Which of the following is used to store data in the computer's memory that can be
used by a program later when executing instructions? Hint: They are link storage
containers
Variables
Operators
Expressions
Boolean

Answers

Answer 1

The  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

What is variables?

Variables can be defined as the way or process in which data or information are store in a computer memory.

Data or information that may likely change or be altered are often stores in a computer memory storage called variables and this store data can be retrieve later for use by a program when executing instruction on the computer  system.

Inconclusion the  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

Learn more about variables here:https://brainly.com/question/23931018


Related Questions

Identify and critically discuss the economic system you would prefer your business to operate in. Justify your choice.

Answers

The economic system you would prefer your business to operate in is free market system.

What type of the free market economic system?

The economic system that I like is the free market system. It is also called capitalism.

The reason why I choose this is because in a free market, competition is the factor that often shows or dictates how goods and services tends to  be allocated. Business in this market are often  conducted with little limited government involvement in it.

Learn more about free market system from

https://brainly.com/question/3369578

For this assignment, you will create a file, write information to the file, retrieve information from that file, and do calculations of the information from the file.

Make sure to comment code and use functions to break the problem up into manageable pieces.

Assignments
1. Open a Numbers.txt file. Write the numbers from 0 to 100 to the file.
2. Read the file Numbers.txt and find the sum, average, and median of all the numbers.
3. Output the results to the screen in a user-friendly format.
4. Make sure to ask the user for all the paths.

**C++ ONLY**

Answers

Answer:

Why only c bro

Use the drop-down menu to identify which command is used to do the activities.

Saving updates on a workbook:

Saving a workbook on OneDrive:

Changing the file name of an existing workbook:

Saving an existing workbook in a different location:

Assigning an initial location for the workbook to be saved:

Answers

Answer:

1. Both

2. Save As

3. Save As

4. Save As

5. Both

Explanation:

got the question right

The value you choose—typically the display text—will be saved as the default “Dropdown list” data-type. Instead of saving the text, the “Dropdown list with published keys” instead saves the Revalue ID (from the database).

What is use of a drop-down menu to identify a command?

A drop-down menu, also known as a list of options, appears when a button or a piece of text is clicked. Users can decide a value from a list by selecting it from a graphical representation of this method.

People can select an item from a list you generate using drop-down menus. In a new worksheet, type the selections you want to appear in your drop-down list. Your list items should ideally be in an Excel table.

A closed-ended inquiry known as a dropdown allows respondents to select one response option from a set of options displayed in a dropdown menu.

Therefore, 1. Both 2. Save As 3. Save As 4. Save As 5. Both.

Learn more about drop-down here:

https://brainly.com/question/4379717

#SPJ2

Submit your 300- word essay that: 1) identifies a problem in your community and works through problem solving steps to provide a solution, and 2) analyzes five conflicts through the conflict resolution approaches and explains an appropriate resolution for each conflict.

Answers

Note the above prompt is about a descriptive essay. See the sample essay below.

Descriptive Essay about a problem in my community and the Solution to the Same

Waste management is an issue that affects every community around the world. It is a problem that has far-reaching consequences on human health and the environment. In my community, waste management is an issue that requires immediate attention. The problem stems from a lack of awareness, inadequate infrastructure, and insufficient regulatory measures.

To address this problem, we can follow a problem-solving process.

The first step would be to define the problem, which is waste management. This would involve understanding the causes and effects of the problem.

The second step would be to gather data on the problem. This could be done through surveys, interviews, and observations.

The third step would be to analyze the data collected and identify the root causes of the problem. In our case, the root causes could be lack of awareness, inadequate infrastructure, and insufficient regulatory measures.

The fourth step would be to brainstorm solutions to the problem. This could be done through workshops, focus groups, and meetings. Some possible solutions could be to increase public awareness through education campaigns, improve waste collection and disposal infrastructure, and enforce stricter regulations on waste disposal.

The fifth and final step would be to implement and evaluate the solutions. This would involve monitoring and assessing the effectiveness of the solutions and making adjustments as necessary.

Conflicts are inevitable in any community, and it is essential to have effective conflict resolution approaches to ensure that these conflicts are resolved in a fair and equitable manner. The five conflict resolution approaches are negotiation, mediation, arbitration, litigation, and avoidance.

Negotiation is a conflict resolution approach that involves parties coming to an agreement through discussion and compromise. This approach would be appropriate for conflicts that are relatively minor and do not involve legal or ethical issues.

Mediation is a conflict resolution approach that involves a neutral third party facilitating a discussion between the conflicting parties to come to an agreement. This approach would be appropriate for conflicts that involve communication breakdowns or misunderstandings.

Arbitration is a conflict resolution approach that involves a third party making a binding decision on the conflict. This approach would be appropriate for conflicts that involve legal issues.

Litigation is a conflict resolution approach that involves taking the conflict to court to have a judge make a binding decision. This approach would be appropriate for conflicts that involve legal or ethical issues.

Avoidance is a conflict resolution approach that involves ignoring or avoiding the conflict altogether. This approach is generally not recommended as it does not resolve the conflict and can lead to further problems in the future.

In conclusion, waste management is a problem that requires a concerted effort from everyone in the community to address. Through problem-solving steps, we can identify the root causes of the problem and come up with effective solutions. Note as well that, having effective conflict resolution approaches is essential in ensuring that conflicts in the community are resolved in a fair and equitable manner. By following these approaches, we can work towards creating a more sustainable and harmonious community.

Learn more about Descriptive Essay at:

https://brainly.com/question/25505941

#SPJ1

Assume we need to implement the following sequence of Instructions with
forwarding by using a 5 stages pipeline.
sub x12, x11, x13
and x8 x12, x15
or x9,x16.x12
For clock cycle 5, what are the control values of A and B (the two outputs of
"Forwarding unit") respectively?
(The control values for the forwarding multiplexors

are shown in the following table)
MUX Control Source
A/B - 00
ID/EX
W/B - 10
EX/MEM

Answers

Answer:

0 0 1 0

Explanation:

sub X12, X11, X13 and x8, X12, X15 or X9, x16, x12 For clock cycle 5, what are the control values of A and B.

Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business

Answers

for easy data management i recommend SQL

The features of spreadsheets and/or database software might she use to facilitate her business are:

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.

What is Spreadsheet?

A spreadsheet is known to be a kind of computer application that is often used for computation, organization, and others.

Note that The features of spreadsheets and/or database software might she use to facilitate her business are:

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.Data filteringAccounting.Analytics, etc.

Learn more about spreadsheets from

https://brainly.com/question/27119344?answeringSource=feedPublic%2FhomePage%2F20

#SPJ2

What is 3+5?*

(Hint: is it not 8)

Answers

Such a confusing question:)

Explanation:

mark me brainliest

public class Billing {
final static double TAX = 0.08;
public static void main(String[] args) {
final double HIGHPRICE - 24.99;
final double MEDPRICE - 17.50;
final double LOPRICE = 10.00;
final int QUAN1 4;
final int QUAN2 6;
double bill;
bill = computeBill(HIGHPRICE);
System.out.println("The total for a photobook that costs $" +
HIGHPRICE + is 5" + bill);
bill - computeBill(MEDPRICE, QUAND);
System.out.println("The total for + QUAN1 +
photobooks that cost $"
MEDPRICE + is $" + bill);
bill - computeBill (LOPRICE, QUANZ, 20.00);
System.out.println("The total for + QUANZ
photobooks that cost $"
LOPRICE with a $20 coupon is $" + bill);
}
public static double computeBill(double amt) {
1/ Write your code here
}
public static double computeBill(double amt, int quantity) {
// Write your code here
}
public static double computeBill(double amt, int quantity, double coupon) {
// Write your code here
}
}

Answers

Answer:

C

Explanation:

How does Accenture work to build trust in Artificial Intelligence (AI)?

Answers

This question has already been asked on Brainly.

https://brainly.in/question/35275070

Accenture work to build trust in Artificial Intelligence (AI) through investing in differentiated intellectual property.

What is a  differentiated intellectual property?

Intellectual property serves as a creations of the mind as well as inventions that is bee used in commerce.

With the creation of this  differentiated intellectual property, it help the Accenture to be able to establish trust because there is a law that protect any intellectual property in the the country.

Read more on intellectual property here: https://brainly.com/question/1078532

#SPJ2

The CPU is basically the same as a disk drive?

Answers

Answer:

No, other than working independently, they are not the same.

Explanation:

A computer's CPU is the fastest part of the system. Its job is to process data and is usually left waiting on the rest of the computer to feed it information to work with. Hard drives are one of the sources that the processor gets data from, but both parts work independently.

Electrostatic Sensitive Devices Google Chrome
A Not secure http/209.60.132.173:8080/nidaile/SCE/portal/lessontrame 7.aspx
2. A requirement for workbench and tools which are used with ESDs is that
tools must be non-metallic and workbenches must be wood covered
tools and work surfaces must be plastic
tools, work surfaces, and floors must be grounded
only tools mulbe grounded

Answers

Answer:

um what

Explanation:

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)

Answers

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.
Memory-memory: All three operands of each instruction are in memory.
Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.
Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

Answers

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

please mark me as brainliest.............

follow me.............

.

In a formula, why is it preferred to use a reference cell instead of a static number in excel?

Answers

Answer:

they allow you to update data in your worksheet without having to rewrite formulas

Explanation:

Modifying values with cell references. Cell references are that they allow you to update data in your worksheet without having to rewrite formulas. The cell address or the range referred to during the calculation while constant has a fixed value.

Hope it helps!!!Brainliest pls!!!

Match each item with a statement below.â

a. âAn address type used in IPv6 to allow a one-to-many relationship between source and destination.
b. âThe bounds of a network that defines which devices must receive a packet thatâs broadcast by any other device.
c. âA method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.
d. âAnd auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.
e. âAn automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.
f. âA value used to express how many bits of an IP address are network ID bits.
g. âAn address that always refers to the local computer.
h. âA value assigned to the gateway based on the speed of the interface used to access the gateway.
i. âA network communication in which a packet is addressed so that more than one destination can receive it
j. âAn automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers

a. âanycast addresses
b. âbroadcast domain
c. âCIDR
d. âEUI-64
e. âISATAP f. âIP prefix
g. âloopback address
h. âmetric
i. âmulticasting
j. Teredo

Answers

Answer:

a. Anycast Addresses

b. Broadcast domain

c. Classless Interdomain Routing (CIDR)

d. Extended Unique Identifier (EUI-64) interface ID

e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

f. IP prefix

g. Loopback Address

h. Metric

i. Multicasting

j. Teredo

Explanation:

a. Anycast Addresses: An address type used in IPv6 to allow a one-to-many relationship between source and destination.

b. Broadcast domain: The bounds of a network that defines which devices must receive a packet that's broadcast by any other device.

c. Classless Interdomain Routing (CIDR): A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.

d. Extended Unique Identifier (EUI-64) interface ID: An auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.

e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP): An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.

f. IP prefix: A value used to express how many bits of an IP address are network ID bits.

g. Loopback Address: An address that always refers to the local computer. The loop address is primarily 127.0.01.

h. Metric: A value assigned to the gateway based on the speed of the interface used to access the gateway.

i. Multicasting: A network communication in which a packet is addressed so that more than one destination can receive it

j. Teredo: An automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers.

HTML is at the core of every Web page, regardless the complexity of a site or number of technologies involved.

1. True

2. False

Answers

Answer:

1

Explanation:

That is true. Every website, no matter how complex, breaks down to basic HTML code and structure.

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?

A.) Animated gif
B.) HTML 5
C.) Adobe Flash
D.) Adobe animate cc

Answers

Answer:

Adobe Flash

Explanation:

From the list of given options, Adobe Flash answers the question.

Adobe Flash are basically multimedia animations that are created to include numerous images which are displayed in sequence.

Other options such as Adobe animation cc is a software used to create flash animations, html5 is a web language, animated GIF are short animations.

The type of animation he  should select is A.) Animated gif

Animated gif are picture which are in Graphic interchange format (GIF) .

Animated gif  are very easy to download because they download quickly.

Animated gif are picture that always move non stop when displayed  on a computer screen or other device as the picture changes from one picture to another picture.

They can always be found on the internet and they are mostly used as an advertisement pictures that is embedded on web pages which help to showcase a company product.

Inconclusion The type of animation he  should select is A.) Animated gif.

Learn more about Animated gif here:

 https://brainly.com/question/15057611

what are the five generations of computer software​

Answers

Answer:

1st gen: Vacuum Tubes(1940–1956)

2nd gen: Transistors(1956–1963)

3rd gen: Integrated Circuits: (1964–1971)

4th gen: Microprocessors (1971–PRESENT)

5th gen: Artificial Intelligence (present)

Explanation:

Which of the following is a true statement?


New employees and/or clients are not concerned with the details of an email; they focus on the deal.


Business emails can convey a negative tone as long as it is supported by a valid reason and sufficient data.


Business emails should always be written using a professional tone.


It is acceptable if proper punctuation, spelling, and capitalization are not used all the time.

Answers

Answer:

4

Explanation:

it's unacceptable, proper punctuation, spelling and capitalization shud be used where possible

What will be displayed as a result of executing the following code?
int x = 6;
String msg = "I am enjoying this class.";
String msg1 = msg.toUpperCase();
String msg2 = msg.toLowerCase();
char ltr = msg.charAt(x);
int strSize = msg.length();
System.out.println(msg);
System.out.println(msg1);
System.out.println(msg2);
System.out.println("Character at index x = " +
ltr);
System.out.println("msg has " + strSize + "characters.");
A) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 24 characters.
B) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 25 characters.
C) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n msg has 24 characters.
D) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n
msg has 25characters.

Answers

Answer:

d

Explanation:

When an application checks for malware, it compares the contents of every file it looks at to this database of definitions and if it finds a match, it flags the file as potentially being infected.

1. True

2. False

Answers

When an application checks for malware, it compares the contents of every file it looks at to this database of definitions and if it finds a match, it flags the file as potentially being infected is a true statement.

What does anti-malware software look for?

A lot of programs are known to scan for malware through the use of a database that contains some known malware definitions

These definitions are used to tell what the malware does and how to know it. If the anti-malware program can be able to detects a file that matches the definition, it will then flag it as potential virus.

Learn more about application from

https://brainly.com/question/1538272

The ideal gas law allows the calculation of volume of a gas given the pressure(P), amount of the gas (n), and the temperature (T). The equation is:

V = nRT / P

Since we only have used integer arithmetic, all numbers will be integer values with no decimal points. The constant R is 8.314 and will be specified as (8314/1000). This gives the same result.

Required:
Implement the ideal gas law program where the user is prompted for and enters values for n, T, and P, and V is calculated. Be careful to implement an accurate version of this program. Your program should include a proper and useful prompt for input, and print the results in a meaningful manner.

Answers

Answer:

Written in Python

P = float(input("Pressure: "))

T = float(input("Temperature: "))

n = float(input("Amount of Gas: "))

R = 8.314

V = (n * R * T)/P

print("Volume: "+str(round(V,2)))

Explanation:

The next 3 lines prompts user for inputs of Pressure, Temperature, Amount of Gas

P = float(input("Pressure: "))

T = float(input("Temperature: "))

n = float(input("Amount of Gas: "))

This line initializes constant R

R = 8.314

This line calculates volume

V = (n * R * T)/P

This line prints volume, rounded up to 2 decimal places

print("Volume: "+str(round(V,2)))

What is a spreadsheet macro?

A) A small program which performs several steps, which can be recorded and activated using a hot key combination.

B) A tool used to create charts.

C) A feature inside excel that makes your work look better.

D) A formula to complete calculations.

Answers

Answer:

Macros are code that automate work in a program—they let you add your own tiny features and enhancements to help you accomplish exactly what you need to do, quickly with just a click of a button.

Explanation:

If you only use part of a quotation, it is not necessary to include a citation.

Answers

Answer:

i believe this is false

explanation:

Write a Python program that translates a binary number of n bits to a decimal number. Your program should first ask the user the length of the binary number (how many bits). Using that information, ask the user to provide each bit from lowest to highest. Once the user has entered all the bit values for the binary number, report back the decimal value. Hint: You should use the mechanism to convert binary to decimal in earlier lectures. Note: Your program should not use any functions or methods from any library.

Answers

Answer:

Follows are the code to this question:

n= int(input("please enter number of bits, which want to convert for binary to decimal numbers: "))

p= 1#defining variable p for calculate power

d= 0#defining variable d for calculate decimal value

for i in range(n):#defining for loop for input bits value

   b= int(input("Enter the bit value from lowest to highest: "))#input value in b

   if b==1:#defining if block that check input is 1 value

       d=d+p#calculating decimal value

   p=p* 2#calculating power

print("The converted decimal number is:",d)#print value

Output:

please find the attached file.

Explanation:

In the above-given code, n variable is defined, which takes the number of bits value which you want to convert into a decimal value.

In the next step, "d and p" variable is defined that calculates the power and decimal number and store its value respectively, in this step, a for loop is used that uses the "b" variable for inputs bits value into lowest to the highest form, and use the if block.

In this block, it checks if the input value is one then it calculates its power and store its value into the "d" variable and use the print method to print its value.  

Hello World.

⇒ What is the function of for loops in Python?

Answers

Answer:

The for loop in Python is used to iterate over a sequence (list, tuple, string) or other iterable objects. Iterating over a sequence is called traversal.

✒Answer✒

The for loop in Python is used to iterate over a sequence (list, tuple, string) or other iterable objects. Iterating over a sequence is called traversal.

Explanation:

# Brainliest Bunch

Momentous events in Philippine history where ICT played a huge role in making it a success?

Answers

Answer:

I hope this answer is correct

Explanation:

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.But Arroyo would later face her own share of troubles during her administration. Both former presidents seemed to follow the same track in politics: they were both vice presidents before assuming the highest seat of the land, and both have been accused of criminal offenses. Despite these, Estrada and Arroyo have managed to retain positions in government today.

Which is the "Network Effect?"

Answers

Answer:

The network effect refers to the concept that the value of a product or service increases when the number of people who use that product or service increases.

Explanation:

Hope this helps !!

One of the leading causes of serious injuries and deaths in this country is single-vehicle crashes into roadside obstacles and hazards.

True
False

Answers

Answer:

True

Explanation:

Just took the quiz on edginuity

Good luck

1.Give single word
a. A computer never gets tired or bored while working for a long time ..........
b. A computer doesn't make any mistake ..........
c. A computer can perform billions of calculations in a second .........
d. A computer can perferm several tasks such as drawing pictures,playing games,etc.......

Answers

Answer:

A. Versatile

B. Accuracy

C. High speed

D. Animation.

Other Questions
area of rhombus ROCK is ________ cm^2 if RC = 13 cm and OK = 24cm The cost of hiring a trailer for t hours is C= 5t+10 draw the graph of C against t A certain space heater that is connected across 220 V and dissipates 1477 W of power in the form of electromagnetic radiation. What is the resistance of the heater? which contient lies between 15N and 60S What are some of the models for digital distribution of magazines? ima give you all my pointsand brainly pwease i need helppRead the two passages and answer the question.Passage 1[1]Nothing that comes from the desert expresses its extremes better than the unhappy growth of thetree yuccas.Tormented, thin forests of it stalk drearily in the high mesas, particularly in thattriangular slip that fans out eastward from the meeting of the Sierras and coastwise hills. Theyucca bristles with bayonet-pointed leaves, dull green, growing shaggy with age like an old[5] man's tangled gray beard, tipped with panicles of foul, greenish blooms. After its death, which isslow, the ghostly hollow network of its woody skeleton, with hardly power to rot, makes eventhe moonlight fearful. But it isn't always this way. Before the yucca has come to flower, whileyet its bloom is a luxurious, creamy, cone-shaped bud of the size of a small cabbage, full ofsugary sap, the Indians twist it deftly out of its fence of daggers and roast the prize for their[10] own delectation.Passage 2[1]I wandered lonely as a cloudThat floats on high o'er vales and hills,When all at once I saw a crowd,A host, of golden daffodils;[5]Beside the lake, beneath the trees,Fluttering and dancing in the breeze.Continuous as the stars that shineAnd twinkle on the milky way,They stretched in never-ending line[10]Along the margin of a bay:Ten thousand saw I at a glance,Tossing their heads in sprightly dance.The waves beside them danced; but theyOut-did the sparkling waves in glee:[15]A poet could not but be gay,In such a jocund company:I gazedand gazedbut little thoughtWhat wealth the show to me had brought:For oft, when on my couch I lie[20]In vacant or in pensive mood,They flash upon that inward eyeWhich is the bliss of solitude;And then my heart with pleasure fills,And dances with the daffodils.Both passages describe a plant. The yucca tree "bristles with bayonet-pointed leaves" and a "fence of daggers" while the daffodils "toss their heads in sprightly dance." What does this word choice reveal about how the two passages view nature? Passage 1 views nature as harsh while Passage 2 views nature as delightful. Passage 1 views nature as serious while Passage 2 views nature as foolish. Passage 1 views nature as stimulating while Passage 2 views natures as fun. Passage 1 views nature as violent while Passage 2 views nature as gruesome. 1. Magalie et Anne sont2. Sarah est3. Nous sommes4. Flix et Sophie sont5. Ils sont6. M. Roland, vous tes7. Le professeur est8. Le lyce estWhat adjective goes after Which physical property is most helpful for separating a mixture of salt dissolved in water?A Particle densityB Boiling pointC Rate of solutionD Magnetic attraction Sam's Club has a special that charges $2.49 per case of water. Vinny wants to pay that price, but needs to purchase a membership first, which costs $50. If Vinny spent $67.43, which equation represents how many cases of water Vinny bought at Sam's club? Brent feels that killing animals for food is wrong. However, bacon is his favorite food. He is in a state of cognitive dissonance because he has two attitudes that conflict with each other. What will help Brent resolve his feelings of cognitive dissonance if ABC undergoes a dilation of scale factor 3 centered at the origin, what will be the coordinates of the image of point B?A- ( 6, 3 ) ?B- ( 2, 9 ) ?C- ( 5, 6 ) ?D- ( 6, 9 ) ?And why ..?Please help! Ill give Brainliest to the first person who answers. What are the Two main classes of people in Chinesesociety during the Tang and Song dynasties A company purchased $1,800 of merchandise on July 5 with terms 2/10, n/30. On July 7, it returned $200 worth of merchandise. On July 28, it paid the full amount due. Assuming the company uses a perpetual inventory system, and records purchases using the gross method, The correct journal entry to record the purchase on July 5 is: _____________ a) Debit Accounts Payable $1,800; credit Purchase Returns $200; credit Merchandise Inventory $1,600. b) Debit Accounts Payable $1,800; credit Merchandise Inventory $1,800. c) Debit Merchandise Inventory $1,800; credit Accounts Payable $1,800. d) Debit Merchandise Inventory $1,800; credit Sales Returns $200; credit Cash $1,600. e) Debit Merchandise Inventory $1,600; credit Cash $1,600. During Peter Zengers trial, his lawyer, Andrew Hamilton, asked the prosecution to prove that Zenger had published false material. After the prosecution failed to do so, the jury acquitted Zenger of the charges of libel. How did this case help increase the freedom of the colonists?A. The colonists could criticize the government as long as they were speaking the truth.B. All colonists were now free to participate in the workings of the colonial legislature.C. The colonists were now free to speak or print any material without the fear of libel charges.D. The colonists were now free to challenge or reject the authority of any government official. 10 points to whoever can answer this id give more but i only have 10. AVIS rent a car is running a deal where you can rent a car for $49.99 and $0.99 per mile. Using "m" for miles, write and expression that depicts this situation. Motivation is defined by psychologists as what? How is the initial kinetic energy related to the final kinetic energy in an elastic collision? HELP!!Find the equation of a line parallel to y = 4x 4 that contains the point (-2,0). Write the equation in slope-interceptform. what is the life span ofelephant , rose, dog ,banana tree Bernard ate part of a small pizza. He started with 11/12 of a pizza but only ate 2/3 of it. which is the best estimate of the amount Bernard ate