What does not usually synchronize among devices using the same E-Reader app?
Account information
Bookmarks
Downloads
Purchases

Answers

Answer 1

Answer:

Purchases

Explanation:

Among devices using the same E-Reader app, we can synchronize our Account information, Account Information, and Downloads, but we cannot get the Purchases.

There is a configuration called Whispersync, we could get Bookmarks , notes and even underlined with security copy.

We could get all our books downloaded, but we could not see any purchase.


Related Questions

An application needs to calculate sales tax for purchases. You decide to simplify the code by putting the sales tax calculation in a function. The returned value from the function is then added to the Subtotal, and the result is stored in the decTotal variable. Which of the following statements will call the GetSalesTax function and return a value to be used in the Total calculation?a.) decTotal = decSubtotal + GetSalesTax()b.) decSubtotal + GetSalesTax(decSubtotal)c.) decTotal = decSubtotal + GetSalesTax(decSubtotal)d.) decTotal = decSubtotal + GetSalesTax(decSubtotal As Decimal)

Answers

Answer:

Option C: decTotal = decSubtotal + GetSalesTax(decSubtotal)

Explanation:

To get sales tax, we need a function can process a subtotal amount and return the tax values. By presuming GetSalesTax() is a function that will return a tax value, this function will expect decSubtotal as the input parameter to the function. Otherwise, there will be no values processed in the function.

The statement  decTotal = decSubtotal + GetSalesTax(decSubtotal)  will invoke function GetSalesTax() by passing decSubtotal as argument. Next the return value of the function will be added with decSubtotal and the summation amount assigned to the variable decTotal.

What technology enables you to run more than one operating system at the same time on a single computer?

Answers

Answer:

The answer is "Virtualization".

Explanation:

Virtualization is processed to create a virtual system. It is the creation of the virtual version of something, that is the operating system, computer, storage device or resources.

Virtualization allows IT organizations to run more than one virtual system on a single server. It depends on software for hardware emulation and virtual computing device development.

Explain the significance of the Battle of the Ironclads, the Monitor and the Merrimack.

Answers

Answer:

The significance of the naval battle between the two ironclads brought about new development in the naval warfare, signaling the end of wooden warships

Explanation:

The battle of the ironclads between the Monitor and the Merrimack occurred on March 9, 1862 which was the first naval battle between ironclad warships. The battle which was inconclusive due to the fact that no much damage was effected on the two warships.

The significance of the naval battle between the two ironclads brought about new development in the naval warfare, signaling the end of wooden warships.

Your friend Luis recently was the victim of identity theft and has asked your advice for how to protect himself in the future. You tell Luis that he should install software that protects network resources from outside intrusions, called a(n) ______.

a. hot spot
b. tracking cookie
c. firewall
d. security scanner

Answers

Answer:

Firewall

Explanation:

Firewalls are mainly intended to protect an individual computer system or network from being accessed by an intruder, especially via the Internet. They thus work to prevent sabotage of the system and the theft or unauthorized viewing of private or sensitive data, such as through the use of spyware.

Final answer:

Luis should install a "firewall" to protect against identity theft by serving as a barrier that controls network traffic and prevents unauthorized access to his computer's resources.

Explanation:

To protect yourself from identity theft and ensure the security of your network resources, it's important to install a program known as a firewall. This software acts as a barrier between your computer and the internet, controlling incoming and outgoing network traffic based on an applied rule set. It helps to prevent unauthorized access to your system, which can be crucial for protecting sensitive personal information from cybercriminals.

A firewall is different from programs that monitor Web usage, which may be used in work settings to ensure employees are focused on work-related tasks. While both are concerned with the use of the internet, a firewall is specifically designed to protect against intrusions and hacking attempts.

Google Ads was designed to deliver three things to every advertiser: relevance, control, and results. It provides relevance by connecting advertisers with the right people at the right time. It provides results by charging only when you get a click. How does Google Ads provide control?
A) By giving advertisers control over the number of specific actions their spend will return
B) By giving advertisers control over which competitors they place ads in auctions against
C) By giving advertisers control over the next highest bid allowed in auctions they enter
D) By giving advertisers control over the maximum they spend per month.

Answers

Answer:

D) By giving advertisers control over the maximum they spend per month.

Explanation:

Google Ads provides advertisers with control over their budget. They choose how much to spend per day, per month and per ad as well as where and how they want to spend. Smart campaign technology allows advertisers to create, oversee, and optimize their campaigns to get benefit from investment. Google Ads lets advertisers set a daily limit on how much of their budget is spent to show their ad and averages daily limit over entire month to restrain their campaign from spending more than expected. Google Ads optimizes advertising strategy and helps in getting the best outgrowth for the business. Google Ads is used in achieving business goals for both big and small advertising budgets.

Which standard is used to configure digital signature settings for e-mail and contacts from the corporate address book, depending on how the corporate e-mail server is set up?

Answers

Answer:

The correct answer for the given question is "s/mime standard".

Explanation:

The s/mime standard is a secure multipurpose standard that is used for the encryption of the public key. This standard provides the security and it is used in the configuring digital signature for the setting of emails.

The main advantage of s/mime standard is to provide the linear way to send and received the data of MIME. This standard id used to protect the emails from unwanted access.

What do you enter at the command prompt to prevent the shell from using to much of the systems resources?

Answers

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

What did major networks do to combat audience erosion in the 1990s?
1. They threatened not to allow cable operators to carry any of their programming.
2. They started making edgier and more controversial programming.
3. They acquired cable channels. They acquired cable operators.
4. None of the options are correct.

Answers

Answer: I think is 3. They acquired cable channels. They acquired cable operators.

Explanation:

The throws clause of a method: a. specifies the exceptions thrown by the calling method. b. specifies the exceptions a method throws. c. specifies the exceptions a method throws and catches. d. specifies the exceptions a method catches.

Answers

Answer:

Option B

Explanation:

Assume the availability of a function called printStars. The function receives an int argument. If the argument is positive, the function prints (to standard output) the given number of asterisks. Thus, if printStars(8) is called, ******** (8 asterisks) will be printed. Assume further that the variable starCount has been declared and initialized to a some integer, possibly negative or zero. Write some code that does nothing if starCount is not positive but that otherwise prints starCount asterisks to standard output by: first printing a single asterisk (and no other characters) then calls printStars to print the remaining asterisks.

Answers

Final answer:

To print asterisks based on the value of 'starCount', you must first check if it is positive. If so, print one asterisk and then call 'printStars(starCount - 1)' to print the rest.

Explanation:

To address the scenario wherein the function printStars needs to be called only if starCount is a positive number, we must first check the value of starCount. If starCount is greater than zero, we print a single asterisk and then call printStars with starCount - 1 to print the remaining asterisks. Here's how this could be coded:

if (starCount > 0) {
   System.out.print('*'); // Prints a single asterisk
   printStars(starCount - 1); // Calls the function to print the rest
}

This code snippet checks if starCount is positive and acts accordingly by printing an initial asterisk, followed by the remaining asterisks using the printStars function.

What percentage of users who do not own a Zero UI device were comfortable with an algorithm learning their behaviour?

Answers

Answer:

This requires a percentage of people with zero UI device, and how many of them are comfortable with it. The rest can be calculated. However, since it is not given, as an assumption, one should note that more and more people are going to have it, but in the beginning, only a few out of them will be comfortable with it at the start, as it is a new technology.

Explanation:

It's important to understand what is a Zero UI device. This means a touchless UI experience. The era of the touchscreen is going to vanish soon hence, and computers will be able to understand our feelings and gestures. Our gestures will drive the computers now, and that is going to be a new style of UI in the computer world. The era has not yet arrived, but you might soon find that era starting, and at the beginning, people will find it hard though with time they will start feeling comfortable with it.

The constructor signature is defined as the constructor __________ followed by the __________.

a. name, parameter list
b. name, return type
c. definition, body
d. definition, parameter list
e. header, body

Answers

Answer:

The constructor signature is defined as the constructor name followed by the parameter list.

Explanation:

In object oriented programming, a class constructor is a special method that will run automatically whenever a new object is created from the class. The constructor name is same with the class name. Besides, the class constructor is often used to initialize the attributes with initial values. Those initial values are held by the parameter list of the constructor.

One example of the constructor defined in a Java class is as follows:

// class name

public class BankAccount {

    // attribute names

      private String holder;

      private double amount;

      // constructor name

      public BankAccount(String holder, double amount) // parameter list

     {

               this.holder = holder;

               this.amount = amount

      }

}    

An absolute cell reference changes the cell references when the formula is copied to a new location.
a) true
b) false

Answers

Answer:

False

Explanation:

In Microsoft Excel or Google Sheet, an absolute cell reference is a cell address that won't be changed even the formula is copied to a new location.

Absolute cell reference is always used whenever a formula is expected to be consistently referred to a particular cell. To create an absolute cell reference, we can simply preceded the row or column or both with the dollar sign $.

For example:

=$A$3 - $B$3

What is a ""software process""? Provide examples of fundamental activities related to this term.

Answers

Answer:

A process that is used to represent the set of phases of work which are applied to build and design a product-related software, known as Software Process.

Explanation:

There are especially four types of fundamental activities related to the software process, these are as follows:

Software specification: The process of defining what type of functions are required for identifying the limitations over the development of the system.System validation: Involves the checking and testing of the software process step by step. It usually has three testing process, such as:System testingUnit testingAcceptance testingSystem implementation: Through the designing of the computer, this process is used for converting the system specification into a system which is capable of being executed.System evolution: The process which repeatedly updates the system and develops initially.

What is the output of the program?
#include
using namespace std;
class bClass
{
public:
void print() const;
bClass(int a = 0, int b = 0);
//Postcondition: x = a; y = b;
private:
int x;
int y;
};
class dClass: public bClass
{
public:
void print() const;
dClass(int a = 0, int b = 0, int c = 0);
//Postcondition: x = a; y = b; z = c;
private:
int z;
};
int main()
{
bClass bObject(2, 3);
dClass dObject(3, 5, 8);
bObject.print();
cout << endl;
dObject.print();
cout << endl;
return 0 ;
}
void bClass::print() const
{
cout << x << " " << y << endl;
}
bClass::bClass(int a, int b)
{
x = a;
y = b;
}
void dClass::print() const
{
bClass::print(); //added second colon
cout << " " << z << endl;
}
dClass::dClass(int a, int b, int c)
: bClass(a, b)
{
z = c;
}

Answers

Answer:

The output to this program is :

2 3

3 5

8

Explanation:

The description of the given c++ program can be given as:

In the given c++ program two class is defined that is "class bClass and class dClass". In bClass, this class declares a method, parameterized constructor, and private integer variable x and y. In dClass, this class first, inherit the base class that is bClass and this class also declares a method, parameterized constructor, and private integer variable z. In the main method, we create the class object and passed value in the constructor parameter that is "2, 3" and "3, 5, 8" and call the function that is "print".  In this method, we use the scope resolution operator that access function and constructor to main method scope. By using a scope resolution operator we define method and constructor.

Wayne works for a large law firm and manages network security. It’s common for guests who come to the law firm to need to connect to the WiFi. He wishes to ensure that he provides maximum security when these guests connect using their own devices, but also seeks to provide assurance to the guests that his company will have minimal impact on their devices. What is the best solution?

Answers

Answer:

C) Dissolvable NAC agent

Explanation:

Network Access Control systems can perform a health check on devices to make sure they meet minimum security standards prior to connecting. Permanent NAC would have an impact on visitor devices; agentless NAC has less impact and COPE devices aren’t possible to give to guests.

FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this information for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?

Group of answer choices

UDP

HTTP

SSH

TCP

Answers

Answer:

TCP

Explanation:

Answer:

TCP

Explanation:

FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.

In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP

FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.

Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to the internet users. You want to created a DMZ for these two servers. Which type of device should you use to create the DMZ?

Answers

Answer:

Network based firewall

Explanation:

A delimitarized zone or perimeter networks is a configuration used to create organisation site platform to unauthorised user. A copy of the companies local network is insecure, like a decor to analysed for beach in network to enhance security.

A firewall is a device used to prevent access to network by non members of a company.

When a DMZ is configured to the internet, a network based firewall ( next to the exit router) is configured to stop access to the company's main local network.

Match each of the following steps of SDLC development to its position in the development process.
I. development
II. design
III. analysis
IV. testing and installation
V. problem/opportunity identification
A. first step
B. second step
C. third step
D. fourth step
E. fifth step

Answers

Final answer:

The SDLC steps are matched as problem/opportunity identification as first, analysis as second, design as third, development as fourth, and testing and installation as fifth. The design process is iterative, often involving prototyping, testing, and refinement.

Explanation:

The steps of the Software Development Life Cycle (SDLC) can be matched to their positions in the development process as follows:

Problem/Opportunity Identification - A. first step

Analysis - B. second step

Design - C. third step

Development - D. fourth step

Testing and Installation - E. fifth step

The SDLC is a structured methodology used for the development of software systems and involves several stages from initial problem identification through to the final deployment and maintenance of the solution. In the design process, after evaluating solutions and selecting the best design, as in the example of choosing a solar still for desalination, the team develops a detailed design through prototyping, testing, and refinement. This approach is typically iterative, sometimes referred to as a spiral design process, and may require several iterations as prototypes are created, tested, and reviewed to enhance the design.

When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?

A. HTTP
B. TCP/IP
C. DNS
D. HTML

Answers

Answer:

The correct answer to the following question will be C. DNS.

Explanation:

DNS stands for Domain Name System, users able to find any information with the help of the domain name. Each and every device which are connected to the internet has there owned IP address, DNS is a system used to translate the domain names into the IP address so it will find the information or browsers can load the resources of the internet.

So by entering the domain name instead on an IP address can also browse the information for any user. And other options like HTTP (Hypertext transfer protocol), HTML (Hypertext markup language) and TCP/IP (Transmission control protocol / Internet protocol) can't help any user for accessing the work done by the DNS.

The leading membranophone in "Kan andi ghazal" is the ________. (If you can not access the audio file here, please go to modules

Answers

Answer:

Tabl Baladi

Explanation:

The Tabl Baladi is a large drum with wood frame and heavy skin on both sides. It is hung by a belt around the player's shoulder is and played with two sticks: the thick one is for the dum sound played with the dominant hand, and the thin stick is for the tak sound played with the other hand.

It is mostly used in classical Arab (Middle Eastern) music. Kan Andi Ghazal is a song by the Lebanese musician Wael Jassar.

​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?

A. ​Cipher code
B. ​Mnemonic code
C. ​Action code
D. ​Derivation code

Answers

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

On the Loan worksheet, in cell C9, enter a PMT function to calculate the monthly payment for the Altamonte Springs 2022 facilities loan. Ensure that the function returns a positive value and set the references to cells B5 and B6 as absolute references.

Answers

Answer:

Microsoft Excel, pmt function.

Explanation:

Microsoft Excel is a spreadsheet application used to manipulate and analyse data. It has several functions and tools to work with. An excel workbook can contain multiple worksheets. It has columns (or field) labelled alphabetically and also numbered rows ( or record).

The PMT function is a financial function used to calculate the periodic payment of loans. It's syntax is;

=PMT(interest rate increase, loan period, loan amount).

For example, if the interest rate increase is annual, and the value is a cell B7, the input would be B7/12. If the value of the loan period and amount are referenced in cells B6 and B5 respectively, the function would be ;

=PMT(B7/12, B6, B5).

But this will give a negative result. For positive result;

=PMT(B7/12, B6, -B5)

Now to make excel pick values from a specified group of cells, they are made absolute by adding the '$' to the columns and rows.

=PMT($B$7/12, $B$6, -$B$5).

The result would positive values spanning to twelve months with interest rate.

To calculate a loan's monthly payment in Excel using the PMT function, enter '=PMT($B$5/12, B6*12, -B4)' in cell C9. This will yield a positive value for the monthly payment with the annual interest rate and loan term set as absolute references.

To calculate the monthly payment for the Altamonte Springs 2022 facilities loan, you need to use the PMT function in Excel. Follow these steps:

Click on cell C9 to make it active.Enter the formula: =PMT($B$5/12, B6*12, -B4), where $B$5 refers to the annual interest rate, B6 to the term in years, and B4 to the loan amount. Using absolute references for $B$5 and $B$6 ensures these references do not change if the formula is copied elsewhere.Press Enter to see the calculated monthly payment displayed as a positive value.

Remember, the PMT function helps manage financial calculations efficiently in Excel, ensuring accurate loan payments computations.

Your computer only boots with a bootable DVD. It is not able to boot without a bootable DVD. What could be the possible reasons for this problem?

Answers

It could mean that your SSD or HHD is fried.

I hope this helped! If so, please mark brainliest!

The nth harmonic number is defined non-recursively as: 1 +1/2 + 1/3 + 1/4 + ... + 1/n. Come up with a recursive definition and use it to guide you to write a function definition for a double -valued function named harmonic that accepts an int parameters n and recursively calculates and returns the nth harmonic number. this is for myprogramminglab.com this is what i have double harmonic(int n) { int sum =0; if (n>0) { sum=sum+(1/(harmonic( n-1))); } return sum; }

Answers

Answer:

See the code below.

Explanation:

The nth armonic number is obtained from the following induction process:

[tex]a_1 = 1[/tex]

[tex]a_2 = 1+\frac{1}{2}=a_1 +1[/tex]

[tex]a_3 = 1+\frac{1}{2}+\frac{1}{3}=a_2 +1[/tex]

And for the the n term we have this:

[tex]a_{n-1}=1+\frac{1}{2}+\frac{1}{3}+....+\frac{1}{n-1}[/tex]

[tex] a_n = 1+\frac{1}{2}+\frac{1}{3}+......+\frac{1}{n}=a_{n-1}+\frac{1}{n}[/tex]

In order to create a code for the ne term we can use the following code using python:

# Code to find the nth armonic

# Function to find n-th Harmonic Number  

def armonicseries(n) :  

   # a1 = 1  

   harmonic = 1

   # We need to satisfy the following formulas:  

   # an = a1 + a2 + a3 ... +..... +an-1 + an-1 + 1/n  

   for i in range(2, n + 1) :  

       harmonic += 1 / i  

   return harmonic  

##############################

And then with the following instructions we find the solution for any number n.

   n = 3 # thats the number of n that we want to find

   print(round(armonicseries(n),5))

Recursive functions are functions that execute itself from within.

The harmonic sum function in Python, where comments are used to explain each line is as follows:

#This defines the function

def harmonic_sum(n):

   #This returns 1, if n is less than 2

 if n < 2:

   return 1

 #If otherwise,

 else:

     #This calculates the harmonic sum, recursively

   return 1 / n + (harmonic_sum(n - 1))

Read more about recursive functions at:

https://brainly.com/question/15898095

The logical structure in which one instruction occurs after another with no branching is a _____.

a. case
b. loop
c. sequence
d. selection

Answers

Answer:

Option(c) i.e "sequence " is the correct answer for the given question.

Explanation:

In the sequence, the statement or instruction is executed in the sequence manner i.e one after another. In the sequence structure, the instruction is executed in the predetermined order and no instruction are skipped sometimes the sequence structure takes too many times when they are more instruction in a single module.

For Example : Following are the program in c++ of sequence control structure

#include<iostream.h> // header file

using namespace std; // namespace

int main() // main method

{

int a=100; // variable declaration

c=a+100;

cout<<c; // display c

return(0);

}

Output:100

In the above program the instruction a=100,c=a+100 and display c is executed in the sequence manner.

In  the Option(a),Option(b) and Option(d)  instruction are not executed in one after another so these are incorrect answers.

Write a loop to populate user_guesses with num_guesses integers. read integers using int(input()). ex: if num_guesses is 3 and user enters 9 5 2, then user_guesses is [9, 5, 2].

Answers

Answer:

num_guesses = 3  #initialized number of guesses to 3

user_guesses = []  #declared the user_guesses array

guess = 0  #guess variable initialized to 0

print('Enter a number: ')  #prompt telling the user to enter a number

while guess < num_guesses:  #loop capturing input and storing into array

   num = int(input())

   user_guesses.append(num)

   guess = guess + 1

#end of loop

print(user_guesses) #array outputted to user

Explanation:

The above program captures numbers from the user and stores into an array (user_guesses), the length of the array is determined by the value contained in the num_guesses variable, it prints the combined input as an array.

Loops are code statements that are used to repetitive statements.

The loop in Python where comments are used to explain each line is as follows:

#This gets input for the number of guesses

num_guesses = int(input())

#This initializes a list for user guess

user_guesses = []

#The following is repeated

for i in range(num_guesses):

   #This gets input for the guess

   num = int(input())

   #This adds the guess to a list

   user_guesses.append(num)

#This prints all the guesses by the user

print(user_guesses)

Read more about loops at:

https://brainly.com/question/19344465

What unique key is known only by the system and the person with whom the key is associated?

Answers

Answer:

Public key is the key known by the system and the person associated with the key.

Explanation:

The other type of key called Private/Secret key is known only to the person who owns the key.

Unit testing: Select one:
a. includes all the preparations for the series of tests to be performed on the system.
b. tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.
c. involves testing the entire system with real-world data.
d. provides the final certification that the system is ready to be used in a production setting.
e. tests each program separately.

Answers

Answer:

e. tests each program separately.

Explanation:

Unit testing -

It is one of the software testing where the individual units are tested , is referred to as unit testing.

The focus of this step is to scan each and every unit separately and thoroughly so as to avoid any type of damage or malfunctioning .

Hence, from the question, the correct statement for unit testing is e. tests each program separately.

Amy has just added a 462 meter run of fiber optic cable to the network. What should she do next?

Answers

Answer:

test the installed cable

Explanation:

Based on the information provided within the question it can be said that the next step that Amy should take would be to test the installed cable. One of the most performed tests is called an Insertion Loss test. This is done with  light source and power meter (LSPM) or optical loss test set, and tests to make sure that the information is travelling through the cable correctly and that no loss occurs in transit.

Other Questions
The name given to postiions of power and authority like chariman and policeman often emphasize the male gender. why does this matter? Use the graph below to determine a1 and d for the sequence. graphed sequence showing point 1, 17, point 2, 14, point 3, 11, point 4, 8, point 5, 5, and point 6, 2 a1 = 1; d = 3 a1 = 1; d = 3 a1 = 17; d = 3 a1 = 17; d = 3 For small amplitudes of oscillation the motion of a pendulum is simple harmonic. Consider a pendulum with a period of 0.550 s Find the ground-level energy. Express your result in joules Find the ground-level energy. Express your result in election volts What expedition did Thomas Jefferson establish to explore the West under the leadership of Lewis and Clark?A. The Western ExplorersB. The Northwest PassagersC. The Mountain RangersD. The Corps of Discovery Curtis finds that his girlfriend is quite uncommunicative this morning. Given what we know about the side effects of extinction, which of the following behavior patterns would we expect Curtis to display?a. an increase in his attempts to communicate with her.b. an increase in emotional behavior.c. an increase in aggression.d. an increase in variability of the behavior. When approaching a school bus with flashing red lights on your side of the road what should you do? What does the Progressive Era demonstrate about American history and social change What is the average atomic mass compared to atomic mass 7. Let P = (-2,4).a. Line r is horizontal and passes through P. Write an equation for r.b. Line s is vertical and passes through P. Write an equation for s. As ocean waves approach shore, their velocity decreases. How does a decrease in velocity affect the frequency and wavelength of the waves entering the shallow water?A. frequency increases and wavelength decreasesB. frequency decreases and wavelength increasesC. frequency stays the same and wavelength increasesD. frequency stays the same and wavelength decreases Is there a pricing policy that would have filled the ballpark for the Phillies game? What test items are determined by the Program Management Office that is developing the system? Select the correct answer. If f(x) = |x| - 4, which translation is applied fo f(x) to get g(x)? 12x+28x - 5 = (6x - 1)(_).whats the factored form ? (6x-1)(__) Shari is a 42-year-old woman who has wanted to find a husband for many years. She has had several successful dating relationships, but they never seem to "go the distance." In addition, Shari does not have a true "best friend" to rely on in times of personal distress. Shari is likely experiencing ____ lonelinessa. companionateb. consummatec. relationald. intimate 9. Which of the following is an example of secondary research?A. Hiring a marketing firmB. Gathering statistics onlineC. Observing reactions to free samplesD. Conducting trial-and-error testing Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer has metastasized to her bones in her thoracic spine. What ICD-10-CM codes are reported?a.M54.6, C79.51, C80.1b.C79.51, G89.3, C80.1c.G89.3, C79.51, C80.1d.C79.51, G89.3, M54.6, C80.1 Jumping Jack Flash is a champion racehorse. A special diet and daily exercise have made him the fastest horse in the country. In the wild, Jumping Jack Flash would survive longer than other horses because of his speed. Is this an example of natural selection?a. Yes, because he is very well adapted to his environment.b. Yes, because his speed is the result of a random event.c. No, because his speed is a result of diet and exercise, not a genetic trait.d. No, because slower horses are better adapted to the environment. The central dogma of molecular biology is that dna is transcribed into mrna, which is then to protein? Another model for a growth function for a limited population is given by the Gompertz function, which is a solution of the differential equation dPdt=cln(KP)P where c is a constant and K is the carrying capacity.(a) Solve this differential equation for c=0.1, K=2000, and initial population P0=500. P(t)= .(b) Compute the limiting value of the size of the population. limt[infinity]P(t)= .(c) At what value of P does P grow fastest? P= . Steam Workshop Downloader