Answers

Answer 1

click on saved changes notification and mark me brainliest ans

Answer 2

Answer:

click on document title your answer is marking brainless answer


Related Questions

With ____ editing, the selected item is moved to the new location and then inserted there.

a. Drag-and-drop

b. Inline

c. Copy-and-carry

d. Cut-and-paste

Answers

With drag-and-drop editing, the selected item is moved to the new location and then inserted there.

Drag-and-drop is a type of editing which allows an item to be selected by using a mouse or any other type of pointing device and then can be dragged to the intended position and inserted there. This type of technique does not require any intermediate process of temporary storage.

In copy-and-carry editing, a duplicate of the item is created, whereas in cut-and-paste the item is detached from its original location and placed in short-term storage before being pasted at the new location.

Inline is a type of editing which is not linked with copying or moving items from one place to another, it only includes the editing and writing of data visually.

To learn more about drag-and-drop, click here:

https://brainly.com/question/18650112

#SPJ4

Assume that ph has been assigned a float. Write an if-else-if statement
that compares ph to
7.0 and makes the following assignments (respectively) to
the variables neutral, base, and acid:
0,0,1 if ph is less than 7
0,1,0 if ph is greater than 7
1,0,0 if ph is equal to 7

Answers

An if-else-if statement that compares ph to 7.0 and makes the following assignments (respectively) to the variables neutral, base, and acid:

0,0,1 if ph is less than 70,1,0 if ph is greater than 71,0,0 if ph is equal to 7

The Program:

ph=int(input("Enter ph value: "))#input ph value

if ph < 7:#defining if block that checks ph value less than 7      

  neutral = 0#holding value in neutral variable    

  base = 0#holding value in base variable    

  acid = 1#holding value in acid variable

elif ph > 7:#defining elif block that checks ph value greater than 7    

  neutral = 0#holding value in neutral variable    

  base = 1#holding value in base variable    

  acid = 0#holding value in acid variable

else:#else block    

  neutral = 1#holding value in neutral variable    

  base = 0#holding value in base variable    

  acid = 0#holding value in acid variable

print(neutral, base , acid)#print value

The above program defines a variable "ph" that inputs an integer value and then follows up with the conditional statement that checks ph values that can be defined

Read more about if-else statements here:

https://brainly.com/question/18736215

#SPJ1

Which ux design role focuses on designing the experience and functionality of a product?

Answers

The UX design role which focuses on designing the experience and functionality of a product is an D. Interaction designer.

What is a GUI control?

A GUI control simply refers to an abbreviation graphic user interface control and it can be defined as a form of user interface that is designed and developed to make it easier for end users to interact, control and use a product such as an electronic device, especially through a combination of graphical icons, symbols, images and audio indicator.

In Computer technology, a professional (expert) who is saddled with the responsibility of designing the experience and functionality of a product is an Interaction designer.

Read more on GUI control here: brainly.com/question/4138138

#SPJ1

Complete Question:

Which UX design role focuses on designing the experience and functionality of a product?

Motion designer

Visual designer

Production designer

Interaction designer

Smiling and nodding are two ways to show a(n)
or situation.
OA. positive
B. frightened
OC. negative
OD. uninterested
о
attitude about a person
SUBMIT

Answers

It is a way to show a positive attitude about a person.

right-clicking a word or phrase that is identified as a mistake will display a shortcut menu that suggests the correct spelling.

Answers

The given statement that right-clicking a word or phrase that is identified as a mistake will display a shortcut menu that suggests the correct spelling is TRUE.


This is because, when a mistake is identified, the spell checker automatically underlines it so that the user can correct it and when you right-click on it, it gives you options to correct the mistake with the correct spellings.

What is a Spell Checker?

This refers to the software that is responsible for correcting spelling errors when typing.

Hence, we can see that the given statement that right-clicking a word or phrase that is identified as a mistake will display a shortcut menu that suggests the correct spelling is TRUE.


This is because, when a mistake is identified, the spell checker automatically underlines it so that the user can correct it and when you right-click on it, it gives you options to correct the mistake with the correct spellings.

Read more about spell checkers here:

https://brainly.com/question/10810979

#SPJ1

Which technology allows multiple vms to have access to the internet? virtual machine manager hypervisor virtual pbx virtual switch

Answers

A virtual switch is special software that enables VMs to communicate with each other, without going outside of our system.

Virtual switches are a key technology that allows multiple virtual machines (VMs) to have access to the internet. By creating a virtual switch, you can essentially create a "mini-internet" for your VMs, allowing them to communicate with each other and with the outside world.

There are many benefits to using virtual switches, including improved security and performance. By isolating your VMs from the physical network, you can better protect them from attacks. And because virtual switches only forward traffic that is destined for their VMs, they can help improve network performance.

If you're looking to create a virtual switch, there are a few things you'll need. First, you'll need a physical server with multiple network adapters.

You'll also need a virtualization platform, such as VMware vSphere, to create and manage your virtual switches. Finally, you'll need a switch management tool, such as the Cisco Nexus 1000V, to help you configure and manage your virtual switches.

Creating a virtual switch is a great way to improve the security and performance of your virtual machines. By using virtual switches, you can create a safe and efficient network for your VMs.

Learn more on virtual switches here:

https://brainly.com/question/27980989

#SPJ4

What is the output of the following command, given that value1 = 2.0 and value2 = 12? print(value1 * value2) 24.0 value1 * value2 2.0 * 12 24

Answers

The output of the following command, given that value1 = 2.0 and value2 = 12 would be 24.0.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

What is a print statement?

A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler, so as to output a given statement.

For this software program, the output is given by:

Output = value1 * value2

Output = 2.0 * 12

Output = 24.0

Read more on print statement and output here: https://brainly.com/question/23713796

#SPJ1

The location of a specific input or output field device is identified by the processor by means of its _____.

Answers

The location of a specific input or output field device is identified by the processor by means of Address

When it comes to input and output devices, the processor needs to know the address of each device in order to communicate with it. The address is like a unique identifier for each device, and it tells the processor where to find the device in memory.

There are two main ways that processor addresses can be assigned to devices. The first is called static addressing, and the second is called dynamic addressing.

With static addressing, the address of a device is fixed and does not change. This means that the processor always knows where to find the device, and there is no need for the address to be stored in memory.

Dynamic addressing is a bit more complex. The address of a device can change depending on the current conditions, and so the processor needs to store the address in memory. This means that the processor has to search for the device every time it wants to communicate with it, which can take up more time and resources.

Learn more about addressing here:

https://brainly.com/question/17191250

#SPJ4

Jackson is working as part of a large animation team and is having a hard time making the characters move realistically because the “bones” and “joints” in the 3D models have some problems. In what step in the animation process were mistakes made?

A.
animation

B.
visual effects

C.
rigging

D.
rendering

Answers

The step in the animation process that involves some mistakes is rendering. Thus, the correct option for this question is D.

What is the Animation process?

The animation process may be defined as the methodology of formulating the illusion of movement through the utilization of still images in a two-dimensional space. The process of animation significantly includes characters, storyboards, and backgrounds in the form of vector graphics.

The movement of bones and joints in the 3D models has some problems due to the rendering of actual sense to the viewers. The animation of this part is perfect along with visual effects but the delivery of this includes some confusion which creates problems.

Therefore, the step in the animation process that involves some mistakes is rendering. Thus, the correct option for this question is D.

To learn more about the Animation process, refer to the link:

https://brainly.com/question/28152242

#SPJ1

Given an array of integers of size 5, how does the computer know where the 3rd indexed variable is located?

Answers

The computer knows where the 3rd indexed variable is by adding space for 3 integers to the base address of the array.

A data type can be defined as metadata that defines the type of data that can be placed inside a PHP variable; Metadata means that it is data about data (information about data such as structure and syntax).

A data type in simpler words can be defined as nothing but a classification of values that can be used in variables and a collection of methods and operators that can be applied to those values. PHP programming language supports approximately 7 different standard data types, these data types are:

IntegerFloat (or double)StringBooleanArrayObjectNull

You can learn more about data type here https://brainly.com/question/14581918

#SPJ4

For windows xp, 2000, and nt servers and workstations, raid 0 or ____ is available.

Answers

For windows XP, 2000, and NT servers and workstations, raid 0 or 1 is available.

What is NT in network?

NT's technology is known to be a type of tech that is said to be the base for any form of  Microsoft successor operating system, that is Windows 2000.

Note that Windows NT which is "New Technology," is known to be made up of two products: Microsoft NT Workstation as well as  Microsoft NT Server.

Therefore, For windows XP, 2000, and NT servers and workstations, raid 0 or 1 is available.

Learn more about servers from

https://brainly.com/question/15498455

#SPJ1

Spoofing is the forging of the __________ address on an email so that the email message appears to come from someone other than the actual sender.

Answers

Answer: Return

Explanation:

Most manufacturers or retailers of laptops offer a warranty that lasts for at least how long?.

Answers

Most laptop makers and sellers provide warranties that last for at least an year, but the coverage varies by brand. The majority of businesses also provide an extended warranty option. It is aspect that makes a brand reliable is its customer support.

A product warranty is the assurance given to customers by the maker of a good or item. Most laptop manufacturers, including Apple, Alienware, Dell, and HP, provide a single year of guarantee. Any problems that occur after that point are your responsibility and will be paid for by you.

Follow the link below to see the difference between warranty and guaranty

https://brainly.in/question/1978885

#SPJ4

Which assignments would yield a non-floating-point number for y? y = 32.0 (x / (z 1.0));

Answers

An assignment which would yield a non-floating-point number for y in y = 32.0 + (x / (z + 1.0)); is: d. x = 1.0; z = -1.0;

The kinds of data type.

In Computer programming, there are five recognized data types and these include the following:

Integer type (int).Character type (char).Floating point type (float).Boolean (bool)String (str)

What is a non-floating-point number?

A non-floating-point number can be defined as a type of number which does not contain floating decimal points, which may also either be positive or negative whole number.

y = 32.0 + (x / (z + 1.0));

y = 32.0 + (1.0 / (-1.0 + 1.0));

y = 32.0 + 1.0

y = 33.0.

Read more on floating-point number here: https://brainly.com/question/25694406

#SPJ1

Complete Question:

Which assignments would yield a non-floating-point number for y? y = 32.0 + (x / (z + 1.0));

a.x = 0.0; z = 1.0;

b.x = -32.0; z = 1.0;

c.x = 0.0; z = 0.0;

d. x = 1.0; z = -1.0;

A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n)___systems degree.

Answers

A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n) information technology systems degree.

What is information technology meaning?

Information technology (IT) is known to be a term that connote the use of any form of computers, storage, as well as networking and other forms of physical devices, infrastructure and processes to be able to make, process, save as well as, secure and pass all kinds of electronic data.

Therefore, A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n) information technology systems degree.

Learn more about information technology from

https://brainly.com/question/25110079

#SPJ1

strong aptitude for math might find a good fit by pursuing a(n)____ systems degree.

Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment?

Answers

NIC Ports use which RJ connector? RJ-45 internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment.

There's a lot of confusion out there about which NIC ports use which RJ connectors. RJ-45 internetworking devices make computers that are connected to separate segments appear and behave as if they're on the same segment. So, which one do you use?

The answer is actually quite simple. If you're connecting two computers together, you'll need to use an RJ-45 cable. If you're connecting a computer to a modem or router, you'll need to use an RJ-11 cable.

RJ-45 cables are actually quite common and can be found at most electronics stores. If you're not sure which one you need, just ask a sales associate for help.

Learn more on internetworking device here:

https://brainly.com/question/28342757

#SPJ4

When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this lapse is referred to as:________

Answers

When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases, this lapse is referred to as: averaging.

What is memory?

In Psychology, memory can be defined as the ability of a living organism such as a human being to take in information through encoding, store it and then retrieve (recall) this piece of information at a latter time in the future.

Generally speaking, some of the effective and efficient ways to improve memory include the following:

Peg word systemElaborative rehearsalDrill and practice

In conclusion, averaging simply refers to the lapses that arises when a person normalizes memories by not reporting extreme cases.

Read more on memory here: https://brainly.com/question/15161639

#SPJ1

At the second simple query wizard dialog box, specify whether to create a summary or a(n) _____ query and then click the next button.

Answers

At the second simple query wizard dialog box, specify whether to create a summary or a detail query and then click the next button.

What is detailed query?

A Master or Detail query is known to be a term that is used in computing.

It is seen as a kind or form of an attached query that tends to take or select data into a given simple fields of a form (which is known to be called the master row) and also inside  a table field (which is known to be called the detail rows).

After that, it often shows a submenu of operations that can be done out for all of the master row that has been selected.

Hence, At the second simple query wizard dialog box, specify whether to create a summary or a detail query and then click the next button.

Learn more about   query from

https://brainly.com/question/5305223

#SPJ1

Explain how interaction with specific apps on a smartphone can be used to trace the movements of a victim or a potential suspect. How might this evidence be used to help prove a suspect’s guilt?.

Answers

The interaction with specific apps on a smartphone can be used to trace the movements of a victim or a potential suspect because all over the globe today, people are known to make use of a lot of different apps and a lot more.

Note that the increase in the rate of used by a person, the larger one has left their  "digital footprint" . This is known to be a way that can be used to prove a person guilty if they post evidence such as threats or pictures linked to the scene.

What is the digital footprint?

Based on the fact that a lot of people do leave their digital footprint in a lot of application, the Messages as well as phone (calling) apps can be a tool that can be used to see if the victim was  said to be in contact with any person that is a suspects in any kind of case.


Therefore, The interaction with specific apps on a smartphone can be used to trace the movements of a victim or a potential suspect because all over the globe today, people are known to make use of a lot of different apps, and a lot more. Note that the increase in the rate of used by a person, the larger one has left their  "digital footprint" . This is known to be a way that can be used to prove a person guilty if they post evidence such as threats or pictures linked to the scene.

Learn more about digital footprint from

https://brainly.com/question/13805577

#SPJ1

A radio station broadcasting a program is an example of ______. group of answer choices interpersonal communication mass communication media-centric communication broad communication

Answers

A radio station broadcasting a program is an example of option B. mass communication.

What is Mass communication?

Mass communication is known to be a term that connote the act or process of influencing or giving and exchanging of information via the use of mass media to a given large area of the population.

Note that it is one that is said to be understood for sharing   various forms of media and for the dissemination of information.

Therefore, A radio station broadcasting a program is an example of option B. mass communication.

Learn more about mass communication from

https://brainly.com/question/20696487

#SPJ1

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?.

Answers

The minimum number of bits required to assign a unique bit sequence is 7.

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. The minimum number of bits required to assign a unique bit sequence is 7. This means that there are a total of 2^7, or 128, possible combinations of bits that can be used to represent the staff members.

The office can use any combination of 7 bits to represent its staff members, but it must use a different combination for each staff member. For example, if the office has 100 staff members, it could use the following bit sequences to represent them:

0100001

0100010

0100011

0100101

0100110

0100111

0101000

Each of these bit sequences represents a different staff member. The office can use any other combination of 7 bits to represent the remaining staff members.

The office can use the application to assign work to its staff members by sending them a bit sequence that corresponds to the work that needs to be done. For example, if the office needs to assign work to staff member #1, it would send the following bit sequence:

0100001

This bit sequence would tell the staff member that they need to do work #1.

Learn more on bit sequence here:

https://brainly.com/question/28500827

#SPJ4

_____ are tools that track the memory usage, status, and errors of currently running software.

Answers

Process managers are tools that track the memory usage, status, and errors of currently running software.

What is a process management?

Process Management is known to be a term that is often called Business Process Management (BPM).

It is seen as  a kind of an organizational discipline that gives tools and resources that is said to be used for examining , defining, optimizing, monitoring, etc., of interdependent business processes.

Therefore, Process managers are tools that track the memory usage, status, and errors of currently running software.

Learn more about Process managers from

https://brainly.com/question/869693

#SPJ1

You manage a notebook system running windows. which task can you perform to log all packets that are dropped by the firewall on your computer?

Answers

The task that a person can perform to log all packets that are dropped by the firewall on your computer is that In the Local Security Policy, one need to configure object access policies for a given Windows Filtering Platform (WFP). Then see audit entries that can be found in the Security log in Event Viewer.

What is a computer notebook system?

The notebook computer is known to be a kind of a battery- or AC-powered personal computer that is said to be very little when compared to a briefcase that can be seen to be easily moved or  be transported and it is one that can be done conveniently.

It is one that is often used in temporary spaces such as in airplanes, school libraries, temporary offices, and others.

Note therefore, The task that a person can perform to log all packets that are dropped by the firewall on your computer is that In the Local Security Policy, one need to configure object access policies for a given Windows Filtering Platform (WFP). Then see audit entries that can be found in the Security log in Event Viewer.

Learn more about packets from

https://brainly.com/question/12972636

#SPJ1

What are components of the network effect in social media engagement? (choose every correct answer.) multiple select question. the exp

Answers

The components of the network effect in social media engagement are:

InformationNetworkDynamic

What is social media engagement?

The Definition of the term Social media engagement  is known to be a term that acts to measures all issues in regards to the public shares, the likes as well as the comments for any kind of online business as well as its social media efforts.

Note that the Engagement is one that is seen as a form of  historical common metric that is known to be used  for the examination of social media performance but it is one that do not  need to translate to sales.

Therefore, based on the above, one can say that The components of the network effect in social media engagement are:

InformationNetworkDynamic

Learn more about social media engagement  from

https://brainly.com/question/8360107

#SPJ1

Information

Network

Dynamic

Player

As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first task be?

Answers

As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

Who is a technical support rep?

The role or duty of a Technical Support is known to be any person that tends to troubleshoot customer tech issues.

Note that they are said to be people who often resolve issues that are linked to computers, phones, tablets, and others.

Therefore, As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

Learn more about technical support  from

https://brainly.com/question/27366294
#SPJ1

See option

a. conduct any necessary research

b. determine the purpose of the message he will send as a response

c. Hit the "reply" button

d. start composing his reply

Electronic courts (e-courts) may also be referred to as _______.
a. web courthouses
b. computer courts
c. virtual courthouses
d. network courts
e. digital courthouses

Answers

Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

What are virtual courts?

Virtual Courts is known to be the idea that is known to be aimed at removing the presence of litigant or any form of lawyer in the court as well as for adjudication of cases that is made on a virtual platform.

Note that this concept is one that has changed so that it can efficiently utilize court resources as well as  provide litigants.

Therefore, Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

Learn more about courthouses from

https://brainly.com/question/18228641

#SPJ1

Question 1 what does a directory server provide? 1 point a real-time communication service a network time service a lookup service for an organization a replication service

Answers

What a directory server does is to provide a lookup service for an organization. A directory service enables users to look up information about an organization. Lookup means to look anything up in an online directory.

It is an exclusive directory service created by Microsoft® to control user and machine authentication and authorization on a Windows domain network.

The major part of Active Directory is Active Directory Domain Services (AD DS), which assigns and enforces security policies and verifies access when a user login into a system or attempts to connect to one over the network.

Follow the link below to understand more on directory server

https://brainly.com/question/13818892

#SPJ4

object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift

Answers

Object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift is a true statement.

What are programming languages?

Programming languages can be defined as a mode of our electronic medium in which the strings of the graphical design as well as the visual elements are being included, it is basically a machine output with the person get.

After using these various languages the person is getting output after the languages use like C, C plus, Java, etc all views languages contribute to an object-oriented method.

Learn more about programming languages, here:

https://brainly.com/question/23959041

#SPJ1

What is the most popular example of specialized software for managing projects?
a) project apple
b) microsoft management
c) tool pert/cpm
d) microsoft project

Answers

The most popular example of specialized software for managing projects is: D) Microsoft project.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is Microsoft office?

Microsoft Office can be defined as a processing software application or program that is designed and developed by Microsoft Inc.

Basically, the Microsoft Office comprises different software applications and these include the following:

Microsoft Word.Microsoft PowerPoint.Microsoft AccessMicrosoft ProjectMicrosoft Excel.

In conclusion, the most popular example of specialized software for managing projects is Microsoft project because it can be used by project managers to formulate plans, budget, distribute resources and monitor project progress.

Read more on Microsoft project here: https://brainly.com/question/2704239

#SPJ1

Which format specifier transforms the variable pi to have only two decimal places in the output?

Answers

Console.WriteLine(pi.ToString("N2")); format specifier transforms the variable pi to have only two decimal places in the output.

Did you know that you can use the "N2" format specifier to transform the value of the pi variable to have only two decimal places in the output?

It's easy to do - simply use the Console.WriteLine method and pass in the value of pi with the "N2" format specifier.

Here's an example:

Console.WriteLine(pi.ToString("N2"));

This will output the value of pi as "3.14".

You can also use this format specifier with other numeric data types, such as floats and doubles. So if you want to limit the output of a float or double to two decimal places, you can use the "N2" format specifier.

Learn more here:

https://brainly.com/question/14425911

#SPJ4

Other Questions
When adding or subtracting numbers in scientific notation, both quantities must have the same ______ before carrying out the calculation. The government plays a significant role in financing health care services in the united states. True or false? When an individual communicates from their critical parent ego state to another's child ego state, what kind of transaction are they said to be engaged in? 6.Part A: Annotate the expressions.Expression C20-(-3)Expression D-20-(-3)Part B: How are the expressions similar?Part C: Explain the steps you would take in simplifyingExpression D. Simplify negative 2 and 3 over 5 minus 6 and 2 over 7. negative 12 and 1 over 2 negative 8 and 31 over 35 negative 8 and 6 over 35 12 and 6 over 35 EXPERIMENT: MASS OF GASHere is your goal for this lesson:Write a report on the mass of gasWe often do not think of gas in terms of having mass. The atmosphere is something we live in and breathe. In this experiment, we will investigate whether gas does truly have mass.Hypothesis: If gas does indeed have mass, then different volumes of it will have a different mass. This could be demonstrated by using a simple balance and comparing the two different volumes, captured by means of balloons.Materials needed:two balloons of the same sizemeter stickstringpaper clipsProcedure:1. Suspend the meter stick from the middle in such a way as to be able to move the string to balance. See the diagram below.2. Attach each balloon to either end of the meter stick, making the apparatus balance.3. Blow up each balloon to different volumes, thus measuring out different volumes of gas.4. Attach the balloons as shown in the diagram below using the paper clips. Be careful to attach the balloons in the same place as where the apparatus balanced.5. Answer the following questions in the writing space provided in this assignment.Did the suspended balloons balance?If they did not, which balloon tipped the scale down?Did your results validate the hypothesis?Give an explanation for your results, including a discussion of how the data collected either validated, or disproved the hypothesis. On the scale of the cosmic calendar, in which the history of the universe is compressed to 1 year, how long has human civilization (i.e., since ancient egypt) existed? Write the equation for the horizontal line that contains point G(4, 8).Oy=8O x = 8O x = 4O y = 4 The tendency of water molecules to cling to another substance is called __________________ Diiodine pentaoxide is used as an oxidizing agent that converts carbon monoxide to carbon dioxide. what is its chemical formula? An operating system is an example of which of the following?A. Hardware B.software C.networking systemD.messaging system If the bond length in a XY molecule is 212,what will be the covalent radius of atom X, ifthe covalent radius of Y atom is 93.O1192.271283 It has 20 ____________ , which have a positive charge and 20 ____________ , which have no charge. both of these subatomic particles are found within the ____________ . Define the terms worker exploitation- Use examples from Mediaeval Europe/JapanWhat was the positive outcome of the Black Death for Mediaeval workers?Why do modern workers in Australia have better working conditions then most other countries?What changes did Magna Carta make to English society in the Middle Ages?Who introduced the concept of Trial by Jury Why?In Australia today, a person is considered to be Innocent Until Proven Guilty. What was the experience in Mediaeval society, and what impact did it have on punishmentsIn Australia Tourture is illegal, punishments don't involve pain, and people believe we should try and reform the offender. Why do you think our justice system has changed so much since the middle ages? select four inorganic items paper gold cardboard metal glass fur olive oil concrete Doctor smith wants to know how many veterinary students decide to pursue a career as a small animal practitioner. there are 27 veterinary schools in the usa, so he decides to randomly select 10% of the students from each school and asks them where they intend to practice one they finish veterinary school. is this an example of a simple random sample? -5(7x-9)-6=144 what is the answer. 3e17 positively charged hydrogen ions pass a point in 5 seconds. what is the current in amps? What did the coca-cola company primarily accomplish by establishing international bottling plants in the 20th century? 45h + 1895 = 5000 What is the value of H