2 while trying to solve a network issue, a technician made multiple changes to the current router configuration file. the changes did not solve the problem and were not saved. what action can the technician take to discard the changes and work with the file in nvram?

Answers

Answer 1

The technician take to discard the changes and work with the file in NV ram is Reload the settings without saving the current state beforehand.

What is NVRAM?Random-access memory that maintains data even when no power is applied is called non-volatile random-access memory. In contrast, both static random-access memory and dynamic random-access memory are kept up to date. For quicker startup times, computer makers primarily employ NVRAM to store information about the status of the device. This enables data about the computer's parts and gadgets to be kept on hand between uses even when the system power is off. Today's flash memory, like that found in a Jump drive, is a good example of NVRAM. Your computer monitor, printers, vehicles, smart cards, and other devices that need settings to be remembered also use NVRAM.

To learn more about NVRAM, refer to:

https://brainly.com/question/5161640

#SPJ4


Related Questions

You want to connect the lan port on a router to the uplink port on a switch. The switch does not support auto-mdi. Which type of cable should you use?.

Answers

You should use a lan port but if that doesnt work than contact nintendo

Mackenzie is the network administrator for a large security corporation. What task might Mackenzie perform as part of her job?

Answers

Since, Mackenzie is the network administrator for a large security corporation, the task that  Mackenzie can perform as part of her job is option C: connecting a new computer to the network.

What does an administrator of a network do?

A network administrator is known to be any person that does the day-to-day management of these networks is the responsibility or the role of network and computer system administrators.

Their role is that they plan, set up, and provide maintenance for a company's computer systems, such as LANs, WANs, network segments, intranets, and other kinds of system that are used for data communication.

Therefore, Since, Mackenzie is the network administrator for a large security corporation, the task that  Mackenzie can perform as part of her job is option C: connecting a new computer to the network.

Learn more about network administrator from

https://brainly.com/question/5860806
#SPJ1

Mackenzie is the network administrator for a large security corporation. What task

might Mackenzie perform as part of her job?

O answering calls from customers who need help

developing a website for the corporation

connecting a new computer to the network

testing a new video game before its release

a computer program consists of two blocks written independently by two different pro- grammers. the first block has an error with probability 0.2. the second block has an error with probability 0.3. if the program returns an error, what is the probability that there is an error in both blocks?

Answers

Using the probability of independent events, it is found that there is a 0.06 = 6% probability that there is an error in both blocks.

What is probability?Mathematical representations of the likelihood of an event occurring or of a proposition being true are dealt with in the area of probability.The probability of an event is a number between 0 and 1, where 1 denotes certainty and 0 normally denotes impossibility.Gonna determine how likely something is to occur, use probability. Many things are hard to predict with 100% certainty.We can only forecast how likely an event is to occur using it, or how likely it is to occur.P (E) = Number of positive results and The formula for determining an event's probability uses the total number of possible outcomes. Probability is hence the possibility that a random occurrence will take place.

If two occasions, A and B, are separated, the probability of both happening is the expansion of the probability of each ensuing, that is:

P(A ∩B)= P(A)P(B)

In this problem, the possibilities are:

Event A: Error on the first block, with 0.2 probability, hence

P(A)=0.2

Event B: Error on the second block, with 0.3 probability, hence

P(B)=0.3

The probability that there is an error in both blocks is:

P(A ∩B)= P(A)P(B)= 0.2(0.3)=0.06

0.06 = 6% probability that there is an error in both blocks.

To learn more about probability, refer to:

https://brainly.com/question/24756209

#SPJ4

Implement the firstOnly method so that it returns the first character of the 5 parameters a, b, c, d and e concatenated together.

Answers

Alternatively , two strings merge in Java in an alternate form , then the first character of final string is first character of the string which is final. The character which is second of the final string is said to be first character of the string which is said to be second.

What is Java ?

Java is defined as a programming language which is used by developers to form laptop's application, game consoles, scientific computers which are known as supercomputers and many more devices.

Java is known as world's third most famous language programming after C and Python which evaluates the popularity of programming language. Java is popularly known as computing platform and programming language.

Therefore, Alternatively , two strings merge in Java in an alternate form , then the first character of final string is first character of the string which is final. The character which is second of the final string is said to be first character of the string which is said to be second.

Learn more about java here:

https://brainly.com/question/12978370

#SPJ1

1 color blindness is a recessiv sex linked disorder in humans.a color blind man has a child with woman who is carrier of the disorder
2 illustrate using a pannet square the probability of having a children who will have normal vission and children who will be color blind
3 use the given data to illustrate sex linked genes by punnet square

Answers

When the color blind man is married to the woman who is the carrier of this disorder. The probability of having normal vision in their children is 1/4 or 25%. While the probability of having colorblind offspring is 3/4 or 75%.

What is Colorblindness?

Colorblindness may be defined as a type of X-linked recessive disorder that impacts the normal vision of an individual. An individual who is suffering from this disorder can not be able to discriminate between the red and green colors specifically.

According to the context of this question, when a colorblind man is interbred with a carrier woman, the genotypes of their offspring are [tex]X^CX^C, X^CY, X^CX, and XY[/tex]. For your better understanding, the Punnett square is given below:

Therefore, the probability of having normal vision in their children is 1/4 or 25%. While the probability of having colorblind offspring is 3/4 or 75%.

To learn more about Colorblindness, refer to the link:

https://brainly.com/question/16844046

#SPJ1

1. 2. 3 Units

Assuming an optical disk has a capacity

of 25GB, how many 60 minute HD videos

of 3. 9GB each could be stored on the

disk?

Answers

Approximately 6 videos, each has 60 minutes duration and 3.9 GB capacity can be stored on a 25GB optical disk.

In this question, it is asked to calculate how many videos can be stored on a 25 GB optical disk. So, the calculation is given below:

The optical disk has a capacity of 25GB.

Each video's required storage is 3.9 GB which has 60 minutes in duration.

First, we calculate how many videos can be stored on an optical disk that has 25 GB capacity.

For this purpose, we need to divide the capacity of each video by the total capacity of an optical disk which is 25 GB.

So,

25/3.9 = 6.410 number of videos (~ 6 videos)

Therefore, 6 videos of 60 HD minutes can be stored on the 25 GB optical disk.

You can learn more about optical disk at

https://brainly.com/question/28066311

#SPJ4

In most modern programming languages, a variable or constant that is declared in a module is _____ in that module.

Answers

In most current programming languages, a variable or constant that is declared in a module is in scope in that module.

Why are constants used in programming?Constants are data values that remain the same each time a program is run. It is not envisaged that constants' choice change. Actual values set into the source code are known as literal constants. When a value must be made available to the program but cannot change while the program is running, constants are employed. A variable is a designated storage space that a computer maintains in memory. By giving it a name, you can access it quickly across the entire application. Any variable whose value is constant throughout your program cannot be updated or changed. At the time of its declaration, a constant variable must be initialized.

To learn more about constant, refer to:

https://brainly.com/question/28544433

#SPJ4

_____is a type of ai often broadly defined as software with the ability to learn or improve without being explicitly programmed.

Answers

Machine learning would be the answer

Which boot option is a part of the unified extensible firmware interface (uefi) standard that enables a client to retrieve the necessary boot loader and system files from a server over the network?

Answers

The boot option that is a part of the unified extensible firmware interface standard and enables a client to retrieve the necessary boot loader and system files from a server over the network is known as the Preboot Execution Environment (PXE).

What is Booting?

Booting may be defined as the strategy of initiating a computer as started via hardware such as a button or by a software command. This process generally powers the computer and starts the operating system effectively.

Preboot Execution Environment (PXE) is a cluster of standards that permits a computer to load a specific operating system through a network connection. This strategy is utilized in order to install an operating system quickly.

Therefore, the preboot execution Environment (PXE) is the boot option that is a part of the unified extensible firmware interface standard and enables a client to retrieve the necessary boot loader and system files.

To learn more about the Booting process, refer to the link:

https://brainly.com/question/27773523

#SPJ1

the program reads in variables totalbudget and productcost from input. assign numproducts with the maximum number of products that can be made with a budget of totalbudget, if each product costs productcost to make. ex: if input is 13 4, the output is:

Answers

The costs interested in creating a development are called Product Costs. These costs include fabrics, labor, presentation supplies, and plant aloft.

What does the product cost?The direct expenses incurred in creating a product are called product costs. Direct labor, for instance, would be one of a manufacturer's product expenses, bare essentials, industrial supplies. When a company produces a good or offers a service, it incurs production expenses, which are sometimes referred to as product costs. Formula for Product Cost Per Unit: (Total Product Cost) / Number of Produced Units. The sales price must be more than or equal to the product's unit cost in order to prevent losses. In a case when the sale price is equal, there is no profit or loss and the sales price covers the cost per unit.

To learn more about product cost, refer to:

https://brainly.com/question/27468665

#SPJ4

In a desktop operating system, which part of the desktop displays the date and time and contains shortcuts to utilities such as audio controls and network connections?

Answers

The Taskbar is the part of the desktop displays the date and time and contains shortcuts to utilities such as audio controls and network connections.

What is the task bar?

The taskbar is known to be a tool in the computer that acts as a shortcuts to any form of applications, as well as the date and time, and lots more.

Note that if a person wants to open a program or file, it will tend to show up on the taskbar, and a person can easily make a switch between different programs by clicking on them on the taskbar.

Therefore, The Taskbar is the part of the desktop displays the date and time and contains shortcuts to utilities such as audio controls and network connections.

Learn more about Taskbar  from

https://brainly.com/question/28147966
#SPJ1

What will happen on our music in our society now if these movement doesn't exist like impressionism, expressionism, electronic and chance music?

Answers

Expressionist music is a more abstract interpretation of traditional Western tones that aims to elicit strong emotions. Impressionist music, on the other hand, is all about capturing the mood of the moment.

What is Expressionist?

Expressionism is a modernist progression that began in Northern Europe around the turn of the twentieth century, initially in poetry and painting.

Its distinguishing feature is to present the world solely from a subjective point of view, distorting it dramatically for emotional effect in order to elicit moods or ideas.

Expressionist music is a more abstract interpretation of traditional Western tones, with the goal of eliciting strong emotions.

The goal of Impressionist music, on the other hand, is to capture the mood of the moment.

Thus, this will happen on the given scenario.

For more details regarding Expressionist, visit:

https://brainly.com/question/2189275

#SPJ1

What are the unpaid entries in a search engine results page that were derived based on their contents relevance to the keyword query?

Answers

organic search – the unpaid entries in a search engine results page that were derived based on their contents' relevance to the keyword query.

The average number of tickets sold daily online is an example of:_________
a. input.
b. raw data
c. meaningful information and feedback

Answers

The average number of tickets sold daily online is an example of meaningful information.

What are Meaningful information?

The term Meaningful information is known to be a word that has its contexts to be used to maximize its importance to specific set of people that are known to be operating in specific settings.

Note that in regards to the sales of ticket, it is one that can be done both online and offline and Information is meaningful when it has good use for it.

Therefore, The average number of tickets sold daily online is an example of meaningful information.

Learn more about meaningful information from

https://brainly.com/question/28299994
#SPJ1

The average number of tickets sold daily online is an example of:_________

a. input.

b. raw data

c. meaningful information

d:  feedback

What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?.

Answers

The term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression called an sql query.

The term "SQL" stands for Structured Query Language. It serves as the standard language for entering, changing, and retrieving data from databases. You may access and control databases using SQL. Using SQL commands, the database may be searched as well as other actions including creating tables, adding data to them, modifying that data, and removing tables.

Learn more on SQL here: brainly.com/question/25694408

#SPJ4

(q017) documentaries that explore - and sometimes critique - the documentary form itself are known as _____________ documentaries.

Answers

The documentaries that explore  and sometimes critique, the documentary form itself are known as reflexive documentaries.

Check more about  Reflexive Documentary below.

What Is Reflexive Documentary?

The reflexive documentary is known to be a kind of a documentaries that is known to be based on the association that tends to exist between the filmmaker as well as the audience.

It is known to be one that is often pushing viewers to be able to depict them based on their perceptions as well as re-analyze their ideas of truth.

Since there are different kinds of  documentaries , therefore one can say that the documentaries that explore  and sometimes critique, the documentary form itself are known as reflexive documentaries.

Learn more about documentaries from

https://brainly.com/question/3452395
#SPJ1

Back in the late 2000s, Rosa had to purchase a physical copy of software that she wanted to install. At that time, what installation method did Rosa MOST LIKELY use?

A.
internet

B.
CD

C.
app Store

D.
digital download

Answers

Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

What is meant by a CD?

CDs are known to be a very little plastic discs on which can be placed things or elements like sound, such as music, which can be recorded on it.

Note that these CDs can also be used to as a way of keeping safe that is saving information which can be used or later read by a computer. CD is a term that is known to be the short abbreviation for the word 'compact disc'.

CDs (or Compact Disc) are known to be in an obsolete phase of software that saves moderate rate of data.

Therefore, based on the above, Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

Learn more about software from

https://brainly.com/question/24321656
#SPJ1


Part A
What is heuristic knowledge that you use during everyday life? Is this heuristic knowledge always correct?

Answers

Answer: For part A

Explanation: Heuristics are methods or strategies which often lead to problem solution but are not guaranteed to succeed. They can be distinguished from algorithms, which are methods or procedures that will always produce a solution sooner or later. An algorithm is a step-by-step procedure that can be reliably used to solve a specific problem.

1. Which is NOT a type of file that InDesign cannot use.

a. Graphics

b. Text Files

c. InDesign Files

d. None of the above

2. You cannot resize a graphic once you put an image in InDesign.

true or false

Answers

Answer: 1. InDesign 2. False

Explanation:

A type of file that InDesign cannot use is known as InDesign File. Thus, the correct option for this question is C.

The statement "You cannot resize a graphic once you put an image in InDesign" is absolutely false.

What do you mean by an InDesign file?

An InDesign file may be defined as a type of desktop publishing software application that is significantly utilized for creating flyers, brochures, magazines, newspapers, books, and other publications.

The types of files that InDesign can remarkably use for operating its well-known function of constructing literary works like magazines, newspapers, books, etc. are graphics, text files, editing files, animation files, etc.

In the InDesign application software, you can generally resize or modify a graphic once you put an image in InDesign. This is facilitated by a tool known as an editing tool.

Therefore, both the questions given above are well described.

To learn more about InDesign application software, refer to the link:

https://brainly.com/question/14478872

#SPJ2

12. What is a benefit of online backup services?
Even if your computer is lost or stolen, you will still have your data.
The service is always free.
The service is always very fast.
O The service does not require an Internet connection.

Answers

Answer: Even if your computer is lost or stolen, you will still have your data.

Explanation:

Constructing a decision tree to visually represent the logic in a multi-outcome if problem is often recommended before translating it into excel pseudo code and then the nested if function. True or false?.

Answers

Constructing a decision tree to visually represent the logic in a multi-outcome IF problem is often recommended before translating it into Excel pseudo code and then the nested IF function. This is true.

When constructing a decision tree, it is often recommended to visually represent the logic in a multi-outcome IF problem before translating it into Excel pseudo code and then the nested IF function. This is true for a number of reasons.

First, by constructing a decision tree, you can more easily see the various paths that the problem can take. This can be helpful in identifying potential errors in the logic.

Second, constructing a decision tree can help to simplify the problem. By breaking the problem down into smaller pieces, it can be easier to identify a solution.

Third, constructing a decision tree can help to clarify the relationships between the different parts of the problem. By seeing the problem visually, you can more easily understand how the different parts fit together.

All of these reasons make constructing a decision tree a valuable step in solving a multi-outcome IF problem.

Learn more on decision tree here:

https://brainly.com/question/15329536

#SPJ4

This type of e-mail account is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail.

Answers

The type of e-mail account that is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail is known as Web-based email.

What are the characteristics of E-mail?

The characteristics of E-mail are as follows:

It involves an instinctive reply to messages.It facilitates the mechanism of auto-forwards and redirection of messages.It involves the facility delivering copies of a message to numerous people.Self-filing and retrieval of messages.

Webmails are web-based email accounts. These types of accounts are typically free email accounts that can be operated through numerous websites. Some examples of them are Yahoo Mail and others.

Therefore, web-based emails are the type of e-mail account that is more widely used because it frees the user from installing and maintaining an e-mail client on every computer.

To learn more about Web-based emails, refer to the link:

https://brainly.com/question/28302659

#SPJ1

A large computer hardware manufacturer purchased a company that develops computer-based software training, among other types of computer-based training. The computer manufacturer has been looking for just such a company that could open up opportunities for them to diversify and grow both businesses. This strategic decision bringing the two companies together is called a.

Answers

Since the large computer hardware manufacturer purchased a company that develops computer-based software training, the strategic decision that is bringing the two companies together is called option c: vertical merger.

What is an example of a vertical merger?

A vertical merger is known to be one that tends to brings together two businesses that may not be in direct competition but are said to be nevertheless connected by the same supply chain.

A good  example of a vertical merger would be an automaker is said to be combining with a parts type of supplier.

A vertical merger is when two or more businesses come together to provide various supply chain services for a single item or service. Most frequently, a merger is one that is often implemented to boost business, get more control over the supply chain process, as well as  forms synergies.

Therefore, Since the large computer hardware manufacturer purchased a company that develops computer-based software training, the strategic decision that is bringing the two companies together is called option c: vertical merger.

Learn more about vertical merger from

https://brainly.com/question/24539048
#SPJ1

A large computer hardware manufacturer

purchased a company that develops computer-based software training, among other types of

computer-based training. The computer manufacturer has been looking for just such a company that could open up opportunities for them to

diversity and grow both businesses. This strategic decision bringing the two companies together is called a

Multiple Choice

conglomerate merger

vertical merger

horizontal merger

The next step in the translation of this mrna will be the formation of a peptide bond between which two of the numbered amino acids?

Answers

The bond between Amino acid 2 and amino acid 3 two of the numbered amino acids. The correct option is A.

What is protein translation?

In genomics, translation is the process by which information encoded in messenger RNA (mRNA) directs the addition of amino acids during protein synthesis.

It is divided into three stages: initiation, elongation, and termination. After being processed, the mRNA transports the instructions to a ribosome in the cytoplasm.

The ribosome, which is made up of rRNA and proteins, is where translation takes place.

The bond formed by amino acids 2 and 3 (two of the numbered amino acids).

Thus, the correct option is A.

For more details regarding protein translation, visit:

https://brainly.com/question/16305501

#SPJ1

Your question seems incomplete, the missing part of question is attached below:

given the following code, how should the tostring methods in the classes h2classa and h2classb be written to give the indicated output and take advantage of the natural tostring method in h2classb?

Answers

Any group of characters that a script interprets is known as a string. Strings include things like "hello world" and "LKJH019283," for instance.

What is the string method?Any group of characters that a script interprets is known as a string. Strings include things like "hello world" and "LKJH019283," for instance. A string is associated with a variable in computer programming, as demonstrated in the example below. The length() string method returns a String's overall character count or length String techniques. A description of string methods As you may remember, a String is an object that represents a series of characters and is frequently used in Java. It is a fantastic method for preserving data. A string is a programming data type that is similar to an integer and a floating point unit, except it represents text instead of numbers.

To learn more about string method, refer to:

https://brainly.com/question/28290531

#SPJ4

rogramming challenge description: your colleague has 15 years of log files full of performance data. the data needs to be sorted, but the file sizes are so big that it's impossible to load them a

Answers

A rating, ranking, quotation, debate, or analysis about a feature of the investment performance of a security, an index, or a benchmark is referred to as "performance data."

What is the performance Data?Performance data include actual expenditures such as money and time. Cost variance, schedule variance, cost performance index, schedule performance index, etc. are a few examples of work performance information. Extremely massive data sets are swiftly analyzed using high-performance data analytics to uncover insights. This is accomplished by running potent analytic software in parallel using high-performance computing. Performance information can be used to evaluate the caliber of applicants hired by the company from various recruitment sources or based on various selection criteria. This can be applied to raise the effectiveness of staffing techniques. The practice of gathering performance-related data from network devices and storing it in a database or data file is known as performance data collection.

To learn more about performance data, refer to:

https://brainly.com/question/14329318

#SPJ4

Which of the following key
performance indicators can be used to
measure whether all employees in the
company are reaching their sales goals?
O A. Profit made per sale
O B. Overall company growth
O C. Number of sales per day
O D. Number of sales per employee

Answers

The key performance indicators that can be used to measure whether all employees in the company are reaching their sales goals is the number of sales per employee. The correct option is D.

What is key performance indicator?

Key performance indicators (KPIs) assess a company's performance in comparison to a set of targets, objectives, or industry peers.

Financial KPIs include net profit (or the bottom line, gross profit margin), revenues minus specific expenses, and the current ratio (liquidity and cash availability).

As for keeping record of the employee those are working, the company should track the number of sales per employee to get to the decision.

Thus, the correct option is D.

For more details regarding key performance indicator, visit:

https://brainly.com/question/13278475

#SPJ1

What is the purpose of the function keys on a keyboard?

Question 2 options:

to perform a specific task

to indent copy

to perform a keyboard shortcut

to capitalize letters

Answers

Answer:

To perform Specific tasks

Explanation:

3.) (30 points) the concept of security through obscurity suggests that we can provide some level of security hiding information. 3.a.) (15 points) think of a situation in which hiding information will not add security to the system. 3.b.) (15 points)then give an example of a situation in which hiding information will provide additional security

Answers

The concept of security through obscurity suggests that we can provide some level of security by hiding information but some scenarios exist when hiding information does not guarantee system security.

A situation when hiding information will not add security to the system is when a hacker with malicious intent discovers the place where your infrastructure is hidden and this makes it vulnerable again.

An example when which hiding information will provide additional security would be the obscurity of a source code to avoid others from copying and using it,

What is System Security?

This refers to the steps and processes that are undertaken in order to secure a system from unauthorized access.

Hence, we can see that The concept of security through obscurity suggests that we can provide some level of security by hiding information but some scenarios exist when hiding information does not guarantee system security.

A situation when hiding information will not add security to the system is when a hacker with malicious intent discovers the place where your infrastructure is hidden and this makes it vulnerable again.

An example when which hiding information will provide additional security would be the obscurity of a source code to avoid others from copying and using it,

Read more about system security here:

https://brainly.com/question/25720881

#SPJ1

note: this is a multi-part question. once an answer is submitted, you will be unable to return to this part. consider the following propositions: l: the file system is locked. q: new messages will be queued. n: the system is functioning normally. b: new messages will be sent to the message buffer. the goal of this exercise is to determine whether the following system specifications are consistent: if the file system is not locked, then new messages will be queued. if the file system is not locked, then the system is functioning normally, and conversely. if new messages are not queued, then they will be sent to the message buffer. if the file system is not locked, then new messages will be sent to the message buffer. new messages will not be sent to the message buffer.

Answers

Based on the multi-part question, if we consider the following propositions:

l: the file system is locked.

q: new messages will be queued.

n: the system is functioning normally.

b: new messages will be sent to the message buffer.

The goal of this exercise is to determine whether the following system specifications are consistent and the answer is given below:

This system is consistent.

Explanations

We use L,Q,N, and B to stand for the basic propositions here,

“The filesystem is locked,” “New messages will be queued,” “The system is functioning normally,” “Newmessages will be sent to the message buffer,”  

Then the given specifications are

¬L?Q,¬L?N, ¬Q?B, ¬L?B, and ¬B.

If we want consistency, then we had better have B false in order that¬B be true.

This requires that both L and Q be true, by the two conditional statements that have B false in order that ¬B be true

Read more about propositions here:

https://brainly.com/question/13263750

#SPJ1

Other Questions
What is the solution of the system? 4 x+2 y=46 x+2 y=8(F) (-2,2)(G) (2,-2)(H) (1,2)(I) (-1,2) In a basketball game, the home team was down by 2 points at the end of the game. They only scored 2 points for every 3 points the visiting team scored. What was the final score of the game? You owe $1,032.56 on a credit card with an 11.25% APR. The minimum due is $67.00and you pay it at the beginning of the month. How much interest is accrued by the end of the month? Considering the authors' use of appeals in theirpassages, which paragraph most appeals to logos? A case Which graph represents the inequality 3y - 5x-6? Adjusting entries never affect the asset account called? New jersey teacher larry abrams is on a mission to transform the lives of students across his state by distributed what item to youth in his community?. If you were a delegate to the First Continental Congress, would you have voted for or against the Declaration and Resolves? Explain. Niagra falls is 170 feet tall. How much gravitational potential energy is lost when a pound of water falls fromthe top of the falls to the bottom of the falls? Answer in BTU. Why were Pablo and his father surprised?O They discovered an ancient city.There was nothing in the cave.There were people living in an underground city. Which question is the most therapeutic to ask the parents of a 3-year-old child who has just died? if f(x)= 2X^2 +1. what is f(x) when X equals three The midpoint of BC is M(5, 2). One endpoint is B(8, 0). Find the coordinates of the other endpoint C. Write the coordinates as decimals or integers. C = (, ) Submit Hi guys i need help please! :) Question: Which of the following is the most accurate when discussing the functionof nerve cells?a) Adenosine diphosphate moves across the synapse to the postsynapticneuronb) Acetylcholine triggers the release of calcium ions from the vesiclesc) The action potential moves in a wave-like fashion along the axon ofthe neuron towards the axon terminald) Sodium and potassium ions contribute to an action potentialproduced by nerve cells How many different ways are there to arrange them if only the history books must be next to each other? So basically what you have to do is subtract the above ground level (1) with ground level (4) and youll get 3 which is negative bc it counts as below ground level . Now that the car rises 13 meters subtract 13-3= 10 and add it with the other ground level 6 meters . 10-6=4 Which of the following is NOT one of the issues that a Palestinian-Israeli peace deal would have to address? Why did Native American groups tend to ally with the French rather than the British? Multiple select questions. Many French trappers and traders married Native American women. French missionaries converted many Native Americans to Catholicism. The French were the first Europeans to have contact with Native Americans. The French were more interested in trade than in land. The French bought the land they used. Write one hook of each type listed below. Remember, you will choose your favorite hook for your introduction paragraph later on. a short story or description an interesting or dramatic fact an engaging question a relevant quote or sayingwhat the heck is this D: Which argument is Bismarck making in this excerpt?A. He is rejecting the idea that German Austria should be made apart of a future united Germany.B. He is warning the Prussian king not to go to war with Austria overRussian territory.C. He is offering to defend German Austria from Bohemiannationalism in the Austro-Hungarian Empire.D. He is insisting that German unification should be the force thatunites all German speakers in Europe.SUBMIT