elevator floor. This implies that in order to push you and your weight up, the scale must exert more pressure on the individual.

What force does an elevator scale measure?

According to Newton's third rule, the scale will measure the force you exert on it, which is equal to the normal force acting on you. That is accurate for the elevator passenger's free body diagram.

To know more about elevator visit:-

https://brainly.com/question/18219705

#SPJ4

A recent study of the lifetimes of cell phones found the average is 24. 3 months. The standard deviation is 2. 6 months. If a company provides its 33 employees with a cell phone, what is the probability that the mean lifetime of these phones will be less than 23. 8 months? assume cell phone life is a normally distributed variable.

Answers

The likelihood that these phones' average lifespans will be less than 23.8 months is 7.7%, or 0.077, in the probability.

What is  normal distribution theory?

In normal distribution theory, we assume that the probability of any given outcome is normally distributed according to a bell-shaped curve.

This question is using the normal distribution theory.

The mean of the curve is the average lifetime of the cell phones (24.3 months), and the standard deviation is the measure of how much the individual lifetimes vary from the mean (2.6 months).

To calculate the probability of a mean lifetime of less than 23.8 months, we first need to convert the given value of 23.8 months into a standard deviation value.

This is done by subtracting the mean (24.3 months) from the given value (23.8 months) and dividing the result by the standard deviation (2.6 months).

The result is -0.5.

This value is then used to look up the probability of a normally distributed variable being less than -0.5 standard deviations from the mean.

The probability of the mean lifetime of these phones being less than 23.8 months is 0.077 or 7.7%.

To learn more about normal distribution theory  refer :

https://brainly.com/question/14916937

#SPJ4

the application has failed to start because its side-by-side configuration is incorrect. How to solve this problem ?

Answers

Start > Control Panel > Add or Remove Programs should be chosen. Track down the programme by scrolling down. After selecting it, select Repair. Launch the software or perform the update once more when the repair procedure is finished.

Application failure: Both software developers and computer users despise them. Program issues happen when a desktop or web application performs incorrectly. Because it is difficult to evaluate every scenario that could result in them and to ensure that all hardware and networking components on a computer are constantly in flawless working order, these mistakes will always occur. Misconceptions: There may still be application errors even if a programme doesn't crash. Program execution can encounter issues in the background. The user might never experience these issues. Programs are frequently programmed to identify little faults and log them in databases. Typically, noncritical failures like this have little impact on an application's operation or the accuracy of its data.

To learn more about "Application failures" Click on below link

brainly.com/question/24157733

#SPJ4

you only need to initiate the data privacy and security compliance process for vendors who are providing educational technology/software.

Answers

The data privacy and security compliance process for vendors providing educational technology/software should include:

Establish a data privacy and security policy. The policy should outline the expectations for vendors providing educational technology/software. This should include measures such as encryption, user authentication, data storage, and data transfers.Conduct a data privacy and security risk assessment. Evaluate the risks associated with the use of educational technology/software and the data being collected and stored.Develop a data privacy and security compliance plan. This plan should include steps to ensure the vendor is compliant with the data privacy and security policy.Implement the compliance plan. This includes training staff on data privacy and security measures, auditing vendor processes, and monitoring data usage.Monitor and review the data privacy and security compliance plan. This includes periodic audits and reviews to ensure that the vendor is meeting the requirements of the data privacy and security policy.

Learn more about Data privacy: https://brainly.com/question/29377955

#SPJ4

When riding a roller coaster, you go up and down many hills. As you get to the top of a roller coaster, what energy change is taking place?.

Answers

As the roller coaster ascends a slope, its potential energy rises and can be transformed into kinetic energy.

On a roller coaster, there are several hills to climb and descend. What energy shift occurs once you reach the peak of a roller coaster?

Potential energy changes into kinetic energy until the automobiles reach the bottom of the hill after being freed from the chain and starting to coast down the hill. Some of the kinetic energy is converted back into potential energy as the automobiles climb the next hill.

What occurs as a roller coaster car descends from a hill's summit?

The roller coaster accelerates more quickly as it descends the hill. At the bottom of the hill, the cart's potential energy is converted to kinetic energy. a hill. You have a very high kinetic energy and a very low potential energy since you are going so quickly.

To know more about roller coaster visit:-

https://brainly.com/question/3391013

#SPJ4

when you save a document for the first time, which tab displays in backstage?

Answers

When you save a document for the first time, the "Save As" tab will typically display in the backstage view. This tab allows you to specify the name and location where the document will be saved, as well as to choose the file format that the document will be saved in.

The Save As tab is the default tab that appears when you save a document for the first time, it allows you to pick the location, name and format of the file, you can also choose to save it to the cloud or on your local drive. By using this tab you can ensure that the original document remains untouched while creating a copy that you can edit. This tab is very useful when you need to keep a version of the document with the original formatting and data.

Learn more about save document, here https://brainly.com/question/8479350

#SPJ4

embedded software usually runs only during the boot process of a device. t or f

Answers

"Embedded software typically only operates during a device's boot phase." This claim is untrue.

The process of booting up, which a embedded system goes through between turning on the power and loading apps, is straightforward in theory but frequently more difficult in practice. Although the primary function of a bootloader is to load the operating system, software and hardware engineers have distinct perspectives on this process.

The concept of the system-boot process may be straightforward, but when you take into account different implementation alternatives, it gets complicated. An example of a well-known case study of a traditional boot sequence is Windows XP. The processor can receive post-reset configuration data via a variety of hardware and software methods. Different starting and kernel-code sizes, read- and write-performance requirements, and other factors are taken into account by primary and secondary boot options. A potent open-source technology called U-Boot (Universal Boot Loader) should be taken into account in Linux-based architectures.

Know more about Embedded software:

https://brainly.com/question/26422781

#SPJ4

Identify the lower class​ limits, upper class​ limits, class​ width, class​ midpoints, and class boundaries for the given frequency distribution. Also identify the number of individuals included in the summary.
Blood Platelet Count of Males (1000 cells/uL): 0-99, 100-199, 200-299, 300-399, 400-499, 500-599, 600-699
Frequency: 3, 49, 76, 25, 0, 1, 0

Answers

Following are the class limits mentioned below:

Lower class limits: 0, 100, 200, 300, 400, 500, 600Upper-class limits: 99, 199, 299, 399, 499, 599, 699Class width: 100Class midpoints: 49.5, 149.5, 249.5, 349.5, 449.5, 549.5, 649.5Class boundaries: -0.5, 99.5, 199.5, 299.5, 399.5, 499.5, 599.5, 699.5The number of individuals: 154.

Use the formulas lower class limit = class mark - class size2 and upper-class limit = class mark + class size2 to get the class limitations. Find the class limits and upper-class limits as intervals using these two formulas to ascertain the actual class limits.

Subtract one from the lower limit of the second class to get the top limit of the first class. To get the remaining upper limits, keep adding the class width to this upper limit. By deducting 0.5 units from the lower limits and adding 0.5 units to the upper limits, you can determine the boundaries.

Learn more about upper and lower-class limits:

https://brainly.com/question/16793431

#SPJ4

when the soviets launched _______________, america devoted even more resources to space and technology research.

Answers

When the Soviets launched Sputnik 1, America devoted even more resources to space and technology research.

What is Sputnik 1?

Sputnik 1 was the first artificial Earth satellite. It was launched into an elliptical low Earth orbit by the Soviet Union on October 4, 1957. The surprise success precipitated the Sputnik crisis and triggered the Space Race between the Soviet Union and the United States.

Sputnik 1 was a small metal sphere measuring about 22.8 inches (58 centimeters) in diameter and weighing 183.9 pounds (83 kilograms). It was powered by two silver-zinc batteries and transmitted radio signals at a frequency of 20.005 and 40.002 MHz.

The satellite orbited the Earth once every 96.2 minutes at an altitude of about 310 miles (500 kilometers) and was visible from the ground as a rapidly moving point of light. It remained in orbit for about three months before its batteries died and it burned up in the Earth's atmosphere on January 4, 1958.

To learn more about satellite, visit: https://brainly.com/question/16761637

#SPJ4

Ricardo uses a stenotype machine for most of his typing. what is most likely his job? question 2 options: a. court reporter b. bookkeeper c. medical coder d. administrative professional

Answers

If Ricardo uses a stenotype machine for most of his typing, his job most likely is of a court reporter.

A stenotype machine's lack of the number of keys found on a typical keyboard is among the first things people notice about it. The court reporter can type in stenographic shorthand using a stenotype machine, which has been around since the early 1800s.

Court reporters can assure that every event in the courtroom, including a witness's cries, can be precisely recorded because a conventional stenotype machine only has 22 keys that are used to key out coded numbers, phrases, words, and noises. Stenographers frequently create their own dictionaries for their work, even if a core set of phrases, words, numbers, and sounds are utilised universally.

Learn more about stenotype machine

https://brainly.com/question/28666050

#SPJ4

ENDS TODAY PLEASE HELP
Part of what makes the digital photography experience so exciting and innovative compared to non-digital cameras of years past is the LCD display that allows you to instantly review your images after taking them.

For this lab, you are going to focus on exploring the camera viewfinder and LCD display a bit more deeply.

You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an understanding of the purpose and function of viewfinders and LCD displays on digital cameras, you will write three to five paragraphs comparing and contrasting these two features. You want to not only identify and explain what they do and how they are used but also explore when and why a photographer might use one versus the other or both simultaneously.

Next, you are going to put on your creativity hat and grab some blank paper and colored pencils, pens, or markers. You are going to create a series of drawings that show what a photographer sees when looking through a camera viewfinder versus what they see when looking at the LCD screen.

Answers

Although it employs an electronic sensor rather than film to create images, digital photography mimics the steps involved in conventional film photography.

What Is Film Photography?The number of megapixels used to describe the resolution of these digital photos, which are kept on a memory card, is.Each frame on a roll of film is exposed to light in traditional film photography in order to produce a picture. Silver halide crystals are coated on plastic film to capture negative images, which deteriorate when exposed to light. Photographers take rolls of film to darkrooms where they employ liquid chemicals to develop the pictures after they've used up all the exposures on the roll.12 Benefits of Digital PhotographySatisfaction in a flash.Purchasing and processing film is expensive.Enormous photo storage spaceVarious purposesA video cameraSharing is simple.A smaller and lighter sizeSimple editing.

To Learn more About film photography refer To:

https://brainly.com/question/20629478

#SPJ1

what are tag and elements inserted in HTML document​

Answers

Answer:

HTML documents consist of tags and elements that define the structure and content of the document. Tags are used to define the structure of the document and elements are used to provide the content. Common elements include headings, paragraphs, links, images, lists, tables, and forms.

how does a proxy server differ from a packet-filtering firewall?

Answers

A proxy server differs from a packet-filtering firewall in that:

A proxy server acts as a go-between for client and server, while a packet-filtering firewall controls access to a network based on low-level network traffic rules.

A proxy server and a packet-filtering firewall are both network security technologies, but they work differently and serve different purposes.

A proxy server acts as an intermediary between a client and a server.

When a client wants to access a resource on the internet, the request first goes to the proxy server, which then forwards the request to the target server. The proxy server can provide various functions such as caching, anonymity, and content filtering.

On the other hand, a packet-filtering firewall examines network traffic and blocks or allows it based on predefined rules. The firewall uses the header information in the packets to make decisions about what to allow and what to block.

Unlike a proxy server, a packet-filtering firewall does not modify the data or make decisions based on the application layer of the network traffic.

Learn more about proxy server:

brainly.com/question/14403686

#SPJ4

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

A proxy server acts as a gateway between a user's device and the public internet, allowing the user to access the internet without revealing their IP address. A proxy server can also be used to filter the traffic that is allowed to pass through to the public internet.

A packet filtering firewall, on the other hand, operates at the Network layer and is used to filter traffic based on the packet headers, such as source and destination address, port, and protocol. Packet filtering firewalls are typically used to protect networks from malicious traffic, while proxy servers are used to protect users from malicious traffic.

Learn more about firewall:

https://brainly.com/question/3221529

#SPJ4

In testing, you find that one of the tables in your database has multiple versions of one of the columns, and updating the information requires the user to go to several different places to make sure the update completes. What process should you use to fix this kind of issue?

A. Denormalization
B. Normalization
C. Insertion
D. Compiling

Answers

Answer:

B. Normalization

Explanation:

When testing and finding that one of the tables in the database has multiple versions of one of the columns, and updating the information requires the user to go to several different places to make sure the update completes, this is an indication of poor database design. This kind of issue is best fixed by using the process of normalization.

transitioning your social media to a more professional look is appropriate when starting to look for a job. true or false

Answers

Consider your opinions regarding social media as you write an argumentative essay on the subject.

You should first come up with a list of topics and points you wish to cover in your essay before you start to write it. Then you can elaborate on each strategy. When discussing social media, you can bring up issues like how it affects people's life, how some individuals experience sadness after witnessing everyone else's success on social media and believing that they are the only ones left behind, and how phony social media is. You can also talk about how children's lives are being impacted by social media. Consider your opinions regarding social media as you write an argumentative essay on the subject.

Learn more about Social media here:

https://brainly.com/question/29036499

#SPJ4

What's To. box in computer and technology​

Answers

The "To:" box is typically used in email or messaging applications as a field for entering the recipient's email address or username. It specifies the recipient of the message or email.

What is the importance of the To: Box?

The "To:" box is an important field in email and messaging applications as it determines who will receive the message.

Accurately entering the recipient's email address or username in the "To:" box ensures that the message will be delivered to the intended recipient. In addition, it helps to keep communication organized and secure by allowing the sender to choose who will receive the message and who will not.

Proper use of the "To:" box is also essential for effective and efficient communication, as it ensures that important information is delivered to the right people.

Learn more about Email:
https://brainly.com/question/14666241
#SPJ1

True or False: Embedded software usually runs only during the boot process of a device.

Answers

False. Embedded software can run at any time during the life of a device, not just during the boot process.

What is software?

Software is a collection of instructions, data, or programs used to operate computers and execute specific tasks. It can be divided into two categories: system software, which controls the operation of the computer hardware, and application software, which consists of programs that help users accomplish specific tasks, such as word processing or playing a game. Software helps people interact with computers and can be used to perform calculations, analyze data, automate processes, and more. In addition, software can help people work more efficiently and effectively, allowing them to accomplish more in less time.

Embedded software can be used to provide a range of functionality and services, such as controlling device hardware, managing data communications, and providing user interfaces.

To learn more about software
https://brainly.com/question/28224061
#SPJ4

a software developer is the person with the training to design, create, and test computer programs. T/f

Answers

The statement is True. Software developers are responsible for developing, testing, and maintaining computer programs for various applications.

Software developers are responsible for developing, testing, and maintaining computer programs for various applications. Their duties may include debugging existing programs, writing code, designing software systems, and testing programs for accuracy and efficiency. They may also be in charge of researching and implementing new technologies for their organization. Software developers need to have strong technical skills and be able to work with other members of a development team.

Learn more about Software: https://brainly.com/question/28266453

#SPJ4

Write 2-4 short & energetic sentences to interest the reader! Mention your role, experience & most importantly - your biggest achievements, best qualities and skills about data entry.

Answers

Searching for an information section genius? Look no further! With north of 5 years of involvement and a 99.9% precision rate, I'm the ideal possibility for your information passage needs. My scrupulousness, speed, and proficiency will guarantee that your information is precisely and productively entered, like clockwork. We should cooperate to make your information passage calm!

while comparing two sheets using the view side by side feature, there is an option which lets you scroll the two sheets in sync. what is that option called ?

Answers

Answer:

Synchronous scrolling

Explanation:

Can You Remain Anonymous If You Win the Texas Lottery?

Answers

Answer: Yes!

Explanation: you can remain anonymous if you wish and go up to clam it. for example a person in a previous drawing went up and clamied his 500 million dollar lottery on live tv wearing a scream face mask to remain anonymous.

A prize winner who elects to remain anonymous must specify that choice at the time of claiming their lottery prize. While it wasn't always possible in Texas, lottery winners can now remain anonymous. Specifically, a person who wins a lottery prize of $1 million or more is eligible for anonymity, according to a 2017 announcement posted by the Texas Lottery.

What is lottery

A lottery (or lotto) is a form of gambling that involves the drawing of numbers at random for a prize. Some governments outlaw lotteries, while others endorse it to the extent of organizing a national or state lottery. It is common to find some degree of regulation of lottery by governments. The most common regulation is prohibition of sale to minors, and vendors must be licensed to sell lottery tickets.

Although lotteries were common in the United States and some other countries during the 19th century, by the beginning of the 20th century, most forms of gambling, including lotteries and sweepstakes, were illegal in the U.S. and most of Europe as well as many other countries. This remained so until well after World War II. In the 1960s, casinos and lotteries began to re-appear throughout the world as a means for governments to raise revenue without raising taxes.

Lotteries come in many formats. For example, the prize can be a fixed amount of cash or goods. In this format, there is risk to the organizer if insufficient tickets are sold. More commonly, the prize fund will be a fixed percentage of the receipts. A popular form of this is the "50–50" draw, where the organizers promise that the prize will be 50% of the revenue.[citation needed] Many recent lotteries allow purchasers to select the numbers on the lottery ticket, resulting in the possibility of multiple winners.

Learn more about lottery at https://brainly.com/question/19899859.

#SPJ4

what is one advantage offered by vdi over rds and vnc?

Answers

One advantage offered by Virtual Desktop Infrastructure (VDI) over Remote Desktop Services (RDS) and Virtual Network Computing (VNC) is that VDI provides a dedicated, isolated desktop environment for each user.

This means that each user has their own personal desktop with their own settings, applications, and data, which is separate from the desktops of other users. This is in contrast to RDS and VNC, which both share a single desktop environment among multiple users.

The advantage of this is that it provides a more secure and stable environment, as each user's desktop is isolated from the others, reducing the risk of one user's actions affecting the stability or security of the entire system.

It also allows for more flexibility in terms of customizing the desktop environment to meet the specific needs of each individual user, such as different software or configurations.

Additionally, VDI provides better performance, as each user has their own resources and does not have to share them with other users.

VDI also allows for better mobility, as users can access their virtual desktops from any device, as long as it has the necessary client software installed. This allows for users to work from anywhere, at any time, and on any device, which is very useful for organizations that have a remote workforce.

To learn more about VDI, use the link:

brainly.com/question/14763327

#SPJ4

charles simonyi is considered the father of microsoft excel?

Answers

Answer:

"Charles Simonyi is a high-tech pioneer, philanthropist and space traveler. He was the chief architect of Microsoft Word, Excel and other widely-used application programs. He left Microsoft to found Intentional Software, which aims to develop and market computer software for knowledge processing."

how to stop smoke detector from chirping without battery

Answers

Answer:you must drain this residual charge by holding the test button for 15 seconds

Explanation:

How do I fix the internal exception in Java SocketException connection reset?

Answers

There are a few things you can try to fix a "connection reset" SocketException in Java:

Check if the server is up and running. If the server is down or not running, the connection will be reset.Check for any issues with the network, such as a firewall blocking the connection.Make sure you are using the correct IP address and port for the server.Check if the server is configured to accept connections from your IP address.If the problem persists, increase the timeout value for the socket connection.If the problem still persists, check your code for any bugs, and ensure that you are properly closing and releasing resources such as sockets and input/output streams.

There are several possible causes for a Java SocketException, Some common causes and solutions include:

The server may be down or unreachable. In this case, you should check that the server is running and that you are using the correct IP address and port number when attempting to connect.A firewall may be blocking the connection. If you are using a firewall, you may need to configure it to allow connections on the port you are using.The client and server may be using different versions of the protocol. If this is the case, you should ensure that they are both using compatible versions.

Learn more about SocketException, here https://brainly.com/question/29315201

#SPJ4

in the windows server 2016 interface, which type of tile displays content that changes dynamically?

Answers

In the Windows Server 2016 interface, "live tile" type of the tile displays content that changes dynamically.

In Windows Server 2016 interface, 'Live Tiles' are designed to show 'Live information' in the Start Menu. The purpose of the Live Tiles is to change the content dynamically. This automatically updating information could be users latest photos, calendar events, breaking news stories, or email messages.

Therefore this is stated that it is the type of Live Tiles in Windows Server 2016 interface that dynamically change or update contents to be displayed.

You can learn more about Windows Server at

https://brainly.com/question/14526761

#SPJ4

I’m trying to log into my PS3 and following all the steps but it keeps showing up with this, if I could have some detailed steps of how to log in properly that would be nice, thank you.

Answers

Answer:

From what i can see you just have to use the same user sign-in Id such as email as you did before

what popular social media app are many government agencies moving to ban?

Answers

Answer:  TikTok

Explanation:

Aume both the variable 1 and 2 have been aigned tring. Write an expreion that evaluate to True if 1 i greater than 2

Answers

Mathematical operators such as addition, subtraction, multiplication, and division are used to form an expression using numbers or variables.

How do you write an expression in algebra?Mathematical operators such as addition, subtraction, multiplication, and division are used to form an expression using numbers or variables.For instance, "4 added to 2" in mathematics will be expressed as 2+4.Any mathematical statement made up of numbers, variables, and an operation between them is called an expression or an algebraic expression.As an illustration, the equation 4m + 5 consists of the terms 4m and 5, as well as the variable m, all of which are separated from one another by the arithmetic sign +.A mathematical expression is a phrase that includes at least two numbers or variables, at least one arithmetic operation, and the expression itself.Any one of the following mathematical operations can be used.

To learn more about expression refer

https://brainly.com/question/1859113

#SPJ4

Other Questions
Question 7 of 10Which of the following best explains the significance of the HarlemRenaissance?OA. It celebrated the heritage and achievements of women.OB. It represented a spiritual coming of age for African Americans.OC. It challenged stereotypes about Asian Americans.OD. It provided more opportunities for Native Americans to join theworkforce.SUBMIT What is one of the most important messages of Traveling by Grace Paley? you are caring for a patient who has a prescription for garamycin 6 mg/kg/day iv q8h. the client weighs 143 pounds. garamycin is available as 100 mg in 50 ml of solution. how many ml of solution should you administer with each dose? What wa the new belief ytem created by the Enlightenment? What wa the new belief ytem created by the Enlightenment? Deim Ilam Mormonim Chritianity Consider the reaction.PCl5(g)PCl3(g)+Cl2(g)=0.042The concentrations of the products at equilibrium are [PCl3]=0.28 M and [Cl2]=0.10 M .What is the concentration of the reactant, PCl5 , at equilibrium? use the following for the first two problems. Listed are 32 ages for Academy Award winning best actors in order from smallest to largest. (Round your answers to the nearest whole number.)18; 18; 21; 22; 25; 26; 27; 29; 30; 31; 31; 33; 36; 37; 37; 41; 42; 47; 52; 55; 57; 58; 62; 64; 67; 69; 71; 72; 73; 74; 76; 77(a) Find the percentile of 37. 14/32= .437544 th percentile(b) Find the percentile of 71 27/32=.8437?I get the 1st one but can't seem to get the 2nd, i come up with 27/32 but the computer doesn't agree can anyone help? humans are designed to breathe through the mouth when possible, which filters the air on the way into the lungs. 2. Serena mixed two samples together: a gray solid that smells like flowers and a gray solid that smells like bleach. She analyzed the results and found two ending substances. One of the ending substances was a white solid. This ending substance is made up of the repeating group of atoms shown above. Which of the diagrams to the left shows the repeating groups of atoms that make up the samples Serena mixed together? which of the following was the MOST significant outcome of atlantas international cotton exposition in 1881 WILL MARK BRAINLIEST!! 20 POINTS PLEASE HELP ASAP GEOMETRY!A person is looking from a car to the top of a building. The angle of elevation to the top of the building from the car is 32. The building is 200 feet away. How tall is the building? Round to the nearest foot Draw the organic product of the two-step synthesis below. CH3CH2C=CH 1. NaNH2 2. PhCH2Br What does Douglas mean by "unfriendly legislation"? If the central bank raises the required reserve ratio, the money multiplier and the money supply will change in which of the following ways? Van has 45 new baseball cards. He puts them in a binder that holds 9 cards on each page. How many pages dose he fill? joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. joe doesn't want to sign out of his computer each time he leaves. which of the following are the best solutions for securing joe's workstation? (select two). the decision of many continental european governments to sponsor and subsidize industrial development in the nineteenth century is best explained by which of the following contexts? compared to north american ranchers, commercial ranchers in the pampas of argentina, uruguay, and southern brazil are more likely to associative property commutative property distributive property You notice that one of your coworkers is disposing of contaminated materials in the regular trash. You have seen her throw away her gloves, blood-soaked gauze, and tubes of blood in the trash receptacle that is used for paper products and other regular waste. Discuss what possible effects this coworker's actions have on other employees and explain how the employee should have disposed of the contaminated materials. Here is a probability scale: 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 If I flip a coin, place a cross on the probability scale to show the probability of getting a head.