Question 1 of 4
OSHA requires which of the following trenches to have a protective system installed?
Select the best option.
O
A trench 1 foot deep.
A trench 3 feet deep.
A trench 14 feet deep.

Answers

Answer 1

Answer:

These are all wrong. OSHA requires a trench to have a protective system starting at 5 feet.

Explanation:

OSHA's own rules state this, unless it is in stable rock. If it is under 5 feet, it isn't required and can be decided by someone qualified.

Answer 2
A trench 14 feet deep would definitely require a protective system, due to the the minimum being 5 feet.

Related Questions

Question 1
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Configuration management is a process for controlling changes in system requirements during software development.

Select one:

a.
True


b.
False


Question 2
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
______________ is the overall time between a request for system activity and the delivery of the response.

Select one:

a.
Through-put speed


b.
Turnaround time


c.
Response time


Question 3
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
When an information systems project gets implemented, it moves into the "maintenance" stage - any requested changes will be considered maintenance activities. There are 4 basic types of maintenance. Please match each with its correct term.

________ maintenance is performed to fix errors
Answer 1
Choose...
___________ maintenance adds new capability and enhancements

Answer 2
Choose...
_________ maintenance improves efficiency

Answer 3
Choose...
_________ maintenance reduces the possibility of future system failure.

Answer 4
Choose...
Question 4
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
System security encompasses confidentiality, integrity, and availability.

Select one:

a.
True


b.
False


Question 5
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
In the testing process, a new computer program reads in a file and attempts to perform arithmetic calculations on a name field. What is the most likely result?

Select one:

a.
The program will encounter a logic error.


b.
The program will encounter a syntax error.


c.
The program will encounter a run-time error.


Question 6
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
The testing process takes place in the closing phase of the project management life cycle. (T/F)

Select one:
True
False
Question 7
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Corrective maintenance efforts are _________ when a project is first implemented

Select one:

a.
Low


b.
Medium


c.
High

Question 8
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Which of the following statements is true about logic errors?

Select one:

a.
Logic errors do not keep the program from running.


b.
With a logic error, program syntax is correct but the program doesn't return the expected results.

c.
Logic errors keep programs from running correctly.

d.
All of the above


Question 9
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Hailey tried to compile her source code, but it failed to compile. The most likely reason is:
Select one:

a.
It had a logic error in it.


b.
It encountered a run-time error.


c.
The code had a syntax error(s).


Question 10
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Mike created a new program that isn't returning the results he expects. Although the program compiles fine and runs fine (without ending in error), it isn't processing correctly. Mike should:

Select one:

a.
Look for logic errors in the code.


b.
Eliminate any syntax errors and try again.


c.
Run a systems test for the users to see if they can help.


d.
All of the above


Question 11
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
Adaptive maintenance adds _____________ to an operational system and makes the system easier to use.

Select one:

a.
New feature(s) or capability.

b.
Changes to make the system more efficient.

c.
Changes to fix syntactical errors.

Question 12
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
After implementation, when an administrator monitors a new system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action, s/he is carrying out:


Select one:

a.
Fault management


b.
Post-implementation control


c.
Production monitoring


Question 13
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
When we monitor current activity and performance levels, anticipate future activity, and forecast the resources needed to provide desired levels of service, we are engaging in:

Select one:

a.
Stress testing


b.
Capacity planning


c.
Establishing a system baseline


Question 14
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
When a new version of a system is installed, the prior release is archived or stored. Companies implement _____________ in order to track system releases, or versions. In this way, it is possible to return to an earlier revision of the system code.
Select one:

a.
Release management


b.
Version control


c.
Version tracking

Question 15
Not yet answered
Points out of 2.0
Not flaggedFlag question
Question text
For the most part, testing is a perfunctory act that satisfies the project sponsor, but can be avoided much of the time.

Select one:

a.
True


b.
False

Answers

Answer:

true and false

Explanation:

In Python, the expression “a ** (b ** c)” is the same as “(a ** b)

Answers

Answer: False

Explanation: When two operators share an operand and the operators have the same precedence, then the expression is evaluated according to the associativity of the operators. For example, since the ** operator has right-to-left associativity, a ** (b ** c) = a ** b ** c. While on the other hand, (a ** b) = a ** b.

Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presented with the following menu:

S: hangar steak, red potatoes, asparagus
T: whole trout, long rice, brussel sprouts
B: cheddar cheeseburger, steak fries, cole slaw
(Yes, this menu really IS a menu!)
Write some code that reads the String (S or T or B) that the user types in into a String variable choice that has already been declared and prints out a recommended accompanying drink as follows: if the value of age is 21 or lower, the recommendation is "vegetable juice" for steak, "cranberry juice" for trout, and "soda" for the burger. Otherwise, the recommendations are "cabernet", "chardonnay", and "IPA" for steak, trout, and burger respectively. Regardless of the value of age, your code should print "invalid menu selection" if the character read into choice was not S or T or B.
ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.
Instructor Notes:
Hint:

Use .equals for String comparison, e.g.
if (choice.equals("B")) instead of
if (choice == "B") // BAD

You might want to skip this one and do section 3.6 (which covers String comparison) beforehand.

Answers

Using the knowledge of computational language in C++ it is possible to write a code that assume that an int variable age has been declared and already given a value

Writting the code:

#include<stdio.h>

#include<conio.h>

int main()

{

//variables to rad choice and age

char choice;

int age;

//read age and choice

printf("\tEnter your age: ");

scanf("%d", &age);

//fflush the keyboard buffer before reading choice

fflush(stdin);

printf("\tEnter your choice: ");

scanf("%c", &choice);

//print the invalid message if the choice is otherthan the S,T,B

if(choice!='S' && choice !='T' && choice !='B')

{

printf("Invalid menu choice");

getch();

}

else if (age <22)

{

if (choice =='S')

{

printf("\tvegetable juice");

}

else if (choice =='T')

{

printf("\tcranberry juice");

}

else if (choice == 'B')

{

printf("\tsoda");

}

}

else

{

if (choice == 'S')

{

printf("\tcabernet");

}

else if (choice =='T')

{

printf("\tchardonnay");

}

else if (choice == 'B')

{

printf("\tIPA");

}

}

//pause the console output until user press any key on keyboard

getch();

}

See more about C++ at brainly.com/question/19705654

#SPJ1

The Check Spelling command is found under the ________ menu.
Question 1 options:

1)

View

2)

Edit

3)

Layer

4)

File

Answers

Answer: 2

Explanation:

In the space below, explain how you can access the character map in Word 2019 using a complete sentence.

Answers

To access the Character Map and see the characters available for a specific font style, click on the Windows or Start button.

What is character map?

Character Map is a utility that comes with Microsoft Windows operating systems that allows you to view the characters in any installed font, check what keyboard input is used to enter those characters, and copy characters to the clipboard instead of typing them.

Click the Windows or Start button to open the Character Map and see the characters available for a specific font style.

Clicking on the Programs submenu, then the Accessories submenu, then System Tools, and finally the Character Map item under the System Tool bar to showcase the Character Map Application from which protagonists are copied and pasted in Word 2016.

Thus, this way, one can access the character map in Word 2009.

For more details regarding a character map, visit:

https://brainly.com/question/15697415

#SPJ1

Write a while loop that divides userNumber by 9, assigns userNumber with the quotient, and outputs the updated userNumber, followed by a newline. The loop iterates until userNumber is less than or equal to 0.

Answers

The loop that divides user number by 9 is assign and the loop is said to be java while loop.

What is java loop?

Java loop is a statement which has controlled by a flow statement that allows code which has to be executed continuosly which has been based on a condition which is boolean. The while loop is said to be repeating according to statement.

Java loop comes in use when we required a continuosly execute statements in blocks. The while loop is said to be repeating according to statement. In case when Iterations statement has not been fixed , in such case while loop is recommended to use.

Therefore, The loop that divides user number by 9 is assign and the loop is said to be java while loop.

Learn more about java loop here:

https://brainly.com/question/14577420

#SPJ1

write a function that gives the product of two numbers in c language​

Answers

Program to Multiply Two Numbers
printf("Enter two numbers: "); scanf("%lf %lf", &a, &b); Then, the product of a and b is evaluated and the result is stored in product . product = a * b; Finally, product is displayed on the screen using printf() .

Explanation:

printf("Enter two numbers: "); scanf("%lf %lf", &a, &b);

Then, the product of a and b is evaluated and the result is stored in product.

product = a * b;

Finally, product is displayed on the screen using printf().

printf("Product = %.2lf", product);

Notice that, the result is rounded off to the second decimal place using %.2lf conversion character.

Is it true or false? Just have been stuck on this for a bit about CNC milling.

Answers

The answer is trueeeee

Which statement best describes a characteristic of a relational database?

Answers

(RDBMS):

A relational database is a type of database that stores and provides access to data points that are related to one another. Relational databases are based on the relational model, an intuitive, straightforward way of representing data in tables. In a relational database, each row in the table is a record with a unique ID called the key. The columns of the table hold attributes of the data, and each record usually has a value for each attribute, making it easy to establish relationships among data points.

The relational database is basically used as the set of the table in which the data can be easily accessible without any re-organizing of the table in the database. In the structured query language (SQL), the relational database is used as the standard users and API ( Application programming interface). The relational database is basically needed to store the information or data in the form of tables. Due to the relational database, we can easily compare the data or information because the data are arranged in the form of columns

Database tables

In a relational database, all data is held in tables, which are made up of rows and columns. Each table has one or more columns, and each column is assigned a specific datatype, such as an integer number, a sequence of characters (for text), or a date. Each row in the table has a value for each column.

A typical fragment of a table containing employee information may look as follows:

emp_ID              emp_lname              emp_fname         emp_phone

10057                 Huong                       Zhang                   1096

10693                 Donaldson                Anne                     7821

The tables of a relational database have some important characteristics:

1. There is no significance to the order of the columns or rows.

2. Each row contains one and only one value for each column.

3. Each value for a given column has the same type.

Learn more about Relational Database: brainly.com/question/13262352

#SPJ1

Is cpu a computer brain. discuss?​

Answers

yes it is a computer brain

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results. The CPU is constantly following instructions of computer programs that tell it which data to process and how to process it.

50 points and brainlist What is the return type of the String class toUpperCase() method?

int
double
boolean
String
void

Answers

Answer:

Int

Explanation:

What are type of main protocol?

Answers

There are three main types of network protocols. These include network management protocols, network communication protocols and network security protocols:

Communication protocols include basic data communication tools like TCP/IP and HTTP.
Management protocols maintain and govern the network through protocols such as ICMP and SNMP.
Security protocols include HTTPS, SFTP, and SSL.

Hope this helps

Information illegally or do damage is known as in IT

Answers

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Who is a Hacker?

A hacker is someone who utilized their knowledge to break into someone else's computers in order to steal information or do harm.

Although the phrase initially referred to a shrewd or knowledgeable coder, it is today more frequently used to describe someone who can access other computers without authorization.

Hacking. In computer science, the term hack implies to use a computer or other technological equipment or system to be able to get an  into an unauthorized system to data owned by another person or organization.

Therefore, based on the above, A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Learn more about Hacker from

https://brainly.com/question/23294592
#SPJ1

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a

Write a class encapsulating the concept of an investment, assuming
that the investment has the following attributes: the name of the
investor, the amount of the investment, and the static interest rate at
which the investment will be compounded. Include a default
constructor, an overloaded constructor, the accessors and mutators,
and methods, toString() and equals(). Also include a method returning
the future value of the investment depending on how many years
(parameter to this method) we hold it before selling it, which can be
calculated using the formula:
Future value = investment(1 + interest rate )year
We will assume that the interest rate is compounded annually. Write a
client class to test all the methods in your class and print out the tuture
value of and investment for 5, 10, and 20 years.

Answers

A class encapsulating the concept of an investment, assuming that the investment has the following attributes is given below:

The Program

import java.util.Scanner;

   /**

      This program compares CD /Investment plans input by the year

      broken down by the requirements below:

      This program creates a table of compound interest investment growth over time

      Broken down by: a) year b) balance at end of year

      Finance formula of A= P(1+ r/n)^n*t is used:

      A = Future Value         | P = Initial Investment

      r = annual interest rate |n = times interest is compounded/year

      t = years invested

   */

    public class InvestmentTableFirstTest

    {

       public static void main(String[] args)

       {

            Scanner in = new Scanner(System.in);

            String bestBankName = "";

            double bestGrowth = 0;

            boolean done = false;

            while(!done)

            {

                System.out.print("Plan name (one word, Q to quit): ");

                String bankName = in.next();

                if (bankName.equals("Q"))

                {

                      done = true;

                }

                else

                {

                     System.out.print("Please enter your principal investment: ");

                     final double PRINCIPAL_INVESTMENT = in.nextDouble();

                     System.out.print("Please enter the annual interest rate: ");

                     double iRate = in.nextDouble();

                     System.out.print("Please enter number of times interest is compounded per year:  ");

                     final double INCREMENT = in.nextDouble();      

                     System.out.print("Enter number of years: ");

                     int nyears = in.nextInt();

                     iRate = iRate/100; System.out.println("iRate:" + iRate);

                     //Print the table of balances for each year

                      for (int year = 1; year <= nyears; year++)

                      {

                       double MULTIPLIER = INCREMENT * year;

                       System.out.println("Multiplier: " + MULTIPLIER); // I've included this print statement to show that the multiplier changes with each passing year

                       double interest = 1 + (iRate/INCREMENT);

                       double balance = PRINCIPAL_INVESTMENT;

                       double growth =  balance * Math.pow(interest, MULTIPLIER);

                       growth = growth - PRINCIPAL_INVESTMENT;                      

                       balance = balance + growth;                                  

                       System.out.printf("Year: %2d  Interest Earned:   $%.2f\t   Ending Balance:   $%.2f\n", year, growth, balance);

                      if (bestBankName.equals("") || bestGrowth > growth) // || bestBankName > growth

                      {

                           bestBankName = bankName;  // bestBankName = bankName

                           bestGrowth = growth; // mostGrow = growth

                      }

                         System.out.println("Earning with this option: " + growth);        

                 }

            }

        }

           System.out.println("Best Growth: " + bestBankName);

           System.out.println("Amount Earned: " + bestGrowth);      

      }

   }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which of the following networking device can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT)?

Answers

The networking device that can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT) is a router. The correct option is a.

What is a router?

On computer networks, a router receives and sends data. Routers are frequently mixed up with network hubs, modems, and network switches.

Routers, on the other hand, can combine the functions of these components and connect with these devices to improve Internet access or assist in the creation of business networks.

Wired routers, wireless routers, core routers, edge routers, and VPN routers are all types of routers.

A router can implement access lists and dynamic routing protocols.

Thus, the correct option is a.

For more details regarding a router, visit:

https://brainly.com/question/15851772

#SPJ1

Your question seems incomplete, the missing options are:

a. Router

b. Layer 2 Switch

c. Hub

d. Layer 3 Switch

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Answers

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

What is system security objectives?

Information security is one that has three primary goals, namely

ConfidentialityIntegrity, Availability.

It is nearly often mentioned in relation to the security of computer networks and systems.

System security refers to the measures that a company takes to protect its networks and resources from disruption, interference, as well as malicious intrusion.

Therefore, If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

Learn more about system security from

https://brainly.com/question/14638168


#SPJ1

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Should remain the same

Should be lowered

Should be increased

Should be reevaluated

What type of computer program takes a high-level language and turns it into assembly code?

Answers

Answer: Compilers

Explanation:

What Is Used To Identify Spelling errors in the document?

Answers

Answer: Spell check

Explanation: Spell check identifies and corrects misspelled words. It also allows you to search a document yourself for words you've misspelled.

A database management system (DBMS) is important to modern organizations because:

Answers

Answer: It is important for both the generation and maintenance of data, take apple, for example, they use a DBMS to manage any incoming data, organize it, and that DBMS also allows the data to be modified or extracted by other users of the DBMS.

Explanation:

This is your code. >>> a = [5, 10, 15] >>> b = [2, 4, 6] >>> c = [11, 33, 55] >>> d = [a, b, c] d[0][2] is .

Answers

The value of d[2][0] value of your code is 11.

What is coding?

Coding, also known as computer programming, is the method by which we communicate with computers.

Code tells a computer what to do, and writing code is similar to writing a set of instructions. You can tell computers what to do or how to behave much more quickly if you learn to write code.

A variable called an is declared, and it contains an array of the numbers 5, 10, and 15.

Variable b is a collection of the numbers 2, 4, and 6.

Variable c is also made up of the numbers 11, 33, and 55.

d[2][0] simply means that we should take the d variable, find the index 2 (which is c), and get the index 0 of c. The result should be 11 because index zero of variable c is 11.

Thus, the answer of d[2][0] is 11.

For more details regarding coding, visit:

https://brainly.com/question/17204194

#SPJ1

In MakeCode Arcade, the space where you drag code blocks to build your
program is called the.
A. Workspace

Answers

In +MakeCode Arcade, the space where you drag code blocks to build your program is called the workspace. The correct option is C.

What is MakeCode Arcade?

Microsoft MakeCode Arcade is a beginner-friendly web-based code editor for creating retro arcade games for the web and dedicated hardware.

As is customary with MakeCode, you can build your program in your browser using blocks or JavaScript.

JavaScript and the Static TypeScript language are used in the Microsoft MakeCode programming environment.

The workspace is the area in MakeCode Arcade where you drag code blocks to build your program.

Thus, the correct option is C.

For more details regarding MakeCode Arcade, visit:

https://brainly.com/question/28144559

#SPJ1

Your question seems incomplete, the missing options are:

A. Game simulator

B. Image editor

C. Workspace

D. Toolbox

You want to save a file to your desktop so no one will be able to you to make changes what do you use copy or move

Answers

Answer:

Copy

Explanation:

You replace an internal drive that is only used to backup data on a computer. Before you
install the case cover, you power on the computer and observe the disk drive lights are not
blinking. You suspect it may not be receiving power, but cannot find the power supply tester.
How can you quickly verify whether power is being supplied to the disk drive?

Answers

The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

How do you check your power supply?

There are different ways to know  if power is entering your system. A person can be able to check the power supply on their computer by removing the side panel that pertains to its case.

Note that when a person bought any kind of rebuilt computer, you are able to likely check the power supply with the use of the computer's manual or by asking or contacting the manufacturer.

Therefore, based on the above, The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

Learn more about multimeter from

https://brainly.com/question/5135212
#SPJ1

Describe the functional components of computer system

Answers

The different components of computers are as follows:

1. Input Unit: These are very essential parts of computers. These are used by us to feed the input into the computers. For example, a mouse, keyboard, and joystick are the input devices.

2. Output Unit: These output units are used to get output from the computers. When we give input the computer process it and then gives output by the output units.

Ex: Monitor, printer

3. Storage: These are used to store the data in the computers. Examples are hard disk, pen drive, compact disc

4. Central Processing Unit: The CPU is also called as brain of computers. It is responsible for every operation on the computer.

5. Arithmetic logic unit: It processes the arithmetic operations in the computer.

I need the user to type 17 OR 18 and if they type a different number the computer should say error else it should say thanks

if Age !="17" or "18" :
print("Error please try again")
elif Age == "17" or "18":
print("thanks")

Answers

The output for the first condition would be thanks while the one when age is not 17 or 18 would be error please try again.

What is the else if (elif statement)?

This is the statement that is used in programming which tells the computer to fulfill another condition if the first condition that it was given is unmet.

Here the first condition is to type 17 or 18 as age.

This would be

If Age == "17" or "18"

print ("thanks")

The output would be thanks if the age falls under the condition of 17 or 18.

Next we are to get what happens if age is not 17 or 18

elif age != "17" or "18"

print("Error please try again")

The output that we would have here if the first condition is unfulfilled would be error try again.

Read more on elif codes here: https://brainly.com/question/15091482

#SPJ1

A(n)______protects your device against unauthorized access.

A. Virtual machine
B. User account
C. Personalization app
D. Administrative tool

Answers

A User account protects your device against unauthorized access.

What is user account and its example?

A user account is known to be a kind of online account that gives one room or does not allow a user to be linked to a network, another computer, or any other thing.

Note that any network that has multiple users requires one to have user accounts and as such, A User account protects your device against unauthorized access.

Learn more about User account from

https://brainly.com/question/26181559

#SPJ1

factors that determine the speed of your computer

Answers

Answer:

NUMBER OF CORES (PROCESSORS) The CPU is where you'll find the processing units, each one known as a core, MULTIPLE APPLICATIONS AFFECTING COMPUTER SPEED, GRAPHIC CARD TYPE.

Explanation:

In 1645, a German Jesuit priest invented an image projection device, which he
called a:

O phantasmagoria.
O zoopraxiscope.
Othermoscope.
O magic lantern.

Answers

In 1645, a German Jesuit priest invented an image projection device, which he called   magic lantern.

What was the Magic Lantern?

This is known to be the very fist initial attempt to be able to project drawings that were known to be in motion.

It was said to be one of the initial kinds of the modern slide projector, that was said to have projected an image that has been depicted on a glass plate.

Therefore, In 1645, a German Jesuit priest invented an image projection device, which he called   magic lantern.

Learn more  about magic lantern from

https://brainly.com/question/13280070
#SPJ1

Answer: magic lantern

Explanation:

What web frameworks is the best

Answers

Based on my own experience, the web frameworks that is known to be the best are:

Express.Django.Rails.Laravel.

What is meant by a web framework?

A web development framework is known to be a composition or a group of resources as well as tools that are known to be used by software developers to be able to build as well as manage web applications, web services and also the creation of websites.

Therefore, based on their quality, one can say that the above mention are the best.

Hence, Based on my own experience, the web frameworks that is known to be the best are:

Express.Django.Rails.Laravel.

Learn more about web frameworks from

https://brainly.com/question/16792873

#SPJ1

What type of software allows users to perform general purpose tasks, like web browsing, typing documents, or gaming?


application software


utility software


system software


antivirus software

Answers

The first one, application
System software !!
!!!!!!!!!!!!
Other Questions
The scale drawing is a map of the campus of Central Middle School. The school board needs to knowthe distance from the art room to the gym in order to build a walkway.What is the scale factor from the map to theactual school?scale factor =? Which statement best completes the diagram of the ways the differentbranches of government can limit each other's power?SupremeCourtCan rulea president's actions unconstitutionalCan refuse to enforce the SupremeCourt's rulingsCan overturn anunconstitutional law passed by CongressPresidentCongressO A. Can order the Supreme Court to ignore precedent when ruling oncertain casesOB. Can obstruct the Supreme Court's rulings by refusing to enforcethemC. Can appoint new justices to replace those engaged in judicialactivismOD. Can propose amendments to the Constitution to overturn aSupreme Court decision What should be avoided for good health? Johanna's professor asked the class to read a short passage and answer questions designed to test their understanding of the material. what type of verbal ability test did the professor use? What are the square roots of 6,400? Develop a flowchart that will request the names and ages of 2 persons. The flowchart will print the name of the oldest personONLY WHAT GOES INSIDE THE SHAPES. Name1 Name2Age1 age2 What is shown in the image below?A food web titled Chesapeake Bay Waterbird Food Web. It shows a very complex food web with many different food chains of various species displayed in 5 categories. Primary Producers: phytoplankton, S A V, vegetation. Herbivores: zooplankton, benthic invertebrates, herbivorous ducks, geese and mute swans. Primary consumers: small planktivorous fish, bivalves. Secondary consumers: gulls and terns, wading birds, large piscivorous fish, sea ducks, tundra swan. Tertiary consumers: osprey, bald eagle.food chaintrophic chainfood webenergy web The concept that the physical environment sets broad limits on human actions, but that people have the ability to adjust to a wide variety of physical environments is. Let f(x)=2x-3. Write a function g whose graph is a reflection in the y axis of the graph of f 5. What evidence is there that Elie's father was a well-respected member of the Jewish community?(10 pts) Which inference about Huck Finn is best supported by Chapter 1 Need help asap please I need this find a so that the point (-1,4) is on the graph of f(x)=ax^2+3 an 8-year-old boy is found to have a mild concussion and is to be discharged home. the mother is instructed to check her child for responsiveness every 2 hours and to wake him up for this assessment after he goes to sleep. she telephones the nurse and says that she is afraid to allow him to go to sleep. how would the nurse respond? Use Ohm's Law to calculate the following:a) The voltage required to produce a current of 2A in a 12ohms resistor.b) The voltage required to produce a current of 0.1A in a 200ohms resistor.c) The current produced when a voltage of 12V is applied to a 10ohms resistor.d) The current produced when a voltage of 230V is applied to a 10ohms resistor. What is the name of the line of reflection for the pair of figures?Enter your answer in the box.line please help!!! I need this urgently I will mark you brainliest!! Write a essay of 100 words, topic: are love poems still relevant in modern society? Do they reflect reality ( love songs can be included If x and y vary directly and y is 40 when x is 5, find y when x is 6. An appliance is rated at 4500 volt-ampere, 240 volts, single-phase. what is the maximum size fuse permitted? The bill of rights is a collective name for the first ten amendments of the us constitution. research each amendment. write a description and give a relatively current example of each one in action.