HELP NOW PLS now now now

HELP NOW PLS Now Now Now

Answers

Answer 1

Answer:

6.enable data to pass between computers in a network to aid communication between users. As a network engineer, you'll have responsibility for setting up, developing and maintaining computer networks within an organisation or between organisations.

7.Sony

At times, what seems to be an effective value network can also be vulnerable to quickly losing effectiveness. At one time, Sony Corporation set up a value network designed to have a "one-stop" gaming experience for its customers. From 2003 to 2008, Sony designed an all-encompassing gaming portal. However, the network was disrupted when computer hackers began breaking into the system and retrieving sensitive banking data from the network users. As a result, the effectiveness of the network was severely compromised.

Explanation:


Related Questions

What is a word processing program? Give examples of word processing programs.

Answers

Answer:

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

If an audio signal is to be coded, either for compression or for digital transmission, it must undergo some form of quantization. Most often, a general technique known as vector quantization is employed for this task, but this technique must be tailored to the specific application so it will not be addressed here. In this assignment, we will observe the effect of uniformly quantizing the samples of two audio signals.
a) Record your voice for 4 seconds and play it again using predefined MATLAB audio functions.
b) Use your Uquant function to quantize each of these signals to 7, 4, 2 and 1 bits/sample.
c) Listen to the original and quantized signals and answer the following questions using the comments in the same MATLAB file:
1- For each signal, describe the change in quality as the number of b/sample is reduced?
2- For each signal, is there a point at which the signal quality deteriorates drastically?
3- At what point (if any) does it become incomprehensible?
4- Which signal's quality deteriorates faster as the number of levels decreases?
5. Do you think 4 b/sample is acceptable for telephone systems? ... 2 b/sample?
d) Use subplot to plot in the same figure, the four quantized speech signals over the index range 7201:7400.

Answers

Answer:

bakakkallalalnabzjs d bannn my account pls

Suppose a class Car and its subclass Honda both have a method called speed as part of the class definition. rentalH refers to an object of the type Honda and the following statements are found in the code: rentalh.cost(); super.speed(); what will the first statement do?
A. Nothing will be called since the code will not compile as a result of multiple definitions of speed.
B. The cost method in Car will be called.
C. The cost method in Honda will be called.
D. Overloading will be used to determine which cost method to use.

Answers

Answer:

C. The cost method in Honda will be called.

Explanation:

The first statement will cause the cost method in Honda to be called. This is because rentalh is a object of the subclass Honda. Therefore, any method that is called using this object variable will target the elements within the Honda subclass. In this case, the cost() method is being called using the rentalh variable which will look for the cost() method within the scope of the Honda subclass. In order to target the parent class Car it would need to be called using the super variable as in statement 2.

What is a
a program​

Answers

Answer:

-a collection of related measures or activities aimed at achieving a specific long-term goal.

-a set of pre-programmed software instructions for controlling the operation of a computer or other machine

-provide (a computer or other machine) with pre-programmed instructions for completing a task automatically

-Organize according to a schedule or plan.

Explanation:

Answer:

A program is an set of instructions given by a computer to perform particular task

Question # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.

Answers

Your answer is outline.

An outline is the tool that will help you the most when developing the content you will use in your presentation.

What is presentation?

A presentation is a method of communicating information from a speaker to an audience.

Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.

An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.

It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.

A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.

Thus, the answer is outline.

For more details regarding presentation, visit:

https://brainly.com/question/938745

#SPJ7

What is congnitive overload

Answers

Explanation:

is a situation where the teacher gives too much information or too much many tasks to Learners simmultaneously , resulting in the learner being unable to process this information

Answer:

Cognitive loadLanguageWatchEditIn cognitive psychology, cognitive load refers to the used amount of working memory resources. There are three types of cognitive load: intrinsic cognitive load is the effort associated with a specific topic; extraneous cognitive load refers to the way information or tasks are presented to a learner; and germane cognitive load refers to the work put into creating a permanent store of knowledge (a schema).Cognitive load theory was developed in the late 1980s out of a study of problem solving by John Sweller.[1] Sweller argued that instructional design can be used to reduce cognitive load in learners. Much later, other researchers developed a way to measure perceived mental effort which is indicative of cognitive load.[2][3] Task-invoked pupillary response is a reliable and sensitive measurement of cognitive load that is directly related to working memory.[4] Information may only be stored in long term memory after first being attended to, and processed by, working memory. Working memory, however, is extremely limited in both capacity and duration. These limitations will, under some conditions, impede learning. Heavy cognitive load can have negative effects on task completion, and it is important to note that the experience of cognitive load is not the same in everyone. The elderly, students, and children experience different, and more often higher, amounts of cognitive load.The fundamental tenet of cognitive load theory is that the quality of instructional design will be raised if greater consideration is given to the role and limitations of working memory. With increased distractions, particularly from cell phone use, students are more prone to experiencing high cognitive load which can reduce academic success.[5]

Explanation:

Hope it helps ^-^

#CarryOnLearning

Blank Are input instructions you give to a computer

Answers

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

How can a DevOps team take advantage of Artificial Intelligence (AI)?

Answers

Answer:

AI/ML can help DevOps teams focus on creativity and innovation by eliminating inefficiencies across the operational life cycle, enabling teams to manage the amount, speed and variability of data. This, in turn, can result in automated enhancement and an increase in DevOps team's efficiency.

Explanation:

Produce a program using a loop that requests for 8 floating point numbers from a user.once provided the program should calculate the average of all numbers that are less than 10.5

Answers

Answer:

The program in Python is as follows:

total = 0

count = 0

for i in range(8):

   num = float(input())

   if num < 10.5:

       total+=num

       count+=1

print("Average: ",total/count)

Explanation:

This initializes the total to 0

total = 0

This initializes the count to 0

count = 0

This loop is executed 8 times

for i in range(8):

This request for float number

   num = float(input())

If input is less than 10.5

   if num < 10.5:

The sum is taken

       total+=num

And count is incremented by 1

       count+=1

The loop ends here

This calculates and prints the average

print("Average: ",total/count)

What most defines a community in the digital age?

Answers

The information age of people texting talking on a cellular device and browising the internet

1 convert (101011)2 ( )10 ? convert(596)10= ( )16 ? convert( 101011101)2 ( )16 ? convert(37)10= ( )2 ?​

Answers

Question:

(a) convert (101011)₂ = ( )₁₀ ?

(b) convert(596)₁₀= ( )₁₆ ?

(c) convert( 101011101)₂ = ( )₁₆ ?

(d) convert(37)₁₀= ( )₂ ?​

Answer:

(a) (101011)₂ = ( 43)₁₀

(b) (596)₁₀= ( 254)₁₆

(c) ( 101011101)₂ = ( 15D)₁₆

(d) (37)₁₀= ( 100101)₂

Explanation:

(a) convert (101011)₂ = ( )₁₀

This means that (101011)₂ be converted to base 10 (decimal).

To convert from binary to decimal, find the sum of the binary digits times their power of 2. i.e

(101011)₂ = 1 x 2⁵ + 0 x 2⁴ + 1 x 2³ + 0 x 2² + 1 x 2¹ + 1 x 2⁰

(101011)₂ = 1 x 32 + 0 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1 x 1

(101011)₂ = 32 + 0 + 8 + 0 + 2 + 1

(101011)₂ = 43₁₀

Therefore, (101011)₂ = ( 43)₁₀

(b) convert(596)₁₀= ( )₁₆

This means that (596)₁₀ be converted to base 16 (hexadecimal).

To convert from decimal to hexadecimal,

i. start by dividing the decimal number by 16 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 16 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

16 | 596

16 | 37 r 4

16 | 2 r 5

    | 0 r 2

Now combine the remainders starting from the bottom up. i.e

254₁₆

Therefore, (596)₁₀= ( 254)₁₆

(c) convert ( 101011101)₂ = ( )₁₆

This means that (101011101)₂ be converted to base 16 (hexadecimal).

To convert from binary to hexadecimal,

i. starting from the rightmost bit, group the binary digits into a group of 4 bits as follows

101011101 => 1   0101    1101

ii. the group that does not contain 4 bits is padded with 0s

101011101 => 0001   0101    1101

iii. using the hexadecimal table, convert each group to hexadecimal as follows.

0001 = 1

0101 = 5

1101 = D

iv. combine the result

15D

Therefore, ( 101011101)₂ = ( 15D)₁₆

(d)  convert(37)₁₀= ( )₂

This means that (37)₁₀ be converted to base 2 (binary).

To convert from decimal to binary,

i. start by dividing the decimal number by 2 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 2 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

2 | 37

2 | 18 r 1

2 | 9 r 0

2 | 4 r 1

2 | 2 r 0

2 | 1 r 0

  | 0 r 1

Now combine the remainders starting from the bottom up. i.e

100101₂

Therefore, (37)₁₀= ( 100101)₂

What tells the hardware what to do and how to do it?

Central Processing Unit (CPU)

Software

Hardware

Hard Drive (HDD)

Answers

Answer:

Software

Explanation:

Software directs a set of instructions to computer hardware and tell them what to do and how to do it.

binary calculation of 1110÷101​

Answers

10.90 not sure tho. POWKSKS
10.99009900990099





Would be the answer

What is edge computing?

Answers

Answer:

I basically means something like the cloud, where your data is uploaded to servers and is then processed and transferred back to you when you need it.

Explanation:

Hope this helps :)

A de-centrally-powered, fully accessible IT architecture that always enables mobile computer technology as well as internet technologies, is determined as Edge computing.

Processing is done through edge computing, instead of sent off to the server farm, either by the equipment rather than via a localized server computer system.

Examples of edge computing include:

Smart grid excellent analysis.Oilfield rigs security monitoring.Video streaming.Drone-enabled agricultural management.

Learn more about edge computing here:

https://brainly.com/question/22646214

Precipitation patterns in gulf Mexico

Answers

Is there a diagram for what your asking ?

Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled architecture b. Symmetric multiprocessors are a popular form of tightly coupled architecture c. Tightly coupled multiprocessors share a single centralized memory, which requires an operating system to synchronize processes carefully to ensure protection d. Loosely coupled multiprocessors have a physically distributed memory and are also known as distributed systems

Answers

Answer:

The statement about Multiprocessors that is FALSE is:

a. Asymmetric multiprocessors are a popular form of tightly coupled architecture

Explanation:

Symmetric multiprocessors house two or more identical processors sharing a single main memory.  The multiprocessors are tightly coupled, and all of them can access all the connected devices without any preferential treatment of one over the others.  This is unlike asymmetric multiprocessors that do not share a single main memory.   Instead, they have distributed memories.

Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above

Answers

Answer:

d

Explanation:

g Write a function named find_min that takes two numbers as arguments and returns the minimum of the two. (Behavior is not specified for which to return, if they are even -- we won't test that case.) For example: Given 2 and 4, the function returns 2 as the minimum.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

void find_min(int x,int y)//defining a method find_min that takes two parameters

{

   if(x<y)//use if to check x less than y

   {

       cout<<x;//print value x

   }

   else//else block

   {

       cout<<y;//print value y

   }

}

int main()//main method

{

   int x,y;//defining integer variable

   cout<<"Enter first number: ";//print message

   cin>>x;//input value

   cout<<"Enter second number: ";//print message

   cin>>y;//input value

   find_min(x,y);//calling method

   return 0;

}

Output:

Enter first number: 4  

Enter second number: 2  

2

Explanation:

In this code, a method "find_min" that takes two integer variable "x,y" in its parameters and use if block to check its value and print is value.

In the main method, we declared two integer variable "x,y" that takes value from user-end, and pass the value into the method that prints its calculated value.

list with ecamples five important applications areas of computer today​

Answers

Answer:

Banking

Education

Business

Engineering and Architectural designs

Health

Explanation:

Banking : Shifting from the manual method of having to input information into hard book ledgers. Data and payment information can now be stored on computers. This may be used to prevent information duplication, forecasting and efficient payment purposes.

Education : With the use of computers today, students can now take computer based tests which are not only easily accessible and curtails geographical issues, they are also faster.

Business : With computers, businesses can now manage and their store customer information, inventory management and sales tracking.

Engineering and Architectural designs : With computers, thesw fields can now boast of computer aided designs which allows experts produce both 2 and 3 - dimensional prototype of equipments, buildings, building plans or other engineering structures.

Health : Adequate health record, patient appointment, digitally monitored pulse rate are some of the uses of computers in medicine.

A major university develops an assessment that is meant to provide data on whether potential students will be successful at the university level. If there is a relationship between the results of the assessment and student success, that will best indicate that the assessment has:___.

Answers

Answer:

Predictive validity.

Explanation:

A correlation can be defined as a numerical measure of the relationship existing between two variables (x and y).

In Mathematics and Statistics, a group of data can either be negatively correlated, positively correlated or not correlated at all.

1. For a negative correlation: a set of values in a data increases, when the other set begins to decrease. Here, the correlation coefficient is less than zero (0).

2. For a positive correlation: a set of values in a data increases, when the other set also increases. Here, the correlation coefficient is greater than zero (0).

3. For no or zero correlation: a set of values in a data has no effect on the other set. Here, the correlation coefficient is equal to zero (0).

A predictive validity can be defined as a measure of the extent to which a test score on a scale is able to predict scores based on certain criteria. Thus, it's a measure of the degree to which a certain criteria can predict future behavior or performance.

One of the most common area in which predictive validity is used is in university or college admissions such as in how scores on an assessment or test are related to performance based on a standard or criterion.

In this scenario, there exists a statistical relationship between the results of the assessment conducted and number of students who were successful. Thus, this will best indicate that the assessment has predictive validity.

Software that enables the organization to centralize data is called A. Data Repository B. Data Base Management System C. Data Warehouse D. Data Mart E. Data File

Answers

Answer:

B. Data Base Management System

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).

how you plan to deal with stress?

Answers

I plan to deal with stress by distracting my self in what I do with my daily life. One way to deal with stress is by listening to music or exercising. Both of these are distractions and help keep things off your mind.

3. Why is human resource plan made​

Answers

Answer: See explanation

Explanation:

Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.

Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.

Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.

write a program to display your name, age and address in c programming​

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   char name[] = "Mr. Royal";

   int age = 20;

   char address[] = "Lagos, Nigeria";

   printf("Your name is %s.\n", name);

   printf("You are %d years old\n", age);

   printf("Your address is %s.", address);

   return 0;

}

Explanation:

This initializes the name

  char name[] = "Mr. Royal";

This initializes the age

   int age = 20;

This initializes the address

   char address[] = "Lagos, Nigeria";

This prints the name

   printf("Your name is %s.\n", name);

This prints the age

  printf("You are %d years old\n", age);

This prints the address

  printf("Your address is %s.", address);

Change the necessary details to yours

What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?

Answers

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

Which avenue may utilize video streaming, audio narration, print designs and animation?

The (blank) may utilize video streaming, audio narration, print designs and animation.

Answers

Answer:

Explanation:

Multimedia medium may utilize video streaming, audio narration, print designs and animation as they are all part of it.

Answer:

Explanation:

ans is multimedia as it contains all of 'em

What tasks do date entry macros commonly perform?

Answers

Answer:

set a default date

Explanation:

Date entry macros are used to seta  default date.

Date macros can be used to  create custom date formats.

What protects your computer so that it doesn’t get a computer virus?

Internet Browser

Antivirus Software

Keyboard Protector

My Teacher

Answers

Answer:

Antivirus Software

Explanation:

I believe Antivirus Software.

Sorry if I am wrong.

Answer:

Antivirus Software

Explanation:

Antivirus scans the incoming files or code that has been passed through your network traffic. Companies who build these softwares maintain a database of viruses that are already known. That database teaches the antivirus to remove, flag or quarantine any viruses in your computer.

What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support? Ethereum Hyperledger Fabric Multichain IOTA

Answers

Ethereum is the correct answer.

Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken

Answers

Solution :

[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

step 3: [tex]$\text{wallSensed}$[/tex]=false

step 4: [tex]$\text{numberOfSteps}$[/tex] = 0

step 5: if([tex]$\text{wallSensed}$[/tex]==true) then

[tex]\text{lower arms}[/tex]

step

else

if(sense)

[tex]$\text{wallSensed}$[/tex]=true;

else

step

[tex]$\text{numberOfSteps}$[/tex]++;

step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall

[tex]\text{Algorithm to}[/tex] turn around:

Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then

turn

[tex]\text{raise arms}[/tex]

turn

 

[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:

Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]

Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do

step

[tex]\text{Algorithm to}[/tex] sit back down:

Step [tex]1[/tex]: sit

Step 2: Lower arms

Other Questions
When you press on a circular table of radius 0.5 m, with a force of 20N, what will be exerted pressure?50pa25pa40N/m10N.mAnswer and I will give you brainiliest What is the momentum of a lab cart with a mass of 0.60 [kg] and a speed of 2.2 [m/s]?-3.67 [kg m/s)-0.27 [kg m/s]-1.32 [kg m/s)-0.82 [kg m/s) mga salik ng kanlurang asya I'm kinda stuck, can anyone help?? Please :) I need an explanation Which of the following is an appropriate care step for a child or infant with a heat-related emergency, like heat cramps?A) Apply sunscreen on the skin to guard against the sun.B) Get the child or infant out of the heat and into a cooler place.C) Have the child or infant drink a lot of water very fast.D) Put more layers of clothing on the child or infant to guard against the heat. A student began a proof of the law of sines using triangle xyz. His work is shown. The student has ____ started the proof. The next step in the proof is to ____. Then the student should _____. which law protect citizebs from human rights violation you should refrain from running or playing on wet and smooth surfaces after a dip in the following swimming pool. Math riddle!A small number of cards has been lost from a complete pack. If I deal among four people, three cards remain. If I deal among three people, two remain and if I deal among five people, two cards remain. How many cards are there? Can someone please tell me what this is a shaved for the first time and I dont know what the red stuff is and I dont know if there are any ingrown hairs there is hairs there but I dont know if they are ingrown also how long will it take for this to go away this is my leg btw Which is the value of 2.3 - (-2.3)? If a cat can exert 2000N Of Force to move a trailer 50m is 20 seconds how much power did the car use ? Change all the sentences as told in the bracketA parcel of books was received (present perfect). Many workers have been suspended (simple past)Ram as well as his son was arrested ( Past perfect)Neither his father nor his mother can help him to overcome the situation ( simple past)He as well as I is going (Present perfect)The police have arrested the thief (future perfect) What is the first step you will use to solve this equation:4x +2 = 7x - 13 Help pls quickly Read the excerpt from a rough draft of an essay Linda is writing for her social studies class.World War Il involved many of the world's most powerful nations. Germany was trying to create a large empire in Europe. The war began in1939 when Germany invaded Poland. Britain and France declared war against Germany. Japan was also involved in the war. Japan wanted to buildan empire in Asia and the Pacific. In 1941, Japan bombed Pearl Harbor, an American military base in Hawaii. This made the United States go to warwith Japan Japan invaded many other countries. A major turning point in the war occurred when Japan was defeated at the Battle of Midway in1942. Germany invaded other countries such as Norway and Denmark in 1940. Next, Germany invaded France.Linda needs to reorganize her writing.Which would be the best organizational structure for her to use?O 1. by topic2. chronological order3. by order of importance4. problem and solution When Joshua's income increases, he purchases more prime-rib dinners than he did before his income increased. For Joshua, prime-rib dinners are Group of answer choices a normal good. an inferior good. an optimal good. a Giffen good. One triangle has a weight of 6 grams. What is the weight of one square? PLS HELP I WILL GIVE BRAINLIEST Calculate the area of the figure.HELP Use the Information from the lesson to answer the questions that follow.Little Crazy's pizza is expensive, not to mention terrible. It's greasy, the crust is stale, and it costs a whopping $4 a slice! Big Berto's slices are also overpriced. They've even been accused of using moldy cheese. Arnold's Out-This-World Pizza doesn't even sell by the slice, and their pies take three hours to make. Why would you eat at any of these places when you could eat at Uncle Sano's? Uncle Sano's sells by the slice or the pie. The pizzas are cheesy. The sauce is heavenly. The crust is fresh from the oven every time. It's cheap, too. Come into Uncle Sano's clean, spacious shop for quick service and tasty food today!Which of the following best describes what the above ad does?condemnsendorsesendorses, then condemnscondemns, then endorsesneither condemns nor endorses