Which of the following will cause you to use more data than usual on your smartphone plan each month?

a. make a large number of outbound calls

b. sending large email files while connected to wifi

c. streaming movies from Netflix while not connected to Wi-Fi

d. make a large number of inbound calls

Answers

Answer 1
Outbound calls. You would most likely make more calls TO people rather than receive.

Related Questions

In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts.

Answers

Answer:

Knowledge base.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;

I. Non-algorithmic processing.

II. Symbolic processing.

In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.

Hence, expert systems represents knowledge as a set of rules by mimicking the expertise of humans in a particular field to uniquely proffer solutions to a problem.

Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.

Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.

Basically, expert systems comprises five (5) main components and these are;

1. Explanation module.

2. Inference Engine.

3. Knowledge acquisition and learning module.

4. User Interface.

5. Knowledge Base.

In the context of the components that makes up an expert system, knowledge base is similar to a database because it is used for storing facts and figures, while keeping track of rules and explanations associated with facts. Thus, giving rise to the knowledge base management system (KBMS).

In the context of the components of a typical expert system, Knowledge base is similar to a database, but in addition to storing facts and figures, it keeps track of rules and explanations associated with facts.

An expert system is a form of artificial intelligence where computer imitate the decision making style of humans.

There are basically two types of the expert system and they are the inference engine and the knowledge base.

The knowledge base consists of the facts and rules and ways of interpreting them to arise to new insights. The inference engine applies logical rules to the knowledge base.

Learn more about knowledge base here:

https://brainly.com/question/9619145

If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?

a. the physical head on the cable os not the correct type

b. one of the ports on either device is damaged or under powered

c. the computer is not running the correct application

d. cable is not the correct color

Answers

Answer should probably be B. I don’t think you’d need an application to transfer data, and the computer wouldn’t even tell you if the data couldn’t transfer if you have the wrong cable head. It wouldn’t even be connected.

The root cause at the time when transferring the data from mobile device to the computer is that the port on the device is either damaged or it is underpowered.

The following are not the root causes for the error message at the time of transferring the data from a mobile device to the computer:

The cable is not of accurate type.The computer does not run the right application.The cable is not of accurate color.

Therefore we can conclude that the root cause at the time when transferring the data from a mobile device to the computer is that the port on the device is either damaged or it is underpowered.

Learn more about the data here: brainly.com/question/10980404

At the Greene City Interiors branch office, you have been asked to implement an IP network. Your network ID is currently192.168.1.0/24. You need to divide this in half network (two subnets) to accommodate hosts on two separate floors of the building, each of which is served by managed switches. The whole network is served by a single router.
Based on the above scenario, answer the following questions:
1. To divide the network in half, what subnet mask do you need to use?
2. What are the subnet IDs for each network?
3. Your manager is not satisfied with the new subnet scheme and wants to reduce the number of subnets to make more hosts and addresses available in each subnet. Is there a way to use the same subnet for the two floors of the office?

Answers

Answer:

3 is your correct answer

Suppose you have a stack ADT (i.e., an Abstract Data Type that includes operations to maintain a stack. Design a flowchart or suitable logical diagram to show you could implement a queue’s enqueue and dequeue operations using two stacks, stack 1 and stack 2.

Answers

Answer:

One approach would be to move all items from stack1 to stack2 (effectively reversing the items), then pop the top item from stack2 and then put them back.

Assume you use stack1 for enqueueing. So enqueue(x) = stack1.push(x).

Dequeueing would be:

- For all items in stack1: pop them from stack1 and push them in stack 2.

- Pop one item from stack2, which will be your dequeue result

- For all items in stack2: pop them from stack2 and push them in stack 1.

Hope it makes sense. I'm sure you can draw a diagram.

List any two characteristics of ASCC.​

Answers

Answer:

spirit of cooperation, collective responsibility

Explanation:

i had that question before

The two characteristics of Automatic sequence controlled calculator ( ASCC) include the following:

It is large sized,it makes use of a rotating shaft, andIt has the ability to perform different tasks at the same time.

What is Automatic sequence controlled calculator ( ASCC)?

The Automatic sequence controlled calculator (ASCC) is defined as the machine that was first installed in Cambridge in 1944 which was designed to solve advanced mathematical physics problems encountered in research.

The characteristics of Automatic sequence controlled calculator ( ASCC) include the following:

It is a very larger machine with the weight of about 5 tons.

It's engine makes use of makes use of a horizontal rotating shaft.

It has the ability to perform different tasks at the same time.

Learn more about calculators here:

https://brainly.com/question/30197381

#SPJ2

Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer: b

Explanation:

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2

You are to calculate the property tax for tax payers. You will ask the county tax clerk if they want to run the program and initiate a loop that runs the program if the county clerk inputs a 1. When the county clerk chooses to run the program, you will ask the county tax clerk to input the lot number and assessed value of the house. Each property is taxed at a rate of 5% of the assessed value. The program will end when the county clerk enters a value of 0 when prompted by your program to either run the program again or quit. Use a while loop to validate the lot number to make sure that it falls between the range of 0 and 999999. When the clerk enters an invalid lot number, display a message that echoes the invalid number entered, and a reminder of the value range of numbers for a lot number. You are to print the lot number, assessed value, and property tax. After the program ends, display the total assessed values, and property taxes calculated, and average property tax

Answers

Answer:

Explanation:

The following code is written in Java. It creates the loop as requested and validates the information provided before continuing, if the information is invalid it prints "Invalid Information to the screen" and asks the user to enter the information again. Finally, outputing all the requested information at the end of the program. The code has been tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int totalValues = 0;

       int totalTaxes = 0;

       int count = 0;

       while(true) {

           int lotNumber, value;

           double tax;

           System.out.println("Would you like to add an Entry: 1=Yes 0=No");

           int answer = in.nextInt();

           if (answer == 1) {

               System.out.println("Please enter lot number: ");

               lotNumber = in.nextInt();

               if ((lotNumber >= 0) && (lotNumber <= 999999)) {

                   System.out.println("Please enter assessed value: ");

                   value = in.nextInt();

                   tax = value * 0.05;

                   System.out.println("Lot Number: " + lotNumber);

                   System.out.println("Property Value: " + value);

                   System.out.println("Property Tax: " + tax);

                   totalTaxes += tax;

                   totalValues += value;

                   count += 1;

               } else {

                   System.out.println("Invalid Lot Number");

               }

           } else {

               break;

           }

       }

       int average = totalTaxes / count;

       System.out.println("Total Property Values: " + totalValues);

       System.out.println("Total Property Taxes: " + totalTaxes);

       System.out.println("Average Property Tax" + average);

   }

}

A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?

a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.

Answers

Answer:

C

Explanation:

definitely C you’re welcome

Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and settings. These can usually be found in the settings/options area of the browser. Identify the web browser you are analyzing and answer the following questions/prompts:
1. List and explain/discuss the privacy and security features that the browser has to offer.
2. How do these privacy and security features protect individuals?
3. How do these privacy and security features affect what businesses can do on the Internet in terms of gathering customer data?

Answers

Solution :

Chrome web browser

The Chrome web browser uses a range of privacy and security settings for its customers. They include several security indicators as well as malware protection. Chrome uses the sandboxing technology, which prevents the harmful viruses and Trojans from reaching the computers.

Chrome provides a safe browsing by giving us an alert whenever we try to browse some harmful web sites.  It also warns you if we use a username and password combination which has been compromised in any data leak.

Chrome also serves to protect the individuals :

It provides a features of Ad blocking.

When we want to browse safely without being recognized or without storing any credentials, Chrome provides an Incognito mode.

Many businesses can be done on the internet using Chrome platform that is safe and authenticate to gather and collect data and information.

Design a dynamic programming algorithm for the following problem.

Find the maximum total sale price that can be obtained by cutting a rod of n units long into integer-length pieces if the sale price of a piece i units long is pi for i = 1, 2, . . . , n. What are the time and space efficiencies of your algorithm?

Answers

Answer:

please mark me brainlist

Explanation:

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.

Answers

Explanation:

With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.

The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.

nhiệt độ chiết rót của máy chiết rót có van trượt là bao nhiêu

Answers

Answer:

please translate

Thank you✌️

CONDUCT INTERVIEWS

Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:

Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.

Answers

Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,

Note that the questions that one need to ask are questions that are based on  the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.

What are the  interview questions asked?

The interview questions prepared were:

Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.

Learn more about interview from

https://brainly.com/question/8846894

Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.

Answers

Answer:

Scale to fit.

Explanation:

The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.

Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.

Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?

Answers

Please send pics and than I sent you lol I wanna wanna play with you lol but I’m gonna play play with this girl and play with me ur mommy mommy play good day bye mommy bye love.

Which statement is most likely to be true about a computer network?

A network can have several client computers and only one server.

A network has to have physical cables connecting the devices in the network.

A network can have several servers and only one client.

A network can consist of a single computer with no other devices in communication with that computer.

Answers

Which statement is most likely to be true about a computer network?

A network can have several client computers and only one server.

Explanation:

a network can have several client computers and only one server

Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative number is not a part of the sorted list). Assume the number of integers is always odd. Ex: If the input is:

Answers

Answer:

The program in Python is as follows:

myList = []

num = int(input())

count = 0

while num>=0:

   myList.append(num)

   count+=1

   num = int(input())

myList.sort()

mid = int((count-1)/2)

print(myList[mid])

Explanation:

This initializes the list

myList = []

This gets the first input

num = int(input())

This initializes count to 0

count = 0

The following is repeated until the user inputs a negative number

while num>=0:

This appends the input number to the list

   myList.append(num)

This increments count by 1

   count+=1

This gets another input

   num = int(input())

This sorts the list

myList.sort()

Assume the number of inputs is odd, the middle element is calculated as

mid = int((count-1)/2)

This prints the middle element

print(myList[mid])

From the complete question. the condition that ends the loop is a negative integer input

Write a program that accepts a list of integers and split them into negatives and non-negatives. The numbers in the stack should be rearranged so that all the negatives appear on the bottom of the stack and all the non-negatives appear on the top.

Answers

Answer:

The program is as follows:

n = int(input("List elements: "))

mylist = []; myList2 = []

for i in range(n):

   num = int(input(": "))

   mylist.append(num)

for i in mylist:

   if i >= 0:

       myList2.append(i)

for i in mylist:

   if i < 0:

       myList2.append(i)

print(myList2)

Explanation:

This gets the number of list elements from the user

n = int(input("List elements: "))

This initializes two lists; one of input and the other for output

mylist = []; myList2 = []

This is repeated for every input

for i in range(n):

Get input from the user

   num = int(input(": "))

Append input to list

   mylist.append(num)

This iterates through the input lists

for i in mylist:

If list element is non-negative

   if i >= 0:

Append element to the output list

       myList2.append(i)

This iterates through the input lists, again

for i in mylist:

If list element is negative

   if i < 0:

Append element to the output list

       myList2.append(i)

Print output list

print(myList2)

how to not addUse methods to: 1. Get a String from the user at the command line 2. Populate an ArrayList of Character data (the wrapper class), with each char in the String represented as a separate Character element in the ArrayList 3. Output each Character to the command line, each on a separate line space into my array list

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user to enter a string. Then the program loops through the string and separates the string into an ArrayList of characters. Finally, it outputs each character separately on a its own line.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a String: ");

       String answer = in.nextLine();

       ArrayList<Character> charsList = new ArrayList<>();

       for (int i = 0; i < answer.length(); i++) {

           charsList.add(answer.charAt(i));

       }

       for (char x: charsList) {

           System.out.println(x);

       }

   }

}

Illustrate why sally's slide meets or does not not meet professional expectations?

Answers

Your missing info to solve this

The uses of computer in the field of education are; ​

Answers

Answer: One of the most common applications of computers in education today involves the ongoing use of educational software and programs that facilitate personalized online instruction for students. Programs like Ready use computers to assess students in reading and math.

Explanation:

Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining

Answers

Answer:

The answer is "Option b".

Explanation:

Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.

Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fail. For example, an adapter can work its way loose over time due to temperature changes in a gradual process known as

Answers

Answer:

Chip creep

Explanation:

Chip creep can be described as a problem that arises as a chip or integrated circuit works its way out of its sockets as Time goes on. it is also the gradual loosening of the integrated circuit. This problem was quite common during early PCs.

What causes this is changes in temperature. Known as thermal expansion. During thermal expansion, as the system gets heated up and during the process of it cooling down it could occur.

Code Example 4-1 int limit = 0; for (int i = 10; i >= limit; i -= 2) { for (int j = i; j <= 1; ++j) { cout << "In inner for loop" << endl; } cout << "In outer for loop" << endl; } (Refer to Code Example 4-1.) How many times does "In inner for loop" print to the console? a. 1 b. 0 c. 2 d. 5 e. 7

Answers

Answer:

"In inner for loop" is printed twice.

Answer: C. 2

Explanation:

Code:

int main()

{

   int limit = 0;

   for  (int i =0; i>=limit; i-=2) {

       for (int j = i; j <= 1; ++j){

           cout << "In inner for loop" << endl;

       }

       cout << "In outer for loop" << endl;

   }

   return 0;

}

Output:

In inner for loop

In inner for loop

In outer for loop

The output "In inner for loop" print twice.

Thus, option (c) is correct.

In the given code example, the inner for loop has a condition j <= 1.

This condition means that the loop will execute as long as j is less than or equal to 1.

However, the initial value of j is i, and the value of i decreases by 2 in each iteration of the outer for loop.

When i = 8, the inner loop has the condition j ≤ 1.

The loop will iterate as long as j is less than or equal to 1.

So the inner loop executes twice: once when j = 8, and then when j = 9. The statement "In inner for loop" prints twice.

Therefore, the output print twice.

Thus, option (c) is correct.

Learn more about Output problem here:

https://brainly.com/question/33184382

#SPJ4

You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.

Answers

In this decision, speed and monitor screen size of a laptop are examples of a. order winners.

What is a laptop?

A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is using it to work.

What are order winners?

Order winners are can be defined as the aspects of a product that wins the heart of a customer over, so as to choose or select a product by a specific business firm. Some examples of order winners include the following:

SpeedMonitor screen sizePerformance

Read more on a laptop here: https://brainly.com/question/26021194

similarities between inline css and internal css​

Answers

Answer:

CSS can be applied to our website's HTML files in various ways. We can use an external css, an internal css, or an inline css.

Inline CSS : It can be applied on directly on html tags. Priority of inline css is greater than inline css.

Internal CSS : It can be applied in web page in top of the page between heading tag. It can be start with

Which Windows installation method requires that you manually rename computers after the installation?​

Answers

Answer:

Command line

Explanation:

After installation of the machine one needs to manually rename the computer. This can be done through the start then settings, then system, and select rename the PC in the right-hand side column.

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

Answers

Answer:C.apple Osx
Answer C

Apple OSX is not a computer application.

The information regarding the computer application is as follows:

The program of the computer application should give the skills that are required for usage of the application software on the computer.An application like word processing, internet, etc.Also, the computer application includes internet explorer, paint, and Microsoft word.

Therefore we can conclude that Apple OSX is not a computer application.

Learn more about the computer here: brainly.com/question/24504878

We canconnect  two or more computer together using cables true or false​

Answers

This is true for most modern computers

Other Questions
What else would need to be congruent to show that ABC= A DEF by theAAS theorem?BEGiven:ZA ZDAB DEAFA. AC = DFB. ZCE ZFC. BC = BCD. BEZE In which sentence does the verb number need to be changed in order to agree with the indefinite pronoun?Everything stated in these reports appears to be correct.Each of the problems were solved.All of his pets demand a great deal of attention.Few of the participants remember the incident. what is the prime product of 120 Which of the following is a benefit of using email to communicate at work ? a ) You can express yourself in limited number of characters Ob ) You don't have to worry about using proper grammar. c) You always get a response right away. d ) You can reach a large audience with one communication . In the past, Alpha Corporation has not performed incoming quality control inspections but has taken the word of its vendors. However, Alpha has been having some unsatisfactory experience recently with the quality of purchased items and wants to set up sampling plans for the receiving department to use. For a particular component, X, Alpha has a lot tolerance percentage defective of 52 percent. Zenon Corporation, from which Alpha purchases this component, has an acceptable quality level in its production facility of 20 percent for component X. Alpha has a consumer's risk of 10 percent and Zenon has a producer's risk of 5 percent. a. When a shipment of Product X is received from Zenon Corporation, what sample size should the receiving department test 1/t=1/g+1/v make g the subject Which three lengths could be the lengths of the sides of a triangle? 21 cm, 7 cm, 11 cm 7 cm, 23 cm, 11 cm, 12 cm, 7 cm, 19 cm 10 cm, 15 cm, 23 cm I need help answering this question thank guys An equation is shown below:3(2x 7) = 3Part A: How many solutions does this equation have? (4 points)Part B: What are the solutions to this equation? Show your work. (6 points) A solenoid passing by a current of 5.0 A generates a magnetic field at its diameter of 50 T. Thus the number of spirals per length scale is:A. 5.0 / Spear / mB. 10 / Spear / mC. 20 / Spear / mD. 25 / Spear / m can someone help me? A sample of gas occupies 1.2 L at 12.0oC. Assuming pressure remains the same, what would be the volume (in L) of this gas at 67oC? A. 1.4 B. 1.0 C. 0.2 D. 5.0 E. 6.7 Do oddsmakers believe that teams who play at home will have home field advantage? Specifically, do oddsmakers give higher point spreads when the favored team plays home games as compared to when the favored team plays away games? Two samples were randomly A tone is the expression of the writer's attitude.TrueFalse At room temperature, sound travels at a speed of about 344 m/s in air. You see a distant flash of lightning and hear the thunder arrive 7.5 seconds later. How many miles away was the lighting strike? (Assume the light takes essentially no time to reach you). Rose walks 2 2/3 km in three-fifths of an hour. If her speed remains unchanged, how many kilometres can she walk in one and three quarters of an hour? Express your answer as a mixed number in lowest terms Help asap What did the three-fifths compromise at the constitutional convention determine?A) How many slaves in each state could vote in national electionsB) How slaves would be counted for the purposes of representation in congressC) How many years slavery would exist before it was abolished D) How many states could own slaves and how many led to remain free The area CA) of a Paroullelogram is found by using this formula A =BH What is the area when to b is 7cm and h is 3cm? Simplify the radical expression.3^0.125b^3A. -5bB. -0.5bC. 0.5bD. 5b Six years ago,the average age of A,B,C and D was 30 years. When E joined them, the average of all five becomes 40 years. What is the age of E?