HELP ASAP

The type of computer that provides centralized storage, processing and overall management of large amounts of data is________.

Answers

Answer 1
the server computer

Related Questions

what does a exponent do in excel ?​

Answers

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:

Which is not a typical application of queues? Group of answer choices High-speed sorting Routing packets in a computer network File server handling file access requests from many clients Print spooling

Answers

first routing decision, the packet will be looked upon after this change. Because of this, the routing may be changed before the routing decision is done.

High-speed sorting is NOT a typical application of queues.

A queue is an abstract data type where the first element is inserted from a specific end (i.e., the REAR), and the removal of the existing element occurs from another end (i.e., the FRONT).

Sorting refers to a type of algorithm that adds different elements of a list in a specific order.

A sorting algorithm should have an output in monotonic order, and such output is a permutation.

In conclusion, high-speed sorting is NOT a typical application of queues.

Learn more in:

https://brainly.com/question/13098446

To what extent can u justify that computer is not the only ICT tool?​

Answers

ICT tool  integration in education is essential because technology enables teaching and learning to occur outside of the classroom.

Describe an ICT tool.

Digital infrastructures like computers, laptops, desktops, data projectors, software, printers, scanners, and interactive teaching boxes are examples of information communication technology equipment. In computer science, the focus is largely on programming and how computers function. Computing focuses more on the hardware and developing the software, whereas ICT is more about the people in the business and customising commercially available programmes to their needs. Learning how to drive a car is an effective analogy.

Why are computers seen as ICT tools?

Tools for information and communication technology are known as ICT tools. Computers, laptops, printers, scanners, software, data projectors, and interactive teaching aids are examples of digital infrastructures that fall under the category of ICT tools.

To know more about ICT tool visit:-

https://brainly.com/question/21298416

#SPJ1

The provision of one of the following social amenities is not impacted by technology. (A) Highways (B) Roads with potholes (C) Electricity for lighting (D) Asphalt roads with modern road signs​

Answers

Answer:

(B) Roads with potholes

Explanation:

Roads with potholes are not impacted by technology. Highways, electricity for lighting and asphalt roads with modern road signs are impacted by technology.

A nested "if" statement only executes if the "if" statement in which it is nested evaluates to True. True False

Answers

The given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

What is a nested "if" statement?

The use of nested IF functions, or one IF function inside another, increases the number of outcomes that may be tested and allows for the testing of numerous criteria.

Based on their performance, we wish to assign each student a grade.

Return an A if Bob's score in B2 is greater than or equal to 90.

Only if the "if" statement in which it is nested evaluates to True does a nested "if" statement take effect.

The OR function allows you to test many conditions in each IF function's logical test and returns TRUE if any (at least one) of the OR arguments evaluates to TRUE.

Therefore, the given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

Know more about the nested "if" statement here:

https://brainly.com/question/14915121

#SPJ4

how to conditional format a cell based on another cell

Answers

To conditional format a cell based on another cell in Excel, you can follow these steps:

1. Select the cell you want to format.
2. Go to the Home tab and click on the "Conditional Formatting" button.
3. Choose "New Rule" from the dropdown menu.
4. In the "New Formatting Rule" dialog box, select "Use a formula to determine which cells to format".
5. In the "Format values where this formula is true" field, enter the formula that references the other cell. For example, if you want to format cell A1 based on the value in cell B1, the formula would be "=B1>0".
6. Click on the "Format" button to choose the formatting style you want to apply.
7. Click "OK" to apply the conditional formatting.
8. The cell will now be formatted based on the condition you specified.
to conditional format a cell based on another cell, use the "Conditional Formatting" feature in Excel and specify the formula that references the other cell.

To know more about Excel, Visit:

https://brainly.com/question/3441128

#SPJ11

what criteria does a switch use to make forwarding decisions? (choose two) layer 3 addresses layer 2 addresses mac addresses ip addresses

Answers

A switch uses Layer 2 addresses (MAC addresses) and Layer 3 addresses (IP addresses) to make forwarding decisions.

Switches operate at the data link layer (Layer 2) of the OSI model and are responsible for forwarding data frames within a local area network (LAN). They use various criteria to make forwarding decisions and determine the destination of a frame.

Layer 2 Addresses (MAC addresses): Switches primarily use MAC addresses, which are unique identifiers assigned to network interface cards (NICs), to make forwarding decisions. Each frame contains source and destination MAC addresses, and the switch maintains a MAC address table (also known as a forwarding table or CAM table) that maps MAC addresses to switch ports. By examining the destination MAC address of a frame, the switch can determine the outgoing port to forward the frame to.

Layer 3 Addresses (IP addresses): In addition to MAC addresses, some switches also support Layer 3 forwarding decisions using IP addresses. These switches are known as Layer 3 switches or multilayer switches. They can perform routing functions by examining the destination IP address in the packet header and making forwarding decisions based on IP routing tables. Layer 3 switches combine the features of switches and routers, allowing for more advanced networking capabilities within a single device.

By considering both Layer 2 addresses (MAC addresses) and, in the case of Layer 3 switches, Layer 3 addresses (IP addresses), switches can efficiently forward frames within a LAN and, in the case of Layer 3 switches, route packets between different networks.

Learn more about IP addresse here:

https://brainly.com/question/31171474

#SPJ11

Explain why the receptionist responded as indicated in the following scenario.

Situation: Jim and Roger are meeting with the executives of the company. They are both wearing blue jeans, polo shirts, and ties. As they walk past the receptionist, he stops them and reminds them the dress code is white collar.

Answers

The receptionist is aware of the every day attire as he works there. Jim and Roger are undressed, since they were wearing blue jeans. The receptionist lets them know of what’s expected.

Hope this helps!

Select the correct navigational path to hide a worksheet.
Click the ____ tab on the ribbon to the Cells gallery.
Select ___ and use that drop-down menu to select ____.
Then Hide sheet.

Answers

Answer:

Home, Format, Hide & Unhide.

Explanation:

A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

What is nucleotide?

It is the sub units and buIlding blocks of DNA. It is made up of a five-sided sugar, phosphate group and then a nitrogen base.

These groups make the backbone of the DNA helix. If you look at a DNA helix, they make the side of the ladder or the side portion. They connect to a nitrogen base which make the steps of the ladder.  The type of sugar that is used in a DNA helix is called deoxyribose.

Nitrogen bases are the molecules that make up the steps of the ladders. There are four different nitrogen bases, namely; Guanine, Thymine,Adenine and Cytosine.

Pyrimidines are compounds that make a single 6-sided ring. Examples of pyrimidines are Cytosine and Thymine. Purines on the other hand make 5-sided and 6-sided rings.

Therefore, A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

Learn more about white blood cells on:

https://brainly.com/question/19202269

#SPJ5

How might telecommuting be implemented as an alternative work
arrangement in a carribbean country?

Answers

The first step is to assess the existing infrastructure and technological capabilities to ensure reliable internet connectivity and communication channels. Secondly, policies and guidelines need to be developed to govern telecommuting, including eligibility criteria, expectations, and performance metrics.

Training and support programs should be provided to help employees adapt to remote work environments. Additionally, collaboration tools and platforms should be implemented to facilitate communication and project management. Finally, monitoring and evaluation mechanisms should be established to assess the effectiveness of telecommuting and make necessary adjustments.

To implement telecommuting in a Caribbean country, it is crucial to evaluate the country's technological infrastructure and ensure that reliable internet connectivity is available to support remote work. This may involve investing in improving internet infrastructure and expanding broadband coverage to remote areas.

Once the technological foundation is established, policies and guidelines need to be developed to govern telecommuting. These policies should define eligibility criteria for employees, specify expectations and deliverables, and establish performance metrics to measure productivity and accountability. Clear communication channels should be established to keep employees informed and connected.

Training and support programs should be provided to help employees adapt to remote work environments. This may include training on the use of remote collaboration tools, time management, and maintaining work-life balance. Support systems such as IT help desks should be available to address technical issues and provide assistance.

Collaboration tools and platforms should be implemented to enable effective communication and project management. This may involve adopting video conferencing tools, project management software, and cloud-based document sharing platforms. These tools facilitate virtual meetings, file sharing, and real-time collaboration among remote team members.

To ensure the success of telecommuting, regular monitoring and evaluation should be conducted. This involves assessing productivity levels, employee satisfaction, and the overall impact on organizational goals. Feedback mechanisms should be in place to gather insights from employees and make necessary adjustments to improve the telecommuting experience.

By following these steps, telecommuting can be effectively implemented as an alternative work arrangement in a Caribbean country, providing flexibility for employees and contributing to a more efficient and resilient workforce.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

What will be the output produced by following code statements?(a) 87//5 (b) 87//5.0 (c) (87 // 5.0) ==(87//5) (d)(87 // 5.0) == int(87/5.0)​

Answers

What is coding?The act of writing computer code using programming languages is referred to as coding. The websites, apps, and other technology we use every day are programmed using coding. The terms "code" and "programming" are familiar to most people, both inside and outside of the computer community. Coding proficiency is necessary for many of the finest tech jobs. Understanding and interpreting code is crucial if you want to work in a lucrative area like software engineering, web development, or data science.

a) 87//5

output

17

b) 87//5.0

output

17.0

c) (87//5.0) == (87//5)

output

True

d) (87 // 5.0) == int(87/5.0)

output

True

To learn more about code, refer to

https://brainly.com/question/26098895

#SPJ1

Which of the following activities Best describes the use of marketing as a form of digital communication
OA An online discount clothing company sends an email about its upcoming sale,
OB. A teacher posts a list of assignments online for students to access
OG A doctor's office emails a patient to remind them about an upcoming appointment
OD. A friend downloads a new song by her favorite artist to her phone.
Reset
Next

Answers

hello!

the answer for this question is:

OA. An online discount clothing company sends an email about its upcoming sale.

hope this helps you!

It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.

Answers

Answer:

A. after you've created the presentation.

Explanation:

A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.

Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.

What is the difference between printer and printing
Give three things a printer can print​

Answers

Answer:

A printer is software that converts documents from computers into instructions for a print device to print on paper

Explanation:

it can print paper , carton , cards

When composing an email message, why might you want to use the bcc field?

Answers

Answer:to copy the email confidentiality

Explanation:

Why is cyber security an important part of sending information using digital signals

Answers

Cyber security is an important part of sending information using digital signals. Because it keeps data safe while stored in the cloud and when they are transmitted. Option D is correct.

What are cybersecurity functions?

Analysts in cybersecurity defend an organization's hardware and network infrastructure against hackers and cybercriminals looking to harm them or steal confidential data.

When conveying information via digital signals, cyber security is a crucial component. because it protects data as it is sent and stored in the cloud.

Hence, option D is correct.

To learn more about cybersecurity  refer;

https://brainly.com/question/27560386

#SPJ1

Why is cyber security an important part of sending information using digital signals

Which of the following devices is NOT required to successfully implement teleconferencing?
Sensor
Modem
Speaker
Microphone

Answers

Answer: a. Sensor

Explanation: Modem= internet

Speaker= able to hear

microphone = to speak

One of the most common uses of spreadsheet programs are communicating with others. O editing images and photos. O tracking and manipulating data. O creating meeting agenda notes.​

Answers

Answer:        tracking and manipulating data.

Explanation: A spreadsheet is nothing more than a large ledger like the ones accountants and office workers used years ago. It was a ruled paper that data and information was entered on in order to keep track of money, inventory, and other information.  Adding or subtracting from one column would change the totals and values overall. Now, with computers we have the electronic version and store the data on disc, flash drive or other connected media.

Answer:

 tracking and manipulating data.

Explanation:

Consider the textbook's implementation of the standard C library function strcpy in assembly language. Implement memset, strlen, strchr, strcat, and strcmp. Use $a0 through $a3 as necessary for the standard C library's arguments to each function. Return in $v0. Do *not* write a main program. You will be given a testing program soon. It is fine if a lot of your functions look a lot like each other. In fact, that's a good sign. Don't worry about overruns or exception cases

Answers

The implementation of standard C library functions using assembly language is as follows:memset:memset is implemented in assembly language as follows:memset:  addiu  jr $raHere, the pointer to the memory area to be filled with a constant byte (a1) is loaded from the stack and placed in the register a1.

The number of bytes to be filled with a constant byte (a0) is loaded from the stack and placed in the register a0. A zero byte is loaded into the register t0 from the byte addressed by a1. If t0 is zero, then the loop is terminated. If not, the loop continues.

A zero byte is stored at the address in a1, and one is added to the contents of a1. The byte addressed by a1 is loaded into the register t0, and if it is not zero, the loop continues.strlen:The strlen function is implemented in assembly language as follows:strlen:  addiu Here, a pointer to a null-terminated string (a0) is loaded from the stack and placed in the register a0. \

To know more about standard visit:

https://brainly.com/question/31979065

#SPJ11

true false 1. Data and information are NOT interchangeable terms. 2. The operating system is a type of application software. 3. The Ethernet port is an example of a connectivity port. 4. A typical CPU can complete billions of machine cycles in one second

Answers

Although the words "data" and "information" are sometimes used interchangeably, they are not the same thing. These elements' functions and subtle distinctions between them.

What is the main difference between information and data?

Data and information differ primarily in that material is made up of unprocessed, raw facts and statistics, whilst information is made up of processed, distilled data that may be used by decision-makers.

What aspect of a computer's operation transforms data into information?

Electronic circuits that understand and carry out program instructions as well as communicate with input, output, and storage devices make up the central processor unit. Data are actually converted into information by the central processing unit.

To know more about data visit :-

https://brainly.com/question/11941925

#SPJ1

How can I make Zoom work on a chromebook?

Answers

Answer:

Many schools rely on Chromebooks as part of regular classroom instruction but especially more so now to continue remote learning. Zoom makes it easy for students to use our video solution on a Chromebook. Open Chrome on the Chromebook and either go to the Chrome Web Store and search for Zoom or go directly to the Zoom entry in the Chrome Web Store.From the Zoom entry, click Add To Chrome and then, when prompted, click Add Extension.

Explanation:

Need answer ASAP I’ll mark brainliest if correct

How can you create a class without any methods, yet call a method from that class?

The class can___ methods from another class

Answers

the class can call methods from another class


hope that helps if you have any questions let me know and if you could mark this as brainliest i would really appreciate it!

To successfully sum all integers in an array, what should the missing line of code be: Java C# public static int sum_array(int[] myArray,int start) { if(start>myArray.length-1) { return 0; } //What goes here? }

Answers

The function should add the integer at the current index to the result of calling the function recursively with the next index as the starting point.

The missing line of code should call the function recursively to sum up all the integers in the array. The function should take two arguments, an array of integers and a starting index. The base case is when the starting index is greater than or equal to the length of the array, in which case the function should return 0. Otherwise, the function should add the integer at the current index to the result of calling the function recursively with the next index as the starting point. This process continues until the base case is met and the sum of all integers in the array is returned.

The index value can be calculated by multiplying the ratio of the current value to the reference value by 100. given that a gallon of petrol currently costs $3.10. Using a reference price of 56.7 cents from 1975, we must calculate the current price index number.

Learn more about current index here

https://brainly.com/question/28820475

#SPJ11

____ is an abstract class for reading character streams.
a. System.out
b. Reader
c. System.err
d. OutStream

Answers

b. Reader is an abstract class for reading character streams.

An abstract class is a template definition of methods and variables in a specific class, or category of objects. In programming, objects are units of code, and each object is made into a generic class. Abstract classes are classes that contain one or more abstracted behaviors or methods.An abstract class is a template definition of methods and variables in a specific class, or category of objects. In programming, objects are units of code, and each object is made into a generic class.

Abstract classes are classes that contain one or more abstracted behaviors or methods. Objects or classes can be abstracted, which means that they're summarized into characteristics relevant to the current program's operation. Abstract classes are used in all object-oriented (OOP) languages, including Java, C++, C# and VB.NET.

learn more about   abstract class here:

https://brainly.com/question/13072603

#SPJ11

Reader is an abstract class in Java that serves as the superclass for all classes that read characters from a stream.

In Java, Reader is an abstract class for reading character streams, which provides a framework for reading characters from various sources such as files, network connections, or other input streams.

The Reader class is an abstract class, which means that it cannot be instantiated directly but must be subclassed to be used. Subclasses of Reader include FileReader, which is used to read characters from a file, and InputStreamReader, which is used to read characters from an input stream.

System.out and System.err are not related to reading character streams but are used for writing output and error messages to the console, respectively.

OutStream is not a valid class in Java, so the correct answer is (b) Reader.

Learn more about java here:

https://brainly.com/question/30354647

#SPJ11

what are the prerequisites to integrate qualys with servicenow cmdb

Answers

To integrate Qualys with ServiceNow CMDB, there are a few prerequisites that need to be fulfilled. These prerequisites include: Access to both Qualys and ServiceNow: To integrate Qualys with ServiceNow CMDB, you need to have access to both the Qualys and ServiceNow platforms.

Qualys API access: To integrate Qualys with ServiceNow CMDB, you need to have access to the Qualys API. You will need to generate an API key from the Qualys platform and ensure that the key has the necessary permissions to access the data you want to integrate. ServiceNow API access: To integrate Qualys with ServiceNow CMDB, you need to have access to the ServiceNow API.

You will need to generate an API key from the ServiceNow platform and ensure that the key has the necessary permissions to access the data you want to integrate. Data mapping: Before you can integrate Qualys with ServiceNow CMDB, you need to map the data fields from Qualys to the corresponding fields in ServiceNow. This will ensure that the data is properly synced between the two platforms. Integration setup: Finally, you need to set up the integration between Qualys and ServiceNow CMDB. This can be done using a third-party integration tool or by writing custom scripts to handle the data transfer. Overall, integrating Qualys with ServiceNow CMDB can be a complex process, but with the right tools and expertise, it can be done successfully. The prerequisites to integrate Qualys with ServiceNow CMDB include access to both Qualys and ServiceNow, Qualys API access, ServiceNow API access, data mapping, and integration setup.To integrate Qualys with ServiceNow CMDB, the prerequisites are as follows: ServiceNow Instance: Ensure you have an active ServiceNow instance running on a supported version. Qualys Subscription: You need a valid Qualys subscription with access to Vulnerability Management and/or Policy Compliance modules. ServiceNow App: Install the "Qualys Vulnerability Integration" app from the ServiceNow Store on your ServiceNow instance. Qualys API Credentials: Obtain the API credentials (username and password) for your Qualys account, which will be used for the integration setup. ServiceNow API Credentials: Obtain the API credentials (username and password) for your ServiceNow instance, which will be used in the Qualys integration setup. Define Asset Groups: Identify and define asset groups in Qualys that you want to synchronize with ServiceNow CMDB.

To know more about Qualys visit:

https://brainly.com/question/31200365

#SPJ11

In reality, the page fault handler code must also reside in pages in memory, and might, under some circumstances (e.g., FIFO page replacement policy) itself be removed. what could be done so that the page fault handler could not be removed?

Answers

To prevent the page fault handler from being removed under certain circumstances such as FIFO page replacement policy, it could be added to a list of kernel processes that should always remain in memory.

This list is known as the "swapper space".In reality, the page fault handler code must also reside in pages in memory, and might, under some circumstances (e.g., FIFO page replacement policy) itself be removed.

To prevent the page fault handler from being removed under certain circumstances such as FIFO page replacement policy, it could be added to a list of kernel processes that should always remain in memory. This list is known as the "swapper space". This is an area of memory that is never swapped out to disk and is always kept in RAM.

Learn more about memory at:

https://brainly.com/question/30886136

#SPJ11

an obvious shortcoming of ____ control is that, by the time a supervisor has the information, its often too late

Answers

The obvious shortcoming of retrospective control is that, by the time a supervisor has the information, it's often too late.

Retrospective control involves monitoring and evaluating performance based on past data or events. It relies on historical information to assess performance and make corrective actions after a problem has occurred or a deviation from desired outcomes has been identified.

The inherent limitation of retrospective control is that it is reactive in nature. By the time the supervisor receives the information and identifies an issue, the problem may have already occurred or had significant consequences. This delay in obtaining and analyzing information can result in missed opportunities for immediate intervention or timely corrective actions.

To overcome this shortcoming, organizations often implement proactive or real-time control systems that provide timely feedback and allow supervisors to monitor performance in real-time or near real-time. Proactive control enables supervisors to take prompt action, make adjustments, and prevent potential issues before they escalate.

By combining proactive and retrospective control measures, organizations can achieve a more comprehensive control system that addresses both immediate concerns and future performance improvement.

Learn more about control system at: https://brainly.com/question/13407997

#SPJ11

The simulation kept track of the time and automatically recorded data on cart displacement and velocity. If the cart trials were run with a real cart and fan using meter sticks and stopwatches, how might the data compare? check all that apply.

Answers

The simulation kept track of the time and automatically recorded data on cart displacement and velocity, the way that the data might compare is options:

A. There would be variables that would be hard to control, leading to less reliable data.

C. Meter sticks may lack precision or may be read incorrectly.

D: B:  Meter sticks may lack precision or may be read incorrectly.

E. Human error in recording or plotting the data could be a factor.

What are the simulation about?

A simulation is the repeated imitation of the behavior of a system or process in the real world. Models are necessary for simulations; whereas the simulation depicts the model's evolution over time, the model represents the essential traits or behaviors of the chosen system or process.

Real time exercises are designed to be inaccurate; therefore, they are repeated many times, with the average score serving as the final score.

Therefore, Having carried out this deed, it demonstrates to us that the Results are unreliable or imperfect, which effectively forces us to make the decisions listed above.

Learn more about simulation from

https://brainly.com/question/11821335
#SPJ1

See full question below

The simulation kept track of the variables and automatically recorded data on object displacement, velocity, and momentum. If the trials were run on a real track with real gliders, using stopwatches and meter sticks for measurement, how might the data compare? Check all that apply.

- There would be variables that would be hard to control, leading to less reliable data.

- The data would be just as valid if it were recorded with a stopwatch.

- Meter sticks may lack precision or may be read incorrectly.

- Real glider data may vary since real collisions may involve loss of energy.

- Human error in recording or plotting the data could be a factor.

- Controlling real glider velocities by hand would be just as accurate as simulation controls.

It is easier to organize data and retrieve it when there is little or no dependence between programs and data. Why is there more dependence in a file approach and less in the database approach?

Answers

In a file approach, there is more dependence between programs and data, while in a database approach, there is less dependence.

This is because the file approach stores data in separate files specific to each program, leading to tight coupling between programs and their corresponding data. In contrast, the database approach utilizes a centralized database system that allows data to be shared and accessed by multiple programs, reducing dependence and enabling easier organization and retrieval of data.

The file approach involves storing data in individual files associated with specific programs. Each program is responsible for managing its own data files, resulting in a high degree of dependence between programs and data. If multiple programs need access to the same data, they would have to duplicate and maintain separate copies of the data, leading to redundancy and potential inconsistency issues. This tight coupling between programs and their specific data files makes it more challenging to organize and retrieve data efficiently.
On the other hand, the database approach utilizes a centralized database system that provides a shared repository for storing and managing data. The database is designed to handle multiple applications or programs, allowing them to access and manipulate data as needed. This centralized approach reduces dependence by decoupling programs from the specific organization and storage of data. Programs can interact with the database through standardized interfaces, such as SQL, which abstracts the underlying data storage details. This abstraction enables easier organization and retrieval of data, as programs can access and retrieve data from the database without having to directly manage individual files. Overall, the database approach promotes data independence and facilitates better organization and retrieval of data compared to the file approach.

learn  more about database here

https://brainly.com/question/6447559



#SPJ11

What theorems do we need to know for ap calculus ab.

Answers

Answer: Intermediate Value Theorem.

Extreme Value Theorem.

Mean Value Theorem for Derivatives.

Rolle's Theorem.

Fundamental Theorem of Calculus (two parts)

Mean Value Theorem for Integrals.

Explanation:

Other Questions
Many psychologists differ in their opinions on child labor. Some believe that it is wrong without exception. Others attempt to take cultural traditions into account. What does the United Nations have to say about children's rights can soomeone plz help me On February 26, Berkshire Hathaway closed at $197,690 per share. One year earlier, one share closed at $223,970. What was an approximate one-year percent change? the angular clasts typical of breccia indicate what about the distance of transport? What type of machine is used to measure the location of an earthquake epicenter. what is the subject of a map 3. Por qu es importante para el ser humano ser libre? i really need help on my question! find the volume of a cone with diameter 12 m and height 20 m. a. 40 pi m3 c. 240 pi m3 b. 120 pi m3 d. 720 pi m3 Multiply PolynomialsWARM-UPMultiply 2x(x2 + 5).2x3 + 10x22x3 + 10x2x2 + 10x0 2x + 5xDONE What Gremlin terrorizes Kingston Falls on Christmas Eve? Dr,Goode prescribes 0.2 grams of cold medicine for Donald. This medicine comes in tablets that are 0.5 grams or 0.05 grams. Should Donald dark 4 of the 0.5 gram tablets or 4 of the 0.05 gram tablets? What conflict control missy are you exhibiting if you deal with people in a way that does not fit in what were the two waves of immigrants called How could learning philosophy teach a man to "life worth living"?Please help me! Which inequality has an arrow pointing to the left when the solution set is graphed on a number line? X_-8 x>6On edg A professional-looking presentation includes: a. multiple focal points.b. a variety of text sizes and fonts.c. consistent use of color and images.d. limited white space surrounding objects what is 0.93 as a percent? at the beginning of year 2 clair company had a $5,500 balance in its retained earnings account. during january of year 2 clair earned $2,000 of revenue and incurred $1,400 of expenses. based on this information, the balance in retained earnings account on january 31, year 2 is Suraj drank 3/4 of the water kept in the container the amont of waterr remaingwas 100 ml how much water was there in the container before he drank it which broad economiic goal is related to the extent to which the people in a society can provide for their own well-being even durin a crisi