If you wanted to evaluate a broken knee, you could use all of the following EXCEPT _____.

Answers

Answer 1

Answer:

what are the options? Would love to help.

Explanation:

Answer 2

Answer:

The correct answer is ultrasound


Related Questions

According to embryology, why do fish and birds have a common ancestor? PLZZ HURRY!!!!

Answers

Answer:

They both have embryos with gill slits and tails. They both have embryos that develop into adults. They both have embryos that form from a fertilized egg.

Explanation:

I hope this helps !

Answer:

According to embryology, why do fish and birds have a common ancestor? They both have embryos with gill slits and tails. ... They both have embryos that develop into adults. They both have embryos that form from a fertilized egg

Explanation:

Typefaces in this category share the common feature of small extensions, known as __________, which appear on the end of some of their strokes.
Group of answer choices
displays

serifs

sans serifs

scripts

Answers

Answer:Sans Serifs

Explanation:

Answer: Sans Serifs

Michael is discussing various project needs with his team. Match Michael's statement with the way project management can help the project. "We need to maintain a performance standard for the processes in the project." "There can be certain threats or problems during project execution. We need to handle them." "The client needs some additional requirements in the project. We need to accommodate them." "The project activities are getting chaotic. We need to manage them efficiently." managing risks arrowRight managing quality arrowRight organizing activities arrowRight managing change arrowRight

Answers

Answer:

"We need to maintain a performance standard for the processes in the project." - managing quality

"There can be certain threats or problems during project execution. We need to handle them." - managing risks

"The client needs some additional requirements in the project. We need to accommodate them." - managing change

"The project activities are getting chaotic. We need to manage them efficiently." - organizing activities

Explanation:

Project management can help Michael manage all these needs that he and his team have. Project management is the application of skills and tools to a particular project. This requires certain knowledge and techniques in order to ensure that the project requirements are properly met. Project management does not generally deal with a whole company at once. Instead, a project is a temporary situation, and it needs to be completed within a specific timeframe. It also means that such a project has a defined scope and resources, which make efficient management even more important.

Final answer:

Michael's discussion about project needs can be matched with project management activities such as managing quality for performance standards, managing risks for potential problems, managing change for additional requirements, and organizing activities to manage chaos.

Explanation:

Michael's statement about maintaining a performance standard for processes relates to managing quality in project management. This will ensure the project's outputs meet the necessary quality standards. When he mentions the need to handle threats or problems during project execution, he refers to managing risks, where potential project setbacks are anticipated, and plans are put in place to address them. Accommodating additional client requirements is part of managing change, which involves adapting the project scope and executing necessary adjustments efficiently. Lastly, his concern about project activities getting chaotic points to the need for organizing activities, which includes effectively structuring tasks and utilizing the right tools and techniques to keep the project on track.

Which of the following best describes application software? coordinates hardware components provides system utilities like the clipboard performs useful tasks like word processing for the user enables the operating system to work with attached hardware devices maintains a system’s disk drives

Answers

Answer:

C

Explanation:

Application software is software that is designed for making use or performing tasks of the application. Such as MS word, excel, and PPT.

This application software is made for the end-users and has various versions that is updated from time to time. They are used to monitor, check and perform specific tasks.

Hence the option C is correct, performs useful tasks.

Learn more about the best describes application software.

brainly.com/question/2786788.

The following can be used for cyberbullying:

All of these answers

Online Chats

Text Messages

Social Media Sites

Answers

Answer:

All of the above

Kara's teacher asked her to create a chart with horizontal bars. Which chart or graph should she use?
(A) Bar Graph
(B) Column Chart
(C) Line Graph
(D) Pie Chart

Answers

Answer:b

Explanation:

Answer:

lol i thinks it a bar graph i dunno.

Explanation:

Hi I need help, This assignment is for Assignment 6 Question 4 in edhesive for computer science. here is the prompt:

Assignment 6: Question 4


Instructions

Assignment 6: Code Snippet

Use the code snippet provided below as the basis for your work on each question in Assignment 6. Note that you may need more than two for loops for shapes in some of the questions.

for i in range(3):
for j in range(3-i):
print("*", end=" ")
print("")

Question 4 Instructions

Use the code snippet above to write a program that uses looping to output the following shape:

FOURTH

* * * * * * * * * *
* * * * * * * * *
* * * * * * * *
* * * * * * *
* * * * * *
* * * * *
* * * *
* * *
* *
*

Please help I don't understand what I m doing wrong and I cant find help anywhere(Also I am in highschool not middle school if that helps anyone)

Answers

Answer:

Following are the python code to print the given pattern:

print('FOURTH') # using print method

for i in range(10): #using loop to count numbers

   for j in range(10-i): # use loop to print asterisk value in reverse order

       print("*", end=" ") #print value

   print("") #using print method for space

Output:

Please find the attachment.

Explanation:

The description of the above python program can be described as follows:

In the first line, use the print method, that print message "FOURTH". In the next line, two for loop is used in which the first loop counts the number to be print value, inside the loop another for loop is used. In this loop, it prints asterisk values in its reverse order and for new lines, it will use the print method with a single white space.

After pasting the information on the left side of the comparison slide, Jamal notices the text box extends beyond the bottom of the slide. How can he fix this issue? Check all that apply.


He can increase the size of the slide.


He can change the orientation of the slide.


He can add words to the text in the text box.


He can decrease the size of the font of the text.


He can expand the text box with corner sizing handles.

Answers

Answer:he can increase the size of the slide, he can change the orientation of the slide, he can decrease the size of the font of the text.

Explanation:

Answer:

A. He can increase the size of the slide.

B. He can change the orientation of the slide.

D. He can decrease the size of the font of the text.

Explanation:

hope this helps :)

What keyboard shortcut is used to move the cursor to the beginning or end of a document.

Answers

Ctrl+Home moves the cursor to the beginning of the document, and Ctrl+End moves the cursor to the end of a document. These shortcuts work with most documents, as well as web pages.

write 5 things that can be done to avoid computer vision syndrome

Answers

Get a comprehensive eye exam.
Use proper lighting.
Minimize glare.
Upgrade your display.
Adjust your computer display settings
Blink more often.
Exercise your eyes.
Take frequent breaks.

Answer:

Use Proper Lighting. Improper lighting is one of the main causes of eye strain. ...

Follow the 20-20-20 Rule. Exercising your eyes is a great way to avoid straining them. ...

Use the Right Equipment. ...

Adjust Your Settings. ...

Take Frequent Breaks

source:www.edgeit com

Drag each tile to the correct box.
Steve wants to insert a video into his presentation. Put the steps in the order that Steve should perform them.
Select the video to insert.
Select the Movie option under Illustrations.
Resize the video player.
Select the Insert tab.

Answers

i think select the video insert select the movie option under illustrations resize the video player then select the insert tab i’m not 100 percent sure tho
Select the insert tab
Select the movie option under illustrations
Select the video to insert
Resize the video player

Which statement is true about the elements of the interface of a presentation program? A. The status bar appears at the top of the page and displays options to style your slides. B. The tool bar displays the thumbnails of your presentation slides in the order they will appear in the presentation. C. Rulers indicate the margins, tabs, and indents in a presentation slide. D. The document area provides a list of commands to create, format, and edit presentations.

Answers

Answer:

The answer is C

Explanation: Why because I got it right trust me.

Leah is now in the Backstage view. Which option should she use to access a blank presentation? Info New Open Options

Answers

Answer:

She Should use New

Leah is now in the Backstage view. The option that should be used by Leah to access a blank presentation is New.

What do you mean by Presentation?

A presentation refers to the information provided by a speaker to an audience.

As Leah is now in the backstage view, the option that she should use to access a blank presentation is New.

Therefore, B is the correct option.

Learn more about Presentation here:

https://brainly.com/question/649397

#SPJ2

After a CPU decodes an instruction, what is the next step in the execution cycle?
A The CPU performs data validation on the operands of the instruction.
B. The CPU loads the next instruction in the instruction cycle.
C. The CPU writes the results to memory.
D. The CPU fetches variables stored in memory or CPU registers.
E. The CPU executes the instruction by performing ALU operations.
(HELP ASAP!!)

Answers

Answer: E) The CPU executes the instruction by performing ALU operations.

Explanation: The execution cycle is of three stages namely; fetch, decode and execute. These are the functions that the CPU carries out from the time of boot-up up until it's shut down.

At the fetch stage, the computer retrieves program instructions from its memory register, at the decode stage; the decoders interprets the instructions from the instructions register and then the next stage will be the executions, at this stage; the interpreted instructions are then passed to relevant function units of the CPU to carry out the required instructions.

E.g mathematical and logic functions are passed on the ARITHMETIC AND LOGIC UNIT(ALU) to perform.

Answer:

The

The CPU executes the instruction by performing ALU operations.

The ____
can be used to paste text in any order.
File tab
clipboard
Paste Special command
Cut command

Answers

The paste special command I believe is the answer
I’m pretty sure it’s Paste Special command :)

Which of the following skills are required to be an effective project manager? (choose all that
apply)
communication
teamwork
friendship
time management
bossy-leadership style
budgeting

Answers

Answer:

communication , teamwork,time management,budgeting are the correct answer to the given question .

Explanation:

Following are the characteristics of effective project manager

The communication skills of project manager should be effective in nature .The project manager should have central leadership expertise.The Project managers should have decision-making skills because the good decision makes the company in profit .In a good project manager, his team members can express their goal really well.The project manager tends to keep his peace of mind the whole time and is continuously focused so not to stop losing himself and potentially impact his team culture..The project manager also take care of time and submit the project in time .The effective project manager also keep mind of budget before starting the project .All the other options are not related to skills of effective project manager that's why they are incorrect option .

Robin maintains a web page for updating the metro timings in the city. He would like the website to display the present day's schedule. To do this, Robin writes a code that includes an object to retrieve the day of the week and then loads the appropriate data into the page.

Robin includes an expression to the code,

var thisDay = new Date("May 23, 2018 14:35:05");

​Identify the value for the month that will be displayed on the web page by usingthisDay.getMonth()method.

a. ​35

b. ​4

c. ​14

d. ​3

Answers

The answer : B 4 is the value of the month that will be displayed on the web page

The value for the month is 4 which will be displayed on the web page using this Day.getMonth() method. which is the correct answer would be option (B).

What is the getDate() Method?

The Date object is a built-in data type for working with dates and timings. The new Date () constructor generates the Date object, which includes a variety of built-in methods for handling and displaying data. By default, a new Date instance returns an object containing the current Date and Time (as defined by the computer's system settings). We use the date object's getDate() function to retrieve the day alone.

As per the question, includes an expression to the code,

var thisDay = new Date("May 23, 2018 14:35:05");

Thus, the value for the month is 4 which will be displayed on the web page using this Day.getMonth() method.

Hence, the correct answer would be option (B).

To learn more about the getMonth() method click here:

https://brainly.com/question/15057469

#SPJ5

Two sides of a triangle measure 8 cm and 15 cm.Which could be the length of the third side?​

Answers

Answer:

There might be plenty of answers, one of them is: if two sides of a right triangle measure 8 cm and 15 cm, then hypotenuse = sqrt (8^2 + 15^2) = 17

Hope this helps!

:)

It is given that the two sides of a triangle measure 8 cm and 15 cm. It means 3rd side must be less than 23. Case 2: Let 15 cm is the largest side. It means 3rd side must be greater than 7.


You just realized the turn signal on your vehicle is broken,
and you need to signal that you're turning left. What is
the correct way to do it?
A Hold your left arm out of the window at a 90 degree angle, with your
hand pointing upward to the sky,
B. Hold your left arm out of the window at a 90 degree angle with the hand
pointed down
C. Hold your left arm horizontally out the window.
D. Hold your left arm out the window pointing vertically straight up to the
sky.

Answers

Answer:

c

Explanation:

The correct way to indicate the left turn in case of broken turn signal is taking the left arm out of the window. Thus, option C is correct.

What is a turn signal in a vehicle?

A turn signal in a vehicle can be given as the indicator that helps in the analysis of the turn to be made by the turn to the other drivers behind, thereby to avoid accidents with overcrossing.

In case the turn signal of the vehicle is broken than the correct way to indicate is holding the left arm out of the window. Thus, option C is correct.

Learn more about turn signal, here:
https://brainly.com/question/4511065

#SPJ2

1.The most common way by which data is input into the computer is through the______________
.A.Mouse
B. Keyboard
C.Microphone
D.Joystick ​

Answers

Answer:

keyboard

Explanation:

The answer is b. Keyboard

Can teachers see if you didnt do the tutorial on edmentum?

Answers

Answer:

Yes, teachers can see if you didn't do the tutorial on edmentum.

Explanation:

The reasons behind this answer are that first of all momentum as a platform managed by a team, shows the content observed or covered by every user. Meaning that if you skipped a resource the platform is going to register that you didn't visit that resource. Also, the tutorial covers basic navigation skills that can be evaluated by the teachers and they could spot very easily who didn't do the tutorial based on their way to navigate in the platform.

What is the purpose of an IT statement

Answers

Answer::A statement of purpose (also called a letter of intent or a research statement) introduces your interests and experience to the admissions committee.

Explanation :A statement of purpose (also called a letter of intent or a research statement) introduces your interests and experience to the admissions committee. For research-focused programs, like most PhDs and many master’s degrees, your statement of purpose will focus primarily on your past research experience and plans.

When should you talk to an adult you trust. A. If you see yourself tag online and you don’t want to be. B. If someone ask you for personal information. C. If you aren’t sure if you should post something. D. All of the above

Answers

b, because the other answers are not that important as much as if someone asks for you personal info.

In my opinion is D...

One advantage of a resource like the world wide web is that it connects people with problems to people who have

Answers

Answer:

solutions / answers

Explanation:

The world wide web is a network of information system where the documents or resources are identified by Uniform Resource Locator (URL). The web resources can also be interlinked by hypertext to enable user to look up a page to another page to search for relevant information. Since 1990s, world wide web has been widely used by many users around the world to upload their contents which cover a wide range of interests. It is almost that any question that we could think of, there will be a solution or answer in the World Wide Web provided by somebody at another corner of the world.

This question involves the creation of user names for an online system. A user name is created based on a user’s first and last names. A new user name cannot be a duplicate of a user name already assigned. You will write the constructor and one method of the UserName class. A partial declaration of the UserName class is shown below.

public class UserName

{

// The list of possible user names, based on a user’s first and last names and initialized by the constructor.

private ArrayList possibleNames;



/** Constructs a UserName object as described in part (a).

* Precondition: firstName and lastName have length greater than 0

* and contain only uppercase and lowercase letters.

*/

public UserName(String firstName, String lastName)

{ /* to be implemented in part (a) */ }



/** Returns true if arr contains name, and false otherwise. */

public boolean isUsed(String name, String[] arr)

{ /* implementation not shown */ }



/** Removes strings from possibleNames that are found in usedNames as described in part (b).

*/

public void setAvailableUserNames(String[] usedNames)

{ /* to be implemented in part (b) */ }

}

(a) Write the constructor for the UserName class. The constructor initializes and fills possibleNames with possible user names based on the firstName and lastName parameters. The possible user names are obtained by concatenating lastName with different substrings of firstName. The substrings begin with the first character of firstName and the lengths of the substrings take on all values from 1 to the length of firstName.

The following example shows the contents of possibleNames after a UserName object has been instantiated.

Example

UserName person = new UserName("john", "smith");

After the code segment has been executed, the possibleNames instance variable of person will contain the following String objects in some order.

"smithj", "smithjo", "smithjoh", "smithjohn"

Write the UserName constructor below.

/** Constructs a UserName object as described in part (a).

* Precondition: firstName and lastName have length greater than 0

* and contain only uppercase and lowercase letters.

*/

public UserName(String firstName, String lastName)

Write the UserName method setAvailableUserNames. The method removes from possibleNames all names that are found in usedNames. These represent user names that have already been assigned in the online system and are therefore unavailable.

A helper method, isUsed, has been provided. The isUsed method searches for name in arr. The method returns true if an exact match is found and returns false otherwise.

Assume that the constructor works as specified, regardless of what you wrote in part (a). You must use isUsed appropriately to receive full credit.

Complete the setAvailableUserNames method below.

/** Removes strings from possibleNames that are found in usedNames as described in part (b).

*/

public void setAvailableUserNames(String[] usedNames)

Answers

Answer:

See explaination

Explanation:

import java.util.*;

class UserName{

ArrayList<String> possibleNames;

UserName(String firstName, String lastName){

if(this.isValidName(firstName) && this.isValidName(lastName)){

possibleNames = new ArrayList<String>();

for(int i=1;i<firstName.length()+1;i++){

possibleNames.add(lastName+firstName.substring(0,i));

}

}else{

System.out.println("firstName and lastName must contain letters only.");

}

}

public boolean isUsed(String name, String[] arr){

for(int i=0;i<arr.length;i++){

if(name.equals(arr[i]))

return true;

}

return false;

}

public void setAvailableUserNames(String[] usedNames){

String[] names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

for(int i=0;i<usedNames.length;i++){

if(isUsed(usedNames[i],names)){

int index = this.possibleNames.indexOf(usedNames[i]);

this.possibleNames.remove(index);

names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

}

}

}

public boolean isValidName(String str){

if(str.length()==0) return false;

for(int i=0;i<str.length();i++){

if(str.charAt(i)<'a'||str.charAt(i)>'z' && (str.charAt(i)<'A' || str.charAt(i)>'Z'))

return false;

}

return true;

}

public static void main(String[] args) {

UserName person1 = new UserName("john","smith");

System.out.println(person1.possibleNames);

String[] used = {"harta","hartm","harty"};

UserName person2 = new UserName("mary","hart");

System.out.println("possibleNames before removing: "+person2.possibleNames);

person2.setAvailableUserNames(used);

System.out.println("possibleNames after removing: "+person2.possibleNames);

}

}

When sending confidential information in an email _____.

Answers

Answer:

Emails can be sent in confidential mode to prevent unauthorized access of the information sent

Explanation:

Emails can be sent in confidential mode to prevent unauthorized access of the information sent. The email can be sent in confidential mode only allowing forward, copy, print, and disabling download. In confidential mode, password and expiration date is needed to be set.

When sending confidential information in an email  warn the recipient that the mail contains confidential information by attaching the word "CONFIDENTIAL" either in the email header or the attachment's file name so that the recipient would open the mail in  secured environment.

which type of operating system does unix belong to

Answers

OS Family

According to google

what is the difference between an embedded image and an attached image

Answers

Explanation:

For example: On an email, An embedded image shows a preview of the image without you having to click on the image. An attached imaged is a file that does not have a preview on an email.

Answer:

A

Explanation:

I just did it

Subt to me on you tube if this helped at (Resurgentz)

Which of these is an example of a college student practicing effective problem solving techniques

Answers

Answer:

d

Explanation:

Answer:

The answer is B

Explanation: Being logical that's the answer that makes sense

Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. Users can open, view, and edit files. The bullet points above describe _____.

Answers

Answer:

The answer would actually be "access privileges" You should put the choices next time so it'll be easier for others.

Hope this helped! Have a great day! - Olli :]

Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. Users can open, view, and edit files. The bullet points above describe access privileges.

What is access privilege?

In Web Image Monitor, "access privileges" refers to the settings that let or prohibit users from accessing the device for checking and carrying out activities via a Web browser.

The ability to read, write, alter, delete, or otherwise access a computer file; change configurations or settings; or add or remove applications is known as having access rights.

Organizations can operate effectively, secure their systems and apps, and maintain the privacy of sensitive data and important infrastructure with the help of privileged access.

Files that are not pertinent to the users' jobs cannot be opened. Users are able to open and read files but not edit them. Files can be opened, viewed, and edited by users.

Thus, access privileges are described in the bullet points above.

For more details regarding access privilege, visit:

https://brainly.com/question/18722191

#SPJ5

Other Questions
I need help pls. ThxThink about the power and importance of music in young peoples lives. Why do people connect with music? Why do young people especially the dream of being a part of art and music? What does Shakespeare mean by the phrase "bad strokes as spoken by Antony in this passage? weak hits poor shots evil deeds harmful words Equation to 2 cups peaches to 3 cups cherries to make 60 cups how many cups of peaches would i need Determine the area of a triangle with m Help plz (problly easy for you) An item is regularly priced at $41. John bought it at a discount of 15% off the regular price. How much did John pay? A certain shampoo is available in two sizes. A 23.7-ounce bottle costs $4.97 . A 33.8 -ounce bottle costs $7.48 . Find the unit price for each size. Then state which size is the better buy based on the unit price. Round your answers to the nearest cent.Unit price for the 23.7 Price per ounce 33.8 Price per ounce Which expressions correctly represent variations of Ohm's law? Check all that apply. Of the 300 students at your middle school, only 15% attended this field trip. How many students need to make it to the boat to be rescued? An Ice Hockey rink is a rectangle with a perimeter of 174 meters. The length is 9 meters more than twice the width. What equation describes this problem? (Remember that the perimeter is twice the length plus twice the width) HURRY PLEASEEEEE!!!!Use r = 2 and r = 5 to determine if the two expressions are equivalent.r + 4(2 + r) 12 8 + 2r 6Complete the statements. 1.When r = 2, the first expression is ?.2.When r = 2, the second expression is 6.3.When r = 5, the first expression is 21.4.When r = 5, the second expression is .?5.The expressions are not equivalent. Use either the square of a binomial or thedifference of two squares to find the area ofeach rectangle. The local rodeo has a circular Pin , with a diameter of 48 feet , in which keep the horses what is the circumference or the horse pin Los amigos ____________________ que es divertido. a. decimos c. digo b. dicen d. dices Please select the best answer from the choices provided A B C D "Pepe, Incorporated acquired 60% of Devin Company on January 1, 2018. On that date, Devin sold equipment to Pep for $45,000. On the sale date, the equipment had a cost of $120,000 and accumulated depreciation of $66,000 with a remaining life of 9 years. Devin reported net income of $300,000 for 2018. Pep uses the equity method to account for its investment in Devin. What is the amount of income from investment in Devin for 2018 Select the correct answer,Which food chain shows the correct flow of energy in an ecosystem?A eagle - rabbit - Sun - hayB. rabbit - eagle - hay - SunC.hay - eagle - rabbit - SunODSun - hay - rabbit - eagleE. Sun - eagle - hay - rabbitResetWext 3 - 2n = 7Show work please The two-party system largely offered a choice betweenA. Slavery and emancipation,B. Peace and war.O C. Change and established ways.O D. Farming and mining. Sage Inc. owns shares of Pronghorn Corporation stock. At December 31, 2020, the securities were carried in Sages accounting records at their cost of $1,030,000, which equals their fair value. On September 21, 2021, when the fair value of the securities was $1,397,000, Sage declared a property dividend whereby the Pronghorn securities are to be distributed on October 23, 2021, to stockholders of record on October 8, 2021.Prepare all journal entries necessary on those three dates. Problem:An old coin is kept in a cubic box in such a way that the outline of the coin touches the 4 walls of the box, if the base of the box has a 24 cm perimeter, what is the area of the coin? Steam Workshop Downloader