MCQ: A computer network is interconnection of two or more:
A: Printers
B: Monitors
C: Computers
D: Hard disks​

Answers

Answer 1

Answer:

computers

Explanation:

it is because other remaining are not able to access network


Related Questions

.............. 1010111 needs to be transferred w.ith odd parity and the answer is
A. 01010111
B.11010111
C.10101110
D.10101111

Answers

Answer:

A. 01010111

Explanation:

This is because in odd parity, the number on the far left (the 8th number) would always be a 0

A! your answer is A- 01010111

Which force is exerted on an object by a person or another object​

Answers

An applied force is a force that is applied to an object by a person or another object. If a person is pushing a desk across the room, then there is an applied force acting upon the object. The applied force is the force exerted on the desk by the person. (Caution: do not confuse weight with mass


All markup languages follow web programming standards. These standards are defined by the

Answers

The World Wide Web Consortium is the primary entity in charge of developing and upholding web standards (W3C). Numerous standards, including the common markup languages we use to create webpages, have been established by the W3C.

Who sets the standards for web programming?

The W3C is the most well-known organization for setting web standards, but there are others as well, including the WHATWG (which oversees the HTML language's living standards), ECMA (which publishes the standard for ECMAScript, on which JavaScript is based), Khronos (which publishes 3D graphics technologies like WebGL), and others. The preferred markup language for building Web pages is HTML. A Web page's structure is described in HTML. A number of elements make up HTML. The content's presentation in the browser is controlled by HTML elements. The labels "this is a heading," "this is a paragraph," "this is a link," etc., are provided by HTML elements.

To learn more about web programming refer to

https://brainly.com/question/27518456

#SPJ1

Write the removeevens() function, which receives a vector of integers as a parameter and returns a new vector of integers containing only the odd numbers from the original vector. the main program outputs values of the returned vector. hint: if the original vector has even numbers, then the new vector will be smaller in length than the original vector and should have no blank element. ex: if the vector passed to the removeevens() function is [1, 2, 3, 4, 5, 6, 7, 8, 9], then the function returns and the program output is: [1, 3, 5, 7, 9] ex: if the vector passed to the removeevens() function is [1, 9, 3], then the function returns and the program output is: [1, 9, 3]
main.py 1 def remove evens(nums): 2 # Type your code here. 3 4 if __name__ ==' ___main___':
5 nums = [1, 2, 3, 4, 5, 6, 7, 8, 9] 6 result = remove_evens(nums) 7 8 print(result)

Answers

Answer:

def remove_evens(nums):

# Create an empty list to hold the odd numbers

odds = []

# Loop through the input list and check if each number is odd

for num in nums:

if num % 2 != 0:

odds.append(num)

# Return the list of odd numbers

return odds

if __name__ == '__main__':

nums = [1, 2, 3, 4, 5, 6, 7, 8, 9]

result = remove_evens(nums)

print(result)

Explanation:

In this implementation, we first create an empty list called odds to hold the odd numbers. We then loop through the input list nums, checking if each number is odd using the modulus operator (%). If the number is odd, we append it to the odds list.

Finally, we return the odds list, which contains only the odd numbers from the input list. In the main program, we pass the input list [1, 2, 3, 4, 5, 6, 7, 8, 9] to the remove_evens() function, and print the resulting list [1, 3, 5, 7, 9].

Why can't mechanical switches be used in microprocessors

Answers

Answer:

Microprocessor sometimes called the central processing unit.

Explanation:

Microprocessor is the heart of the computer network. It is useful in large agencies such as business, government, and our lives. This little chip is called the life of the computer. It is also called all computers life as we all know that. It is formed as the purest form of Moore law. It also said that this little chip also reached to its physical form.

The microprocessor sometimes called central processing unit or CPU. Mechanical switches are not used in microprocessor because of their easily interference. It has common problem called contact bounce.

can someone please help me answer this I can’t fail. tysm :)

can someone please help me answer this I cant fail. tysm :)

Answers

Answer:

option d because of you. blaa

Explanation:

whu

write a second function called round2() that is similar to round1() except that it uses k2 and returns the concatenation of r2 and l2.

Answers

To write a second function called round2() that is similar to round1() but uses k2 and returns the concatenation of r2 and l2, we can follow these steps:

Start by defining the function header with two arguments, r1 and l1, which represent the right and left halves of the output of round1().

Generate the subkeys k2a, k2b, k2c, and k2d using the same process as in round1(), but using k2 instead of k1.

Apply the Feistel function using the subkeys k2a, k2b, k2c, and k2d, and the input l1 and r1. The output of the Feistel function will be the new left and right halves, l2 and r2.

Concatenate r2 and l2 to obtain the output of round2().

Here is the implementation of the round2() function in Python:

def round2(r1, l1, k2):

   # Generate subkeys k2a, k2b, k2c, k2d

   k2a, k2b, k2c, k2d = generate_subkeys(k2)

   # Apply Feistel function using subkeys k2a, k2b, k2c, k2d, and input l1 and r1

   l2 = r1

   r2 = xor(l1, feistel_function(r1, k2a, k2b, k2c, k2d))

 # Concatenate r2 and l2 to obtain output of round2

   output = r2 + l2

   return output

The round2() function takes the right and left halves of the output of round1() as input, along with the subkey k2.

It generates the subkeys k2a, k2b, k2c, and k2d using the generate_subkeys() function, applies the Feistel function using these subkeys and the input r1 and l1, and concatenates the resulting r2 and l2 to obtain the output of round2(). The output is returned as a single string.

For more such questions on second function visit:

https://brainly.com/question/22527663

#SPJ11

Which of the following operating systems would be best suited for running a server?
- MacOS
- Ubuntu
- Windows 10
- Ubuntu server

Answers

Ubuntu server is the best one

you need to configure a windows workstation with the ip address of the proxy server for your network. click the tab in the internet properties window that you would use to do this.[General - Security - Privacy - Connections - Programs - Advanced]

Answers

Connections is the actual answer for the configuration of a windows workstation.

What do you mean by Windows workstation ?

For those with sophisticated data requirements, including data scientists, CAD experts, researchers, media production teams, graphic designers, and animators, Windows 10 Pro for Workstations is the ideal solution.

Workstation, a high-performance computer system that is primarily created for a single user and features powerful central processing, big storage, and excellent graphics capabilities.The substantially improved GPU found in workstations aids the CPU in reliving some work and in displaying visuals with excellent quality. Even if every laptop has a good graphic card for the high-quality display, the graphics on workstations will always be superior.(1) Any Windows-powered computer. look at workstation. (2) Using a client PC that is a Windows server. To benefit from the extra robustness and features included in server products, Windows server versions are occasionally used as desktop computers. Windows server, please.

To know more about Windows Workstation please click here ; https://brainly.com/question/29554975

#SPJ4

Which of the following is NOT correct concerning database design? Question 2 options: Identify all fields needed to produce the required information Group related fields into tables Determine each table's primary key Organize each piece of data into its largest useful part.

Answers

The option which is not correct concerning database design is identify all fields needed to produce the required information.

What is database design?

The database design is the arrangement of the data or the information, according to the model of database.

Let's check all the option one by one,

Identify all fields needed to produce the required information- This does not concern with the database design.Group related fields into tables-A relation database design consist of one or more than one related table. These tables are used together when the information is required.Determine each table's primary key- To determine the table's primary key, is the concern with the database design.Organize each piece of data into its largest useful part-The database design is the organization of data in the model of database.

The option which is not correct concerning database design is identify all fields needed to produce the required information.

Learn more about the database design here;

https://brainly.com/question/25694408

Some organizations and individuals, such as patent trolls, abuse intellectual property laws .



computer science

Answers

Answer:

False.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Patent trolls buy up patents in order to collect royalties and sue other companies. This ultimately implies that, patent trolls are individuals or companies that are mainly focused on enforcing patent infringement claims against accused or potential infringers in order to win litigations for profits or competitive advantage.

Hence, some organizations and individuals, such as patent trolls, do not abuse intellectual property laws.

Answer:

the answer is intentionally

Explanation:

i took the test

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

One technique for coping with stress, known as _____, is to avoid thinking about or experiencing the situation that makes you stressed and to convince yourself to think positive thoughts instead.

Answers

One technique for coping with stress, known as Stress reliving is to avoid thinking about or experiencing the situation that makes you stressed and to convince yourself to think positive thoughts instead.

What is stress?

Young people frequently have trouble learning how to handle stress. When stress is related to a catastrophic occurrence, such as a natural disaster, a family loss, school shootings, or community violence, youth can become especially overwhelmed.

Young people might feel better with stability and support from parents, carers, and instructors. When frightening or stressful situations occur in a child's life, worry is only natural.

By discussing these incidents with your kids, you can help them put frightening information into a more realistic context. Keep an eye on what your kids see and hear about stressful situations that occur in their life.

Therefore, One technique for coping with stress, known as Stress reliving is to avoid thinking about or experiencing the situation that makes you stressed and to convince yourself to think positive thoughts instead.

To learn more about stress, refer to the link:

https://brainly.com/question/25632718?

#SPJ1

rita has been given a task of writing the multiples of 7 from 70 to 140 . What statements should she write to display these on the QB64 screen ?

Answers

Answer:

....

Explanation:

What tool should be used to create real-time monitors that can be customized to show specific data on hardware, protocols, and applications

Answers

Answer:

steel

contrete

Explanation:

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

Your friend has a great idea for a new app, and she shows you a document that outlines what the app will do. This document is an example of: a market analysis. b functional requirements. c phishing prevention. d data flow diagram.

Answers

Answer:

D

Explanation: D and B are both vary close, I know that A and C are wrong, But the answer would be D: "Data flow diagram", because they are highlighting what the app is supposed to do. Function requirements would be your freind showing you a list of things they need for the app to work properly. I hope this answers your question.

Which command can be used to provide a long listing for each file in a certain directory? A. ls -T B. ls -l C. ls -F D. ls -L

Answers

The command that can be used to provide a long listing for each file in a certain directory is `ls -l`.

The `ls` command stands for list and is used to display the contents of a directory or file. It can be used to display the contents of the current working directory or the contents of a specific directory. The `ls -l` command is used to display the contents of a directory in a long format.The `ls -T` command is used to display the contents of a directory and the date and time when the files were last modified. The `ls -F` command is used to display the contents of a directory with each file and directory name followed by a character that represents the type of file or directory.The `ls -L` command is used to display the contents of a directory and any symbolic links in the directory.

Know more about command here:

https://brainly.com/question/32442346

#SPJ11

On a Windows system, sectors typically contain how many bytes?
a. 256,
b. 512,
c. 1024,
d. 2048

Answers

The answer to the question "On a Windows system, sectors typically contain how many bytes?" is B) 512. In the case of Windows, a sector is designed to store 512 bytes, and 256 bytes is not the maximum capacity for a sector in Windows.

Microsoft Windows, also called Windows and Windows OS, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs). The sector is the smallest physical storage unit on a disk, and it is made up of bytes. A sector typically contains 512 bytes on a Windows operating system, and is the typical sector size for hard drives and USB drives. However, larger drives that use Advanced Format technology may use 4,096-byte sectors instead of 512-byte sectors to improve efficiency and reliability.

A sector is considered as a storage unit on the disk. Generally, its size is fixed at 512 bytes in size. Manufacturers determine a disk sector to have a certain storage capacity. In the case of Windows, a sector is designed to store 512 bytes, and 256 bytes is not the maximum capacity for a sector in Windows.

The answer to the question "On a Windows system, sectors typically contain how many bytes?" is B) 512.

Learn more about Windows system here:

https://brainly.com/question/27764853

#SPJ11

z 1
-- = --
7 21
solve​

Answers

Answer:

\(z= \frac{1}{3}\)

Explanation:

Given

\(\frac{z}{7} = \frac{1}{21}\)

Required

Solve

\(\frac{z}{7} = \frac{1}{21}\)

Multiply both sides by 7

\(7 * \frac{z}{7} = \frac{1}{21} * 7\)

\(z= \frac{1}{21} * 7\)

Rewrite as:

\(z= \frac{1 * 7}{21}\)

\(z= \frac{7}{21}\)

Simplify fraction

\(z= \frac{1}{3}\)

Cups gets its directives from its configuration file, which is /etc/cups/__________.

Answers

CUPS (Common Unix Printing System) is a modular printing system that allows computers to communicate with printers and efficiently manage print jobs. CUPS gets its directives from its configuration file, which is located at /etc/cups/cupsd.conf.

This configuration file contains various settings that control how CUPS operates, such as listening addresses, access control, logging, and default print settings. The cupsd.conf file can be edited by system administrators to modify these settings as needed, allowing for customization of the print environment.By using the configuration file, CUPS can be tailored to meet the requirements of different organizations, ensuring smooth print operations and a better user experience. Some common changes made to the cupsd.conf file might include adjusting the LogLevel to monitor printing activity, setting access control rules to restrict user access, or configuring printer sharing for a network.Remember to restart the CUPS service after making any changes to the configuration file for them to take effect.This can be done using the command "sudo systemctl restart cups" on most Linux systems.The /etc/cups/cupsd.conf file is essential for controlling the behavior of the CUPS system, allowing administrators to configure printing settings according to their needs. Make sure to edit this file cautiously, as incorrect configurations can lead to printing issues or service failures.

For such more questions on CUPS

https://brainly.com/question/26941359

#SPJ11

What optional voice guide unit is available for the ftm-400dr radio?.

Answers

The Yaesu FTM-400DR radio is a popular choice among amateur radio operators due to its advanced features and capabilities. One of the optional accessories for this radio is the voice guide unit, which provides audible guidance and assistance to the user.

The voice guide unit for the FTM-400DR radio is known as the FGPS-2, and it is designed to help users navigate the various functions and settings of the radio. The unit provides audible prompts and guidance for menu options, frequency settings, and other important features of the radio.

The FGPS-2 voice guide unit is particularly useful for visually impaired or blind users who may have difficulty navigating the radio's controls and settings. It can also be helpful for users who are operating the radio in low-light or low-visibility conditions, as the voice prompts provide an alternative to visual feedback.

In conclusion, the FGPS-2 voice guide unit is an optional accessory for the Yaesu FTM-400DR radio that provides audible guidance and assistance to users. It is particularly useful for visually impaired or blind users, as well as those operating the radio in low-light or low-visibility conditions. If you are interested in purchasing this accessory, be sure to check with your local amateur radio dealer or online retailer for availability and pricing.

To learn more about Yaesu FTM-400DR, visit:

https://brainly.com/question/29577794

#SPJ11

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Marisol wants a data structure that is as flexible and controllable as possible. Which of these would be most appropriate?

A. primitive
B. Built-in
C. User-defined
D. String

Answers

Answer:

B. Built-in

Explanation:

You can modify built-in data structures like adding elements to an array and removing elements.

However, creating a data structure is more time-consuming such as manually sorting a list instead of using the built-in sort function.

the main work area of the computer is the

Answers

Answer:

Desktop

Explanation:

The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.

How does the team know what to work upon during the iteration? (1 correct answer)






1. The team participates in the iteration planning during which the Lead/Onsite coordinator/Facilitator decides who would work on that.





2. Based on the discussions during iteration planning, team members agree on what each would work on.





3. The Facilitator has regular interaction with the Product Owner. He/she guides the team on the tasks to be taken up.





4. Iteration plans are shared by Product Owner beforehand; any spill over from last iteration is taken up by default.

Answers

Answer:

2

Explanation:

In iteration, the entire team participates. A list of backlog and upcoming tasks is made and plan for the execution of these tasks is decided mutually.

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?


Storing digital photographs to be printed and displayed in a large format in an art gallery

Answer A: Storing digital photographs to be printed and displayed in a large format in an art gallery
A

Storing a formatted text document to be restored to its original version for a print publication

Answer B: Storing a formatted text document to be restored to its original version for a print publication
B

Storing music files on a smartphone in order to maximize the number of songs that can be stored

Answer C: Storing music files on a smartphone in order to maximize the number of songs that can be stored
C

Answer D: Storing a video file on an external device in order to preserve the highest possible video quality
D

Storing a video file on an external device in order to preserve the highest possible video quality

Answers

Storing music files on a smartphone in order to maximize the number of

songs that can be stored is most appropriate for choosing lossy

compression over lossless compression.

What is Lossy compression?

Lossy compression refers to a type of data compression which results in

the file size being small. Most times the quality is reduced as a result of

this .

This gives rise to more space being made available for the storage of more

song files which is why it is most appropriate.

Read more about Lossy compression here https://brainly.com/question/18806025

what is the type of software that locks your device until you pay a hacker to gain access again?

Answers

I’m not 100% sure, but I think it is Malware

describe the difference between serial and parallel processing.

Answers

Serial processing is a type of single task processing but Parallel processing is a type of multiple tasks processing.

What is the difference between serial and parallel processing?

Serial processing gives room for only one object at a time that is said to be processed, but parallel processing often takes in a lot of objects to be  processed simultaneously.

Therefore, Serial processing is a type of single task processing but Parallel processing is a type of multiple tasks processing.

Learn more about Serial processing from

https://brainly.com/question/21304847

#SPJ11

Does anybody have the answer for 2.19.6 checkerboard for codehs??

Answers

Answer:

speed(0)

penup()

setposition(-200,-200)

pendown()

def draw_square_row():

color_value = 0

for i in range (10):

if color_value %2 == 0:

begin_fill()

color("red")

for i in range (4):

forward(40)

left(90)

forward(40)

color_value = color_value + 1

end_fill()

elif color_value %2 == 1:

begin_fill()

color("black")

for i in range (4):

forward(40)

left(90)

forward(40)

color_value = color_value + 1

end_fill()

def draw_square_row_2():

color_value = 1

for i in range (10):

if color_value %2 == 0:

begin_fill()

color("red")

for i in range (4):

forward(40)

left(90)

forward(40)

color_value = color_value + 1

end_fill()

elif color_value %2 == 1:

begin_fill()

color("black")

for i in range (4):

forward(40)

left(90)

forward(40)

color_value = color_value + 1

end_fill()

def move_up_a_row():

left(90)

forward(40)

right(90)

backward(400)

for i in range (5):

draw_square_row()

move_up_a_row()

draw_square_row_2()

move_up_a_row()

Explanation:

tell me if you get it right

Does anybody have the answer for 2.19.6 checkerboard for codehs??
Other Questions
list out the ideas that help in maintaining social harmony in the community? expansionary fiscal policy that creates a budget deficit can lead to crowding out. this crowding out effect is exhibited by part 2 a. increased government expenditures and decreased interest rates. b. increased government expenditures and decreased investment. c. decreased government expenditures and decreased investment. d. increased taxes and increased investment. Will give brainlyistThe distance from New York City, New York, to Paris, France, is 3628 miles and the distance from New York City to London, England, is 3463 miles. Which distance is greater, and by how much? A. The distance between New York City and London is greater by 65 miles. B. The distance between New York City and Paris is greater by 65 miles. C. The distance between New York City and Paris is greater by 165 miles. D. The distance between New York City and London is greater by 165 miles. What is 2 3/8 divided by 1 1/4 On December 31, Year 1, Precision Manufacturing Inc. (PMI) of Edmonton purchased 100% of the outstanding ordinary shares of Sandora Corp. of Flint, Michigan.Sandoras comparative statement of financial position and Year 2 income statement are as follows:STATEMENT OF FINANCIAL POSITIONAt December 31Year 2Year 1Plant and equipment (net)US$6,600,000US$7,300,000Inventory5,700,0006,300,000Accounts receivable6,100,0004,700,000Cash780,000900,000US$19,180,000US$19,200,000Ordinary sharesUS$5,000,000US$5,000,000Retained earnings7,480,0007,000,000Bonds payabledue Dec. 31, Year 64,800,0004,800,000Current liabilities1,900,0002,400,000US$19,180,000US$19,200,000INCOME STATEMENTFor the year ended December 31, Year 2SalesUS$30,000,000Cost of purchases23,400,000Change in inventory600,000Depreciation expense700,000Other expenses3,800,00028,500,000ProfitUS$1,500,000Additional InformationExchange ratesDec. 31, Year 1US$1=C$1.10Sep. 30, Year 2US$1=C$1.07Dec. 31, Year 2US$1=C$1.05Average for Year 2US$1=C$1.08Sandora declared and paid dividends on September 30, Year 2.The inventories on hand on December 31, Year 2, were purchased when the exchange rate was US$1 = C$1.06.Assume that Sandora's functional currency is the U.S. dollar:(i) Calculate the Year 2 exchange gain (loss) that would result from the translation of Sandora's financial statements and would be reported in other comprehensive income. (Input all amounts as positive value. Omit currency symbol in your response.)(Click to select) Exchange gain Exchange loss C$ For a put option on a given security with a given expiration date, the value of the put is ______ when the exercise price is ______. Damage to the substantia nigra would be expected to producea. difficulty in color perception.b. changes in appetite leading to anorexia.c. difficulties in visual tasks.d. Parkinson-like motor symptoms.e. problems in speech perception. reits can invest in all of the following except: a mortgages b real estate c limited partnerships d other reits Solve the equation by finding the common multiple.three fourths minus two sixths plus seven twenty fourths equals blank seventeen twenty fourths eighteen twenty fourths nineteen twenty fourths twenty twenty fourths Which lines from natalie merchant's song "wonder" most likely inspired r. j. palacio to make august's character stared at wherever he goes in the novel wonder? Examining Cultural Variables in a Business LetterThese two versions of the same business letter were written by a sales manager for an American computer company. The first letter was addressed to a potential customer in the United States; the second version was addressed to a potential customer in Japan. The questions that follow ask you to think about how cultural variables affect the nature of the evidence, the structure of the letters, and their tone. London uses a third-person omniscient point of view in White Fang Gives the reader a deeper understanding of the story characters setting themes symbols An example of a mutualism, or +/+ relationship, is ________. cryptic coloration in frogs herbivory the relationship between bees and flowers the relationship between Virginia's warblers and orange-crowned warblers, which use some of the same resources solve for x : 3 + 3x = -33 Which choice shows three lengths that cannot be the lengths of the three sides of a triangle? 2 cm, 8 cm, 8 cm B. 2 cm, 3 cm, 6cm C. 4cm, 5 cm, 7 cm . D. S cm. 6 cm. 9 cm Change "The temple had trees planted around by the children" into active voice Topic: Foodborne disease outbreak. Answer: Find a food outbreak story that happened in the U.S in the last 50 years, share the link, and summarize the situation. Describe the effect on the business as a result of the outbreak. Was it fair or unfair? Help Me PleaseThanks Oxidation unit testPlease help ASAP. Which phrase best defines a redox reaction? (1 point)O a reaction in which oxygen combines with different atomsO a reaction in which electrons are transferred between different atomsO a reaction in which electrons are released from the systemO a reaction in which the number of oxygen atoms is reduced The language and religion of a people are physical features of a region.Please select the best answer from the choices providedTF