Which of the following statements is true regarding a user account? Once a user account has been created, it cannot be completely deleted. Once a user account has been assigned to a group, it cannot be completely deleted. Files created by a user in a group must be assigned to another group member if the original user account is deleted. Files created by a user account can be completely removed if they are no longer needed.

Answers

Answer 1

Answer:

Files created by a user account can be completely removed if they are no longer needed.

Explanation:

A user account can be defined as a profile or identity created for the users of a computer system. There are various types of user accounts and these includes administrator, guest, and standard user.

The statements which is true regarding a user account is that, files created by a user account can be completely removed if they are no longer needed.


Related Questions

Please explain election technology

Answers

Answer:

Technlogy is the application of scientific knowledge for practical purposes, especially in industry.

Explanation:

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title bar plz solve thisss​

Answers

Answer:

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title bar plz solve thisss

True
Bbbhjhhhcghnbfyujvff

What would the proper initialization and declaration be for an ArrayList myTemps meant to store precise temperature measurements

Answers

Answer:

Explanation:

When dealing with the Java programming language you need to first declare the variable type and then initialize that variable. Since precise temperature measurements would be in a double format (example: 98.3) then the proper way to do this would be with the following code.

ArrayList<Double> myTemps = new ArrayList<Double>();

               myTemps.add(98.3);

               myTemps.add(33.2);

               myTemps.add(48.5);

This code declared the ArrayList as type Double and added three elements to the array

The proper  initialization and declaration should be shown below.

Proper initialization and declaration:

At the time of dealing with the programming language i.e. JAVA here we required to first see the type of variable after this we have to initialize it. The measurment of the temperature should be in the double format example 98.3

So, the following code should be used.

ArrayList<Double> myTemps = new ArrayList<Double>();

              myTemps.add(98.3);

              myTemps.add(33.2);

              myTemps.add(48.5);

This code should be declared the ArrayList since type Double and added three elements to the array.

Learn more about array here: https://brainly.com/question/24348246

Suppose you want to find a specific piece of hardware at the lowest price, and you don't mind if it's used. Which type of purchase would be most likely

to meet that criteria?

large online retailer

local computer store

small online retailer

O consumer-to-consumer auction site

Answers

Answer:

consumer-to-consumer auction site

Explanation:

The best type of purchase for this scenario would be a consumer-to-consumer auction site. These sites allow anyone to make a publication selling their product. This publication can be seen by anyone around the world. It is the best way of finding the cheapest prices for a specific item. The condition of the items on these sites can vary. The majority of the time they are used items in good conditions, but can also be new items or very worn out items being sold for parts.

7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.

Answers

Answer:

True.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

Hence, a patent is an example of a rare and valuable resource because it protects the intellectual property of an individual or business entity and as such serves as a medium for gaining royalties or valuable economic benefits.

Since JavaScript is case sensitive, one of the variables below needs to be
fixed: *
O var isGood = true
var isGood = "true"
O var isGood = false
var is Good = FALSE
,,, can someone answer the bottom one lol?

Answers

Answer:

var is Good = FALSE needs to be fixed

bottom answer is method.

Explanation:

var is Good = FALSE because you are assigning a boolean and in js booleans are all lower case.

Functions that are stored in object properties are called “methods”

An amount of money P is invested in an account where interest is compounded at the end of the period. The future worth F yielded at an interest rate i after n periods may be determined from the following formula: 

F=P(1+i)n.F=P(1+i)n.
Write a program that will calculate the future worth of an investment for each year from 1 through n. The input to the function should include the initial investment P, the interest rate i (as a decimal), and the number of years n for which the future worth is to be calculated. The output should consist of a table with headings and columns for n and F. Run the program for P = $100,000, i=.05, n=10 years F=P(1+i)nF=P(1+i)n

Modify the problem by using the following general formula for compounding interests: F=P(1+i/m)^mn where, m is the number of interest payments per year. Solve the problem for m=1 (annual) and m=12 (monthly).

Answers

Answer:

def future_worth(p,i,n):

   print("n \t F")

   for num in range(1, n+1):

       F = round(p * ((1 + i)** num), 2)

       print(f"{num}\t{F}")

future_worth(100000, .05, 10)

Explanation:

The "future_worth" function of the python program accepts three arguments namely the P (amount invested), i (the interest rate), and n (the number of years). The program runs a loop to print the rate of increase of the amount invested in n number of years.

which of the following is an example of personal writing ​

Answers

Where are the choices?

Which of the following are thin, lightweight laptops that possess strong processing
power and are more expensive than typical laptops?

Answers

Answer:

apple laptops

Explanation:

How we ingest streaming data into Hadoop Cluster?

Answers

Hadoop could be described as an open source program to handle big data. By utilizing the MapReduce model, Hadoop distributes data across it's nodes which are a network of connected computers. This data is shared across the systems and thus enables it to handle and process a very large amount dataset at the same time. These collection of networked nodes is called the HADOOP CLUSTER.

Hadoop leverages the power and capabilities of it's distributed file system (HDFS) which can handle the reading and writing of large files from log files, databases, raw files and other forms of streaming data for processing using ingestion tools such as the apache Flume, striim and so on. The HDFS ensures the ingested data are divided into smaller subunits and distributed across systems in the cluster.

Learn more : https://brainly.com/question/15548105

Before you buy something you want, you should buy ___ ?

Answers

Answer:

The things you need.

Explanation:

People, today, are immersed in a capitalist and consumerist world that is constantly inducing the individual to acquire goods and services, that is, it transforms the individual into a consumer, being the fundamental link for the functioning of consumer societies .

Now, it is necessary that the individual, as a consumer, interprets his own needs and does not get carried away by the constant and overwhelming advertisements that companies launch on the market. In this way, he can cover his basic needs and then consume products that do not have that primary need.

Answer:

a microwave

Explanation:

A digital signaling system is required to operate at 9600 bps. a. If a signal element encodes a 4-bit word, what is the minimum required bandwidth of the channel

Answers

Answer:

1200 Hz

Explanation:

Given that the signal encodes 4-bit words, then

log2M = 4,

Again, we're told that the system operates at 9600 bps, so

C = 9600

If we bring back our earlier relation, we have

9600 = 2B * 4

9600 = 8B

B = 9600 / 8

B = 1200 Hz

Therefore, we can conclude that the minimum required bandwidth of the channel is 1200 Hz

The minimum required bandwidth of the channel is 1200 Hz

In a signal processing system, bandwidth(measured in Hertz) refers to the variation between a higher frequency and a lower frequency in a continuous range.

It can be calculated by using the formula:

[tex]\mathbf{B_ a = \dfrac{f_s}{2} }[/tex]

where;

The sampling rate [tex]\mathbf{f_s = \dfrac{R}{n}}[/tex]

and;

The operation rate of the digital signaling system R = 9600 bpsThe number of bits (n) = 4

The sampling rate is:

[tex]\mathbf{f_s = \dfrac{9600 \ bps}{4 \ bits}}[/tex]

= 2400 Hz

The minimum required bandwith [tex]\mathbf{B_ a = \dfrac{f_s}{2} }[/tex] is:

[tex]\mathbf{B_a = \dfrac{2400 \ Hz}{2}}[/tex]

= 1200 Hz

Learn more about the bandwidth here:

https://brainly.com/question/4294318

NEED ASAP DUE TODAY

Complete the statement referring to the types of light exposure.

____means reflecting too much light into the camera, making the image appear brighter than the normal exposure.​

Answers

Answer:

Normal

Explanation:

Choose the type of error described.

_____occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added

_____occurs when you use the wrong punctuation, such as print 'hello' without parentheses

_____occurs when the program starts running, but encounters an error such as trying to divide by zero


DUE TONIGHT!!!

Answers

Answer:

1. Logical error.

2. Syntax error.

3. Runtime error.

Explanation:

A compiler can be defined as a software program or application designed to read sets of sequential instructions written by programmers and to translate these set of instructions into binary digits for the execution of commands on the central processing unit (CPU) of a computer system.

The three (3) main types of error experienced by a compiler are;

1. Logical error: occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added

2. Syntax error: occurs when you use the wrong punctuation, such as print 'hello' without parentheses

3. Runtime error: occurs when the program starts running, but encounters an error such as trying to divide by zero

Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later
date and also make it available to her colleagues.
What is her best option?

Answers

Answer:

Making a custom template.

Answer:

Creating a custom template

Explanation:

Hope that helped.

What is software piracy? Check all of the boxes that apply.


copying computer software or programs illegally


using someone’s ideas without giving them credit


making lots of copies and sharing with friends


breaking the security on software so it can be used illegally


knowing the laws regarding copyright and intellectual property

Answers

Answer:

Explanation:

Software Piracy includes all of the following:

copying computer software or programs illegallymaking lots of copies and sharing with friendsbreaking the security on software so it can be used illegally

All of these acts provide ways of individuals gaining access to the software illegally and without paying for it. Doing so ultimately prevents the software developers from making any money on the idea and all of the hard work that they have put into making that software.

Answer:

A C D

Explanation:

An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requirements, they begin coding. However, after a few weeks, confusion sets in between team members. What is the most logical reason for the confusion

Answers

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

The East Coast sales division of a company generates 62 percent of total sales. Based on that percentage, write a Python program that will predict how much the East Coast division will generate if the company has $4.6 million in sales this year. You should not perform the calculation by hand and put the result into the program; instead, your program would write a formula to do the computation and display the result.

Answers

Answer:

def prediction(sales):

print(0.62 * sales)

prediction(4600000)

Explanation:

Code written in python :

We could write it out has a function :

The code is written has a function ;

'def' starts the function which is named prediction. The function takes in a single argument which is the amount of sales made. Since the percentage of sales generated is a constant pegged at 62%. The expression print( 0.62 * sales) outputs the amount generated by east coast. The function call; prediction(4600000) prints the amount generated if a sales of $4600000 is made.

Complete the rest of this statement:
In computer science, a computer is a tool a computer scientist uses, but computer science is not
about the tools.
instead, computer science is about _____

Answers

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

Computer science is about the operation of computers in aspects of programmingdata processing and analytics, and designs area.

What is computer science?

Computer science is concerned with the operation of computers in aspects of programming, data processing and analytics, and designs area.

Computer science is a field that investigates challenges connected to information technology and its applications, such as data storage, analysis, presentation, and data transmission.

The periphery of computer science expands to many other fields, such as its user interface usability, which is strongly connected to bioinformatics, a field tied to biological analysis, psychology, etc.

Learn more about computer science here:
https://brainly.com/question/22654163

Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0

Answers

Answer:

Declare total = 0

Explanation:

Given

Variable name: total

Variable type: integer

Variable value: 0

Required

Write a pseudocode statement

Because total is meant to hold integer values, it can be initialized as:

total = 0

Using total = 0.0 means that total is meant to hold floating values. So, we make use of

total = 0

However, this variable must be declared before being initialized.

So, we make use of the following statement to declare the variable:

Declare total

"Declare total" and "total = 0" gives:

Declare total = 0

java Two smallest numbers Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input begins with an integer indicating the number of integers that follow. You can assume that the list will have at least 2 integers and fewer than 20 integers. Ex: If the input is: 5 10 5 3 21 2 the output is: 2 and 3 To achieve the above, first read the integers into an array. Hint: Make sure to initialize the second smallest and smallest integers properly.

Answers

Answer:

The code to this question can be defined as follows:

import java.util.*;//import package for user input

public class Main //defining a class

{

public static void main(String[] args)//defining main method  

{

   int m1,m2,num,t,i;//defining integer variable

   Scanner incx = new Scanner(System.in);//creating Scanner class object

   m1 = incx.nextInt();//input value

   m2 = incx.nextInt();//input value  

   if (m1 > m2)//use if block to check m1 greater than m2  

   {//swapping value

       t = m1;//holding m1 value in t

       m1 = m2;//defining m1 that take m2

       m2 = t;//holding m2 value  

   }

   for (i = 2; i < 6; i++)//defining for loop  

   {

       num = incx.nextInt();//input value  

       if (num < m1) //defining if block to smallest value

       {

           m2 = m1;//holding m2 value in m1

           m1 = num;//holding num value in m1

       }  

       else if (num < m2)//defining if block to smallest value  

       {

           m2 = num;//holding num value in m2

       }

   }

       System.out.println(m1 + " " + m2);//print two smallest values

   }

}

Output:

5

10

5

3

21

2

2 3

Explanation:

In the above code, five integer variable "m1, m2, num, t, and i" is declared, in which it creates the scanner class object for inputs the value and use m1 and m2 use to the input value.

In the next step, if a block is used to swap the value and pass into the for loop that use if block to find the two smallest values and hold its value into the m1 and m2 and print its value.

Previous
15
Next →
Pretest: Data Representation and Execution
Submit Test
Reader Tools
15
Drag each label to the correct location on the image.
Drag each logic gate name to its corresponding truth table.
XOR
NAND
NOR
OR
А
B
Output
А
B
Output
A
B
Output
А
B
Output
0
0
0
0
1
0
0
1
0
0
0
0
1
1
0
1
1
0
1
0
1
1
1
0
1
1
1
o
0
0
0
1
1
1
1
1
1
1
1
1
0
0
1
1
0
Reset
Next

Answers

Answer:

A b output 0110111111001111

Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed

Answers

Answer:

Swap daemon

Explanation:

Swap daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed. The main function of the swap daemon is to monitor processes running on a computer to determine whether or not it requires to be swapped.

The physical memory of a computer system is known as random access memory (RAM).

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer.Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS),machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

The term technology includes: Group of answer choices Artifacts, machines, and physical products Information systems Institutional frameworks All of the above

Answers

Answer:

All of the above

Explanation:

Technology can be explained as the the application of science as well as knowledge to practically solve problems, and invention of tools. It can be regarded as knowledge that deals with engineering as well as applied sciences. Through technology alot of

machinery and equipment has been developed as a result of the application of scientific knowledge. One of the examples of technology is invention of internet. It should be noted that the term technology includes Artifacts, machines, and physical products as well as Information systems Institutional frameworks.

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. What technologies should the IT manager use when implementing MFA?

Answers

Answer:

Push notifications.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Multi-factor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials. First of all, the user is required to provide his or her login credentials (username and password) and lastly, a unique PIN known as One Time Password (OTP) that was sent sequel to logging in.

In this scenario, a company is implementing multi-factor authentication (MFA) for all applications that store sensitive data. The information technology (IT) manager wants MFA to be non-disruptive and user friendly.

Hence, the technology the IT manager should use when implementing MFA is push notifications.

Push notifications refers to an internet-based communication system used for generating or creating messages that are sent automatically to the mobile phone of an end user even when the particular application is not in use or open. Push notifications are user-friendly because they can either be approved or denied by a user.

Fill in this function that takes three parameters, two Strings and an int. 4- // Write some test function calls here! The Strings are the message that should be printed. You should alternate printMessage("Hi", "Karel", 5); between the Strings after each line. The int represents the total number of lines that should be printed. public void printMessage(String lineOne, String lineTwo, in For example, if you were to call 19.
printMessage("Hi", "Karel", 5);
// Start here! 12 the function should produce the following output:
Hi
Karel
Hi
Kare

Answers

Answer:

The function in Java is as follows:

public static void printMessage(String lineOne, String lineTwo, int lines){

       for(int i = 1;i<=lines;i++){

           if(i%2 == 1){

               System.out.println(lineOne);

           }

           else{

               System.out.println(lineTwo);

           }

       }

   }

Explanation:

This defines the function

public static void printMessage(String lineOne, String lineTwo, int lines){

This iterates through the number of lines

       for(int i = 1;i<=lines;i++){

String lineOne is printed on odd lines i.e. 1,3,5....

      if(i%2 == 1){

               System.out.println(lineOne);

           }

String lineTwo is printed on even lines i.e. 2,4,6....

           else{

               System.out.println(lineTwo);

           }

       }

   }

To call the function from main, use:

printMessage("Hi", "Karel", 5);

Which of the following rights is NOT guaranteed by copyright?
Right to avoid criticism
Right to make derivatives
Right to reproduce a work
Right to sell, rent, or lend
Mark this question for review

Answers

Answer:

A. Right to avoid criticism

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, the right that is not guaranteed by copyright laws is the right to avoid criticism because as an author or writer your literary work is subject to criticism from the readers and by extension the general public.

Col 1 Col2 Col 3
Row 1 23.1 13.58 14
Row 2 56.783 46.29 45.71
Write a program that accomplishes the following objectives:
1. reads in the number of rows, then the number of columns,
2. using nested FOR loops, reads in the column data for each row,
3. adds up the data for each row and derives an average for each row,
4 also adds up all the data in the table and derives an overall average.
Hints
1. Look at slides 3 and 4 of CS1336_Lect5e_nested_loops.pptx and Pr5-14.cpp for samples of nested FOR loops, especially line 38 in slide 4 for a calculation of average per student. That is very much like a row average.
2 Have two running total variables, for example rowsum and totalsum. Initialize totalsum to 0 in the beginning of the program Initialize rowsum to 0 before the inner loop (see line 29 in slide 4). Keep running totals for both of these inside the inner loop (see line 36 in slide 4). Average the rowSum after each iteration of the inner loop (see line 38 in slide 4). Average the totalsum after the outside loop ends
When the input is as shown in Figure 1. your program should produce the output as shown in Figure 2.
Figure 1: (sample input) 23 23.1 13.58 14 56.783 46.29 45.71
Figure 2 (sample output) Lverage of data in row #1 is 16.89 Average of data in row #2 is 49.59 Average of all data is 33.24

Answers

Answer:

In C++:

#include<iostream>

using namespace std;

int main(){

int rows, cols;

cout<<"Rows: "; cin>>rows;

cout<<"Columns: "; cin>>cols;

int rowsum = 0; int totalsum = 0;

float nums[rows][cols];

for(int i = 0;i<rows;i++){

for(int j = 0;j<cols;j++){

cout<<"Row "<<i+1<<", Column "<<j+1<<": ";

cin>>nums[i][j];

rowsum+=nums[i][j];  totalsum+=nums[i][j];

}

cout<<"Average of row "<<i+1<<": "<<(rowsum*1.0/cols*1.0)<<endl;

rowsum = 0;

}

cout<<"Overall Average: "<<(totalsum*1.0)/(rows*cols*1.0);

return 0;

}

Explanation:

This line declares number of rows and number of columns as integer

int rows, cols;

This line prompts user for number of rows

cout<<"Rows: "; cin>>rows;

This line prompts user for number of columns

cout<<"Columns: "; cin>>cols;

This line initializes rowsum and totalsum to 0, respectively

int rowsum = 0; int totalsum = 0;

This line declares a 2d array

float nums[rows][cols];

The following iteration gets user input into the array

for(int i = 0;i<rows;i++){

for(int j = 0;j<cols;j++){

cout<<"Row "<<i+1<<", Column "<<j+1<<": ";

cin>>nums[i][j];

This line sum up the rows

rowsum+=nums[i][j];  

This line sum up each entry

totalsum+=nums[i][j];

}

This line calculates and prints the average of each row

cout<<"Average of row "<<i+1<<": "<<(rowsum*1.0/cols*1.0)<<endl;

rowsum = 0;

}

This line calculates and prints the overall average

cout<<"Overall Average: "<<(totalsum*1.0)/(rows*cols*1.0);

True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching URL, with no partial matches

Answers

Answer:

False

Explanation:

Mapping annotation requires configured requests that are forwarded to default server and an error  is not raised. It has various URL attributes that are matched. The requests are sent to the URL that matches with the annotation.

This element is known as the path a dot makes. It can be used to create
contour drawings or to shade areas.
O Color
Contrast
Line
O Value
O None of the above

Answers

the answer is Value

i just know

Other Questions
What is the potential energy of your 3kg puppy that is sitting in the grass in your backyard You have to design an airplane that is very fast. What type of airfoil would you use for the wing? Why? 5th grade work Roberts favorite sport was Location Pf Berln Conference Of 1884 Select the fraction that is equivalent to two thirds.Question 9 options:two twelfthsfour twelfthsthree sixthseight twelfths A user from the financial aid office is having trouble interacting with the finaid directory on the university's ERP system. The systems administrator who took the call ran a command and received the following output:Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the ERP system.Which of the following is the MOST likely reason for the issue?A. The permissions on the finaid directory should be drwxrwxrwx. B. The problem is local to the user, and the user should reboot the machine. C. The files on the finaid directory have become corrupted. D. The finaid directory is not formatted correctly Someone please help me to resist an attack made on someone or something meaning Which resource is nonrenewable?O A. SoybeansO B. CopperO c. CattleO D. Sunlight Add.6.2 + 0.95 = ?The sum is .Subtract.2.53 0.8 = ?The difference is . One advantage to sexual reproduction versus asexual reproduction is that A photographer is 6 feet tall and cast a shadow that is 2 feet long. He is photographing a palm tree with a shadow that is 7 feet long. What is the height of the tree Read the excerpt from "George Washington."Which is the central idea in this excerpt?AlbcHe pursued two intertwined interests: military arts andwestern expansion. At 16 he helped survey Shenandoahlands for Thomas, Lord Fairfax. Commissioned alieutenant colonel in 1754, he fought the first skirmishesof what grew into the French and Indian War. The nextyear, as an aide to Gen. Edward Braddock, he escapedinjury although four bullets ripped his coat and twohorses were shot from under him.O As a young man, Washington participated in landsurveying and fought in the military.O Washington escaped injury even though four bulletstore his coat and two horses were shot from underhim.O At the age of sixteen, Washington helped surveyShenandoah lands for Thomas, Lord Fairfax.O Washington was part of skirmishes that eventuallybecame the French and Indian War. 12 baseball cards cost $25 = How many dollars per baseball card? The famous "Liberty or Death' speech was delivered by _Patrick HenryGeorge MasonHoratio GatesJohn HancockSamuel Adams A classmate thinks that cancer and apoptosis are both harmful to organisms. Do you agree or disagree? Explain your reasoning. hello everybody hru allfrom indiawhat is reflection of light? Ben jogged 4 1/2 miles in 1 1/4 hours at a constant rate. How far did ben jog in 1 hour? pls do it fastin the given figure AB=10.2cm, AC=14cm, AD=DC and AD perpendicular to BC. calculate area of triangle ABC. Factor: 2m + 19 + 6m - 7