What will happen if you delete system32?

Answers

Answer 1
Search Results
Featured snippet from the web
System32 contains critical system files , software programs and they are essential to boot operating system . So deleting it will cause system failure and nothing will work properly . And if you restart your pc then it wont boot at all. You will have to do a clean reinstall to fix things up again .

Related Questions

The purpose of a windows 10 product key is to help avoid illegal installation True Or False?

Answers

Answer:

True.

Explanation:

A product key is a 25-character code that's used to activate Windows and helps verify that Windows hasn't been used on more PCs than the Microsoft Software License Terms allow.

Write a function named replaceSubstring. The function should accept three string object arguments entered by the user. We want to look at the first string, and every time we say the second string, we want to replace it with the third. For example, suppose the three arguments have the following values: 1: "the dog jumped over the fence" 2: "the" 3: "that" With these three arguments, the function would return a string object with the value "that dog jumped over that fence". Demonstrate the function in a complete program. That means you have to write the main that uses this.

Answers

Answer:

public class Main{

public static void main(String[] args) {

 System.out.println(replaceSubstring("the dog jumped over the fence", "the", "that"));

}

public static String replaceSubstring(String s1, String s2, String s3){

    return s1.replace(s2, s3);

}

}

Explanation:

*The code is in Java.

Create function called replaceSubstring that takes three parameters s1, s2, and s3

Use the replace function to replace the s2 with s3 in s1, then return the new string

In the main:

Call the replaceSubstring function with the given strings and print the result

Arrange the following units of storage in descending
order. B, TB,KB, GB,MB

Answers

Answer:

TB,GB,MB,KB,B

Explanation:

Need some help with Discrete Mathmatics please help urgent?

Answers

Answer: 2, 4, 1, 5, 3

Explanation:

P: Arguments are not arranged in regular order like the one I am used to

Q: I cannot understand         ~Q: I can understand

R: I grumble                            ~R: I do not grumble

S: Get a headache

T: Examples are not easy

Here is the logic order of the given sentences:

2)   P

4)   P →  Q

1) ~Q → ~R

5) ~R →  S

3)   S →  T

∴)   T

What was the goal of the 2009 Educate to Innovate campaign?

A) promote and develop STEM practitioners and teachers in the fields
B) strengthen America’s global lead in scientific research and education
C) assist American students in becoming leaders in math and science
D) improve technology and attract workers to STEM occupations

Answers

The letter choices are randomized for everyone, but the answer is:

— To assist American students in becoming leaders in math and science

The 2009 Educate goal is to improve technology and attract workers to STEM occupations.

What is the main goal of STEM?

The aim of STEM education is to bring up STEM literacy in terms of knowledge and understanding of scientific and mathematical things.

Therefore, The 2009 Educate goal is to improve technology and attract workers to STEM occupations and thus bring out innovation.

Therefore Option d is correct.

Learn more about STEM from

https://brainly.com/question/18243320

#SPJ9

To view paragraph marks, click on the ______ tab, in the paragraph group, click show/hide

Question 3 options:

View


Home


Page layout


References

Answers

Answer:

Home

Explanation:

Thank Quizlet, lol!

What is production switching?

Answers

Answer:

Production switching is one way that a business has of coping with uncertainty. Rather than having one plan that they must remain committed to, the process of production switching allows a business to adjust to new circumstances.

Explanation:

what is a thesaurus is best used for​

Answers

Answer:

false

Example: a thesaurus is NOT the best resource

#TODO: This function needs to accept an incoming message and process it accordingly. # This function is called every time the switch receives a new message. #if message.pathThrough == True and message.origin not in self.activeLinks: #self.activeLinks.append(message.origin) #if message.pathThrough == False and message.origin in self.activeLinks: #self.activeLinks.remove(message.origin)

Answers

Answer:

This function is a method of a class object that checks a message path and register or update the previous messages list with only new messages.

Explanation:

def message_check(self ) :

If message.pathThrough == True and \ message.origin not in self.activeLinks:

Self.activeLinks.append( message.origin )

Elif message.pathThrouh == False and \ message.origin in self.activeLinks:

Self.activeLinks.remove( message.origin )

When does information become a liability for an organization

Answers

Answer:

A. When it is not managed properly

Explanation:

when stuff is not mananged as it should then it becomes a liablilty

As an administrator of the Contoso Corporation, you are responsible for configuring the users’ mobile computers. You want to ensure that when a computer system accesses a public network—such as the local coffee shop, the airport, or the user’s home network—other computers and devices cannot find your system. In addition, you want to disable file and printer sharing access. However, when in the office and the computers connect to the office using a VPN client, you want network discovery and file and printer sharing available. What should you do?

Answers

Answer:

What i should do is to modified or change network discovery and file as well as the printer sharing by clicking on the advanced sharing Networking and Sharing Center setting, the second step will be to modified the Public network settings and the third step will be to modified the home network settings .

Explanation:

Based on the information given the first step is to go to Networking and Sharing Center on my system and then click on the

the advanced sharing setting in order for me to modified or change the network discovery and file as well as the printer sharing, although this modification will have to based on the location of the network.

Second step will be to click on the Public network settings and check If network discovery as well as the file/print sharingis is in a disabled mode, once it is in a disabled mode the third step will be for me to change or modified the home network setting in order for it to help disable the network discovery as well as the file/print sharing while the last step will be to check the Domain network settings and the Work network settings which I do not need to change reason been that the setting does not need modification.

Complete the sentence.
A data ___ is the precisely formatted unit of data that travels from one computer to another.

Answers

Answer:

A data packet is the precisely formatted unit of data that travels from one to another

Explanation:

A packaged unit of data that is transmitted along a network path is known as a data packet. The Internet Protocol (IP) makes use data packets for transmission of data in computer networks and on the World Wide Web.

The parts of a data packet includes the payload, which is the raw data, and meta data located in the header such as information on the source and destination IP addresses of the data known as routing information.

Answer:

A data packet is the precisely formatted unit of data that travels from one to another

Explanation:

Suppose that we are working for an online service that provides a bulletin board for its users. We would like to give our users the option of filtering out profanity. Suppose that we consider the words cat, dog, and llama to be profane. Write a program that reads a string from the keyboard and tests whether the string contains one of our profane words. Your program should find words like cAt that differ only in case. Option: As an extra challenge, have your program reject only lines that contain a profane word exactly. For example, Dogmatic concatenation is a small category should not be considered profane.

Answers

Answer:

Here is the JAVA program:

import java.util.*;   //to use Scanner class, Lists

public class Main{  //name of class

public static void main(String[] args) {  //start of main function

   String sentence = "CaT and catalog are not same";  //a string

   sentence = sentence.toLowerCase();  // converts the words in the sentence to lowercase

   Scanner sc = new Scanner(sentence);  //creates Scanner class object

   List<String> profane_words = profaneList();  // creates a list of profane words i.e. cat, dog and llama

   int count = 0;  //count the number of profane words

   while (sc.hasNext()) {  //reads string as tokens and returns true if scanner has another token

       String word = sc.next();  //returns the next complete token (word) and store it into word variable

       for (String profane : profane_words) {  // looks for each profane in profane_words list

           if (word.matches(".*\\b" + profane + "\\b.*") && ! sentence.matches(".*" + profane + "[a-z].*\\b" + profane + "\\b.*") && ! sentence.matches(".*[a-z]" + profane + ".*\\b" + profane + "\\b.*")) {  //uses matches() method that identifies whether a word in the string matches the given regular expression.

               count++;  //each time if the word of sentence matches with word given in profane_list then 1 is added to count

               System.out.println("The word " + profane + " is a profane!");  //displays the word which is profane

           }  }    }

   System.out.println("Number of profane words: "+ count);  }  //displays the number of profane words found in the sentence

private static List<String> profaneList() {  //list of profane words

   List<String> profane_words =  new ArrayList<>();  //creates an array list of profane words named as profane_words

   profane_words.add("dog");  //adds word "dog" to the list of profane words

   profane_words.add("cat");  //adds word "cat" to the list of profane words

   profane_words.add("llama");  //adds word "llama" to the list of profane words

   return profane_words;  }} //returns the list of profane words

   

Explanation:

I will explain the program with an example:

sentence = "CaT and catalog are not same";  

First this sentence is converted to lower case as:

sentence = "cat and catalog are not same";  

Now the while loop uses hasNext() which keeps returning the next token and that token is stored in word variable.

Next the for loop iterates through the list of profane_words to check each profane word with the word in a sentence.

Next this statement:

if (word.matches(".*\\b" + profane + "\\b.*") && ! sentence.matches(".*" + profane + "[a-z].*\\b" + profane + "\\b.*") && ! sentence.matches(".*[a-z]" + profane + ".*\\b" + profane + "\\b.*"))

uses regular expressions to find the profane words in the sentence. The logical operator&& AND between the three expressions is used so all of the three must hold for the if condition to evaluate to true.

word.matches(".*\\b" + profane + "\\b.*")  expression uses \b to check an exact match of the word. \b is meta-character to find a match at the beginning and at the end. So this checks if the word of a sentence matches with the profane in the profane list.

! sentence.matches(".*" + profane + "[a-z].*\\b" + profane + "\\b.*") && ! sentence.matches(".*[a-z]" + profane + ".*\\b" + profane + "\\b.*"))

These two expressions check if profane does not include as a part of another word in the sentence. This solves the extra challenge. Like here in the sentence we have a word catalog which is not a profane but a profane cat is included in this. So this will not be considered as a profane.

Every time a word matches with the profane from profane list, the value of count variable is incremented to 1.

In the end the statement:    

System.out.println("Number of profane words: "+ count);  

prints the number of profane words in the sentence.

List<String> profane_words =  new ArrayList<>(); creates the list of profane words and add() method adds the words to the list profane_words. So profane_words list contain "cat", "dog" and "llama"

Hence the output of this program is:

The word cat is a profane!                                                                                                                      Number of profane words: 1

The program output is attached in screenshot

 

websites in which a question appears at the top with boxes underneath that help answer the question are called?

Answers

Answer:discussion forums

Explanation:

I did it and got it right

Answer: discussion forums

Explanation:

i got it right lol

Amy wants to adjust her camera settings so that it automatically sets the apertures and shutter speeds while still allowing her to control the ISO and flash settings. Which mode dial option should Amy choose to achieve this?

A. manual mode
B. aperture priority mode
C. program mode
D. shutter priority mode

Answers

Answer:

C: Program mode

Explanation:

Program mode is similar to Auto but gives you a little more control over some other features including flash, white balance, ISO etc.

Here's what the others do:

Aperture priority mode:

You as the photographer sets the aperture that you wish to use and the camera makes a decision about what shutter speed is appropriate in the conditions that you’re shooting in.

Shutter priority mode:

You as the photographer choose the shutter speed that you wish to shoot at and let the camera make a decision about what aperture to select to give a well exposed shot.

Manual mode:

Everything is controlled by the photographer.

Hope this helps!

What is the primary purpose of a namespace?

Answers

Answer:

A namespace ensures that all of a given set of objects have unique names so that they can be easily identified.

Explanation:

Answer:

A namespace ensures that all of a given set of objects have unique names so that they can be easily identified.

Explanation:

In below freezing conditions, keep your fuel level at least _________ full to keep moisture from freezing in your gas line.

Answers

quarter tank at least

Which one is NOT an Apex Legend Character.
1. Mirage
2. Bangalore
3. Lifeline
4. Lara Croft
5. Crypto

Answers

Answer:

lara croft

Explanation:

i think ??????

Answer:

Lara Croft

Explanation:

She from Tomb Raider

What is another way that the condition below could be written? ​ ( num <= 10 )

Answers

Answer:

 ( (num < 10) || (num = 10) )

Explanation:

Here we have the condition as num <= 10 which means the condition gets satisfied till less than 10 i.e., (9) and condition also gets satisfied when the num is equal to 10 .

We can get same result using ( (num < 10) || (num = 10) ) because in OR when either of the input is true the output is true .

Which of these is an application? Microsoft Windows Linux Microsoft Word Apple ios​

Answers

Answer:

I think it's Microsoft windows

Answer:

it is microsoft word just took test

Why is it important for element IDs to have meaningful names

Answers

Answer:

  to remind of purpose and use

Explanation:

When a data item has a meaningful name, the name can be a reminder of the purpose and use of the item. It can also be suggestive of the range of legitimate values. It also makes error-checking easier.

If the name of it is not meaningful, this information about the item must be found in a dictionary somewhere, often a time-consuming or difficult project. Using elements with non-meaningful IDs provides opportunities for error and confusion--not something that is generally wanted.

Answer:

to remind of purpose and use

I’m nobody. Who are you?
Are you nobody, too?
The There’s a pair of us - don’t tell!
They’d banish us, you know.

How dreary to be somebody
How public, like a frog
To tell your name the livelong day
To an admiring bog!
-“I’m nobody. Who are you?”
Emily Dickinson

Which statement best sums up the meaning of the poem

A. The poet wishes for fame

B. The poet praises the common man.

C. the poet states that being a “nobody” is a terrible thing to be

D. The poet believes the unimportant people are like frogs that never stop croaking.

Answers

Answer:

The poet praises the common man.

Explanation:

The poet states that being a “nobody” is a terrible thing to be

Who is Poet?

One of America's greatest and most creative poets of all time is Emily Dickinson. She claimed definition as her domain and contested the established definitions of poetry and the task of the poet.

Like authors like Walt Whitman, Henry David Thoreau, and Ralph Waldo Emerson, she experimented with expression to liberate it from socially prescribed boundaries.

She created a novel kind of first-person identity, much like authors like Charlotte Bronte and Elizabeth Barrett Browning.

Therefore, The poet states that being a “nobody” is a terrible thing to be .

To learn more about Identity, refer to the link:

https://brainly.com/question/30699830

#SPJ2

Write a program that will input the names, ages and weights of three siblings and display the lightest followed by the youngest of the siblings. Do the above assignment without using an array of objects. Implementation Create a project asSibling. In the above project, create a class Sibling not containing the main method. In the above project, create a class TestSibling containing the main method.

Answers

Answer:

Here is the JAVA program:

Sibling.java class:

import java.util.Scanner;  //to accept input from user

public class Sibling {  //class name

//private data members of class

   private String name;  // String type variable to hold the name of sibling

   private int age;  // int type variable to hold the age of sibling

   private int weight;  // int type variable to hold the weight of sibling

   public Sibling() {}     //constructor of class Sibling

   public Sibling (String n, int a, int w)  {  //parameterized constructor

       name = n;  // refers to name field

       age = a;  // refers to age field

       weight = w;    }   // refers to weight field

   public String getName ()    {   //accessor method to get the current name of sibling

       return name;    }   //returns the name field of the sibling

   public int getAge ()    {   //accessor method to get the current age of sibling

       return age;    }   //returns the age field of the sibling

   public int getWeight (){ //accessor method to get the current weight of sibling

    return weight;    } //returns the weight field of the sibling

   public void getInput() {    //to take input name,age and weight from user

 Scanner input = new Scanner(System.in);  //Scanner class object

 System.out.print("Enter the name:  ");  //prompts user to enter the name of sibling

 name = input.nextLine();  //scans and reads the input name from user

 System.out.print("Enter the age:  ");  //prompts user to enter the age of sibling

 age = input.nextInt();   //scans and reads the age from user

 System.out.print("Enter the weight:  ");  //prompts user to enter the weight of sibling

 weight = input.nextInt(); } }   //scans and reads the input weight from user

Explanation:

Here is the TestSibling class that contains main method:

public class TestSibling {   //class name

public static void main (String[] args) {   //main method

String name;  // to hold name of sibling

int age, weight;   // to hold age and weight of sibling

Sibling sib1, sib2, sib3;   // objects of Sibling class

sib1 = new Sibling ();  // creates object of class Sibling for sibling 1 and calls constructor

sib1.getInput();   // calls getInput method using sib1 object to get the name, age and weight of sibling 1

sib2 = new Sibling ();  // creates object of class Sibling for sibling 2 and calls constructor

sib2.getInput();   //calls getInput method using sib2 object to get the name, age and weight of sibling 2

sib3 = new Sibling ();  //creates object of class Sibling for sibling 3 and calls constructor

sib3.getInput();   //calls getInput method using sib3 object to get the name, age and weight of sibling 3

Sibling youngest=null, lightest=null;    //holds the youngest age and lightest weight of siblings

if (sib1.getAge( )<= sib2.getAge( ) && sib1.getAge( ) <= sib3.getAge( ) )   /*if condition checks if age of sibling 1 is less than or equals to that of sibling 2 and sibling 3,  using object of each sibling and getAge method to access age. the logical operator && AND is used so that if condition evaluates to true if sib1 is younger than both sib2 and sib3 */

{ youngest=sib1;}   //if the above condition is true then sets sib1 as youngest

else if (sib2.getAge( ) <= sib1.getAge( ) && sib2.getAge( ) <= sib3.getAge( ) )   // else if condition checks if age of sibling 2 is less than or equals to that of sibling 1 and sibling 3

{youngest=sib2;}   // if above condition is true then sets sib2 as the youngest

else   //if none of the above condition is true then this means that the third has the lowest age

{            youngest=sib3;    }    //sets sib3 as the youngest

if (sib1.getWeight( ) <= sib2.getWeight( ) && sib1.getWeight( ) <= sib3.getWeight( ) )   //if condition checks if weight of sibling 1 is less than or equals to that of sibling 2 and sibling 3,  using object of each sibling and getAge method to access weight of each sibling

          { lightest=sib1; }   //if the above condition is true then sets sib1 as having the lightest weight

else if (sib2.getWeight( ) <= sib1.getWeight( ) && sib2.getWeight( ) <= sib3.getWeight( ) )  // else if condition checks if weight of sibling 2 is less than or equals to that of sibling 1 and sibling 3

{lightest=sib2; }  //if the above condition is true then sets sib2 as the lightest

else  //if none of the above condition is true then this means that the third has the lightest weight

{ lightest=sib3;   }  //sets sib3 as the lightest

System.out.println("The lightest sibling: " + lightest.getName() +" " + lightest.getAge()+" "+ lightest.getWeight());  } } //calls the getName() getAge() and getWeight() method using object lightest to print the lightest of the siblings

System.out.println("The youngest sibling: " + youngest.getName() +" " + youngest.getAge()+" "+ youngest.getWeight());  //calls the getName() getAge() and getWeight() method using object youngest to print the youngest of the siblings

The screenshot of the output is attached.

Why is sequencing important?

(A). It allows the programmer to test the code.
(B). It allows the user to understand the code.
(C). It ensures the program works correctly.
(D). It makes sure the code is easy to understand.

Answers

Answer:

C

Explanation:

If it wasn't in order then the code would fail

Answer:

C is the right answer because................

Explanation:

No Loops, or if statements, or arrays allowed for this program. You will receive a zero if your program contains any loop, if statement, or array. You need a program to maintain information about your stocks. Assume that you have the following stocks:
Stock Name Number of Shares Buying Price Current Price Yearly Fees
Per Share Per Share
IBM 155 $15.33 $13.33 $5.00
ORACLE 375 $11.77 $12.25 $3.50
SUN MICRO 350 $27.55 $35.75 $12.25
LINKSYS 85 $25.35 $23.34 $6.00
CISCO 50 $45.36 $50.86 $1.50
You must use the data from this table for you Program Set 2 submission.
Write a C program that will perform the following tasks:
Task 1: Allow the user to enter in the data for each stock. Stock name, Number of shares, Buy Price, Current Price and Yearly fees.(The user will not enter the $'s.)
Task 2: Calculate the Initial Cost, Current Cost, and Profit for each stock. The formulas to use are: Initial Cost

Answers

Answer:

Here is the C program:

#include <stdio.h> //to use input output functions

int main(){ //start of main function

    char *stock_name=NULL; //to store stock name (this is used instead of using char type array)

    int shares; //to store number of shares

    float buy_price; //to store the buy price

    float cur_price; //to store the current price

    float fees; //to store the fees

    double initial_cost; //to store the computed initial cost

    double current_cost; //to store the value of computed current cost

    double profit; //to store the calculated value of profit

printf("enter stock name ");  //prompts to enter stock name

scanf("%m[^\n]",&stock_name); //reads the input stock name

printf("enter number of shares "); //prompts to enter number of shares

scanf("%d", &shares); //reads the input number of shares

printf("enter the buy price, current price and fees "); //prompts to enter buy price, current price and fees values from user

scanf("%f %f %f", &buy_price, &cur_price, &fees); //reads the values of buy price, current price and fees from user

    initial_cost = shares * buy_price; //computes initial cost

    current_cost = shares *cur_price; //computes current cost

    profit = current_cost - initial_cost - fees; //computes profit for each stock

printf("The stock name is: %s\t\n",stock_name); //displays the stock name

printf("The number of shares: \t%d\t\t\n",shares); //displays the number of shares

printf("The buy price is:\t$\t %0.2f\t\n",buy_price); //displays the buy price

printf("The current price is:\t$\t %0.2f\n",cur_price); //displays the current price

printf("The fees are:\t\t$\t %0.2f\n",fees); //displays the fees

printf("The initial cost is:\t$\t %0.2f\n",initial_cost); //displays the computed initial cost

printf("The current cost is:\t$\t %0.2f\n",current_cost); //displays the computed current cost

printf("The profit is:\t\t$\t %0.2f\n",profit);//displays the computed profit for each stock

return 0;  }

       

Explanation:

Lets say the user input IBM, 150, 11.33 13.33 and 5.00 as stock name, number of shares, buy price, current price and fees values.

So,

stock_name = "IBM"

shares = 150

buy_price = 11.33

cur_price = 13.33

fees = 5.00

Now initial cost is computed as:

  initial_cost = shares * buy_price;

This becomes:

  initial_cost = 150* 11.33

  initial_cost = 1699.5

Next current cost is computed as:

    current_cost = shares *cur_price;

This becomes:

    current_cost = 150*13.33

    current_cost = 1999.5

Next the profit is computed as:

    profit = current_cost - initial_cost - fees;

This becomes:

    profit = 1999.5 - 1699.5 - 5.00

     profit =     295

These values are displayed on the output screen up to 2 decimal places. So the output of the entire program is:

The stock name is: IBM                                                                                                                        The number of shares:   150                                                                                                                   The buy price is:         $        11.33                                                                                                        The current price is:   $        13.33                                                                                                        The fees are:               $        5.00                                                                                                         The initial cost is:        $        1699.50                                                                                                      The current cost is:     $        1999.50                                                                                                      The profit is:                 $        295.00

The screenshot of the output is attached.

What is the most likely designation for an engineer in charge of a company's equipment and machinery? a. design engineer b. inspection engineer c. technical sales engineer d. maintenance engineer​

Answers

Answer: Maintenance engineer

Explanation:

Design engineer is an engineer that uses both mathematical and scientific methods to develop ideas that will be used and design that'll be used for a particular product.

Inspection engineers are the engineers that checks out roads, bridges etc and identify problems that such structures have so as to prevent accidents from happening.

Technical sales engineer advices the company and also give support with regards to products when technical expertise may be required.

Maintenance engineers are the engineers that are involved in checking, and servicing equipments and machinery and making sure that they're always functioning properly and in good, working conditions. These engineers ensures the smooth running of machines.

Based on the above scenario, the answer is maintenance engineers.

Answer:

d

Explanation:

Which infection sends information to your computer through a third party

Answers

Answer: Spyware

Explanation:

Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party

Answer:

a viriz

Explanation: im only in 69th grade i wouldent know

Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of header. This is then transmitted through some networks (via routers), each of which uses a 24-bit of packet header for packet transmissions. The destination network can accept a maximum packet size of 800 bits. How many bits, including headers, are delivered to the network layer protocol at the destination?

Answers

Answer:

1852 bits

Explanation:

The total number of bits transmitted = Number of data bits + number of header bits sent to IP layer + number of appended header bits.

The total number of bits transmitted = 1500 bits + 160 bits + 120 bits = 1780 bits

Ratio of number of bits transmitted to maximum packet size = 1780 bits / 800 bits = 2.225 = 3 (to next whole number)

Therefore the number of bits, including headers, are delivered to the network layer protocol at the destination =  total number of bits transmitted + (packet header × ratio)

Number of bits = 1780 bits + (3 × 24 bits) = 1852 bits

What type of volatile memory is used on small systems such as laptops?

Select the correct answer.

A.
SODIMM
B.
ROM
C.
SRAM
D.
DIMM

Answers

Answer:

A. SODIMM

Explanation:

SODIMM is the "mini" version of desktop ram. it is smaller to accommodate the laptop's size.

the answer is SODIMM

_is necessary for the health growth of bones and teeth fill ups​

Answers

Answer:

Calcium

Explanation:

Calcium is a necessity and makes your bones stronger. It typically comes in milk.

Other Questions
our analysis of cherry pink and apple blossom white -15 +n=-9 One step equation need the answer Hi, can someone please help me out with this problem? thanks in advance.Construct Income Statement(s) for a firm with an accounting break-even point of $1,000,000 and a degree of operating leverage of 3. Assume a corporate income tax rate of 10%. Show calculations that prove that the accounting break-even point is $1,000,000 and the DOL is 3 for your statement(s). Two town on a map are 2 1/4 inches apart.the actual distance between the towns is 45 miles. Which of the following could be the scale on the map? [tex]1.986 \times {10}^{6} [/tex]write this number in standard notation x - 2 > 4 What is the answer and explainPls I'll Give BRAINLIEST The box is resting on the table. Choose the correct number of planes in the figure.1. 12. 23. 34. 45. 5 6. 6 Artical five of the us constitution supports the principal of federalism because? o babysit one child, Fernando charges $10 to drive to the appointment plus $4 per hour. He saves 30% of the total amount he earns. Brenna charges $6 per hour and saves 25% of the total amount she earns. Which equation can be used to determine the number of hours, h, after which Fernando and Brenna will have saved the same amount of money? 10 + 0.3(4h) = 0.25(6h) 0.3(10) + 4h = 0.25(6h) 0.3(10 + 4h) = 0.25(6h) 0.3(14h) = 0.25(6h) Name 2 things that travel well through metal? What value should go in the box what is the answer to 3(x-20)=15 the mass of jam when full is 450g. the jam has a mass of 80g. find the total mass of 3 full jars of jam in kilograms and grams Determine the SLOPE of the following equation: y = 3/2x + 4* Pistol shrimps and gobies depend on each other for their shelter and protection, and they have a beneficial relationship with each other. Whats this symbiotic relation called? Which of the following is NOT a search engine?YahoolChromeBingGoogle PLEASE HELP ASAP ITS DUE IN THE NIGHT Energy is converted between different forms- watch the video below, then describe how energy is converted when you listen to music through headphones. Your answer should include four different energy forms Solve: 12r-6s=t for r Which responsibilities were assigned to the central government under the Articles of Confederation? taxing goods and services maintaining a militia drawing up treaties publishing a newspaper in the esophagus food is chemically digested. true or false