Which instruments do volcanologists use to predict volcanic eruptions?
A: Seismograph
B: Rain Gauge
C: Satellite
D: Airplane Equipped with Weather Devices

Answers

Answer 1

Answer:

A.) Seismograph

Explanation:

Scientists use seismographs to predict ground movement, which can cause earthquakes and volcanic eruptions

Hope this helps! Good luck!


Related Questions

Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.

Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.
Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.

Answers

For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.

How to write program in loop ?

A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.

A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.

We can write the code in a simple way like this below :

n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

 num = int(input("Enter number: "))

 if num % 3== 0:

     divisible += 1

     print(str(num)+" is divisible  by 3")

 else:

     notdivisible += 1

     print(str(num)+" is not divisible by 3")

print("You entered "+str(divisible )+" even number(s).")

print("You entered "+str(notdivisible )+" odd number(s).")

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Answer:n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

    divisible += 1

    print(str(num)+" is divisible  by 3.")

else:

    notdivisible += 1

    print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Explanation:

For that one that's I'm on python <3

Elena wrote the following code in scratch to have the sprite move and then turn around. however, the code does not work as expected. what should be done to fix the error?

change "move 20 steps" to "move 10 steps"
change "turn left 180 degrees" to "turn left 90 degrees"
change "turn left 90 degrees" to "turn right 180 degrees"
change "turn right 90 degrees" to "turn left 90 degrees"

Answers

The thing that Elena  need or should do  to fix the error is option  Change "turn right 90 degrees" to "turn left 90 degrees".

How is the  error going to be fixed?

Based on the question, we have the the  highlights which are:

The sprite is need to move forward and also turns aroundThe first line of the code segment moves the sprite 20 steps forward;This step is correct, and it does not need to be changed.

Based on the sprite turn, it is one that  need to rotate 360 degrees in a direction.

Based on the code segment, we have the below rotations:

180 degrees left90 degrees left90 degrees right

When the angles of rotation are added, we have:

180 + 90 - 90 = 90.

Therefore, The thing that Elena  need or should do  to fix the error is option  Change "turn right 90 degrees" to "turn left 90 degrees".

Learn more about error from

https://brainly.com/question/26561906

#SPJ1

You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?

Answers

Answer:

There must be a  proxy server that is not allowing access to websites

Explanation:

A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.

How is your day going?Technology affects the learning experience of students by helping them

get into the top colleges.
participate in sports.
communicate with friends.
prepare for a future career.

Answers

Answer:

is this technology or

Explanation:

computer

Answer:

communicate with friends.

Explanation:

bc i took it

A(n) ________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. Group of answer choices sustainable information virtualized agile

Answers

Information MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.

It includes the hardware, software, and telecommunications equipment that is used to store, process, and transmit information. Information MIS infrastructure is essential for any organization that relies on information to operate.

A strong information MIS infrastructure can help an organization to:

Protect its data from unauthorized access, use, or disclosure.Ensure the availability of information when it is needed.Maintain the integrity of information.Improve the efficiency of information processing.Support decision-making.The components of information MIS infrastructure include:

Hardware: This includes computers, servers, storage devices, and telecommunications equipment.

Software: This includes operating systems, applications software, and database management systems.

Telecommunications: This includes the network that connects the hardware and software.

Information MIS infrastructure is a critical component of any organization's IT system. By investing in a strong information MIS infrastructure, organizations can protect their data, improve their efficiency, and make better decisions.

To know more about network click here

brainly.com/question/14276789

#SPJ11


8. (a) Identify two advantages and four limitations of the Speech recognition devices.

Answers

Explanation:

Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it


4. 5 Facts about Alternating Current and direct current

Answers

Answer:

1. The Alternating current comes from a power plant. The direction of the electricity switches back 60 times every second.

2. Alternating current: The same amount of current flows through a circuit regardless of the direction of the current.

3. Direct current: Even when no current is flowing through the wire, the electrons in the wire are moving at speeds up to 600 miles (1000 kilometers) per second but in random directions because the wire has a finite temperature.

4. Direct current: As opposed to alternating current, the direction and amperage of direct currents do not change. It is used in many household electronics and in all devices that use batteries.

5.  Alternating current is five times more dangerous than Direct current. The frequency of the alternating current is the main reason for this severe effect on the human body. The frequency of 60 cycles is in an extremely harmful range. At this frequency, even a small voltage of 25 volts can kill a person.

Explanation:

You were conducting a forensic analysis of an iPad backup and discovered that only some of the information is within the backup file. Which of the following best explains why some of the data is missing

Answers

The backup being examined in this case is probably a differential backup that contains the data that has changed since the last complete backup.

How does forensic analysis work?

A thorough study to determine the cause, origin, perpetrators, and outcomes of a security event or a breach of company policy or federal law is known as forensic analysis. Particularly in criminal cases, forensic analysis is frequently associated with evidence presented to the court.

What is the work of a forensic analyst?

Forensic science technicians often perform the following tasks in labs: Analyze the forensic evidence you have collected from crime scenes using chemical, biological, and microscopic methods. Investigate potential connections between suspects and criminal conduct using DNA or other scientific analysis findings.

To know more about forensic analysis visit:

https://brainly.com/question/4327079

#SPJ4

How would the grain crusher work

Answers

Answer:

Grain crusher is used to crush various kinds of grains, peas, buckwheat, beans, corn, linseed seeds and etc. Crushed grains are usually used to feed ruminant animals. Crushed grain are easier to digest, nutrients are assimilated more easily.

list five function key
list two alphabet key
byEmmanuel okorie​

Answers

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

write a function number of pennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. ex: if you have $5.06 then the input is 5 6, and if you have $4.00 then the input is 4. sample output with inputs: 5 6 4

Answers

In the first example, when the input is `5 6`, it means there are $5.06. To calculate the total number of pennies, we convert the dollars to pennies by multiplying it by 100 (since there are 100 pennies in a dollar) and add the remaining pennies. So, in this case, the function would return 506.

In the second example, when the input is `4`, it means there are $4.00. Since no pennies are specified, we assume there are no additional pennies. Thus, the function would return 400.

To summarize, the function `number_of_pennies()` converts the given dollar amount and any additional pennies into the total number of pennies by multiplying the dollars by 100 and adding the remaining pennies, if any.

learn more about pennies here:

brainly.com/question/15602431

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

What do “phone-copying” systems allow investigators to do?
(Forensic Science class, digital forensic science)

20 points will give brainliest

Answers

Answer:

it allows them to be able to look at the recent things people done on it . i believe

It allows them to be able to look at the recent things people done on it . i believe.

What is Phone copying?

You can backup your iOS device using iCloud, or you may backup your Android device using system backup or Android backup tools.

In order to make sure nothing important is lost, you should additionally back up any particular data you're worried about losing, like family photos, on a different server.

You can use them to transfer your data to a new device if all you want to do is keep a complete copy of the info on your phone. You might need to request a new SIM card from your provider, though. To learn more about their policy, get in touch with their customer support team.

Therefore, It allows them to be able to look at the recent things people done on it . i believe.

To learn more about phone copying, refer to the link:

https://brainly.com/question/30284610

#SPJ3

What does this mean?

What does this mean?

Answers

Answer:

The network that the platform is running on is down. Wait about 30min, and then try again. You can also restart your device.

Explanation:

This used to happen to me all the time during school, but when I restarted my computer it always fixed it!

A 'sharp' is any object that can puncture a plastic bag. What is the recommended strategy for handling sharps (such as broken or chipped glassware) in lab

Answers

To reduce the risk of injury, always pick up shattered glass with a brush and dustpan, tongs, or forceps and drop it into a container intended for disposing of broken glass.

What is the suggested procedure for handling cracked or broken glass in a laboratory?

Glass that has broken should be cleaned up right away. A tiny brush and dustpan should already be present in a laboratory to clear up any minor spills. To pick up the smaller fragments of shattered glass, use forceps or duct tape.

How should broken glass be cleaned in a lab?

Use forceps, tongs, scoops, or other mechanical tools to remove or retrieve broken glass from a work area or a fume hood.

To know more about disposing visit:-

https://brainly.com/question/28234440

#SPJ4

The Remove Duplicates tool locates and deletes records that are duplicated across more than one field. Question 5 options: True False

Answers

The given statement "The Remove Duplicates tool locates and deletes records that are duplicated across more than one field" is true.

What is meant by Remove Duplicates?

Remove Duplicates option enables to easily delete duplicates from a data table. It is a common and often needed action that can be performed on a data table. One can locate and remove duplicates by following some simple steps.

Steps to remove duplicates:

Select the range of cells from which you want to remove duplicates and Click Remove Duplicates.

The dialogue box appears on the screen, click OK, and the duplicates will be removed.

The Remove Duplicates tool locates and deletes records that are duplicated across more than one field, which is true.

To know more about Remove Duplicates visit:

https://brainly.com/question/30245037

#SPJ11

Consider the following code segment. Int a = 10; int b = 5 * 2; System. Out. Print(a == b); What is printed as a result of executing the code segment?

Answers

The code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.

What is code?

Code is defined as a phrase used to describe text that a computer programmer has created utilizing the rules of a specific language. Computers can obey a set of instructions created through coding. Programmers can create programs, including websites and apps, by coding.

The piece of a program in an object file or in that contains executable instructions is referred to as a text segment, sometimes known as a code segment or simply as text.

Thus, the code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.

To learn more about code, refer to the link below:

https://brainly.com/question/497311

#SPJ1

When the supervisor-to-subordinate ratio exceeds a manageable span of control, additional Teams, Divisions, Groups, Branches, or Sections can be established. Which NIMS Management characteristic does this describe? Possible Answers:
a.Management by Objectives
b.Comprehensive Resource Management
c.Formal Communication
d. Modular Organization

Answers

This describes the Modular Organization characteristic of the National Incident Management System (NIMS). Modular Organization refers to the structure of an incident management organization that is divided into functional or geographical units, with each unit having defined responsibilities, resources, and reporting relationships.

Modular Organization is a structure used in incident management that divides the organization into functional or geographical units. Each unit has defined responsibilities, resources, and reporting relationships. This structure allows for efficient and effective response by managing the span of control within manageable limits and providing a clear chain of command and unity of effort. It is a key characteristic of the National Incident Management System (NIMS).

Learn more about Modular Organization: https://brainly.com/question/12774819

#SPJ4

If somebody is using a laptop at a coffee shop, how are they likely connected to a network?

Answers

If someone is using a laptop at a coffee shop, they probably have a snooping network connection.

What is the snooping?

The snooping refers to illegal access to someone else's or a company's data. Similar to eavesdropping, the method does not always involve intercepting data while it is being transmitted.

Snooping attacks include a hacker listening in on network communication between two workstations. Passing unencrypted passwords in traffic increases the risk of unwanted access to the network and data reading.

Snooping occurs for a variety of reasons. They might be curious or they might have been harmed in the past. But it's crucial to keep in mind that having a dialogue is always preferable to invading someone's privacy, and the moment you look through your partner's belongings, you lose credibility.

Therefore, it is snooping.

Learn more about the snooping, refer to:

https://brainly.com/question/27493229

#SPJ6

Early computing crash course computer science #1 paragraph

Answers

Answer:

But before we get into all that, we should start at computing’s origins, because although electronic computers are relatively new, the need for computation is not.So each bead on the bottom row represents a single unit, in the next row they represent 10, the row above 100, and so on.But if we were to add 5 more after the first 3 we would run out of beads, so we would slide everything back to the left, slide one bead on the second row to the right, representing ten, and then add the final 2 beads on the bottom row for a total of 12.So if we were to add 1,251 we would just add 1 to the bottom row, 5 to the second row, 2 to the third row, and 1 to the fourth row - we don’t have to add in our head and the abacus stores the total for us.Over the next 4000 years, humans developed all sorts of clever computing devices, like the astrolabe, which enabled ships to calculate their latitude at sea.As early computer pioneer Charles Babbage said: “At each increase of knowledge, as well as on the contrivance of every new tool, human labour becomes abridged.”

A10:A20 Refer to values in


Cell A10 and cell A20


The cell in column A and row 10


The range of cells in column A and rows 10 through 20


The range of cells in row 15 and columns B through #

Answers

Im trying to solve this problem

A10:A20 Refer to values in The range of cells in column A and rows 10 through 20. Thus the correct option is C.


What is a cell in excel?

The rectangles that make up an Excel worksheet's grid are called cells. A worksheet's references, the column letter, and the row number that intersect at the cell's location serve as a means of identifying each cell.

A, B, and C serve as column numbers, whereas digits serve as row identifiers (1, 2, 3). Depending on the column and row, each cell has a unique name or cell address.

In the given case, the values of A10:A20  is being asked which indicates that In column A the range of cell 10 to 20 is written as A10: A20.In other words, the cell is written as intersection Column  D to Row 5 the cells will be D5.

Therefore, option C is appropriate.

Learn more about Excel, here:

https://brainly.com/question/1380185

#SPJ6

you are troubleshooting a windows 10 laptop that is infected with malware. you have already identified the type of malware on the laptop. what should you do next? (select three)

Answers

: The use of multifactor authentication is regarded an enterprise pleasant practice for both computer systems and smartphones.

Which is a common method used to specify the sources a consumer is allowed to access?

Authorization is a procedure through which a server determines if the purchaser has permission to use a resource or get admission to a file. Authorization is commonly coupled with authentication so that the server has some thought of who the client is that is inquiring for access.

How can you mitigate or minimize the danger of data loss inclusive of controls on the data?

How to forestall information loss

Regularly time table "fire drills" to restore statistics from backup. ...

Keep computer systems in safe, dry and dust-free areas. ...

Back up data regularly. ...

Have a generator or battery back-up system. ...

Protect gear from static electricity that can erase statistics or injury components.

Learn more about troubleshooting here;

https://brainly.com/question/14394407

#SPJ4

In 2-5 paragraphs, compare and contrast paraphrasing and summarizing.

Answers

Answer:

Paraphrasing

Explanation:

Although the two are often confused, there is actually quite a big difference between them. When you summarize the text you are reading, you are simply giving a general outline of the story or article, briefly touching on main events or main points. Little in-depth information should be given. A summary should be 1/3 the length of the original.  

A paraphrase, on the other hand, can be more detailed. But you do have to be cautious of plagiarism with this one. In your own words and your own sentence structure, you are retelling the text as if recounting a story you heard from someone else. But it is your own writing. When possible, unless using necessary proper nouns, use completely different wording. Using synonyms of the same words will still be considered plagiarism. Similar sentence structure can also be plagiarism. If the original text uses many compound sentences, find a way to use simple sentences, complex sentences, and compound-complex sentences sparingly.

Answer:

Although the two are often confused, there is actually quite a big difference between them. When you summarize the text you are reading, you are simply giving a general outline of the story or article, briefly touching on main events or main points. Little in-depth information should be given. A summary should be 1/3 the length of the original.  

A paraphrase, on the other hand, can be more detailed. But you do have to be cautious of plagiarism with this one. In your own words and your own sentence structure, you are retelling the text as if recounting a story you heard from someone else. But it is your own writing. When possible, unless using necessary proper nouns, use completely different wording. Using synonyms of the same words will still be considered plagiarism. Similar sentence structure can also be plagiarism. If the original text uses many compound sentences, find a way to use simple sentences, complex sentences, and compound-complex sentences sparingly.

Explanation:

What is the full form of UNIVAC, QBASIC?​

Answers

UNIVersal Automatic Computer (UNIVAC)

Quick Beginner's All-Purpose Symbolic Instruction Code (QBasic)

Explanation:

UNIVAC:Universal Automatic Computer

QBASIC:Quick Beginner's All-Purpose Symbolic

Instruction Code

Keep smiling and hope u r satisfied with my answer.Have a great day :)

which statement is true of domain-specific self-esteem in adolescents? group of answer choices the best domain-specific predictor of global self-esteem in adolescents is their athleticism. the best domain-specific predictor of global self-esteem in adolescents is their ability to be outgoing. the best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness. the best domain-specific predictor of global self-esteem in adolescents is their perception of their agreeableness.

Answers

The best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness.

What is global self-esteem?

Global self-esteem is the individual’s overall evaluation of their own worth and capabilities. It is the ability to recognize one’s own value and accept that value as a positive attribute. Self-esteem is connected to how one views themselves and their place in the world.

Research has shown that physical appearance is a major factor in adolescents' global self-esteem, with a greater emphasis on physical attractiveness leading to higher self-esteem. Other factors such as athleticism, agreeableness, and being outgoing may influence self-esteem, but physical attractiveness is the strongest predictor of global self-esteem in adolescents.

To learn more about physical appearance
https://brainly.com/question/30473252
#SPJ1

An AttributeError occurs if a function does not exist in an imported module. Fill in the missing code to handle AttributeErrors gracefully and generate an error if other types of exceptions occur.
import my_lib
try:
result = my_lib.magic()
SOLUTION:
print('No magic() function in my_lib.')

Answers

Since An AttributeError occurs if a function does not exist in an imported module, the missing code to handle is except AttributeError.

How may AttributeError be fixed?

When an attribute reference or assignment fails, the Python AttributeError exception is thrown. When an attribute reference attempt is made on a value that does not support the attribute, this can happen.

Therefore, in using a try-except block, the AttributeError can be fixed. The try block should contain the lines of code that potentially throw the AttributeError, and the except block can catch and handle the problem.

Hence the use of except AttributeError is the mising code.

Learn more about AttributeError from

https://brainly.com/question/29431784
#SPJ1

How are “cells” in a spreadsheet formed?

Answers

Cell: A cell is a rectangular area formed by the intersection of a column and a row. ... For example the cell in Column "C" in Row "3" would be cell C3. Column: Columns run vertically on the spreadsheet screen. An Excel spreadsheet contains 256 columns that are labeled with the letters of the alphabet.

Answer:

Mitosis

Explanation:

New cells are created from a process called cell division. The new cells are produced when a cell, called the mother cell, divides into new cells called daughter cells. When two daughter cells have the same number of chromosomes as the original cell, the process is called mitosis.

the ratio of length, breadth and height of a room is 4:3:1. If 12m^3 air is contained in a room, find the length , breadth and height of the room​

Answers

Explanation:

The ratio of length, breadth and height of a room is 4:3:1

Let length = 4x

Breadth = 3x

Height = x

Volume of air contained in the room, V = 12 m³

We need to find the length, breadth and height of the room. The room is in the shape of a cubiod. The volume of a cuboid is given by :

V = lbh

\(4x\times 3x\times x=12\\\\12x^3=12\\\\x=1\)

Height of the room = 1 m

Breadth of the room = 3x = 3 m

Length of the room = 4x = 4 m

Absolute cell adressing

Answers

When copying a formula from one cell to another in Excel, an absolute reference is a cell reference where the column and row coordinates remain constant.

What is excel?

Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Data analysts and other users can make information easier to view as data is added or changed by organising data using software like Excel.

Cell references come in two flavours: absolute and relative. When copied and filled into other cells, relative and absolute references behave in different ways.

A formula's relative references are altered when it is copied to another cell. Contrarily, regardless of where they are duplicated, absolute references hold true.

When a specific cell reference needs to be constant, an absolute cell reference can be used. Formulas, charts, functions, and other instructions frequently use references to cells in their syntax.

Thus, this can be concluded regarding absolute cell addressing.

For more details regarding absolute cell addressing, visit:

https://brainly.com/question/30443246

#SPJ1

Other Questions
If a balloon full of nitrogen gas is submerged from the surface of a pool to the bottom of that same pool, what will happen as the pressure on the balloon increases? show all workshow all work15. and is in Quadrant III, find tan cot 0 + csc 3 a) If cos 0 = b) Express tan 8 in terms of sec 0 for 0 in Quadrant II (10 points) Question 21 pThe muffins for today's menu are peaked and have air pockets According to the EPAs waste hierarchy, what are the two leastpreferred methods of waste disposal? What are 2 potential negativeimpacts of each of those methods? A = 1 2 -2 3 2 4 10 4 B = 3 -1 1 5 3 1 2 (AB)2,1 (a) Without computing the whole matrix, find (AB)1,2, (b) Do (AB)2,3 and (AB)3,2 exist? If so, find them. (c) Does BA exist? (d) Find CA, C R. Help please. Janmir Parker - Achieve3000 The Lowdown on Lowriders.pdf Thought Question Suppose you are building a one-of-a-kind lowrider bicycle that reflects your own creative style. Write a story about the bike, including its artwork and features, as well as your experience building it. Include details from the Article to support your ideas what is an synonyme for see you later in french Four newly married couples are dancing at a function. The selection of the partner is random. The number of ways that exactly one husband is not dancing with his own wife is: Each time you fill your gas tank, make a routine check of * 4 points a. all fluid levels. b. tires, coolant, and windshield wiper fluid. c. oil and air filters. d. the electrical system. Need help with this question A loop of wire turns between two permanent magnets in a generator. What is the effect of this motion. two buildings are built 10m apart. *the angle of depression from the top of the shorter building (y) to the foot of the taller building (p) is 53. *the angle of elevation from the top of the shorter building to the top of the taller building (x) is 28. *calculate the height (xp) of the taller building. page 262 trigonometry topic 11 of text book How many milliliters of 0.0991 mkoh are required to titrate 25.0 ml of 0.0839 mhbr to the equivalence point? which is a primary contributing factor for the risk-taking behavior for school-aged children? hesi find all time(s) when the object is at a height of 200 feet. round your answer(s) to the nearest tenth of a second. Help !!!!!!!!!!!!!!!!!!!!!!! Explain Common sense, its impact, and the name of the author who wrote it. Two boxes inside a larger box both have five boxes inside them. How many boxes are there in total? PLEASE HELP add a line of xml so that the text displayed is the value of a string named book (defined in strings.xml). A D-negative mother gives birth to a baby that tests as D-negative in the immediate spin phase. What step should be performed next