where would be the best place to use mobile office networking? (choose two) question 27 options: construction sites disaster relief warehousing ptmp bridges ptp bridges

Answers

Answer 1
Construction sites and Warehousing.

Related Questions

Question 1 Choose one IT Project of your own and answer the question that follows: NB: Only IT project examples are accepted. Q.1.1 Briefly explain your project highlighting the end product, expected

Answers

The main answer to the question is that my IT project aims to develop a mobile application for task management.

What is the focus of your IT project and what does it aim to develop?

My IT project revolves around the development of a mobile application specifically designed for task management. The end product of this project will be a user-friendly and intuitive app that allows individuals and teams to efficiently organize and track their tasks. The application will offer features such as creating tasks, setting deadlines, assigning tasks to team members, tracking progress, and generating reports.

By providing a centralized platform for task management, the app aims to enhance productivity, streamline workflows, and improve collaboration within organizations. It will be compatible with both Android and iOS platforms, ensuring wider accessibility to users. Through a clean and intuitive user interface, the app will simplify the process of task management and empower users to stay organized and achieve their goals effectively.

Learn more about project

brainly.com/question/19569405

#SPJ11

What is the best sequence of Asimov’s laws and why?

Answers

Answer:

According to this law of Asimov robotics, 'a robot will not harm humanity or through any inaction will allow humanity to come to harm'. This law actually supersedes all the laws he mentioned in his science fiction novel.

Write a python code using tracy turtle to draw the following shape

Write a python code using tracy turtle to draw the following shape

Answers

Answer:

import turtle

t = turtle.Turtle()

R = 20

N = 8

def rect(x,y,w):

 t.penup()

 t.setpos(x,y)

 t.pendown()

 for _ in range(4):

   t.left(90)

   t.forward(w)

rect(0,0,R*N)

rect(R*N,0,R*N)

rect(0,-R*N,R*N)

rect(R*N,-R*N,R*N)

for x in range(1,N+1):

 t.penup()

 t.setpos(0,-R*x)

 t.pendown()

 t.circle(R*x)

Explanation:

Not a turtle expert, but this seems to do the job.

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

The ignition system pickup coil or trigger is usually electrically connected to the ________. group of answer choices

Answers

The ignition system pickup coil or trigger is usually electrically connected to the ignition control module or ignition control unit. The pickup coil generates a signal that is sent to the ignition control module, which then controls the firing of the spark plugs.

The ignition control module determines the timing and duration of the spark, based on inputs from various sensors such as the crankshaft position sensor and the camshaft position sensor. The ignition control module also communicates with the engine control unit (ECU) to ensure optimal engine performance. This electrical connection between the pickup coil and the ignition control module is crucial for the ignition system to operate effectively and accurately time the spark ignition in the engine.

To know more about ignition system, visit:

https://brainly.com/question/14094081

#SPJ11

In the current situation, how do you access information as a student? How will you integrate the use of ICT in your daily life and your chosen track?

Answers

Answer:

Explanation:

As a computer science student information is accessed in every possible way. This can be through a local school lan network, mobile devices, e-mail, etc. All of these help information flow to and from various people and makes obtaining this information incredibly simple as a student. Especially in the field of computer science, I need to integrate as many ICT devices with me in my everyday life, to send emails, check calendar updates, research information on the web, check school reports, and even speak with clients.

Which three of the following will be printed?

c = 7

while (c > 0):
print(c)
c = c - 3
Group of answer choices

0

1

3

4

5

6

7

Answers

In the above code snippet, The following numbers will be printed:

7

4

1

What is the explanation for the above?

The initial value of c is 7, which is greater than 0, so the loop starts. The print(c) statement inside the loop prints the current value of c, which is initially 7. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes 4.

On the second iteration of the loop, the condition c > 0 is still true, so the loop continues. The print(c) statement inside the loop prints the current value of c, which is now 4. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes 1.

On the third iteration of the loop, the condition c > 0 is still true, so the loop continues. The print(c) statement inside the loop prints the current value of c, which is now 1. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes -2.

On the fourth iteration of the loop, the condition c > 0 is false, because c is now -2, so the loop ends. Therefore, only 7, 4, and 1 will be printed.

Learn more about code at:

https://brainly.com/question/30772469

#SPJ1

Identify the correct software or hardware applications in the passage below

Answers

Answer: software is a generic term used to refer to applications scripts and programs that run on a device.

Explanation:

which graphic is used to compare data or outline a detailed topic, such as a schedule or menu, in a compact format, and presents related information in rows and columns?

Answers

When the data analyst commences the morph data phase of analysis on a dataset, he or she will do two things: find the correlation between data and perform calculations on data. As a result, options c and d contain the correct answers.

What is data analysis?

Data analysis has been known as the process of the examining data sets in order to discover trends and draw conclusions about the information contained in the data sets.

The transform phase has a data analysis phase in which a data analyst identifies trends and connections between various data sets.

To accomplish this, the data analyst searches for correlations between various data sets and performs calculations on them.

Therefore, c and d are correct options.

For more details regarding data analysis, visit:

brainly.com/question/28840430

#SPJ1

Your task is to calculate the beta of a stock of your choice indexed against the S\&P 500 . See an example here: Chapter 10 in-Class Projectipdf ↓ Create everything in a spreadsheet and compute the beta of the stock using both a regression analysis and SLOPE function in Excel. Then, compare back to the beth from three websites. Cite your sources and explain your findings.

Answers

Beta is a statistical measure that measures a stock's price volatility in comparison to the market as a whole. The Beta coefficient is calculated by measuring the relationship between a stock's returns and the returns of the market. It calculates how a stock price will fluctuate as the market fluctuates.

Here are the steps to calculate the beta of a stock of your choice indexed against the S&P 500 using both a regression analysis and the SLOPE function in Excel.Step 1: Gather the stock price data for the stock and the S&P 500 for the same time period.Step 2: Plot the data for the stock and the S&P 500 in a scatter plot in Excel. The X-axis should be the S&P 500 returns, and the Y-axis should be the stock returns.Step 3: Using Excel, find the slope of the trend line for the scatter plot. This is known as the beta coefficient, and it is calculated using the SLOPE function. The formula for the SLOPE function is:SLOPE (known_y’s, known_x’s)The known_y's are the stock returns, and the known_x's are the S&P 500 returns.Step 4: Calculate the R-squared value of the trend line. This value will help you determine how well the trend line fits the data. An R-squared value of 1 means that the trend line perfectly fits the data, while an R-squared value of 0 means that the trend line does not fit the data at all.Step 5: Compare your beta value with the beta values from three websites to determine how accurate your calculation is. The three websites could be Finance, and Reuters Finance. Cite your sources and explain your findings.

Learn more about market fluctuates here :-

https://brainly.com/question/28213053

#SPJ11

Write a program that asks the user to enter the name of an input file. If the file does not exist, the program should prompt the user to enter the file name again. If the user types QUIT in any uppercase/lowercase combinations, then the program should exit without any further output.

Answers

Answer:

I can help you with that inbox me

4.8 Code Practice: Question 2

Answers

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation;

yw

1. You are being asked to write a pseudocode to calculate the gross pay for five (5)
employees.
The user should enter:
✓ the employee’s name
✓ the level of the employee
✓ the number of hours worked
NB Hours worked in excess of the normal 40 hours are paid overtime at 1.5 times the
employee's hourly pay rate
Display the name of the employee, number of hours worked and the gross pay.

Answers

Here is the pseudocode to calculate the gross pay for five employees:

START Initialize employee name, employee level, hours worked, and overtime rate values to 0

Set overtime rate to 1.5Set normal working hours to 40

FOR i = 1 TO 5    OUTPUT "Enter employee name"    INPUT employee name    OUTPUT "Enter employee level"    INPUT employee level    OUTPUT "Enter number of hours worked"    INPUT hours worked    IF hours worked > normal working hours THEN        SET overtime hours to hours worked - normal working hours        SET gross pay to (normal working hours * employee level) + (overtime hours * employee level * overtime rate)    ELSE        SET gross pay to hours worked * employee level    END IF    OUTPUT "Employee name: ", employee name    OUTPUT "Hours worked: ", hours worked    OUTPUT "Gross pay: $", gross payNEXT i

The above pseudocode will calculate the gross pay for each employee by taking into account the hours worked and the employee level.

If an employee works more than 40 hours, then the overtime rate will be applied to their pay rate to calculate their gross pay. The name of the employee, number of hours worked, and the gross pay will be displayed for each employee.

For more such questions on pseudocode, click on:

https://brainly.com/question/24735155

#SPJ8

Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?

Answers

Answer:

I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.

Explanation:

I went into the PowerPoint and did it myself.

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

1.How do we insert pictures in a word document ?
2.How to print a document in a word document? ​

Answers

Answer:

Explanation:

Place your insertion point where you want the image to appear.

Select the Insert tab.

Click the Picture command in the Illustrations group. The Insert Picture dialog box appears.

Select the desired image file, then click Insert to add it to your document. Selecting an image file.

Python
Write a function that calculates a cell phone bill
First screenshot of rules and such
Second screenshot is example of outcome

PythonWrite a function that calculates a cell phone billFirst screenshot of rules and suchSecond screenshot
PythonWrite a function that calculates a cell phone billFirst screenshot of rules and suchSecond screenshot

Answers

print("welcome to the bill calculator")

minutes = float(input("number of minutes you used: "))

data = float(input("the amount of data you used in GB: "))

print("your basic plan costs $39.99 per month")

mcost = (minutes - 450) * .45

print("you will be charged " +  str(mcost) + " for the minutes you used")

print("the monthly data fee is $30.00")

dcost = (data - 3) * 10

print("you will be charged " + str(dcost) + " for the extra data you used")

total = mcost + dcost + 69.99

print("your total bill is " + str(total))

the 20 value your teacher gave may be incorrect, bc 4.2-3*10 = 12 not 20, making the total 109.89

When the CPU performs the work described in the commands,
this stage is known as
A.) execute.
B.) fetch.
C.) store.
D.) decode.

Answers

Answer:

(A) execute

This is the answer

Brainliest?? no way right?

an array that can be sized and bound at runtime is a question 20 options: a) static array b) fixed stack-dynamic array c) stack-dynamic array d) fixed heap-dynamic array e) none of the above

Answers

An array that can be sized and bound at runtime is a stack-dynamic array. The correct answer is option c.

A stack-dynamic array, also known as a dynamic stack or a resizable stack, is a type of data structure that provides a stack interface while using a dynamic array as its underlying storage.

A stack is a linear data structure that follows the Last-In-First-Out (LIFO) principle, meaning that the last element added to the stack will be the first one removed. A dynamic array, on the other hand, is a type of array that can be resized during runtime, allowing for more efficient memory usage and flexible data storage. By combining these two concepts, a stack-dynamic array can grow or shrink dynamically as elements are pushed onto or popped off of the stack. This allows for efficient memory usage and avoids the need to pre allocate a fixed amount of memory for the stack, which can lead to wasteful memory usage if the stack does not reach its maximum capacity.

Learn more about stack-dynamic array here: https://brainly.com/question/29216876

#SPJ11

Complete the following statement by selecting all possible answers.
A router sends data

to the correct computer.

to all computers.

where it should go.

based on the data’s destination.

in a loop.

Answers

Answer:

to the correct computer

where it should go

based on the data's destination

Explanation:

took the assignment on edg :)

Answer:

to the correct computer

where it should go

based on the data's destination

Explanation:

Carol is working on her family farms to produce better variety of crops which have higher yields which process should carol use to create a better variety of crops?

Answers

Answer:

Genetic engineering

Explanation:

Answer:

B - Crop Rotation

Explanation:

You have just plugged a USB hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk hardware has not been recognized by the computer. What utility would you use to verify??

Answers

Answer:

Device Manager and Disk Management

Explanation:

There are two main utilities that can be used to solve this problem. The main one being device manager. This utility will show you any and all devices connected to the computer. This includes USB hard drives. If it is detected and has a driver installed it will show up in Device Manager. From here you can also change the drivers, disable/enable it, etc. If the device is not listed in Device Manager then you can use the Disk Management utility to check if it is listed there. This can sometimes happen when the disk does not have a proper drive letter, which can be adjusted in Disk Management. Both of these utilities are built-in to windows operating systems.

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Issues of transparency, technology, and choice are examples of choices related to the _____ strategy choice of total compensation.

Answers

Issues of transparency, technology, and choice are examples of choices related to the management strategy choice of total compensation.

As a business owner, you have a lot of choices to make when it comes to compensation. You can choose to be transparent with your employees about how much they're being paid, or you can keep that information private. You can also choose to invest in technology that will help you keep track of compensation, or you can do things the old-fashioned way.

Ultimately, the choice of how to manage compensation is up to you. But whatever you choose, you should be aware of the implications. If you're not transparent about compensation, your employees may feel like they're being treated unfairly. And if you don't invest in technology to manage compensation, you may find yourself falling behind the competition.

At the end of the day, it's important to choose a compensation strategy that's right for your business. There's no one-size-fits-all solution, so take the time to figure out what will work best for you.

Learn more on technology here:

https://brainly.com/question/7788080

#SPJ4

Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue​

Answers

Some of the options in this question are not correct; here is the correct and complete question:

In order for a fictionalized story to be based on real events, the author should include

A. Characters with strong feelings

B. Historical material

C. A narrator

D. Dialogue​

The correct answer is B. Historical material

Explanation:

Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.

According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.

How to fix Retrieving data, wait a few seconds and try to cut or copy again?

Answers

To fix Retrieving data
1. Restart your computer.

2. Try another program to cut or copy the data.

3. Check for any available updates for the program you are using.

What is program  ?

Programming is the process of creating instructions that tell a computer how to perform a task. Programming involves tasks such as analysis, generating algorithms, profiling algorithms' accuracy and resource consumption, and the implementation of algorithms in a chosen programming language (commonly referred to as coding). The source code of a program is written in one or more programming languages. The purpose of programming is to create a program that performs specific operations or exhibits desired behaviors.

To know more about program
https://brainly.com/question/11023419
#SPJ4

the siri personal assistant application on apple's iphone 5s is an example of a ________.

Answers

The Siri personal assistant application on apple's iPhone 5s is an example of a natural language processing (NPL) system.

What is a natural language processing system?

Scaling other language-related jobs is accomplished through the use of natural language processing, which enables computers to speak with people in their own language. As an illustration, NPL enables computers to read text, hear the voice, understand it, gauge sentiment, and identify the key points.

While the science of natural language processing(NPL) is not new, the technology is growing quickly as a result of a rise in interest in human-to-machine communication, as well as the availability of massive data, powerful computation, and improved algorithms.

To learn more about natural language processing system, use the link given
https://brainly.com/question/14222695
#SPJ1

What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?

Answers

0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
7093
3907
9073
3709
7093
7039
0793
0973
9307
3097
3970
9703
9730

The Boolean operator NOT _____ terms from a search query.
A. eliminates
B. isolates
C. standardizes
D. includes

Answers

Answer:

eliminates

Use NOT in a search to: eliminate words from your search.

Other Questions
Whats diction means? Calculate Delta H r* n for Ca(s) + 1/2 * O_{2}(g) + C*O_{2}(g) -> CaC*O_{3}(s) QUESTION 10 Put these SDLC phases in the correct order. Deploying and evaluating the system Requirements: Speak to the customer, analyze system needs Developing and documenting software Designing the recommended system Testing and maintaining the system COMPLETE SUSANA'S SENTENCES ABOUT HER FAMILY WITH THE CORRECT FORMS OF THE VERBS IN PARENTHESES. ONE OF THE VERBS WILL REMAIN IN THE INFINITIVE!!!Mi familia y yo___ (vivir) en Madrid. Tengo muchos libros. Me gusta ____(leer). Mi hermano Alfredo es muy inteligente. Alfredo _____(tener) clases los lunes y viernes. Los martes y jueves Alfredo y yo _____(correr) en el parque. Mis padres _____(comer) mucha pasta los domingos. Yo _______(creer) que mis padres ____(deber) comer menos. Answer the question below acceptance sampling, a sample of items is randomly selected without replacement and the entire batch is accepted if every item in the sample is okay. the abc electronics company has just manufactured 2100 write-rewrite cds, and 50 are defective. if 3 of these cds are randomly selected for testing, what is the probability that the entire batch will be accepted? this includes evaluate numerica expressions Quick please its for a test today what the definition of The project charter? I am MrBeast and if you can guess what number I am thinking of between 1 and 100 I will give $10,000. Comment or answer. Where are Sancho and Bolsa in this scene?O at the hospitalO at the zooO at Mrs. Morningstar's house A 50-year-old father has a daughter and a son. The son is 4 years older than his sister. In 8 years the age of the father will be equal to the sum of the ages of his children. What is the agerespective of these children? of the following, which is a valid c identifier? group of answer choices june1997 employee number myextralongvariablename all of the above are valid identifiers. department a sustainable diet that is higher in legumes, whole grains, nuts, seeds, fruit, and vegetables reduces the risk of developing and reduces the environmental costs of producing food. (a) Points and are shown on the number line. Part A Find the distances between points and and between points and . Show your work or explain your answers. Refer to the number lint in your explanation. Enter your answers and your work or explanation in the box provided. Select two phrases Ovid uses in Passage 1 to show that Pyramus and Thisbe experience a shared love."A thing which they could not forbid, they were both inflamed, with minds equally captivated. There is no one acquainted with it; by nods and signs, they hold converse. And the more the fire is smothered, the more, when so smothered, does it burn. The party-wall, common to the two houses, was cleft by a small chink, which it had got formerly, when it was built. This defect, remarked by no one for so many ages, you lovers (what does not love perceive?) first found one, and you made it a passage for your voices, and the accents of love used to pass through it in safety, with the gentlest murmur. Oftentimes, after they had taken their stations, Thisbe on one side, and Pyramus on the other, and the breath of their mouths had been mutually caught by turns, . . ." (paragraph 1) A bag contains 26 letters and 10 numerals. Robin draws two cards from thebag. What is the probability that she draws 2 numerals? Find the length of the third side of each triangle. Determine the molecules in 237 g CCI4 software application used to calculate the exchange of currency