While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops
responding. Which Task Manager tab would you use to end Internet Explorer?

Answers

Answer 1

Answer:

applications tab

Explanation:


Related Questions

an array is a(n) ____ of values in computer memory.

Answers

In a computer's memory, an array is a list of values. Each element (value or variable) in an array is identified by at least one array index or key. An array is a type of data structure.

when using subscript 6 when you have a 5 element array?

It is argued that your subscript is out of limits if you have a five element array and use subscript 6. The loop control variable has two possible values: increase and decrease. By exiting a loop as soon as a match is discovered in the array, you can increase a program's efficiency.

In a data structure, what exactly is an array?

A continuous stream of memory locations is used to hold elements of the same data type in arrays.

To know more about array visit :-

https://brainly.com/question/13261246

#SPJ4

How to fix microsoft has blocked macros from running because the source of this file is untrusted

Answers

Removing Mark of something like the Web is the quickest way to unlock macros. To delete, perform an appropriate on the file, select Properties, and then click the General tab's Unblock checkbox.

Who currently owns Microsoft?

250 million Microsoft shares, or 103 million shareholder votes, are owned by Bill Gates. As of December 2021, the selling price of Bill Gates' ownership in Windows was $35 billion. William H. "Bill" Gates

How can I contact Microsoft customer support?

To get support phone numbers. If a post was useful to you, kindly advise it as such and give it a rating. This will make it easier for other people to discover solutions to similar queries.

To know more about Microsoft visit :

https://brainly.com/question/26695071

#SPJ4

What security measure is used to slow the movement of personnel when entering or leaving a secure area

Answers

When entering or exiting a secure area, mantrap security measures are utilized to slow down personnel movement.

What kind of physical security precautions are used to make portable gadgets more improbable to be stolen?

In order to prevent theft, loss, and resale, portable equipment like laptops should be properly secured with a lock. The majority of desktop and laptop computers feature built-in slots that can be connected using a cable lock. Most computer stores carry these locks in their inventory.

Which security element is host- or network-based?

Network-based or host-based IDS are both options. Network-based IDSs examine network, transport, and application protocols while keeping track of network traffic for specific network segments or devices in order to spot suspicious activities.

To know more about mantrap security visit :-

https://brainly.com/question/29744068

#SPJ4

The process by which keys are managed by a third party, such as a trusted CA, is known as?
O Key escrow
O Key destruction
O Key renewal
O Key management

Answers

Key escrow is the procedure by which credentials are handled by the a third party, like a reliable CA.

What is the name of the entity that issuing digital certificates is a trustworthy third party?

A reputable organization that issues Security Socket Layer (SSL) certificates is known as a certificate authority (CA).These ssl signatures are data files that are used to link an entity cryptographically to a public key.

How are certificates issued by CAs verified?

A browser will acquire a series of certificates to validate a certificate, each of which has signed the certificate before it, linking the signing CA's base to a server's certificate.A certification path is the name given to this collection of credentials.

To know more about digital certificates visit:

https://brainly.com/question/29726262

#SPJ4

Which Windows 10 power-saving mode uses an ACPI (Advanced Configuration and Power Interface) S0 low-power idle mode to maintain a network connection while saving energy

Answers

In Windows 10, Modern Standby is a power-saving mode (ACPI S0) that functions similarly to standby mode while additionally supplying power to the network interface to keep connectivity.

Which tool should you use to set the devices and services that Windows starts when it boots?

Changes to configuration settings, such as which programmes Windows launches, can be made using the Microsoft System Configuration (msconfig) tool, a piece of Microsoft software. It has various helpful tabs, including: Tools, Services, Startup, and General.

What does Windows 10's ACPI mean?

A part of the Windows operating system's inbox is the Windows ACPI driver, sometimes known as Acpi. sys. Support for power management and Plug and Play (PnP) device enumeration are among Acpi. sys' duties. The HAL causes issues on hardware platforms with an ACPI BIOS.

To know more about ACPI visit:-

https://brainly.com/question/29853140

#SPJ4

You are creating a DRP for a small, independent car dealership. There are four employees who each use a desktop computer; there are no servers. All company data is stored on the four computers. A single high-speed DSL link is shared by all users. What are the best DRP solutions

Answers

The risks that will have the greatest influence on business operations are identified via a business impact study. In figuring out how to recover from a calamity, this is helpful.

What kind of disaster recovery strategy focuses on minimising the impact of a disaster on IT systems, staff, and customers?

A disaster recovery plan gives companies the ability to react swiftly to a crisis, take immediate action to lessen damage, and restart operations as soon as feasible. Typically found in a disaster recovery strategy are Staff members can use emergency measures in the event of a calamity.

What actions should you take when keeping backup server tapes offsite?

Maintain all of your backup tapes and other media in a safe, comfortable, and, most importantly, fireproof environment. No matter if you backup a single file or a whole system.

To know more about business impact study visit :-

https://brainly.com/question/18645299

#SPJ4

Knowing that the central portion of link bd has a uniform cross sectional area of 800 mm2 , determine the magnitude of the load p for which the normal stress in link bd is 50 mpa. (hint: link bd is a two-force member. ) ans: p = 62. 7 kn

Answers

The magnitude of the load p is 62.7kn. The x, y, and z directions are all possible for load magnitude.

How do you determine the size of a load?

5.3 The load's size and composition, The result of multiplying the weight to be transported by the equipment weight (tare) is the value [N], which indicates the size of the load. Q represents each wheel's load capacity Pu stands for pounds to move. P = tare of the equipment n is the number of wheels making contact with the surface.

The x, y, and z directions are all possible for load magnitude. The current work plane's coordinate system is the same. The direction of the load is indicated by positive coordinates. Shifting the work plane, for instance, enables you to precisely apply loads when you create loads perpendicular to sloped portions.

The magnitude of a two-dimensional vector, a=(a1,a2), can be calculated using the formula a=a21+a22.

Explanation: p = 800 mm2+50mpa = 62.7kn.

To learn more about magnitude refer to:

brainly.com/question/24256733

#SPJ4

Which of the following will configure all the span elements with red (#FF0000) text color? a. span { color: #FF0000;} b. #span { color: #FF0000; } C. span { color:#FF0000; } d.

Answers

All the span elements will be configured with red (#FF0000) text color if you use the following syntax: span color: #FF0000;.

The text color is set by which CSS property?

The text color is set by which CSS property? On a web page, the font color can be changed using the declaration property bgcolor.

Which CSS syntax for body color is appropriate?

The right CSS syntax is pcolor:black; out of everything provided (Option 2). CSS selectors are used to "find" (or pick) the HTML components that need styling. The HTML element you want to style is designated by the selector p in CSS, which is p>. The value of a color's property, which is black, is a property.

To know more about span elements visit :-

https://brainly.com/question/26102029

#SPJ4

in sql, you use the ____ command to query a database.

Answers

In SQL, you use the SELECT command to query a database.

The SELECT command is used to retrieve data from one or more tables in a SQL database.

The basic syntax of a SELECT statement is as follows:

SELECT column1, column2, ...

FROM table_name

WHERE some_column = some_value

Here, column1, column2, etc. are the names of the columns that you want to select, table_name is the name of the table that you want to query, and the WHERE clause is used to filter the results based on a certain condition.

The SELECT statement can also be used in combination with other SQL commands, such as JOIN, UNION, and GROUP BY, to retrieve data from multiple tables or to perform more complex queries.

Learn more about the database:

https://brainly.com/question/29412324

the shop linked to these assets is violating integrity policies and is not eligible to engage in this commerce operation.

Answers

No, the shop is not violating any integrity policies and is eligible to engage in the commerce operation.

What is commerce operation?Integrity policies are measures designed to ensure that business operations are conducted in an honest, fair, and transparent manner.These policies include ethical codes of conduct, rules for disclosure and transparency, and prohibitions against fraud, bribery, and other corrupt practices. In this case, the shop linked to these assets has violated these policies and is therefore not eligible to engage in this commerce operation. The shop may have violated these policies by engaging in deceptive practices, such as false advertising or misrepresenting prices or services. It may have also failed to disclose important information or have taken part in other forms of corruption.Additionally, it may have failed to comply with applicable laws and regulations. All of these violations could render the shop ineligible to engage in this commerce operation. By adhering to integrity policies, businesses are able to ensure that they are engaging in ethical and legal practices while also protecting their customers and stakeholders.Therefore, it is essential that all businesses adhere to these policies to remain eligible for engaging in commerce operations.

To learn more about Integrity policies refer to:

https://brainly.com/question/30138038

#SPJ4

Which of the following is an advantage that text-based programming languages (i.e. Python) have over block-based programming languages (i.e. Scratch)

Answers

When writing a programme, text-based programming languages give programmers more in-depth control over lower-level functionality.

In block-based applications, we are constrained to use the blocks that are provided to us and frequently have a limited range of options for doing so. We have more freedom to customise lower-level functionality in text-based languages since we are not constrained by a predetermined number of available blocks.

Python is usually used for making websites and applications, automating repetitive tasks, and analysing and display of data. Python has been utilised by many non-programmers, including accountants and scientists, for a different kind of routine activities including managing finances since it is very simple to learn.

To learn more about Python

https://brainly.com/question/18502436

#SPJ4

The following describes which sources of potential risk: The software programming team is supposed to begin work in two months. The team has already been hired, but half of the team does not yet have their security clearance, and will not be able to start work on site until they do.

Answers

External conditions and demands, administration and security, logistics, as well as other variables, security and integration of human systems .

What does introductory programming entail?

If you're searching for a simple and even enjoyable computer language to learn first, Python is always advised. Python reads plain English and is easy to grasp for someone who is new to programming, as opposed to having to dive right into rigid syntax restrictions.

How challenging is programming?

It is public knowledge that programming is one of the most hard challenges to master. It is not difficult to understand why some people find it challenging to learn how to code given how different it differs from conventional educational methods, including college degree programs in computer science.

To know more about Programming visit :

https://brainly.com/question/11023419

#SPJ4

Which access control technology includes software licensing keys, copy restrictions from music CDs or DVDs or other measure taken to protect copyrighted material

Answers

To safeguard their intellectual property, digital data, and digital material, content providers use a system called digital rights management (DRM). DRM restrictions are used to limit particular actions that can be conducted with digital data, like printing, copying, and sharing, as well as access to those files.

DRM licencing - what is it?

Developer worries about unlicensed copying and distribution of your app are addressed with DRM (digital rights management, or more generally licence verification).

DRM copy protection: what is it?

Copyrights for digital media are safeguarded using digital rights management (DRM). Utilizing technologies that restrict the use and duplication of proprietary software and works protected by copyright is part of this strategy.

To know more about  CDs or DVDs visit:-

https://brainly.com/question/29176007

#SPJ4

Which of the following hardware items is not compatible with Window workspaces? a. A USB hub b. USB 2.0 ports c. USB 3.0 ports d. 32-bit legacy BIOS (non-UEFI)

Answers

Windows workspaces are incompatible with the USB hub of the aforementioned hardware devices.

What does a USB hub do?

The little converter known as a USB port hub has numerous additional USB ports. It's a simple method for increasing the number of USB ports on your computer. 3 to 7 additional ports are frequently found in USB hubs.

Are USB hubs a wise choice?

For someone who owns numerous power-hungry USB devices, USB hubs are the ideal buddy. A USB hub can accommodate the needs of any device that requires USB power, including phones, tablets, and desk devices. Additionally, it is advantageous as everything can be plugged into the same hub rather than having to search for a spare mains plug.

To know more about USB hub visit :-

https://brainly.com/question/28333162

#SPJ4

In Bash, if you need a little help with how a command like ls works, which of the commands can you use to get more information

Answers

ls --help or man ls it is the commands can you use to get more information.

What is the ls command in bash?

The current directory's files are listed by the ls command (ls is short for "list"). The ls command will by default just print the names of all the files and folders. Use the flag "-l" to receive the extra details and a cleaner view. The following information about each file is displayed by ls in long list format.

The 'ls' command can be used to list files and directories. If you use the "ls" command without any other options, the contents of your current working directory, which is just another way of saying the directory that your terminal is currently in, will be listed.

To learn more about command refer to :

https://brainly.com/question/25808182

#SPJ4

the module definition comprises the module header and the module ________.

Answers

The module definition comprises the module header and the module body.

What constitutes a module definition?

A self-contained item or unit that can be connected to other items of its kind to create a larger system. Examples include an assembly of electrical parts and related wiring or a section of computer software.

Can there be more than one variable with the same name in a module?

Due to the fact that they are in the same scope, a module may include two variables with the same name. There must be compatibility between the data types of the arguments used in a module call and the parameters stated in the module header.

                       The program as a whole and each statement inside are both within the scope of the parameter variables.

Learn more about module

brainly.com/question/14527306

#SPJ4

Why perfection is required in sync? and what are the causes that can ruin it?​

Answers

Perfection is not necessarily required in synchronization, but it can be important to ensure that synchronization is accurate and consistent. Synchronization is the process of coordinating the actions or timing of multiple devices or processes, and it is often used to ensure that data or events are properly aligned or coordinated.

There can be a number of causes that can ruin synchronization, including hardware or software malfunctions, network delays or disruptions, interference from other devices or signals, and human error. It can be important to identify and address these potential causes in order to maintain the accuracy and reliability of synchronization.

1. When your computer is not in use, the screen should go blank after a moment, and you should be required to log in again when you return. T/F

Answers

Answer:

Explanation:

This statement is generally true. Having the screen go blank after a moment of inactivity, and requiring a login to return to the computer, is a common security feature known as screen locking. When a computer is locked, it prevents unauthorized access by requiring a password or other form of authentication before the user can regain access to the computer.

This is a useful feature as it helps to prevent sensitive data from being accessed if the computer is left unattended for an extended period of time. The lock time out can be configured in the settings by the administrator and it can depend on the specific operating system you are using.

On Windows, you can set the lock time out by going to the Power & Sleep settings and then selecting Additional power settings. On MacOS, you can set lock time out by going to System Preferences, Security & Privacy, then General and adjust the setting for "require password" after sleep or screen saver begins

It's important to remember that screen locking does not guarantee total security, but it's an important step towards making sure your computer is secure and you should enable this feature if it's available on your operating system.

Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

The user of this application program is prompted to enter the starting pay, the number of years, and the percentage of wage growth per year.

The range function in the for loop is used to specify how many times the wages will be calculated for the specified number of years. It begins at 1 and finishes after Years+1, which implies that when the user enters 10 days, 10 will also be displayed in addition to the year.

The Python code is as follows:

Input: StartingSal = int("Enter the starting salary: ");

AnnualIncrease is equal to (int (input("Enter the annual% increase:")) / 100)

Years = int("Enter the number of years: "); input;

Count in the range (1, Years + 1):

print("Year," count, "Salary:," StartingSal*((1+AnnualIncrease)**(count-1)"))

To know more about program  visit:-

https://brainly.com/question/11023419

#SPJ4

Describe the level of technology, equipment, and instructional materials needed to support the proposed program of study or course offering.

Answers

The level of technology, equipment, and instructional materials needed to support the proposed program of study or course offering will depend on the specific course or program.

Technology, Equipment, and Instructional Materials Needed for a Program of Study or Course Offering

Generally speaking, the instructor will need access to a computer and internet connection, as well as software and applications that are required for the course. Additionally, instructional materials such as textbooks, workbooks, and handouts are often needed to support the course.

Depending on the subject matter, the instructor might need to purchase additional equipment such as lab equipment or video equipment. In some cases, specialized software or hardware may be required.

Finally, the instructor may need to provide access to online learning platforms, such as a learning management system, to facilitate engagement and communication between students and instructors.

Learn more about Technology: https://brainly.com/question/25110079

#SPJ4

urn the ignition switch to start and release the key immediately or you could destroy the ___________.

Answers

Start the engine and, if necessary, be aware of the ignition positions. Release the key or button as soon as the engine begins. Aim for 1.5 to 2 seconds of idle time before you start the car. Ensure that all gauges show the vehicle systems are operating normally.

What occurs when you turn on your car's ignition?

The ignition switch activates the voltage from the battery to the ignition coil to produce the engine spark when triggered by the key or button press.

Why does my car's key need to be turned repeatedly to start?

This kind of issue is typically brought on by some form of electrical issue. The battery's and starter's wiring could become faulty or fall loose.

To know more about ignition visit:-

https://brainly.com/question/12866730

#SPJ4

When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across the ___________.

Answers

When using for loops and two-dimensional arrays, the outside loop moves across the rows and the inside loop moves across the columns.

In a two-dimensional array, how should each loop be used?

Improved for each loops or layered for loops can be used to iterate across 2D arrays. A 2D array's outer loop typically traverses the rows, whereas the inner loop often covers the columns in a single row. The length of a 2D array indicates the number of rows. length array for a row

Why do we use two for loops with two-dimensional arrays?

To better understand an array's contents, think of a two-dimensional array as a matrix with rows and columns. A 2D array can be looped over by first iterating through each row, followed by iterating through each column in each row. We require two loops that are nested inside of one another because of this.

To know more about array visit

brainly.com/question/14291092

#SPJ4

An operating system can ensure that applications continue to run when hardware upgrades and updates occur. Group of answer choices True False

Answers

It is true that an operating system can ensure that applications continue to run when hardware upgrades and updates occur.

How do operating systems manage software and hardware?

The relationship between software and hardware is controlled by the operating system. The operating system installs a device driver for each piece of hardware in order to access and communicate with it. The hardware manufacturer creates a little program known as a device driver, which is included with the hardware component.

How are hardware resources managed by an operating system?

Keyboards, displays, printers, scanners, and cameras are just a few examples of peripheral input and output devices that the operating system controls. It regulates the transmission and reception of data. An application known as a device driver is used by the operating system to accomplish this. Device control manuals are found in device drivers.

To know more about operating system visit

brainly.com/question/24760752

#SPJ4

The special operator used to check whether a subquery returns any rows is ____.
a. BETWEEN c.LIKE
b.EXISTS d.IN

Answers

The special operator used to check whether a subquery returns any rows is exists.

In computer programming and mathematics, an operator can be defined as a character that represents a specific process or mathematical or logical action . Example, "x" is an arithmetic operator that defined multiplication, and "&&" is a logical operator representing the logical AND function in programming.

Based on its type, an operator manipulates an operand or arithmetic or logical value,  in a specific way to generate a specific result. From handling simple arithmetic functions to facilitating the execution of complex algorithms, like security encryption, operators play an important role in the programming world.

Here you can learn more about arithmetic functions in the link brainly.com/question/12101371

#SPJ4

There is a specific operator that is used to determine whether a subquery returns any records.

An operator is a character that represents a particular process or mathematical or logical action in computer programming and mathematics. As an illustration, the arithmetic operator "x" defines multiplication, whereas the logical operator "&&" in programming denotes the AND function.

An operator manipulates an operand, or arithmetic or logical value, in a specified way depending on its type to produce a specific outcome. Operators play a crucial role in programming, handling everything from basic arithmetic operations to aiding the execution of challenging algorithms like security encryption.

To know more about arithmetic functions, refer:

brainly.com/question/12101371

#SPJ4

To implement the circular nature of the bounded-buffer problem, the producer fills the slot buffer[next_in] and then increments next_in by 1 mod n. Similarly, the consumer empties the slot buffer[next_out] and then increments next_out by 1 mod n. (a) What problem would occur if multiple producers or multiple consumers executed the bounded buffer code

Answers

Introduction to bounded buffer The following are crucial portions for the bounded-buffer problems (also known as the: A producer updating next in while writing to a buffer slot.

Which two processes are connected to the bounded buffer issue, and what are their names?

Producer-consumer problem is another name for the bounded buffer problem. The Producer-Consumer problem is used to generalize this issue. The solution to this issue is the creation of two counting semaphores, "full" and "empty," which count the number of full and empty buffers currently present.

How can processes share memory using a bounded buffer?

A fixed buffer size is what is implied by the term "bounded buffer." Consumers and producers both wait for new items while the buffer is filled. The Producer and the Consumer must coordinate. The bounded-buffer problem's shared memory solution permits up to (n-1) items in the at most (n-1) items can be present at once buffer.

To know more about consumer empties visit:-

brainly.com/question/28990014

#SPJ4

To analzye various alternative scenarios, a manager would use _______.
a. the spreadsheet's 'what-if' capability
b. the graphing features of spreadsheet software
c. the reporting feature of a BI tool
d. a data visualization tool

Answers

The 'what-if' feature of the spreadsheet would be used by the management to assess numerous potential scenarios.

used to search through enormous amounts of data for hidden patterns that can be utilized to forecast future trends?

Large data sets are sorted through using a technique called data mining to find patterns and relationships that may be used to analyze data and find answers to business challenges. Businesses can foresee future trends and make more educated business decisions thanks to data mining techniques and tools.

Which of the following will be a fact measure in a data cube utilized at a chain retail establishment?

The revenue for a chain retail business is typically the fact measure in a data cube (example: Indiana's second-quarter revenue of $900 from sales of pants).

To know more about spreadsheet visit :-

https://brainly.com/question/8284022

#SPJ4

A busy clustered web site regularly experiences congested network traffic. You must improve the web site response time. What should you implement

Answers

Network load balancing should be implemented.

The operation of network load balancing is what?

The Network Load Balancing (NLB) capability uses the TCP/IP networking protocol to divide traffic among different servers. NLB gives web servers and other mission-critical servers stability and performance by joining two or more machines that are executing programmes into a single virtual cluster.

What makes network load balancing crucial?

By equally distributing network traffic, load balancing enables you to avoid failure brought on by overtaxing a certain resource. Applications, websites, databases, and other computing resources operate more efficiently and are more readily available as a result of this method. Additionally, it makes it easier to process consumer requests accurately and efficiently.

To know more about Network load balancing visit

brainly.com/question/13088926

#SPJ4

Technician A says oily residue on hoses, components, or fittings indicates an area where refrigerant may be leaking. Technician B says that low coolant level will result in the water pump only heating the engine, not the inside of the car. Who is correct?

Answers

Technician A is correct. Technician A says oily residue on hoses, components, or fittings indicates an area where refrigerant may be leaking.

What are the many forms of refrigerant?

It typically comprises of pentafluoroethane and difluoromethane, two hydrofluorocarbon refrigerants. The refrigerant R-410A is regarded as non-ozone depleting. This refrigerant offers greater energy efficiency as compared to R-22 and R-407C. It is far more advantageous than R-22 and doesn't include chlorine.

What is the Meaning of refrigerant level?

Simply explained, the refrigerant is also known as the life force or blood of your air conditioning system. Low concentrations of the same cause the system to wear down more quickly, requiring more energy to run and keep your home cool. This is because each cooling cycle needs enough refrigerant to absorb and transferring absorbing and transferring heat outside.

To know more about Technician A visit:

https://brainly.com/question/16546681

#SPJ4

Andrea purchased an Apple iPad and an extended warranty. She also purchased a gaming application specially developed for Apple iPad. The application purchased by Andrea, is an example of a(n) _____ product.

Answers

The application purchased by Andrea, is an example of an augmented product.

What are "augmented" and "real" products?

When clients buy a real product, they also get additional services or benefits, which is known as an augmented product. An actual product is anything that a business sells, and it comprises branding, packaging, and product design.

Why would one utilise augment?

Although the word "augmentation" is frequently used to describe an increase in size or quantity, it can also apply to other sorts of modifications, such improvements in quality. It usually suggests that whatever is being added to something will make it better. The word "augmentation" is normally employed in a neutral or positive context.

To know more about augmented product visit

brainly.com/question/30117927

#SPJ4

What is the name of the service that can be used to run applications written for use on older versions of Windows to run under the Windows 7 operating system?

Answers

I choose Linux for everyday home use. My current favorite is the Arch. It wouldn't be a good place to start learning Linux, in my opinion. Many distributions, like Ubuntu, Linux Mint, and others, are more user-friendly for beginners.

Windows 7 is a particular operating system?

Built on the Windows Vista kernel, Windows 7 was created as an update to the Vista operating system. The Aero user interface (UI) from Windows Vista is still in use.

The finest operating system: Why is Windows 7 the best?

The advantages of Windows 7 are numerous, and they include improved performance and user experience, application compatibility, and an easy-to-use interface resembling earlier Windows versions.

To know more about Linux visit :-

https://brainly.com/question/15122141

#SPJ4

Other Questions
Explain the reason why you tested electrical conductivity with a solution containing both methanol and water. The Odyssey - Elpenor, the rituals that Odysseus performs on the island show that the ancient Greeks respected and honoredtheir cows.the dead.the sea.their traditions. Who would southern colonists have seen as the best candidate for serving us as the town's judge? A) a tailor B) a wealthy planter C) a newspaper printer What is the moral of the story the two sisters? Pls help question 9,10 and 11. And can u explain or show how u make the equation ? If f(x) = 2x4 - 3x + 3, then what is the remainder when f(x) is divided by x - 1? Guidelines for maintaining a more stress-free standing position behind the chair would include which of the following Find the radius of a circle that has a sector area of 165.6 cm2 and an angle measure of 129*. Round your answer to the nearest tenth. The nurse is visiting a client who was released from inpatient rehabilitation 6 weeks ago after a 5-month recovery from a motor vehicle accident that left the client immobile. As the nurse enters the home, the client braces hands on the arms of a chair to rise and uses crutches to walk across the room. What is the best response by the nurse How do you plot the point 3? How do you find the value of x in a two step equation? Here is a piece of cake each piece of cake has the same number of candles how old is rongopai What does the right to pursuit of happiness mean? What did Washington think was the triumph of our enemies? What are the elements of ownership? What type of energy is a ball rolling down a ramp? Please Help!!!chapter 71. What generalizations can you make about where your food comes from? Describe the major patterns in your data and provide examples of specific foods that illustrate these patterns.2. Discuss how globalization has affected your diet. In a less globalized world, what do you think your diet would look like? In other words, what would your diet look like if you ate mostly locally available foods?3. Critically evaluate your globalized diet. What are the pros and cons of such a diet for you, the people who produce and transport the foods you eat, and the environments in which the foods are produced?chapter 94. how would you describe the sexual norms of your country as a whole, and how do they compare to the sexual norms in your own family or community?5. Describe the types of relationships you have observed, and try to rank them based on how accepted or prohibited they are in society. Which are considered most mainstream? Which are considered most taboo? Among the taboo relationships, which come with the most serious social or legal ramifications? Finally, what does this hierarchy tell you about the value system in your community?6. Describe the social reasons and moral justifications used in your community to accept some types of sexual relationships and prohibit or condemn others. Critically evaluate these justifications and explain how they are linked to other aspects of society (gender, power, etc.). A baker places 4 muffins in each box. Which is the total number of muffins in 8 boxes? Help please radicals Professors Harry Markowitz and William Sharpe received their Nobel Prize in Economics for their contributions to the Multiple Choice