Discuss the impact of vision on your actions to keep a clean environment​

Answers

Answer 1

Answer:

For healthy living a clean environment is crucial: The more you care about our environment, the more contaminants and toxins that have a detrimental effect on our health are polluted. Air pollution can lead, among other problems and diseases, to respiratory and cancer problems

Explanation:

Ensuring and improving the climate is an important resource for Irelanders. To safeguard against radiation and contamination damage our kin and the climate.

We have the vision:

A perfect environment to promote practical society and economy, which is sound and very secure.

Very few people are working to keep the environment clean. Although municipal authorities are responsible for making sure the environment is clean, the clean and green environment must also be supported.

Reasons Why We Should Care About the Environment

An essential part of human survival is the environment in which we live. I believe that people who don't care about the environment simply don't know how important it is for us all and how it doesn't directly affect them, which is why I want you to worry about the environment.

Earth Is Warming: We must do more to fight climate change for our children and our future. Yes, no single event trends. Yes, it is true. You can't ignore that now.

Biodiversity is essential: the diversity of plants, animals and the rest of our world is concerned with biodiversity. Habitat loss and degradation due, among other things, to human activity, climate change, and pollution could be negatively affected.


Related Questions

An entertainment application would most likely do which of the following?
A. allow users to watch popular movies and TV shows
B. connect users with social and business contacts
C. confirm users' travel plans
D. teach users a new language

Answers

Answer:

A is the answer to this question

Answer:

A. allow users to watch popular movies and TV shows

Explanation:

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
coworker for immediate handling. What should she do?
O Configure a response for external senders.
O Configure a response for internal senders.
O Only send during a specific time range.
O Configure an Automatic Reply Rule.

Answers

Answer:

Configure an Automatic Reply Rule

Explanation:

The Rule feature in Outlook enables a user to respond immediately to a message, to move a message, or to flag a a message.

The Automatic Replies (Out-of-Office) feature can also be used to let colleagues inside the organization know when a user is out of office and the arrangements that they have made

Also, Using the Out-of-Office dialogue box, under the Files tab, Automatic Replies can be configured using the Rules button to add a rule that forwards all messages from the particular client to the email address of a coworker for them to take care of immediate, while sending an automatic reply to the sender about being out of office and that the mail has been forwarded to a coworker to handle

Therefore, Kylee can configure an Automatic Reply Rule

Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59

Answers

Answer:

-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.

-- Enums are great for representing states and other common constants like colors.

-- Enums let us specifically value each constant we create.

Explanation:

Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.

Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.

Option 4 is applicable because enums are used to represent various states and also other constants.

Option 5 is also applicable they allow the developer to create each value constant.

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
email address
web address
UNC path
O All will be automatically converted,

Answers

Answer:

d. All will be automatically converted.

Explanation:

A hyperlink is a link created in one document and that leads to another document mostly by clicking on that link. In Microsoft Outlook, some text formats are automatically converted to hyperlinks which are shown by first underlining the text and then changing the text color to blue. Some of the text formats that are turned to hyperlinks are:

i. email addresses

ii. web addresses

iii. UNC path: This is a path specifying the location of a particular document or resource on a computer or server. It has the following format:

\\name--of--server\resource-path-name

4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.

Answers

Answer:

D

Explanation:

Communication are happen when 2 people are response each other

It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.

What is communication?

The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.

It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.

Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.

Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.

Thus, the correct option is 4.

For more details regarding communication, visit:

https://brainly.com/question/22558440

#SPJ2

Your question seems incomplete, the probable complete question is:

All of the following statements are true EXCEPT one. Which

statement is NOT true?

Select the best option.

Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.

Discuss any five positive and five Negative impact
of ICT on society​

Answers

Answer:

The technology of information communication has the capacity to transform society. It plays a key part and provides the infrastructure needed to achieve each of the United Nations Sustainable Development Goals. It also allows financial integration by m-commerce and lets people connect instantly to millions.

ICT has a particularly important impact on business. It allows people to exchange knowledge and advice immediately and establish a website or online shop at a low cost, thus reducing the obstacles to starting a business dramatically. As such, it is a major factor in change and the maturity of ICTs is strongly connected to economic growth.

Explanation:

Effects of ICT

As a human beings, we are always associated in our everyday life with many essential things. The use of ICT equipment in our lifestyle has simplified many time-consuming calculations and difficult tasks, and social contacts have been strengthened. ICT has affected life by enhancing the timely distribution of media information and improved home and workplace communications via social networking, e-mail, etc.

The quality of human life has been greatly improved by ICT. For example, it could take a few days for a letter to come to the recipient, but a single minute for an e-mail to reach. ICT offers a broader understanding and information for each facility  24 Hrs X 7 days. In the following, ICT affects different fields of daily living.

Positive Impacts of ICT:

As domestic and home businesses.As social connectivity.As E-learning/ As educationAs for shopping/tradingAs for banksAs a job/jobs

Negative Impacts of ICT:

Face-to-face interaction reduced.Social Decoupling.Physical activity/health issues reduced.Cost.

How laggy is you're game cause I even lag in offline games this is just a random question. ​

Answers

Answer: its bad

Explanation:

Answer:

Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.

Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based

Answers

Answer:

The modified program is as follows:

user_input = input()

short_names = list(user_input.split(" "))

short_names.pop(0)

short_names[-1] = "Joe"

print(short_names)

Explanation:

This gets the user input

user_input = input()

This converts input to list

short_names = list(user_input.split(" "))

This removes the first item of the list

short_names.pop(0)

This updates the last item to "Joe"

short_names[-1] = "Joe"

This prints the updated list

print(short_names)

Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "non-negative" otherwise. Ex: If userVal is -9, output is:
-9 is negative. PLEASE USE C++

Answers

Answer:

PROGRAMMING APPROACH:

Define the necessary header file using namespace.Define the main() method.Declare variable inside the function().Print result.

Explanation:

Required C++ Code:

#include<iostream>

#include<string>

using namespace std;

int main()

{

  string condStr;

  int userVal;

  cin>>userVal;

  condStr=(userVal<0)?("negative"):("non-negative");

  cout<<userVal<< " is "<< condStr <<"."<<endl;

}

OUTPUT:

-2

-2 is negative.

A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.

Answers

Answer:

Here the code is given as follows,

Explanation:

OUTPUT:  

Message: AAAABBBCCDDDDDDDE  

Number of symbols in the alphabet = 5  

Characters in the alphabet = A,B,C,D,E  

Number of bits per symbol = 3  

Histogram showing the frequency of the symbols in the alphabet  

A | ****  

B | ***  

C | **  

D | *******  

E | *

my iphone s6 is plugged in but isnttttt charging and the chager works on my ipad waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Answers

Answer:

Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.

Answers

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a color, and a Boolean value to indicate whether the triangle is filled.

Answers

Answer:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

Explanation:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

A pointer can be used as a function argument, giving the function access to the original argument.
A. True
B. False

Answers

Answer:

True

Explanation:

A pointer can be used as a function argument, giving the function access to the original argument.

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

A) Why should assembly language be avoided for general application development?
B) Under what circumstances would you argue in favor of using assembly language for developing an assembly language program?
C) What are the advantages of using a compiled language over an interpreted one?
D) Under what circumstances would you choose to use an interpreted language?

Answers

Answer:

(A) Assembly language should be avoided for general application development for the following reasons:

i. It is difficult to write assembly language codes. It does not contain many tools and in-built functions to help with the development of these applications.

ii. Since general application development requires that the application be machine independent, writing such applications in assembly language (which is a low level, machine dependent language) might be a pain as it would require that the writer have sufficient knowledge of hardware and operating systems.

(B) The following are the circumstances where assembly language should be used:

i. Assembly languages are low level languages that are very close to machine languages that the machine or processor understands. Therefore, when writing codes for programs that should directly communicate with the processor, assembly language should be used.

ii. Since assembly language codes are machine dependent, when there is a need to write applications for target machines, they should be used.

iii. If there is a need to have very great control of certain features of your application and resources to be consumed such as amount of RAM, clock speed e.t.c, assembly languages are a great tool.

(C) Some of the advantages of compiled language over an interpreted language are:

i. Compiled languages are way faster than interpreted languages because the compiled languages are converted directly into native machine codes that are easy for the processor to execute. Put in a better way, with compiled languages, codes are compiled altogether before execution and therefore reduces the overhead caused at run time. Interpreted languages on the other hand executes codes line after line thereby increasing the overhead at run time.

ii. Since codes are compiled first before execution in compiled languages, nice and powerful optimizations can be applied during the compilation stage.

(D) Interpreted languages could be chosen over compiled languages for the following reasons:

i. Interpreted languages are much more flexible and easier to implement than compiled languages as writing good compilers is not easy.

ii. Since interpreters don't need to convert first to intermediary codes as they execute these codes themselves, programs built with interpreters tend to be platform independent.

How does a junction table handle a many-to-many relationship?

by converting the relationship to a one-to-one relationship
by moving the data from the source table into the destination table
by directly linking the primary keys of two tables in a single relationship
by breaking the relationship into two separate one-to-many relationships

Answer: 4
by breaking the relationship into two separate one-to-many relationships

Answers

Answer:

two" (and any subsequent words) was ignored because we limit queries to 32 words.

Explanation:

please mark as brainliest

Answer:

By breaking the relationship into two separate one-to-many relationships

Explanation:

I just did it / edge 2021

you recieve a phone call from the sterlization monitoring company informing you that the last spore test you sent has failed. What should you check to determine the possible cause

Answers

Answer: The type sterilization that was used and how well it was performed

Explanation:

If there's a phone call from the sterilization monitoring company that the last spore test sent has failed, to determine the possible cause, I'll have to type sterilization that was used and how well it was performed.

The sterilization technique used will be analysed, and there'll also be a check for possible human errors. Once thus is done, the possible reason for the failure of the last spore that was sent can then be determined.

I NEED HELP I'LL GIVE BRAINLEST

Direction can be applied to animations but not transitions.


True

False

Answers

Answer: True

Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.

Answer:

I think it's true but I'm not 100% sure.

An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.

Answers

An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.

What is electronic spreadsheet?

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.

Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

You might also keep in mind that while exporting data into a spreadsheet, some data types might change.

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Thus, the answer is electronic spreadsheet.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?

Answers

Answer:

As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.

Explanation:

Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.

Anyone wanna play league of legends, i play top and mid

Answers

Answer:

u get work

Explanation:

What is food technology​

Answers

Answer:

is the application of food science to the selection, preservation, processing, packaging, distribution, and use of safe food. Related fields include analytical chemistry, biotechnology, engineering, nutrition, quality control, and food safety management.

Explanation:

Consider the following method:

public void doSomething(int n) {
if (n > 0) {
doSomething(n/2);
StdOut.print(n);
doSomething(n/2); }
}

How many recursive calls are made by doSomething(n)?

Answers

Answer:

two recursive calls are made

Explanation:

In this piece of code two recursive calls are made by doSomething(n). This is assuming that the input (n) is greater than 0. Otherwise the function will simply end because it will completely skip over the IF statement which holds the entirety of the functions code. A recursive call is represented as the name of the function/method itself within itself. Therefore, everytime the code states doSomething(n) or in this case doSomething(n/2) it is calling itself.

Which ONE of the following role players provides technical backup, trouble shooting and
computer literacy training?
1. Parents
2. Teachers
3. ICT Coordinator
4. Subject specialist​

Answers

Answer:

C, ICT coordinator

Explanation:

 

ICT Coordinator provides technical backup, trouble shooting and computer literacy training.

ICT Coordinator

This individual seems to be in charge of such gear as well as applications, as well as broadband connections.

This same coordinator also assists overall ICT policy development in schools, such as the formation of an ICT management committee, responsibility division, as well as communication with stakeholders.

Thus the response above i.e., "option 3" is correct.

Find out more information about ICT Coordinator here:

https://brainly.com/question/25168859

the brain of the computer that does calculation moving and processing of information​

Answers

Explanation:

The computer brain is a microprocessor called the central processing unit (CPU). The CPU is a chip containing millions of tiny transistors. It's the CPU's job to perform the calculations necessary to make the computer work -- the transistors in the CPU manipulate the data. You can think of a CPU as the decision maker.

Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0 Volume for 4.5, 2.1, 3.0 is: 9.45 Relevant geometry equations: Volume

Answers

Answer:

Explanation:

The following is written in Java. It takes in the three values as parameters and then uses the formula for calculating the volume of a pyramid. Finally, returning the volume to the user. A test case has been provided in the main function and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       double output = calc_pyramid_volume(4.5, 2.1, 3.0);

       System.out.println(output);

   }

   public static double calc_pyramid_volume(double base_length, double base_width, double pyramid_height) {

       double volume = (base_length * base_width * pyramid_height) / 3;

       return volume;

   }

}

Which of the following Python methods is used to perform hypothesis testing for a population mean when the population standard deviation is unknown?

a. uttest(dataframe, null hypothesis value)
b. ztest(dataframe, null hypothesis value)
c. prop_1samp_hypothesistest(dataframe, n, alternative hypothesis value)
d. ttest_1samp(dataframe, null hypothesis value)

Answers

Answer:

B: ztest(dataframe, null hypothesis value)

The Python method that is used to perform a test of hypothesis for a population mean with an unknown population standard deviation is d. ttest_1samp(dataframe, null hypothesis value).

A t-test is normally applied when the population standard deviation is not known.  The researcher will use the sample standard deviation.

While the z-test can also be used in Python to perform hypothesis testing with a known population standard deviation and a sample size that is larger than 50, only the t-test can be applied with an unknown population standard deviation or a sample size less than 50.

Thus, the only Python method to carry out hypothesis testing with unknown population standard deviation is the t-test, which is given in option d.

Learn more about hypothesis testing at https://brainly.com/question/15980493

१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :
(क) सुशासन र विकास

Answers

Answer:

n

Explanation:

Answer:

kkkkkkkkikkkkkkkkkkkiikkiiii

Other Questions
help please! no links :) Read the excerpt from Justice Sotomayor's speech "A Latina Judge's Voice."For me, a very special part of my being Latina is the mucho platos de arroz, gandules y pernirrice, beans and porkthat I have eaten at countless family holidays and special events. My Latina identity also includes, because of my particularly adventurous taste buds, morcilla, pig intestines; patitas de cerdo con garbanzo, pigs' feet with beans; and Ia lengua y orejas de cuchifrito, pigs' tongue and ears. I bet the Mexican-Americans in this room are thinking that Puerto Ricans have unusual food tastes. Some of us, like me, do.How does the speakers use of Spanish names for food most affect the tone and meaning of this excerpt?It shows her strong connection to her heritage.It demonstrates how unusual Puerto Rican food is.It exemplifies a frustration with the United States.It deliberately excludes non-Spanish speakers. Americans were encouraged to participate in all of the following homefront activities EXCEPT afamilies were encouraged to grow victory gardens bwomen were encourage to work in factories cfamilies rationed goods such as meat and sugar dwomen were encouraged to join combat forces PLEASE HELP ME PLEASEEEEEEEEE HELP What number must you add to complete the square? x^2+26x=23 How do you solve this equation ? 25 3 x = 40 Match the percentage of Hispanic population with its state.1. over 38% []Pennsylvania2. over 3% []Washington3. over 8% []California4. over 32% []Montana5. over 7% []New Mexico6. over 1% []Oregon 5. Image 3 Question: What characteristic did each of these civilizations share?Each civilization was centered around a major river system.Agriculture flourished in each of them.They each were places where hunters and foragers existed.Major world religions were birthed in each of these civilizations. 6. Image 3 Question: Which historical event led to the development of permanent civilizations?The Great MigrationThe Great Leap ForwardNeolithic RevolutionDiaspora A_____ function is a function that can be expressed as the quotient of two polynomial functions in wich the denominator does not equal zero. A.rational B.division C.relationship D.polynomial Keith is looking at a cliff. He determines that the angle of elevation to the top is 70 from where he is at. 70m away from Keith, Alan estimates the angle between the base of the cliff, himself, and Keith to be 29 while Keith estimates the angle between the base of the cliff, himself, and Alan to be 48. What is the height, h, of the cliff to the nearest tenth of a metre?1) 78.8m2) 83.9m3) 89.0m4) 95.7mThis question completely baffled me on my homework, I still haven't done it because I don't even know how to approach it (Since it's a 3D problem)Please help me outAlso, this homework is due in an hour so I'm starting to sweat three contributing factors that led to xenophobia What is the value of 21 - 4 = 5 ? in the equation below? (Show your work) Help Please!Please answer the question and please don't type a random thing just to get points. Form similar pairs of words.Boron : B :: Beryllium : the United States Supreme Court to decide which cases to review?A.A case must be sent from a state supreme court.B.A case must be sent directly from federal district courts.C.A case must involve an important legal question that will help other judges decide future cases.D.An appellate court must not have addressed the case prior to arriving to the Supreme Court. The price of a product is increased by 30% and then again by 10%. How many per cent did the price increase altogether? A regulation-size women's basketball has a diameter of 9.07 inches. What is the surface area of the basketball? Use 3.14 for and round to the nearest tenth. We can determine the potential of a single electrode by:____________.a. attaching it to a voltmeter b. determining the electronegativity of its component elements c. measuring its mass d. none of the above Given: line a line b. If m7 = 63 , then m4 = __ ? __. A castle guard is standing on the opposite side of an 8-foot moat and wants to reach a window that is 15 feet above the ground. The guardprops a ladder against the castle wall to form a right triangle as shown. Approximate the length of the ladder needed to reach the window tothe nearest tenth of a foot.