A(n) _____, such as microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Answers

Answer 1

A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

What is a personal information manager PIM software?

A personal information manager (PIM) is known to be a kind of a software application that is known to function by the use of  tools to help one or computer users to be able to handle and monitor contacts, calendars, tasks, appointments as well as other forms of personal data.

Therefore, A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Learn more about ​personal information manager (PIM) from

https://brainly.com/question/23664875

#SPJ1

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

a. swim lane

b. ​personal information manager (PIM)

c. ​fact-finding application

d. ​enterprise architecture


Related Questions

Look at the code in the example below and then answer the question..

Look at the code in the example below and then answer the question..

Answers

Answer:

The second option (can't type the link or I will get banned)

Source:

I just finished my HTML/CSS final last quarter.

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture

Answers

Answer:

C: Callout shape

Explanation:

The object that should he insert into the Word document is the callout function. The correct option is b.

What is Microsoft Word?

A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.

A callout function is one of the functions that specifies a callout and is implemented by a callout driver.

The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.

Therefore, the correct option is b. callout.

To learn more about Microsoft Word, refer to the below link:

https://brainly.com/question/2579888

#SPJ5

The _____ function provides the option of defining multiple sets of
criteria for counting rows in a targeted range of cells.

Answers

The COUNTIFS function provides the option of defining multiple sets of criteria for counting rows in a targeted range of cells.

.What is the COUNTIFS function?

The COUNTIFS function is a statistical function used to count the number of cells that meet multiple criteria in a specified range of cells. It is a flexible function that can count cells based on a variety of criteria, making it an effective tool for data analysis.

The syntax for the COUNTIFS function is as follows:COUNTIFS(range1, criteria1, [range2], [criteria2], ...)

Where:range1 is the first range of cells to be evaluated.criteria1 is the first set of criteria that must be met for a cell to be counted.[range2], [criteria2], ... are optional additional ranges of cells and criteria to be evaluated in the same way as range1 and criteria1, respectively.Therefore, the correct answer to the question is: COUNTIFS.

Learn more about functions COUNTIF at

https://brainly.com/question/32950831

#SPJ11

which pc motherboard bus is used to connect the cpu to ram and other motherboard components?

Answers

Answer: A Front side is used to connect the CPU to ram and other motherboard components.

"Front side" refers to the external interface from the processor to the rest of the computer system, as opposed to the back side, where the back-side bus connects the cache (and potentially other CPUs). A front-side bus (FSB) is mostly used on PC-related motherboards (including personal computers and servers).

Explanation: Hope this helps!! :)) Mark me as brainliest and have a good day!! :)))

Suppose we have a 16 block cache. Each block of the cache is one word wide. When a given program is executed, the processor reads data from the following sequence of decimal addresses:
0, 15, 2, 8, 14, 15, 26, 2, 0, 19, 7, 10, 8, 14, 11
Show the contents of the cache at the end of the above reading operations if:
the cache is direct mapped
the cache is 2-way set associative
the cache is 4-way set associative
the cache is fully associative
The content at address 0 can be shown as [0]. Assume LRU (Least Recently Used) replacement algorithm is used for block replacement in the cache, and the cache is initially empty.

Answers

In a 16 block cache with various mapping methods, the contents at the end of the given sequence of decimal addresses are:

1. Direct-mapped cache: Each address maps to a unique cache block.
Cache contents: [0], [15], [2], [8], [14], [15], [26], [2], [0], [19], [7], [10], [8], [14], [11].

2. 2-way set associative cache: Addresses map to one of two possible cache blocks within a set.
Cache contents: [0, 15], [2, 26], [8, 19], [14, 7], [10], [11].

3. 4-way set associative cache: Addresses map to one of four possible cache blocks within a set.
Cache contents: [0, 15, 2, 26], [8, 19, 14, 7], [10], [11].

4. Fully associative cache: Any address can map to any cache block.
Cache contents: [0], [15], [2], [8], [14], [15], [26], [2], [0], [19], [7], [10], [8], [14], [11].

In each case, the LRU algorithm is used to determine block replacement, ensuring that the least recently accessed block is replaced when necessary.

learn more about 16 block cache here:

https://brainly.com/question/29563012

#SPJ11

Python_Lab_2_Functions

An object’s momentum is its mass multiplied by its velocity. The kinetic energy of a moving object is given by the formula

KE=(1/2)mv2, where m is the object’s mass and v is its velocity squared.

Write two functions one for momentum and the other for kinetic energy.

The momentum function must have two required parameters and calculates/prints the object's momentum.

The kinetic energy function must have two required parameters and calculate/print the

kinetic energy.

Write a program that accepts an object’s mass (in kilograms) and velocity (in meters

per second) as inputs and then outputs its momentum and kinetic energy by calling the functions.

Answers

Answer:

Program written in Python

def KEfunction(mass,velocity):

    KE = 0.5 * mass * velocity**2

    print("Kinetic Energy: "+str(KE))

def momentum(mass,velocity):

    P= mass * velocity

    print("Momentum: "+str(P))

Mass = float(input("Mass (kg): "))

Velocity = float(input("Velocity (m/s): "))

KEfunction(Mass,Velocity)

momentum(Mass,Velocity)

Explanation:

This line defines the kinetic energy function

def KEfunction(mass,velocity):

This line calculates the kinetic energy

    KE = 0.5 * mass * velocity**2

This line prints the kinetic energy

    print("Kinetic Energy: "+str(KE))

This line defines the momentum function

def momentum(mass,velocity):

This line calculates the momentum

    P= mass * velocity

This line prints the momentum

    print("Momentum: "+str(P))

The main method begine here

This line prompts user for mass

Mass = float(input("Mass (kg): "))

This line prompts user for velocity

Velocity = float(input("Velocity (m/s): "))

This line calls the kinetic function

KEfunction(Mass,Velocity)

This line calls the momentum function

momentum(Mass,Velocity)

a company has approached you for their product testing, and you agree to do it. first, you have to install the necessary plugins for the software through the browser, install the software, and run the software again. what procedure should you adopt to ensure that you don't compromise the browser and the computer's operating system?

Answers

Ensure that the OS security settings are enabled, scan downloaded files for viruses and malware, execute the program in HSTS/HTTPS mode, and then send a secure cookie to the server.

Threat actors (hackers) can infiltrate your computer and network via phishing scams, viruses, worms, ransomware, and spyware, to name just a few methods. If this happens, you and your business could suffer financially. Knowing how easy your identity can be taken by merely clicking a bad link from an email can be frightening. There are many ways you can be attacked or exploited, but there are also many methods you can defend yourself and your business from online dangers.

Learn more about phishing here-

https://brainly.com/question/24156548

#SPJ4

Arthur Meiners is the production manager for Wheel-Rite, a small manufacturer of metal parts. Wheel-Rite sells 10,378 gear wheels each year. Wheel-Rite setup cost is $45 and maintenance cost is $0.60 per sprocket per year. Wheel-Rite can produce 493 gear wheels per day. The daily demand for the gear wheels is 51 units. Show your work.
1. What inventory management model should we use to solve this problem?
Model for discount purchases
Model Economic Quantity to Order
Model Economic Quantity to Produce
Model to handle dependent demand
2. What is the optimal amount of production? 3. What is the maximum inventory level of gear wheels that will be in the Wheel-Rite warehouse? 4. What is Wheel-Rite's annual setup cost? 5. What is the annual cost of maintaining Wheel-Rite?

Answers

1. The appropriate inventory management model to solve this problem is the Economic Quantity to Produce (EOQ) model. The EOQ model is used to determine the optimal order quantity or production quantity that minimizes the total cost of inventory, taking into account three cost types: setup, production, and holding.

2. To calculate the optimal amount of production using the EOQ model, we need the following information:
- Demand per year (D) = 10,378 gear wheels
- Setup cost (S)= $45
- Production rate per day (P) = 493 gear wheels
- Working days per year (W) = 365 (assuming no downtime)

The formula to calculate the EOQ is:

EOQ = sqrt((2 * D * S) / (P * (1 - (D / (P * W)))))

Plugging in the values:

EOQ = sqrt((2 * 10,378 * 45) / (493 * (1 - (10,378 / (493 * 365)))))

Calculating this equation will give you the optimal amount of production.

3. The maximum inventory level of gear wheels that will be in the Wheel-Rite warehouse can be calculated by multiplying the optimal amount of production (EOQ) by the number of production cycles in a year. The number of production cycles can be calculated by dividing the annual demand (D) by the optimal amount of production (EOQ) and rounding up to the nearest whole number.

Maximum inventory level = EOQ * ceil(D / EOQ)

4. Wheel-Rite's annual setup cost can be calculated by multiplying the setup cost (S) by the number of production cycles in a year.

Annual setup cost = S * ceil(D / EOQ)

5. Wheel-Rite's annual cost of maintaining inventory can be calculated by multiplying the holding cost per unit (which is the maintenance cost per sprocket per year) by the average inventory level. The average inventory level can be calculated by dividing the maximum inventory level by 2.

Annual cost of maintaining inventory = (Holding cost per unit) * (Average inventory level)

In this case, the holding cost per unit is $0.60 per sprocket per year, and the average inventory level can be calculated as (Maximum inventory level / 2).

Please note that you need the calculated EOQ value from question 2 to answer questions 3, 4, and 5.8

Explain the terms Preorder, Inorder, Postorder in Tree
data structure (with examples)

Answers

The terms Preorder, Inorder, and Postorder in Tree data structure are defined below.

The in-order array in the Tree data structure, Recursively builds the left subtree by using the portion of the preorder array that corresponds to the left subtree and calling the same algorithm on the elements of the left subtree.

The preorder array are the root element first, and the inorder array gives the elements of the left and right subtrees. The element to the left of the root of the in-order array is the left subtree, and also the element to the right of the root is the right subtree.

The post-order traversal in data structure is the left subtree visited first, followed by the right subtree, and ultimately the root node in the traversal method.

To determine the node in the tree, post-order traversal is utilized. LRN, or Left-Right-Node, is the principle it aspires to.

Learn more about binary tree, here;

brainly.com/question/13152677

#SPJ4

plsssssssss help me​

plsssssssss help me

Answers

Answer:

1. physical hazard

2. psychological hazard

3. biological hazard

4. physical and/or psychological hazard

5. chemical hazard

6. physical hazard

7. chemical hazard

8. biological hazard

Explanation:

You do the rest

ou are troubleshooting a raid 6 array on a high-end computer. two drives have their fault lights on. what is the best action for you to take?

Answers

You are troubleshooting a raid 6 array on a high-end computer. two drives have their fault lights on. The best action to take would be to replace the failed drives as soon as possible to restore the redundancy of the RAID 6 array and prevent data loss.

After replacing the drives, the RAID controller will automatically start the rebuild process. It is important to monitor the rebuild process and make sure that it completes successfully. If the rebuild process fails or if another drive fails during the rebuild, the data on the array may be lost and the array may need to be reconstructed from backup.

Here you can learn more about the RAID controller

brainly.com/question/30049518

#SPJ4

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
A. Your developers will have ready access to the source code.
B. The open-source solution is in the public domain.
C. The code for the open-source solution can be viewed by a community of open-source developers.
D. Maintenance of an open-source solution relies on developers who volunteer to work on the code.

Answers

Answer:

honestly I think the other one is correct

Explanation:

What part of the network is the point where the responsibility of the administrator ends and the telecommunications providers responsibility begins

Answers

Answer:

"PAD interface " is the correct answer.

Explanation:

PAD seems to be a concept most commonly linked with such an X.25 interface, where even the PAD splits the shared information into individual packets as well as configurations asynchronous distribution including its header information.The interface pad should be used for scrubbing polished surface areas and contour lines, in conjunction with handle abrasive particles. Use the pad GUI would also give a smoother performance. The control pad is located between some of the scrubbing disc as well as the backing pad.

1. What are the benefits of being skillful in making simple electric gadgets?
2. How can you be safe while working on a simple gadget project?

Answers

The benefits of being skillful in making simple electric gadgets is that due to your skill used in creating the gadget, it can help people to do their work more easily and fast.

One can be safe while working on a simple gadget project by wearing safety goggles or gloves if need be.

What are electronic gadgets?

Electronic gadgets are known to be a kind of appliances that is said to function based on technology or the use of electronic technology.

Note that In simple gadget such as a calculator, it is known to be an electronic gadget that help one to calculate bigger amount easily and fast

Learn more about gadget  from

https://brainly.com/question/1162014

How can you tell an open innovation project from one that is not?

Answers

An open innovation project is one in which a company seeks external ideas, knowledge, and expertise from outside the organization to advance its goals, rather than relying solely on internal resources. Conversely, a project that is not open innovation relies primarily on internal resources and expertise.

Here are some characteristics of an open innovation project:

Collaboration: Open innovation projects involve collaboration between internal teams and external partners such as customers, suppliers, academic institutions, startups, and other companies.

Sharing of knowledge: An open innovation project requires sharing of knowledge, information, and expertise between the internal and external parties.

Involvement of external parties: In an open innovation project, external parties are actively involved in the innovation process, from ideation to commercialization.

Innovation ecosystem: An open innovation project is part of a larger innovation ecosystem that fosters the exchange of ideas, knowledge, and expertise.

Access to resources: An open innovation project provides access to external resources such as funding, facilities, equipment, and talent.

In contrast, a project that is not open innovation is typically driven by internal resources and expertise. Internal teams are responsible for all aspects of the innovation process, and external parties are not involved in any significant way.

In summary, an open innovation project involves collaboration, sharing of knowledge, involvement of external parties, an innovation ecosystem, and access to external resources.

Which of these is a compound morphology?

A.
bookkeeper = book + keeper
B.
happiness = happy + ness
C.
books = book + s
D.
banker = bank + er

Answers

Answer:

D.

Explanation:

yarn po answer ko po eh

because bank +er =banker

A. Bookkeeper = book + keeper !!

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

bioinformatics is the use of computer technology to compare and analyze genome sequence. group of answer choices true false

Answers

It is True. Bioinformatics involves the use of computer technology to compare and analyze genome sequences.

How does bioinformatics utilize computer technology to study genome sequences?

Bioinformatics is the field that utilizes computer technology and computational methods to compare and analyze genome sequences. With the exponential growth of genomic data, bioinformatics has become essential in deciphering and interpreting biological information.

By employing various computational tools, algorithms, and statistical techniques, bioinformatics enables researchers to identify patterns, similarities, and relationships within genome sequences.

Bioinformatics plays a pivotal role in genomics research, as it allows for the identification of genes, regulatory elements, and other functional elements within genomes.

It aids in understanding evolutionary relationships, genetic variations, and their potential impact on diseases. Additionally, bioinformatics facilitates the analysis of high-throughput sequencing data, enabling researchers to make sense of the vast amount of genetic information generated.

Through bioinformatics, scientists can predict protein structure and function, annotate genomic sequences, and conduct comparative genomics studies.

This interdisciplinary field combines biology, computer science, mathematics, and statistics to unravel complex biological phenomena and provide insights into the fundamental processes of life.

In summary, it is True bioinformatics harnesses the power of computer technology and computational algorithms to analyze, compare, and interpret genome sequences, ultimately advancing our understanding of genetics, evolution, and disease.

Learn more about Bioinformatics

brainly.com/question/12537802

#SPJ11

At the arcade, what did mike do to remind bryan of Alex?

Answers

Answer:

uhhhh he kept mentioning him i dunno

Explanation:

Design a webpage on Artificial Intelligence /Augmented Reality. please help me out with these computer programming

Answers

Answer:

Using HTML, CSS, and Javascript to create the layout, style it, and program the blog's interactivity respectively. Or use Wordpress without codes.

Explanation:

Designing a blog or a website requires certain knowledge or tools. Programmers use tools like HTML, CSS, Javascript, and other front-end libraries and back-end web frameworks. HTML is used to mark-up the web layout, CSS is used to style beautify the page while Javascript is used to make the page interactive.

Other tools like Wordpress requires little or no skill, since the layout of the webpage is drag and drop and other back-end features can be programmed to it.

Question 2
An engineer is writing a web application that requires some user input. The engineer has put a submit button on their page and now needs a way for their program to recognize when the button has been clicked.
The engineer should add a(n) __________ to their JavaScript.
third-party API
event listener
else if statement
for loop

Answers

When the submit button is pressed, the engineer should add an event listener to their JavaScript. A JavaScript method called an event listener watches for a particular event to happen.

Can I add a JavaScript event listener to a button?

Any HTML DOM object, including HTML elements, the HTML document, the window object, and other objects that enable events, such as the xmlHttpRequest object, can have event listeners added using the addEventListener() method.

How can we add an event listener to JavaScript that is running in a browser?

The addEventListener method adds the function or object that implements EventListener to the EventTarget's list of event listeners for the supplied event type ().

To know more about JavaScript visit:-

https://brainly.com/question/28448181

#SPJ1

which of the following is true? select all that apply. true false most queries have fully meets results. true false www.crocheting is fully meets for the query

Answers

The statement "most queries have fully meets results" is false.

The statement "most queries have fully meets results" implies that the majority of queries (searches) yield complete and satisfactory results. This statement is not true because there are various factors that can affect the relevance and completeness of search results, such as the specificity of the search terms, the search engine algorithms, and the quality of the indexed content.


Most queries have fully meets results. True: It is true that most queries have results that fully meet the users' expectations, as search engines aim to provide relevant and accurate information. www.crocheting is fully meets for the query.

To know more about queries visit:-

https://brainly.com/question/30155481

#SPJ11

1.  "most queries have fully meets results" is false

2. "www.crocheting is fully meets for the query" is  false

What should you know about most queries?

A large number of queries do not have fully meets results.

This is because there are a vast number of possble queries, and it is impossible for any search engine to index and return results for all of them.

"www.crocheting" is a website that provides information about crocheting. It is not a search engine, and it does not return results for queries.

Example of queries that may have fully meets results is "What is the capital of France?"

Find more exercises on queries;

https://brainly.com/question/4492510

#SPJ1

One benefit of open source software is that it

One benefit of open source software is that it

Answers

Answer:B

Explanation:

Which of the below would provide information using data-collection technology?

Buying a new shirt on an e-commerce site
Visiting a local art museum
Attending your friend's baseball game
Taking photos for the school's yearbook

Answers

The following statement would provide the information by utilising data-collection technology: Buying a new shirt on an e-commerce site.

What is data collection?
The process of obtaining and analysing data on certain variables in an established system is known as data collection or data gathering. This procedure allows one to analyse outcomes and provide answers to pertinent queries. In all academic disciplines, including the physical and social sciences, the humanities, and business, data collecting is a necessary component of research. Although techniques differ depending on the profession, the importance of ensuring accurate and truthful collection does not change. All data gathering efforts should aim to gather high-caliber information that will enable analysis to result in the creation of arguments that are believable and convincing in response to the issues that have been addressed. When conducting a census, data collection and validation takes four processes, while sampling requires seven steps.

To learn more about data collection
https://brainly.com/question/25836560
#SPJ13

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

\(\frac{1}{3}\ m/s\)

Explanation:

The computation of the velocity by using the following formula is

As we know that

\(Velocity = \frac{Displacement}{Total\ time\ taken}\)

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

\(= \frac{10\ meters}{30\ seconds}\)

\(= \frac{1}{3}\ m/s\)

We simply applied the above formula so that we can get the velocity and the same is to be considered

Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additional nodes to a network is an example of _________ scaling.

Answers

Answer:vertical and horizontal

Explanation:

Answer:

Horizontal and then Vertical

Explanation:

What is the purpose of an attribute in HTML?
A.
It is a property that changes the default behavior of an element.
B.
It is an empty element.
C.
It consists of a start tag and an end tag.
D.
It is a tag without angular brackets.

It is not C.

Answers

A. It is a property that changes the default behavior of an element.

Fill in the blank with the correct response.
A company's virtual desktop is stored on a remote central service. This is known as desktop _____.

Answers

Answer:

Virtual Desktop

Explanation:

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats

Answers

A security information and event management (SIEM) system in an SOC helps fight security threats by combining data from varying technology sources and analyzing logs in real time, which helps in managing resources to implement protective measures against threats.

Features of a SIEM

They are tools used to promote information security through the provision of reports that display malicious intrusion attempts and alerts that are triggered in case of violation of established rules for security.

Therefore, through SIEM tools there is greater analysis and collection of data that can impact information security, generating a better classification of threats and investigative capacity to carry out actions to combat system insecurities.

Find out more information about security information here:

https://brainly.com/question/26282951

Other Questions
How does phosphoglycerate kinase make glycolysis energy neutral at this step? After the abdication of the last Qing emperor in China in 1912, the new republican government adopted a new national flag (the so-called five-races-together-in-harmony flag) in which five stripes represented the five main ethnic groups: the Han Chinese, the Manchus, the Tibetans, the Uighurs, and the Mongols. The adoption of the flag is an example of which of the following processes?answer choicesGovernmental efforts of the new states undo the tolerant ethnic and religious policies of their imperial predecessors in order to promote greater uniformityGovernmental efforts of the new states to reduce heir political and economical dependence on former colonial powersEfforts by authoritarian governments to mobilize all segments of society for a conflict with foreign powersGovernmental efforts of multinational states to promote a new nationalist identity that would help prevent the emergence of ethnic separatism Use details from the text to write an informative paragraph explaining the differences between the types of producers found in the rain forest. Paragraph must be a minimum of 5 sentences with punctuation and capitalization. A federally funded research study involving children 8 to 12 years old involves collecting a single voided urine sample to assess the frequency of asymptomatic proteinuria (higher amounts of protein in the urine without any signs or symptoms of illness or infection). According to 45 CFR 46, an IRB's risk assessment would likely conclude that this study involves: john said to me, 'Do you know where he is'change it to indirect speech : The healthcare provider prescribes diltiazem 125 mg/100 mL at the rate of 10 mg/hour for a client with atrial flutter. The nurse should set the electronic infusion device (EID) to deliver how many ml/hour? (Enter numeric value only. It rounding is required, round to the nearest whole number.) if the 6th term of an A.p is 11and its first term is 1 find the common diferent Actividad 4 Responde las siguientes preguntas: Qu es la verdad? Por qu es tan complicado definir el trmino verdad? Muchos movimientos sociales (obreros, feministas, indgenas, ecologistas y eco feministas) defienden posturas que se afirman como verdaderas, cules son las premisas que mantienen?, cul es la relacin con la democracia y los Derechos Humanos? Cul es la relacin contempornea entre la ciencia y la verdad? Decide whether ABCD with vertices A(2,3), B(2,3), C(2,1), and D(2,1) is a rectangle, a rhombus, or a square. How do you think the establishmentand success of Constantinople mayhave affected the course of historyin the Western Roman Empire? Can someone plz tell me this answer solve 3(8-169)-5(4-36) Hello I kinda need help its for a math test thank you! :) a group of 15 skydivers met at a seminar and began talking about life insurance during a break. because it was expensive to get individual life insurance, they decided to band together to form a small group so that they could qualify for group life insurance. after they applied for group life insurance, they were rejected. why? 2. Discuss the position of the Federalists related to ratification of the Constitution. Use facts. 3. Discuss the position of the Anti-Federalists related to ratification of the Constitution. Use facts. Kin made a picture frame for a square picture with sides that are 5f - 4 inches long. Framing the picture adds 2 inches to the length of each side. Use the distributive property to write two expressions for the perimeter of the framed picture. Show your work. What is the distance over which the power carried by the wave is reduced bt 4. 1 db? typer your answer in meters to two places after the decimal the features listed above describe what type of cell Evaporation is used to _________________. can yall pls go to my other question before this one plss!!