click cell i5 and enter a function that determines the number of full-time employees, (ft).

Answers

Answer 1

To determine the number of full-time employees in cell I5, you can use the COUNTIF function: =COUNTIF(A1:A100, "Full-time")

To determine the average salary of all full-time employees in cell I6, you can use the AVERAGEIF function with a criteria range that corresponds to the full-time employees: =AVERAGEIF(A1:A100, "Full-time", B1:B100)

To return the tax deduction amount for the number of dependents listed in cell C5, you can use the VLOOKUP function with the table range H13:I17: =VLOOKUP(C5,H13:I17,2,FALSE)

What is the worksheet about?

In regards to the question:

To copy the function down in column E, you can use Flash Fill by typing the formula in the first cell and then using the Flash Fill tool to automatically copy the formula down the column.

To calculate employee FICA withholding in cell F5, you can use the IF and AND functions: =IF(AND(A5="Full-time",C5>0),B57%,B55%)

To copy the function down in column F, you can use Flash Fill by typing the formula in the first cell and then using the Flash Fill tool to automatically copy the formula down the column.

To apply conditional formatting to the range C4:C34, you can select the range and then go to the Home tab and select Conditional Formatting > Highlight Cell Rules > Greater Than. Set the value to 3 and choose the Red fill color.

Learn more about worksheet from

https://brainly.com/question/25130975

#SPJ1

See full question below

On Insurance worksheet, Click cell I5 and enter a function that determines the number of full-time employees, (FT).

Enter a function in cell I6 that determines the average salary of all full-time employees. Format the results in Accounting Number Format.

Enter a lookup function in cell E5 that returns the tax deduction amount for the number of dependents listed in the cell C5. Use the table in range H13:I17 to complete the function. The maximum deduction is $500.00; therefore, employees with more than four dependents will receive no additional deductions.

Use Flash Fill to copy the function down, completing column E. Be sure to use the appropriate cell referencing. Format the data in column E with the Accounting Number Format. Save the workbook

Enter a logical function in cell F5 that calculates employee FICA withholding. If the employee is full-time and has at least one dependent, then he or she pays 7% of the annual salary minus any deductions. All other employees pay 5% of the annual salary minus any deductions. Copy the function down through column F. Format the data in column F with Accounting Number Format.

Apply conditional formatting to the range C4:C34 that highlights any dependents that are greater than 3 with Red.


Related Questions

What will the total width of divs be based on this rule set? div { width:600px; padding:40px; border: solid thin

Answers

The total width of divs be based on this rule set is 600 px.

What is division?

In an HTML document, the div> element specifies a divide or section. The div> tag is used to encapsulate HTML components that are subsequently modified using CSS or altered with JavaScript. The class or id property makes it simple to decorate the div> element. Select the div with the class property in CSS, then give it an identical height and width. You may create a circle using the div element by creating an empty div in HTML, setting equal height and width in CSS, and then applying a border-radius of 50%.

Here,

Based on this rule set, the overall width of divs is 600 px.

To know more about division,

https://brainly.com/question/29580872

#SPJ4

Most wired home networks use ________ cable, which is most susceptible to interference.
A) fiber-optic
B) unshielded twisted-pair
C) Wi-Fi
D) coaxial

Answers

Unshielded twisted-pair cable, which is most susceptible to interference, is used in the majority of wired residential networks.

What is susceptible and example?

prone to being readily swayed or injured by something: She doesn't respond well to flattery. These plants are especially prone to frost damage. The disease can spread quickly in children who are especially vulnerable to it. The proportion of sensitive people in environmentally exposed groups is estimated by the cumulative incidence of acute rheumatic fever. As a result, fibril morphologies that are more prone to fragmentation may be favoured by agitation. When this occurs, the snail's resistance to a challenge infection is lost, making it more vulnerable to subsequent infections.

Know more about compare an residential Visit:

https://brainly.com/question/29898240

#SPJ4

additionally, a 403 forbidden error was encountered while trying to use an errordocument to handle the request.

Answers

When you access an empty websites directory or a specific page with a permissions problem, you could get the 403 prohibited error.

This is due to the fact that the majority of websites are configured to forbid directory browsing in order to stop hackers from accessing crucial data.

However, if either you or your site users run across this problem, you must address it right once to avoid losing important traffic. There are several ways to fix 403 problems because of their diverse sources.

Eight ways to resolve the 403 prohibited error are provided, along with an explanation of the many forms of 403 forbidden errors and their potential causes.

The 403 Forbidden error Error Client-side error type

Variations in errors

You don't have authorization to access [directory] on this server, thus access is forbidden.

HTTP 403 Forbidden error

403 Forbidden error

Request that is prohibited by administrative restrictions 403 Forbidden

Learn more about Websites here:

https://brainly.com/question/19459381

#SPJ4

You are installing an operating system on a drive that appears to have sector issues. Which formatting option should you use

Answers

In the case where you are installing an operating system on a drive that seems to have sector issues, you should use the Full Format formatting option.

A full format erases the data in the partition table and checks every sector on the surface of the hard drive for bad sectors. This is the main reason why a quick format takes so long. A quick format only rewrites the partition table; There is no difference from a performance standpoint.

In other words, a full format erases all files from the hard drive, modifies (or manages) the file system, and checks the hard drive for bad sectors. A full format takes substantially longer than a quick format. Windows supports both  NTFS and FAT for both full and quick formats.

You can leanr more about operating system at

https://brainly.com/question/1763761

#SPJ4

local gpos contain fewer options than domain gpos. local gpos do not support ______.

Answers

Compared to domain gpos, local gpos have fewer choices.Folder redirection and the installation of Group Policy software are not supported by local gpos.

What functions does local Group Policy have?

Administrators can configure Group Policy in GPOs using a hierarchy of trees provided by the Group Policy Editor.The sites, domains, & organizations (OU) that include computer and user objects can then be connected to these GPOs.

Does each user have access to the local Group Policy?

The machine and any users signing onto the computer are subject to the policy settings defined by this LGPO.This LGPO was previously present in prior iterations of Microsoft Windows.

To know more about gpos visit:

https://brainly.com/question/14833669

#SPJ4

Metadata is the data that describe the properties of the data stored in a database.
True or False

Answers

That is correct—metadata are data that describe the characteristics of other data. The first time computers were used for data processing, databases were created.

What exactly is a database's metadata?

Data about data is referred to as metadata. Metadata, which is defined as data that provides information on one or more characteristics of the data, is used to condense essential data facts that can facilitate tracking and working with particular data. Here are a few instances: methods for data production.

Where is the metadata kept?

Numerous locations can be used to store metadata. Data is frequently kept in tables and columns within databases where the metadata refers to databases. Sometimes metadata is present in a data dictionary, a specialized document or database created to hold such data.

To know more about databases visits :-

https://brainly.com/question/29412324

#SPJ4

It is true that metadata is the data that describe the properties of the data stored in a database.

Data that specifies the traits, traits, and traits of the data kept in a database is referred to as metadata. It offers details regarding the data's context, structure, and organisation.

Details like data types, field lengths, linkages between tables, information about the data source, timestamps, and more can be found in metadata.

It aids in data administration, enables efficient searching, querying, and data analysis, and benefits users and applications in understanding and interpreting the data in the database.

In order to ensure data integrity, guarantee data quality, and facilitate effective data processing in databases, metadata is crucial.

Thus, the given statement is true.

For more details regarding metadata, visit:

https://brainly.com/question/30299970

#SPJ6

the addition of control information to a packet as it moves through the layers is called ____.
a. encapsulation
b. overloading
​c. payload
d. filtering

Answers

Answer: A.

Explanation:

Encapsulation is the process of enclosing a message or signal in a set of codes which allow transfer across networks.

__________ are high speed central networks to which multiple smaller networks connect

Answers

Answer:

corporate backbone networks

Explanation:

An administrator suspects that a user who arrives early, stays late, and sometimes works weekends might be stealing data. How can the administrator limit this user based on these parameters

Answers

Data security is of the utmost importance in any organization. To ensure that valuable data remains secure, administrators should:

Implement access restrictionsMonitor user activityUse two-factor authenticationLimit physical accessUtilize encryption

Implementing Security Measures to Limit Unauthorized User Access to Sensitive Data

Implement access restrictions - Limit access to the most sensitive data only to authorized users and restrict the user's access to the data they need to do their job.Monitor user activity - Implement a monitoring system to track the user's activities and compare them with the normal usage pattern. Alerts can be set up to notify the administrator when the user deviates from the normal usage pattern.Implement two-factor authentication - Require the user to provide additional authentication credentials when accessing sensitive data.Limit physical access - Limit access to the data and computer system to only authorized personnel.Use encryption - Encrypt sensitive data and require the user to enter a password to decrypt it.

Learn more about encryption: https://brainly.com/question/20709892

#SPJ4

Module 4 of the "Technology for Success - Computer Concepts" section of this course eBook covered several topics related to Operating Systems and File Management, including the Key Terms Download Key Termslisted at the end of the module. This discussion assignment requires that you make an original post explaining in detail one of the key terms listed at the end of Module 4 before seeing posts made by other students.

To complete this assignment, do the following:

Before the end of the first Thursday after this assignment became available, make an original post explaining in detail a Key Term Download Key Termtopic from the list at the end of Module 4 of the "Technology for Success - Computer Concepts" section of this course eBook. Include in your post two questions related to the topic you have chosen that you would like some classmates to explain.

Answers

In essence, RAM is a sort of computer memory that enables quick data reading and modification in any order. Both the operating data for the system and machine code are frequently stored there.

Why are its kinds given and why do we need it?

The two most common kinds of RAM are:

1.) Static RAM: It is therefore employed to generate the CPU's cache that is speed sensitive.

2.) Dynamic RAM: Each bit of data is kept in its own capacitor inside of a particular integrated circuit.

Uses of RAM:

1. Higher Compatibility

2. Increased speed of operation.

3. Reduction in power loss.

Write two questions about RAM?

1. How much RAM is needed for video game play and virtual machine operation to work smoothly?

2. What creation was patented in 1968 by IBM's Robert Dennard?

To know more about RAM visit-

brainly.com/question/15302096

#SPJ4

Compared to traditional advertising, an effective business use of social media tools is to _____.
a.promote products
b.engage customers
c.broadcast information
d.focus on the company's interests

Answers

Utilizing social media platforms to engage customers is a more successful company strategy than traditional advertising.

What makes consumer engagement important?

Maintaining brand awareness for your company requires engaging clients and enhancing their experience. They will remain loyal to you for a longer period of time and be more productive if they are more engaged.

What happens during customer engagement?

Customer engagement is the process of communicating with customers using a range of media in order to improve your connection. This process often starts with the initial conversation and continues after the customer makes a purchase for many firms.

To know more about engage customers visit:-

https://brainly.com/question/14094750

#SPJ4

Which logic gate is the diagram
showing?
AD
B-
O AND
O OR
O NOT
O NOR
* 1 point
out

Answers

Answer:

AND GATE

Explanation:

If p=1 and q=0 p AND q=1×0 r=0

considering your character's perspective, which computing ideas of your team members seem the best? which ones are you concerned about?

Answers

From my character's perspective, the ideas that seem the best are those that emphasize collaboration, efficiency, and cost-effectiveness.

What is character's perspective?

Character's perspective is their point of view on a particular situation. It is based on their values, beliefs, and experiences. For example, a character may view a situation differently than another character based on their unique perspective. It is important to consider character's perspective when writing a story to make sure that characters stay true to themselves and their beliefs. This helps to create a believable story and more interesting characters.

I am confident that my team members are well-versed in these principles and that their computing ideas will be well-thought-out and practical.

I am most concerned with any computing ideas that may be difficult to implement or that may require a significant amount of time and resources. I believe it is important to consider the potential challenges posed by any idea before making a final decision.

To learn more about potential
https://brainly.com/question/12947584
#SPJ4

identify the term that does not denote key concurrency. select one: a. mutual exclusion b. non-critical section c. race condition d. intermediate

Answers

Non-Critical Section is the term that does not denote key concurrency. "Non-critical section" refers to a section of code that does not need to be protected by a mutual exclusion mechanism because it does not access shared resources.

What is Concurrency?

Concurrency is the ability of a computer system to perform multiple tasks simultaneously. This can be achieved through various techniques such as multi-tasking, multi-threading, and multi-processing. Concurrency allows a system to perform multiple tasks at the same time, rather than one after another, which can improve performance and responsiveness.

In a concurrent system, multiple tasks are executed in parallel and the system manages their execution by scheduling the tasks to be executed on the available resources such as processors and memory. Concurrency can also be used to handle multiple inputs or events in real-time, such as user interactions or network requests, and can help to improve the scalability and fault-tolerance of a system.

To know more about Concurrency, visit: https://brainly.com/question/14209825

#SPJ4

After completing your analysis of the rating system, you determine that any rating greater than or equal to 3. 5 points can be considered a high rating. You also know that chocolate and tea considers a bar to be super dark chocolate if the bar's cocoa percent is greater than or equal to 70%. You decide to create a new data frame to find out which chocolate bars meet these two conditions. Assume the first part of your code is: best trimmed flavors df <- trimmed flavors df %>% you want to apply the filter() function to the variables cocoa. Percent and rating. Add the code chunk that lets you filter the data frame for chocolate bars that contain at least 70% cocoa and have a rating of at least 3. 5 points. 1 reset what rating appears in row 1 of your tibble? 1 point 4. 25 3. 50 4. 00 3. 75

Answers

The advantages of adopting R for the project include the ability to process large amounts of data quickly and create high-quality data visualizations. You may also quickly replicate and share your findings.

Facet wrap(Cocoa. Percent) is the code you write. Facet wrap() is the function in this code chunk that allows you to make wrap around facets of a variable. Every ingredient is derived from cocoa beans. The proportion is split between cacao solids (the "brown" part that includes health benefits and the unmistakable chocolatey flavor) and cacao butter (the "white" part that carries the chocolate's fatty component).

A higher cocoa percentage in a chocolate bar indicates that it has more cocoa mass and less room for other components such as sugar.

Learn more about data here-

https://brainly.com/question/13650923

#SPJ4

breaking a program up into a set of manageable sized functions is called ________ programming.

Answers

breaking a program up into a set of manageable sized functions is called Modular programming.

Is there a way to divide our program into more manageable chunks?

Your software is decomposed into smaller pieces. By defining a function, you can give the computer a new command and specify what it should perform in response.

What does programming's breaking point mean?

A breakpoint is a place in a program where execution of the code will stop. For instance, the programmer could want to set a break point at line 5 of the method if they changed the logic fault in the trace table example.

To know more about Modular programming visit:-

https://brainly.com/question/11797076

#SPJ4

List and explain procedures for information processing​

Answers

Information processing is the process of transforming raw data into meaningful and useful information through a series of steps. Here are the general steps involved in information processing:

InputStorageRetrievalProcessingOutputFeedback

What is information processing​?

Input: The first step in information processing is to collect and input data into the system. This can be done through manual data entry, data import, or data capture from various sources such as sensors, databases, or external systems.

Storage: After the data has been collected, it is stored in a suitable location for processing. This can be done in a variety of ways such as in a database, a file system, or in memory.

Therefore,  in Retrieval: The next step is to retrieve the data from storage and prepare it for processing. This involves accessing the data, sorting it, and filtering it as necessary.

Learn more about information processing from

https://brainly.com/question/27178394

#SPJ1

A(n) _____ is a condition, restriction, or requirement that the system must satisfy. a. constraint b. index c. milestone d. viewport.

Answers

Option No. (A) Constraint is the appropriate response. a precondition, constraint, or prerequisite that a system must meet.

What exactly is a constraint in SQL?

To provide guidelines for the data in a table, utilize SQL constraints. The type of data that can be entered into a table is constrained by constraints. As a result, the data in the table are accurate and trustworthy. The data action is terminated if there is a violation of the constraint.

Are limitations a good or bad thing?

When you are attempting to maximize a limitation, it is said to be positive. You are attempting to minimize a negative constraint. Observe in the graphic above that, whether the constraints are positive or negative, the optimal solution always obtains the greatest score.

To know more about Constraint visit :-

https://brainly.com/question/17156848

#SPJ4

Q9- What process involves placing one PDU inside of another PDU? * a. Encoding b. Encapsulation c. Segmentation d. Flow control 2 points Q10-Which memory location on a Cisco router or switch stores the startup configuration file? * a. Flash b. ROM C. NVRAM d. RAM

Answers

Placing one PDU within another PDU is part of the encapsulation process.

What exactly does encapsulation mean?

Encapsulation is a technique for preventing direct user access to some object components, preventing users from seeing the current state values for each of an object's variables. Data members and associated data function or methods for an instantiated subclass or object can be concealed using encapsulation.

Encapsulation: Why is it used?

Encapsulation is a technique for preventing unauthorized parties from directly accessing the values and state of a hierarchical data object inside a class.

To know more about encapsulation visit:

https://brainly.com/question/29563804

#SPJ4

A data ______ contains data about each file in the database and each field in those files.
a. encyclopedia
b. reference
c. guide
d. dictionary

Answers

A data dictionary contains data about each file in the database and each field in those files.

What exactly do you mean by data?

Data in computing refers to information that has been transformed into a format that is effective for transmission or processing. Data is information that has been transformed into binary digital form for use with modern computers and transmission mediums. Data may be used as a solo or plural topic. In the quest of knowledge, data is a collection of discrete values that communicate information, describing amount, quality, fact, statistics, other fundamental units of meaning, or just sequences of symbols that may be further understood. A datum is a unique value included within a group of data.

To know more about data visit:

brainly.com/question/13650923

#SPJ4

to avoid double counting, what will have to be removed from a website page prior to the addition of an event tag?

Answers

If your website already uses a legacy conversion tag, you'll need to get rid of it and add this event tag in its place. This will prevent the tags from being counted more than once.

Why does Analytics count things twice?

The fact that a transaction hit is sent to \Analytics every time the "thank you" page is loaded is by far the most frequent cause of duplicate transactions.

What threat does double counting pose?

Any economy's national product is overestimated due to the issue of double counting. It is incorrect to include both the value of the final good and the value of the intermediate goods because the final value already includes the value of the intermediate goods.

To know more about website visit:-

brainly.com/question/19459381

#SPJ4

In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.
a. rollforward
b. partial restore
c. backward recovery
d. retroactive backup

Answers

The DBMS uses the log during a rollforward to reenter changes made since the previous backup or save.

A database is an organized collection of data that is digitally accessible and stored. Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system.

By applying transactions noted in the database log files, the ROLLFORWARD command restores a database. This command can be used if any table spaces were taken offline by the database as a result of a media error, a database backup image was restored, or both. It is used following the recovery of a database or table space backup. Before the database can be retrieved using rollforward recovery, it must be recoverable.

Learn more about DBMS here

brainly.com/question/28813705

#SPJ4

if voip traffic needs to traverse through a wan with congestion, you need ___________.

Answers

If VoIP traffic must pass via a congested WAN, Quality of Service is required (QoS).

What in networking is a WAN?

A wide-area network is the term for the technology that connects your offices, data centers, cloud applications, and cloud storage (WAN). It is referred to as a wide-area network because it consists of several locations scattered across a specific geographic region, or maybe the entire world.

What are WAN and LAN?

A sort of network that links a few structures together, such as a few homes or offices, is known as a local area network, or LAN. On the other hand, a WAN, or wide area network, is a network that spans a larger geographic area, perhaps even the entire globe.

To know more about WAN visit-

brainly.com/question/621746

#SPJ4

Compared with character-based formats, a ____ storage format offers a more efficient storage method.
a. decimal
b. unary
c. tertiary
d. binary

Answers

A binary storage format offers a more effective storing approach than character-based formats.

Some information must be physically storable by the digital system. The information storage media must have binary storage elements for holding individual bits when discrete information items are represented in binary form.

A device with two stable states is referred to as a binary cell.

Cell Input: The cell receives information and commands that cause it to enter one of the states.

Cell output is a physical quantity that indicates the status of the cell.

Binary digits [0, 1] are used to encode states.

A 1-bit memory cell called a flip-flop can be used to store digital data. We must utilise a collection of flip flops to improve the storage capacity in terms of the amount of bits. A register is a collection of flip-flops of this type.

Learn more about Storage here:

https://brainly.com/question/10674971

#SPJ4

in linux, the command _________________________ displays currently logged-in users.

Answers

In Linux, you can use the who command to find out who is presently logged in and other important information.

What purpose serve displays?

Users can interact with a computer and examine data that has been generated, stored, or sent in the form of text and graphics by using displays in conjunction with hardware like keyboards and trackpads.

The best display technologies, please.

For Organic Light Emitting Diode, it is an acronym. OLED is the best choice when looking for the best TV display technology. When an electric current is supplied directly to this technology, it uses biological components like carbon to produce light.

To know more about Display visit:

https://brainly.com/question/14312229

#SPJ4

use the ________ attribute on a tag to display an image that represents the movie.

Answers

To display the video player's user controls, use the controls property on a video element.

What is the title of the tool that produces pan and zoom effects?

In film and video creation from still images, the Ken Burns effect is a form of panning and zooming effect. The American documentarian Ken Burns used the method extensively, hence the name.

In graphics, what is a poster?

A poster is a sizable piece of paper that is hung on a wall for decoration or placed in a public place to advertise something. The majority of the time, posters combine text and graphics, but they can also be entirely pictorial or entirely text.

To know more about controls property visit :-

https://brainly.com/question/12271689

#SPJ4

When comments are not visible, what can you do to view them?
Close and reopen the file.
O Use the Ctrl+V command.
O Use the Show Comments button on the Review tab.
Use the Track Changes button in the Slide Show tab.

Answers

When comments are not visible, Use the Show Comments button on the Review tab to view them. Thus, option B is correct.

What is Arrange tab?

Sizing as well as moving the fields in the design view which can sometimes be time consuming. Be that as it may, we could always use the tab order dialog box to perform this operation.

In order to do so, we must select the labels along with the fields in the question, just to proceed or to the arrange tab, including the sizing and the ordering group and then click on the Align button.

Therefore, When comments are not visible, Use the Show Comments button on the Review tab to view them. Thus, option B is correct.

Learn more about button on:

https://brainly.com/question/29248040

#SPJ1

Answer: The correct answer is C

Explanation:

Closing then reopening the file wouldn't show you a comment, unless the comment is saved to the slides.

Using the Ctrl+V tab just isn't the right command to use.

Therefore option C is just the right answer in this case.

A smartphone runs on a PC operating system.
true or false

Answers

Answer:

False

Explanation:

Both android and iOS run on similar code to some PC OSes (Linux and Mac OS respectively) but they run on a heavily modified version, so they would not count as running on those OSs

data travels in and out of the cpu through embedded wires called the __________.

Answers

Data travels in and out of the CPU through embedded wires called the Bus. The bus serves as the channel for communication between the CPU, memory, and peripherals.

How crucial is a computer system's CPU?

The CPU is a crucial component of every computer and is responsible for receiving, directing, and processing data. It's frequently referred to as the "brain" or "heart" of the desktop or laptop PC because it's typically the most crucial component, depending on which bodily part you'd consider the most significant.

What does the CPU's primary job involve?

The central processing unit (CPU) directs the computer through each phase of problem-solving. A computer's input unit sends data to the central processing unit, which then processes it and makes it available to an output unit that the user may use.

To know more about CPU visit-

https://brainly.com/question/9479562

#SPJ4

video games can be considered to be a major new medium in part because ______.

Answers

The fact that consoles may be used to convey a variety of media content is one of the reasons why video games can be regarded as a significant new medium.

What movie introduced the Internet as a new platform for cinema promotion?

Blair Witch was perhaps the first movie whose advertising was more significant than the actual picture and is remembered as the first significant Internet campaign, but it did not fundamentally alter the way movies were sold.

What changes is technology making to the movie business?

The use of digital cameras and other technology speeds up the production of movies compared to traditional film cameras. The digital format also enables filmmakers to accomplish their schedules with nearly no waste, hence controlling production costs.

To know more about video games visit:-

https://brainly.com/question/29040707

#SPJ4

Other Questions
In two or three sentences, explain Henry Clay's "American System." Please help me finish this home work 16 Select the correct answer. An ounce of cheese can be estimated by: A. One hand cupped. B. The size of your fist. C. The size of the palm of your hand. D. The size of your thumb. why do i feel bloated all the time and my stomach enlarged? sociologists refer to societies in which individuals experience no social mobility as __________. Pre-Lab Assignment 17C Questions 1-10Nucleus Sarcolemma Desmosome Sarcomere Intercalated discs Sarcoplasmic reticulum Mitochondria Myofibril Muscle cells (fibers) Gap junction make it the most liked question If you love god.can you guys do? is this cause/effect paragraph correct like a chain method ,if not correct it thx?:The fact that you know english is good because it's one of the most used languages in the world so if you know how to speak and write english you can get jobs in important offices of bisness and others and for working to important offices you must studied very well at university and school if not this is another story .Speaking english is very good way to communicate with strange persons and communicating to strange pea[le is a chance to know them so if you are not learning english go lear ! to be better in society and community. Each week, Veronica volunteers13 hours at the animal shelter. If shevolunteers for h hours, how manytotal hours does she volunteer?Find the expression Explain the principles behind an acid-base titration. What is an indicator? what must be true for the coase theorem loading... to hold? for the coase theorem to hold, The top two targets for ransomware attacks are the _____a. Internal Revenue Service and the Social Security Administration b. petroleum industry and nuclear facilities c. healthcare industry and financial institutions d. aviation and aerospace industries 4Which BEST describes why certain traits led to an increased frequency within the population of medium ground finches?A because the traits were acquiredB because the traits were favorableC because the traits were inheritedD because the traits were mutations A satellite orbiting Earth at an orbital radius r has a velocity v. What would the velocity be if the satellite is moved to an orbital radius of 6r laws governing _____ offer the most striking differences between common-law and code-law systems.A. international tradeB. civil disputesC. criminal offenceD. intellectual propertyE. domestic industry 3. Mexico's total GDP is what percentage of the United States' total GDP? There is much discussion in the press about several states moving to legalize cannabis, either for medical use or for recreational purposes. Looking only at the economic impact of such changes in the laws, discuss how the existing system of supply and demand for illegal cannabis will be changed with the new legalization. What will happen to existing supply avenues Sometimes people see these other ways of doing as wiser, more spiritual or more knowledgeable. This kind of ethnocentrism can be called taking a which of the following statements below is false regarding the complex ion [co(en)2(h2o)cn]2+ ? -The complex ion contains Co(I).-The complex ion exhibits cis and trans geometric isomers, but no optical isomers.-The complex ion exhibits two geometric isomers (cis and trans) and two optical isomers.- The geometric isomers of the complex ion have identical chemical properties.- Because en is a strong field ligand (large ), the complex ion is paramagnetic. n-(2-hydroxy-3-methoxybenzyl)-n-(p-tolyl)acetamide