This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer 1

Answer:

data

Explanation:

Answer 2

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.


Related Questions

How do I find questions to answer?

Answers

Answer:

you go to the left side

Explanation:

yea

How do you win a game of amoung us

Answers

Answer: As the Crewmates move around the map in Among Us to complete tasks, Impostors try to sabotage and kill them off anonymously. If the latter successfully kills off all the Crewmates without being noticed, then he/she wins the game.

Explanation: Have a blessed day!

Answer: Just go around vent, in secret and press emergency meeting ONE TIME. then say someone vented,  and say they vented but really it was you

Explanation:

:)

What is the best way to describe eNotes?

A.it is a tool students can use to take notes during an online lesson

B.it provides access to an extensive back up system on the nternet

C.It allows students to clip a portion from a webpage for later use.

D.It is a tool for storing images and recordings in one location.​

Answers

Answer:

A.it is a tool students can use to take notes during an online lesson

Explanation:

ENotes is a tool used to take notes, particularly targeted towards online learners. Note-taking generally help students to possess a far better understanding of what they learn. It also helps the scholars to enhance their writing skills. There are many sophisticated and straightforward note-taking tools available on the market.

Answer:

(A) It is a tool students can use to take notes during an online lesson.

Explanation:

Jenny is preparing a presentation on the health statistics of the 10 most populated countries. She wants to apply a blinking effect to the names
of the countries, and a motion effect between the exit and entry of every slide. Which options should she use?
Jenny should use the v option to apply a special blinking effect to the names of the countries and the
option to
apply a motion effect between the exit and entry of every slide

Answers

Answer:

Jenny opens presentation software and insert data in slides

then, click on country names one by one and apply animations as you want, to apply animation on text. animation are occur in animation tab. Different type of animations are found in animation section such as blinking, fade , Wipe, Fly in etc.

After applying animations on country names

Secondly, You apply motion effect on exit and entry  of every slide.

Select slide on which you want to apply motion effect then click on Transitions tab and apply that motion effect as you want. the effect will apply on this slide.

If you want to apply same motion effect on all slide then you will first select all slide and then apply desire motion effect.  

The motion effect will apply on exit and entry of every slide.

Explanation:

Answer:

Jenny should use the Animation option to apply a special blinking effect to the names of the countries and the Transition option to apply a motion effect between the exit and entry of every slide.

Which of the following projects is most likely be used in STEM education to learn technology concepts?


test different sandbag materials that can help prevent flooding

analyze cleaning products to determine which ones are eco-friendly

investigate search engine criteria to improve search results

conduct a scavenger hunt to see who can find the most geometric shapes

Answers

Answer:

C.)

investigate search engine criteria to improve search results

Explanation:

I go to a STEM school, though the others are good options and are stuff we may do, they wouldn't help to teach technology concepts.

what is a compter software​

Answers

Answer:

Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be really used on its own.

Hope this helps!!

one paragraph essay about early computing device​

Answers

Alternatively, most modern computational devices are “digital”. One of the earliest implementations of a digital system is attributed to Joseph-Marie Jacquard of France in 1801, the Jacquard Loom. He used a punched card to control the weaving actions of a loom, which introduced much more intricate patterns in woven cloth. Jacquard’s approach was a variation on the original punched-card design of Jacques de Vaucanson in 1745. de Vaucanson was a toy maker (most famous for his mechanical duck), and his idea of automating the weaving process was not well accepted by weavers (a situation not unlike that of the modern day computer ink and paint process in traditional animation.)

The punched-card idea was adopted later by Charles Babbage in about 1830 to control his Analytical Engine, and later by Herman Hollerith for tabulating the 1890 census. The Babbage Analytical engine (which was never completed by him) was designed to use Jacquard’s punched cards to control an automatic calculator, which could make decisions based on the results of previous computations. It was intended to employ several features later used in modern computers, including sequential control, branching, and looping.

An assistant to Babbage was Augusta Ada Lovelace (or Lady Lovelace), the daughter of the English poet Lord Byron, and a mathematician, who created a “program” for the Analytical Engine to compute a mathematical sequence known as Bernoulli numbers. Based on this work, Ada is now credited as being the first computer programmer and, in 1979, a modern programming language was named ADA in her honor.

In 1878, Oberlin Smith devised a crude magnetic recording device made of a silk thread covered with steel dust. In theory, when exposed to a magnetic field, the steel dust particles would align with the magnet, creating a digital pattern. Smith applied for a patent, but never followed through with the application. He concluded that he wouldn’t be able to establish a useful pattern on the strings, published his results in 1888, but dropped his investigations.

Further contributions to magnetic recording were few, until Fritz Pfleumer developed the magnetic tape, which was a strip of paper covered with magnetic dust (the first paper tape used was covered with high grade ferric oxide barn paint (rust red), and a cloud of red dust sprayed the air as the tape was used). The German General Electric company bought the patents from Pfluemer and marketed the first true tape recorder, the Magnetophon (meaning “tape recorder” in French) in 1936.

The U.S. Census Bureau was concerned about the difficulty of tabulating the 1890 census. One of its statisticians, Herman Hollerith, envisioned a machine that could automate the process, based on an idea similar to that used in the Jacquard Loom. Hollerith designed punches for his system, which he called the Hollerith Electric Tabulating System. A pin would go through a hole in the census card to make an electrical connection with mercury placed beneath. The resulting electrical current activated a mechanical counter and the information would be tabulated. The tabulating system was featured in an 1890 issue of  Scientific American magazine.

1890 Scientific American cover

The 80 column punch card introduced by Hollerith in 1928 became the standard input medium for computers until the late 1970s when interactive systems became usable. It was sized at 7 3/8 inches wide by 3 1/4 inches high by .007 inches thick. Prior to 1929, this was a standard size for many U.S. banknotes, and Hollerith apparently chose it so that he could store cards in boxes made for the Treasury Department.

“IBM” Card

What became known as the “IBM card” was the source of a popular phrase which became the topic for a great article by Steven Lubar of the Smithsonian in 1992, titled “Do not fold, spindle or mutilate: A cultural history of the punch card.”[2]

Hollerith obtained over 30 patents for his research, but he was not a marketer. He felt he had a choke hold on the census tabulating machine, and he charged the Census Bureau more than it would have cost to do it by hand. As a result, they developed, and in fact patented their own version of the machine. Hollerith almost closed the doors on his company, but he was able to attract a brilliant business mind, Thomas J. Watson, to run it, and his company survived; it would later become International Business Machines (IBM).

If you found this helpful, please mark me brainliest and rate it and thank me thru that button!

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

uppose that a datagram of 2,700 bytes (20 bytes of IP header plus 2,680 bytes of IP payload) arrives at a router and must be forwarded to a link with an MTU of 900 bytes. Also suppose that the original datagram is stamped with an identification number of 15. How many IP fragments will be created by the router to forward this packet

Answers

Answer:

Four (4) IP fragments will be created by the router to forward this packet.

Explanation:

Datagram = 2700 bytes

IP Header = 20 bytes

Maximum Transmission Unit = 900 bytes

Original datagram is stamped with an identification number of 15

Required number of fragments = [tex]\frac{Datagram - IP header}{MTU - IP header}[/tex]

⇒  [tex]\frac{2700 - 20}{900 - 20}[/tex]

⇒  2680 / 880 = 3.045

ceiling(3.045) = 4

HELP QUICKLY

What is the result for the following line of code? >>>print("one+day")

O one day
O one + day
O one day
O oneday

Answers

Answer:

The answer is 4. oneday

Explanation:

Just did it and got it right.

The result for the given line of code "print("one+day")" is oneday. Thus, the correct option for this question is D.

What is meant by Coding?

In computer and technology, Coding may be defined as a type of process that remarkably assigns a code to some instruction for classification or recognization. Coding anyhow makes it feasible for us to construct computer software, games, apps, and websites.

Coding is a list of sequential or step-by-step process that delivers instructions and gets computers to do what you want them to do. The given line of code involves one + day without spacing, so the output for this line of code is oneday.

This set of instructions delivers the commands to the processing units in order to reveal a valid and accurate output.

Therefore, the correct option for this question is D.

To learn more about Line of code, refer to the link:

https://brainly.com/question/20212221

#SPJ5

Data becomes _______________ when it is presented in a context so that it can answer a question or support decision making.

Answers

Answer:

Information

Explanation:

Data becomes information when it is presented in a context so that it can answer a question or support decision making.

Data comes in raw forms which is as a result of studying a particular behavior or pattern over time.

By processing data, we are trying to get appropriate meaning from the raw forms that we have.

When we arrive at a conclusion based on these raw data, then we primarily have deduced information from the data

It is thus information that helps answer a question or appropriately support making of decisions

Xbox or Playstation? I wanna know why with a valid reason {:^)

Answers

There both good but playstation because on xbox you have to have a gamepass to play most games on there for ps4 you dont and the controllers don’t need batteries

There are three main categories of objects to be protected by access controls: information, technology, and _____________.

a. applications
b. processes
c. physical location
d. networks

Answers

Answer:

c. physical location

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device in order to grant or deny them access to a computer resource.

Access control work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials through a process known as authentication and granting the user access if the credentials provided are authentic (valid) through a process known as authorization, else, they would be denied access.

An example of an access control is a password because it is typically a basic and fundamental front-line defense mechanism against an unauthorized use of data or cyber attacks from hackers.

There are three main categories of objects to be protected by access controls: information, technology, and physical location. Information refers to all data sets, technology refers to the software applications, network and computer systems while physical location refers to infrastructures such as building, data centers, campuses, offices etc.

Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.

Answers

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:

This worked for me.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

  print("You are old enough to drive. \n")

else:

  print("Still taking the bus, I see. \n")

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

  print("That is good to hear.")

elif(feel == "Sad"):

  print("I'm sorry to hear that. ")

else:

  print("Oh my!")

print("Tell me more. \n")

See more about python at brainly.com/question/26104476

is domain name system encrypted?

Answers

Answer:

they are all the same

Explanation:

all the packets look the same tis is because of HTTPS and HTTP/2, and how they both use connection

A ________ helps create objects using a step-by-step process. Group of answer choices template shortcut file extension wizard

Answers

Answer:

Wizard.

Explanation:

This is explained to be a sort of design that's seen to require place in forms or steps in designing it. Here, steps just like the layout fixing, program for an improved performance and plenty of other factors that are employed in portraying a top quality design are been put to put extensively.

Internet designing of web makes use of assorted programs and tools so as to attain the intended look, like Photoshop and lots of others. so as to form a winning design, Web designers must consider their audience, the aim of the web site and therefore the visual appeal of the planning.

Paghambingin ang malawak na perspektibo sa

ang

limitadong perspektibo sa pamamagitan tatlong

eng lakas halimbawa.


Malawak


1

2

3


Perspektibo


1

2

3

Answers

Answer:

2

Explanation:

Paghambing limitadong perspektibo sa pamamag

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!

What does the Address Resolution Protocol do?


transports packets, but does not include data reassembly

reports that a sender cannot be found

sends files across a network

finds the address of the next routing device along the network pathway

Answers

Answer: transports packets, but does not include data reassembly

Explanation: Hope it helps you!

Answer:

finds the address of the next routing device along the network pathway

Explanation:

srry its late

During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter:

Answers

Answer:

The answer is "Patch and restarts the unknown service".

Explanation:

Please find the complete question in the attached file.

SNMP would be a means to share information with different devices on the network. It allows systems to interact, and although machines are physically executing code.

SNMP Trapping was warning notifications that are sent to a central repository, the "SNMP manager" from either a remote SNMP enabled device. The trigger could warn them that a controlled device overheats.

Its key form of contact between both the SNMP control devices-SNMP Agent and SNMP Director-is trap communications. If you will note, SNMP is a possible protocol to also be shared with supervisors and agents.

Each element in a dictionary has two parts: a key and a value. You use a key to locate a specific value.
a) True
b) False

Answers

Answer: TRUE

Explanation:

Elements in a dictionary are usually composed of two parts ; the key which could be viewed as the file name used to store the value. In general a dictionary written in the pattern; {key : value}. A certain value can be located, modified, deleted and added to a dictionary by using the dictionary key attached to each value in the dictionary object created. Each dictionary key should be unique and will be a string of letters which holds a particular value.

how can I write 3*3*3=27 in C langueg

Answers

Answer:

x³ - 27 = 0

-Astolfo

5. It is possible to prevent someone
from copying the cell from yoursheet?
How?​

Answers

can you elaborate more?

Answer:

click REVIEW tab and then "protect workbook"

Explanation:try it

According to Get2 College, which of the following can you receive text messages about as a high school senior?

Answers

Answer:

A scholarship

Explanation:

List the name and purpose of twenty (20) different C++ commands.

Answers

Answer:

Drivers and help a new program to run

How to make distortion effects on sony vegas or premiere pro

Answers

i use i movie what do u use

Rafael needs to add a title row to a table that he has inserted in Word. What should he do?

Answers

Answer: C

Explanation:

Edge2020

Answer:

c

Explanation:

how many years of prior experience in tech support do most MSP positions require?

Answers

Answer:

1

Explanation:

you need at least one year, (google says so)

For MSP positions, experience in tech support must have at least one year of prior experience.

What is tech support?

It is a service provided by a hardware or software company which provides registered users with help and advice about their products.

To work as a technical support, one must be experienced enough to understand the software and hardware complete terms.

Thus, most MSP positions require one year of prior experience.

Learn more about tech support.

https://brainly.com/question/6955119

#SPJ2

Can hackers actually hack into a built in camera on a laptop?

Answers

Answer:

Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study or virtual socialising. Unfortunately, this privilege can leave us vulnerable to an online attack known as camfecting. This is when hackers take control of your webcam remotely.

Answer:

yes

Explanation:

guys can u guys help me write the program plz

Answers

public class MyProgram{

   public static void main(String [] args){

       System.out.println("*****");

       System.out.println(" ****");

       System.out.println("  ***");

       System.out.println("   **");

       System.out.println("    *");

   }

}

That's all there is to it. I hope this helps!

. Write a program, Array Range, that asks the user to input integers and that displays the difference between the largest and the smallest. You should ask the user the number of integers s/he would like to enter (this will allow you to set the length of the array). Allow the user to input all the numbers and then store them in the array. Search the array for the largest number, then search for the smallest, and finally compute the calculation. Display all the numbers given by the user, the max number, the min number, and the difference

Answers

Answer:

Written in C++

#include<iostream>

using namespace std;

int main() {

int n;

cout<<"Number of array elements: ";

cin>>n;

int myarr[n];

cout<<"Enter array elements: ";

for(int i=0;i<n;i++) {

 cin>>myarr[i];

}

int small = myarr[0];

int larg = myarr[0];

for(int i=0;i<n;i++) {

 if(small > myarr[i]) {

  small = myarr[i];

 }

 if(larg<myarr[i]) {

  larg = myarr[i];

 }

}

cout<<"Array Elements are: ";

for(int i =0; i<n;i++) {

 cout<<myarr[i]<<" ";

}

cout<<endl;

int range = larg - small;

cout<<"Largest: "<<larg<<endl;

cout<<"Smallest: "<<small<<endl;

cout<<"Range: "<<range<<endl;  

return 0;

}

Explanation:

I've added the source file as an attachment where I used comments as explanation

Other Questions
What does x equal in the following examples?4x+6. And. 2x+4 4/7 1/8 write the answer in lowest terms: Lee el anuncio que fue traducido al espaol por un negocio local. Escoge la palabra en ingls que es un cognado por una palabra de la lectura. Ten cuidado porque tambin hay cognados falsos que se usaron incorrectamente. Read this classified ad that was translated in Spanish by a local business. Choose the English word that is a cognate for a word in the reading. Be careful because there are also some false cognates that were used incorrectly. Clases de msica Se ofrecen clases de msica e instrumentos musicales. Clases de piano, guitarra, violn, trompeta, saxfono y flauta. El profesor es msico profesional. Tambin es artista de radio y televisin. Las clases son veinte dlares y se ofrecen en los meses de junio y julio. Ven con tu mejor ropa y sers un artista con xito en la carpeta roja! (1 point) carpet artist exit rope GIVING 100 POINTS!!!Read chpater 7 of Animal Farm. What is the author's purpose in this section? How does the author's use of literary devices support his purpose? Be sure to consider the historical context as you respond(must be 6-8 sentences) (100 points and brainliest for the answerASAP)Rewrite this scene from Daisys or Gatsbys point of view. Your rewritten scene must include the characters inner thoughts, description of other characters/the setting, and dialogue between characters. PLEASE NOTE:You may use the dialogue from the original text, but nothing else. Dont let dialogue dominate your entire rewritten scene. Also, you may rewrite the dialogue, as long as it stays true to the scene and characters. (Example: Many movie versions of books change the dialogue but not in a way that changes the representation of the character or scene, ideally.)When you are finished, answer the following questions:1.How did the change in narration affect the story?2.Which narratorNick or Daisy/Gatsbydo you think is more effective in this scene? Explain. She turned her head as there was a light dignified knocking at the front door. I went out and opened it. Gatsby, pale as death, with his hands plunged like weights in his coat pockets, was standing in a puddle of water glaring tragically into my eyes. With his hands still in his coat pockets he stalked by me into the hall, turned sharply as if he were on a wire, and disappeared into the living-room. It wasnt a bit funny. Aware of the loud beating of my own heart I pulled the door to against the increasing rain.For half a minute there wasnt sound. Then from the living-room I heard a sort of choking murmur and part of a laugh, followed by Daisys voice on a clear artificial note:I certainly am awfully glad to see you again.A pause; it endured horribly. I had nothing to do in the hall, so I went into the room.Gatsby, his hands still in his pockets, was reclining against the mantelpiece in a strained counterfeit of perfect ease, even of boredom. His head leaned back so far that it rested against theface of a defunct mantelpiece clock, and from this position his distraught eyes stared down at Daisy, who was sitting, frightened but graceful, on the edge of a stiff chair.Weve met before, muttered Gatsby. His eyes glanced momentarily at me, and hislips parted with an abortive attempt at a laugh. Luckily the clock took this moment to tilt dangerously at the pressure of his head, whereupon he turned and caught it with trembling fingers and set it back in place. Then he sat down, rigidly, his elbow onthe arm of the sofa and his chin in his hand.Im sorry about the clock, he said.My own face had now assumed a deep tropical burn. I couldnt muster up a single commonplace out of the thousand in my head.Its an old clock, I told them idiotically. I think we all believed for a moment that it had smashed in pieces on the floor.We havent met for many years, said Daisy, her voice as matter-of-fact as it could ever be.Five years next November.The automatic quality of Gatsbys answer set us all back at least another minute. I had them both on their feet with the desperate suggestion that they help me make tea in the kitchen when the demoniac Finn brought it in on a tray.Amid the welcome confusion of cups and cakes a certain physical decency established itself. Gatsby got himself into a shadow and, while Daisy and I talked, looked conscientiously from one to the other of us with tense, unhappy eyes. However, as calmness wasnt an end in itself, I made an excuse at the first possible moment,and got to my feet.Where are you going? demanded Gatsby in immediate alarm.Ill be back.Ive got to speak to you before you go.He followed me wildly into the kitchen, closed the door, and whispered: Oh, God! in a miserable way. Whats the matter?This is a terrible mistake, he said, shaking his head from side to side, a terrible, terrible mistake.Youre just embarrassed, thats all, and luckily I added: Daisys embarrassed too.Shes embarrassed? he repeated incredulously. Just as much as you are" It was time I went back. While the rain continued it had seemed like the murmur of their voices, rising and swelling a little now and then with gusts of emotion. But in the new silence I felt that silence had fallen within the house too.I went inafter making every possible noise in the kitchen, short of pushing over the stovebut I dont believe they heard a sound. They were sitting at either end of the couch, looking at each other as if some question had been asked, or was in the air, and every vestige of embarrassment was gone. Daisys face was smeared with tears, and when I came in she jumped up and began wiping at it with her handkerchief before a mirror. But there was a changein Gatsby that was simply confounding. He literally glowed; without a word or a gesture of exultation a new well-being radiated from him and filled the little room.Oh, hello old sport, he said, as if he hadnt seen me for years. I thought for a momenthe was going to shake hands.Its stopped raining. two popular ideologies contributed to imperialism: a sense of nationalism and.. Write an equation in slope-intercept from for the line that passes through the given points and is perpendicular to the given point (2,4), x-6y=2 Answer this Multiple Choice:How does kinetic energy transfer whenyou pour cold milk into hot coffee?Energy transfers from the milk. What is your reasoning?Energy transfers to the milk.Energy transfers to the coffee.None of the aboveStudents, draw anywhere on this slide! Optimum germination conditions differ between species. Sometimes this depends on the evolutionary history of the plant species. One species has higher germination rates when the seeds are exposed to soil with ash present. This is an example of _______________. Which statement explains why Thomas Cary refused to recognize Edward Hyde as governor? Hyde established a new political party that banned organized religion. Hyde enacted policies that were hostile to the Church of England. Hyde ordered the Church party to attack the Quakers. Hyde opposed policies that favored Quaker interests. Read this excerpt from The Call of the Wild. How does this moment change Buck? Night came on, and a full moon rose high over the trees into the sky, lighting the land till it lay bathed in ghostly day. And with the coming of the night, brooding and mourning by the pool, Buck became alive to a stirring of the new life in the forest other than that which the Yeehats had made. He stood up, listening and scenting. From far away drifted a faint, sharp yelp, followed by a chorus of similar sharp yelps. As the moments passed the yelps grew closer and louder. Again Buck knew them as things heard in that other world which persisted in his memory. He walked to the centre of the open space and listened. It was the call, the many-noted call, sounding more luringly and compellingly than ever before. And as never before, he was ready to obey. John Thornton was dead. The last tie was broken. Man and the claims of man no longer bound him.O It gives him a sense of newfound obedience. O It gives him the desire to start his own family. O It gives him the idea to sleep through the night in the forest. O It gives him a sense of newfound freedom. What are Maggie's challenges with her weight? What things has she struggled most with and what efforts has she tried? Why do you think she's been unsuccessful so far? A man is making a metallic gate for their new house. What will the man do in order for his gate to prevent rusting? Find the measure of B The steps I look find the measure of B are:First,added___________.Then,I_______________ What was Rome idea in regards to their citizens participation ingovernment? *1 pcA The citizens do not select the members of this group or vote on the country's lawsB The citizens only vote for country's lawsC The citizens were not invokedD The citizens were active participants in the creation of laws and electing politicians. What is the value of the expression (81 1/4)^4? You have recently signed up for a new job and noticed this policy for retirement savings. Invest $200 and the employer does 70% matching for 35 years at an interest rate of 4.8%. Why doesn't the White Knight continue on with Alice?"I don't know," Alice said doubtfully. "I don't want to be anybody's prisoner. I want to be a Queen." "So you will, when you've crossed the next brook," said the White Knight. "I'll see you safe to the end of the wood - and then I must go back, you know. That's the end of my move-Through the Looking-Glass, Lewis Carroll O He cannot go with her. O He chooses not to go. O He cannot cross the brook.OAlice does not want him to. everyone of the shirts (has/have) a green collar Select the correct answer.For what values of n is the perimeter of square A less than the perimeter of rectangle B?A. B. C. D.