WORTH 10 PTS - MIDDLE SCHOOL PLEASE HELP

WORTH 10 PTS - MIDDLE SCHOOL PLEASE HELP
WORTH 10 PTS - MIDDLE SCHOOL PLEASE HELP

Answers

Answer 1

Answer: C

Explanation: Just navigate your way on the map and you will find the answer.

Answer 2
The answer is C hope it really helps!!

Related Questions

Name at least 2 reasons why the suburbs were a place that veterans went to live after World War II.

Brainlist for first answer!!

Answers

Answer:

they wanted to escape their crowded neighborhoods and find lower cost of land and housing.

Explanation:

hope this helps

1) The GI Bill provided veterans with low-cost mortgages, which made it easier for them to afford homes in the suburbs.

2) The suburbs offered a quieter and more peaceful lifestyle compared to the crowded and noisy cities, which appealed to many veterans who had experienced the trauma of war.
Other Questions
For a tidal range at a particular place with 2 tides daily of 10 m, and the surface tidal energy harnessing plant of 9 km, if the specific gravity of water is 1025.18 kg/m, determine the total energy potential per day of the plant. [8] If investment decreases by $8 billion and the economy's MPC is 0.6, the aggregate demand curve will shift Multiple Choice leftward by $20 billion at each price level. rightward by $8 billion at each price level. rightward by $20 billion at each price level. leftward by $4 billion at each price level. 1. Explain about the analog to digital conversion. 2. What is the function of PWM in D/A conversion? 3. What are the Applications of Digital to Analog Converters? which group mostly immigrated to new york city a puerto ricans b mexicans c chinese d native americans The _____ includes all the sensations and experiences of which we are aware at any given moment.a. consciousb. preconsciousc. post consciousd. unconscious What advice or modifications to his treatment regimen would you recommend for your new patient? (Discuss a minimum of two). Please support your answer with research-based evidence. artificial intelligenceSolve tic-tac toe using Backtracking search tor CSP Cyber Security 13 10 19 Down Across 2. a network security system, either hardware- or software-based, thatt, any malicious computer program which is used to hack into a 4. a standalone malware computer program that replicates itself in controls incoming and outgoing network traffic based on a set of rules. computer by misleading users of its true intent order to spread to other computers. 3. are small files that Web sites put on your computer hard disk drive when you first visit 7. any software program in which advertising banners are displayed 5. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their masterwhile the program is running (the cybercriminals) who are often safely located somewhere far 8. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. across the Internet. 6. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their 9. global system of interconnected computer networks that use the hard drive. Internet protocol suite 10. a method, offen secret, of bypassing normal authentication in a 12. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information product 11. a local or restricted communications network, especially a private network created using World Wide Web software. 13. designed to detect and destroy computer viruses. 15. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. 16, an attempt by hackers to damage or destroy a computer network or system. 14. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. 18. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data 17. someone who seeks and exploits weaknesses in a computer system or computer network 19, the activity of defrauding an online account holder of financial information by posing as a legitimate company. 20. body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access 13 what organelle packages and directs proteins to their proper destination? drag the terms on the left to the appropriate blanks on the right to complete the sentences. the. is the adverse effects an organism experiences when exposed to a toxic substance. Find the critical numbers of the function.f(x)=3x4+8x348x2 At a certain temperature, the vapor pressure of pure benzene () is 0.930 atm. A solution was prepared by dissolving 14.0 g of a non-dissociating, non-volatile solute in 78.17 g of benzene at that temperature. The vapor pressure of the solution was found to be 0.899 atm. Assuming the solution behaves ideally, determine the molar mass of the solute. Suppose that x=x(t) and y=y(t) are both functions of t. If y^2+xy3x=3, and dy/dt=2 when x=2 and y=3, what is dx/dt? im on the test i need help ASAP Find a particular solution to the differential equation2y + 1y + 1y = 2t^2+2t5e^2t In trapezoid ABCD below, angles B and C are right angles.(a) Circle the two sides from the four choices below that are parallel.ABBCCDDAb) Find the area of the right trapezoid by breaking itinto a rectangle and right triangle and summingtheir areas.Rectangle:Sum of areas:Right Triangle:D24 cmA6 cm B16 cmC An exchange of proposals or counter proposals as a means of reaching a satisfactory settlement to a conflict is referred to as. transportation and warehousing are both a kind of logistics activitiestruefalse In at least 150 words, identify the claim, or central idea, in The Unseen Values, and provide two examples of evidence the author uses to support his claim.if you copy and paste you will get reported pls hurry Python program that converts a mathematical expression into a binary tree after the users enters it as an input. The program has to print why an expression is not valid. For example: (4*3*2) Not a valid expression, wrong number of operands. (4*(2)) Not a valid expression, wrong number of operands. (4*(3+2)*(2+1)) Not a valid expression, wrong number of operands. (2*4)*(3+2) Not a valid expression, brackets mismatched. ((2+3)*(4*5) Not a valid expression, brackets mismatched. (2+5)*(4/(2+2))) Not a valid expression, bracket mismatched. (((2+3)*(4*5))+(1(2+3))) Not a valid expression, operator missing.