4) Emma wants to create a web page for her school's volleyball team. Which of these could she use?

A) Weebly

B) Chrome

C) Alta Vista

D) SEO

Answers

Answer 1

The correct answer for the given option is A. Because Weebly is a means to create a website, the other options are all search engine website

What is Weebly?

Weebly itself is a platform that can be used to create a blog or website for free or for a fee. Weebly has the advantage of having a simple interface design that is easy for users to understand. In addition, the features offered are also varied, making it easier for users to design their own website or blog. For those of you who understand web development, you can still change template settings and edit the CSS and HTML code.

This website builder can indeed be relied on by beginners or even someone who is already a professional. However, for its use, Weebly is ideal for small businesses, personal websites, or online stores. Launching from its official website, currently Weebly has been used by more than 40 million users worldwide. So, there is no need to doubt this website that this website builder has guaranteed quality.

Learn more about website builder at: https://brainly.com/question/16445466

#SPJ1


Related Questions

What is a minimum security satellite camp?

Answers

A minimum security satellite camp is a type of federal correctional facility that is typically less restrictive than a traditional prison. These camps are often used to house inmates who pose a low risk of escape or danger to the community.

What is Satellite?

A satellite is a celestial body that orbits around another celestial body. There are two main types of satellites: artificial satellites, which are man-made, and natural satellites, which occur naturally.

Artificial satellites are used for a variety of purposes, such as communication, navigation, and weather forecasting, while natural satellites are primarily used for scientific study.

To learn more about Satellite, visit: https://brainly.com/question/27913592

#SPJ4

g what is the information processor in an instrument for measuring the color of a solution visually

Answers

The human brain serves as the information processor in a system for visually determining the hue of a solution.

What makes it a transducer?

Energy is converted from one form to another by a transducer, a piece of electronic equipment. Energy is transformed from one form to another through the process of transduction. Loudspeakers, microphones, thermometers, and LEDs are just a few examples of the many different types of transducers.

Why do you use the word "transducer"?

Energy is converted from one form to another by a transducer, a piece of electronic equipment. Typical examples include thermometers, loudspeakers, position and pressure sensors, and antenna. This signal is converted into a set of figures that can be seen on a readout.

To know more about processor visit:-

https://brainly.com/question/28902482

#SPJ4

when the computer is started, a bootstrap program begins testing the system hardware. where is this bootstrap program stored?

Answers

The ROM is the most practical site to store the bootstrap because it is a fixed location, requires no initialization, and cannot be infected by a computer virus because it is read-only memory.

What is the purpose of Bootstrap?

A free and open source front-end development framework called Bootstrap is used to build websites and web applications. Bootstrap offers a collection of vocabulary for template designs and is designed to enable responsive construction of mobile-first websites. The most widely used CSS framework for creating responsive and mobile-first websites is Bootstrap. It is simple to use and saves developers a tonne of time by eliminating the need to manually write HTML, CSS, and JavaScript code. Almost any requirement for front-end website development may be met by the Bootstrap framework because it is sturdy and versatile. Bootstrap is a set of CSS classes and JavaScript functions used to develop responsive, mobile-first websites and applications.

Learn more about the Computer here: brainly.com/question/28498043

#SPJ4

1. what are six types of video ports?

Answers

Answer: HDMI, DVI, VGA, DisplayPort (DP), USB-C, Thunderbolt, SDI.

an admin at universal containers wants to map configuration attribute values to the quote line in a customer's product catalog. assuming the field mapping is correct, which setup will prevent the configuration attribute value from being stored on the non-bundle quote line?

Answers

A setting in the configuration: even if those values aren't displayed in your line editor field set, applies its value to the fields in your bundle. inherits the field's type as its own.

Targeting a picklist, for instance, causes the configuration attribute to display as a picklist containing all of the values for the targeted field. Oracle CPQ is a cloud-based tool that assists sellers in configuring the ideal combination of goods or services and producing precise, expert estimates to promptly satisfy the pricing objectives of their clients. On new quotes, quotes up for renewal, and quotes that have been amended, Salesforce CPQ applies the agreed pricing. The effective amount field for the quote line displays the quantity actually used by Salesforce to determine prices for that quote line.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

Intermediate repair of a laceration is coded when layered closure is required. True or False?

Answers

When layered closure is necessary, an intermediate repair of a laceration is coded. True .

What does a wound closure with layers mean?

The term "layered" repair often refers to the use of absorbable sutures to cover dead space (where else infection or an abscess may form) and to release stress on the epidermis.

(CPT codes 12031–12057) Intermediate repair The treatment of a wound that, in addition to the requirements for basic repair, needs a layered closure of one or more of the deeper layers of subcutaneous tissue and superficial (non-muscle) fascia in addition to the skin falls under the category of intermediate wound repair.

To know more about  laceration visit:-

https://brainly.com/question/10448206

#SPJ4

which user group in windows (applies to windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?

Answers

Answer:

administrator group

Explanation:

The members of this group have full control over the computer, including the ability to install, configure, and manage software, create and manage user accounts, and access and modify system settings and configuration. They can also take ownership of files and folders, and change permissions on them. This group is granted with the highest level of access and control to the computer and resources, and it's intended to be used for users that are responsible for maintaining and managing the system.

a user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. what is the best way to respond to this situation?

Answers

Answer:

Escalate the interaction to the next level of customer support and politely inform the customer.

PLEASE PLEASE PLEASE I NEED HELP!!! 15 POINTS!!

Moore's law is the observation that the number of transistors in a dense integrated circuit doubles about every two years. Research Moore's law and answer this question: Do you believe that transistors will continue to double as observed by Moore, or will the trend slow down? Why?

Answers

Moore's Law is the observation that the number of transistors on a microprocessor doubles about every 18 to 24 months. The trend of Moore's Law has been observed to hold true for several decades, but it is expected to slow down in the future. There are several reasons for this.

What were the reasons?

One reason is that as transistors get smaller, they become more difficult and expensive to manufacture. As the size of transistors approaches atomic scales, the laws of physics begin to limit the ability to further shrink transistors.

Another reason is that as the number of transistors on a microprocessor increases, the power consumption and heat generated by the chip also increases, which can limit the performance of the chip.

Read more about Moore's law here:

https://brainly.com/question/28877607

#SPJ1

Show the value of all bits of a 12-bit register that hold the number equivalent to decimal 215 in (a) binary; (b) octal; (c) hexadecimal; (d) binary-coded decimal (BCD)

Answers

The sum of all the bits in a 12-bit register holding the binary representation of the number 215 in decimal form.

How many digits are in 12 bits?

There are 4096 (212) distinct numbers that a 12-bit digital value can represent. The number of possible representations for a 16-bit digital value is 65536 (216). You may realize at this point that a digital input can be compared to a 1-bit analog-to-digital converter.

How come 1024 bytes equal 1 MB?

1 MB is equivalent to 1024 Kilo Bytes, or KB, in digital units of measurement. Knowing these measurement units and their conversions is crucial since they support the safekeeping of our sensitive data on digital gadgets.

To know more about bit register visit:-

https://brainly.com/question/29554693

#SPJ4

aggregating unclassified information together will never make the information classified. T or F

Answers

It is true that grouping unclassified material together will never turn it into classified information.

Doesn't original categorization have the same influence and effects as derivative classification?

Original classification has a greater impact and more lasting effects than derivative classification. Derivative classifiers are responsible for each of the following: EXCEPT: The authority for original classification must be held by derivative classifiers.

Which of the following is a legitimate justification for categorizing data?

The only legitimate justification for classifying information is to safeguard national security. The following steps are all included in derivative categorization, EXCEPT for: first deciding that it is necessary to protect information from unauthorized disclosure for national security reasons.

To know more about information visit:-

https://brainly.com/question/17218068

#SPJ4

Eufy Security By Anker Solo Pro 2-Pack Standalone Security Cameras With Solar Panels

Answers

Eufy is a wonderful option if you want to replace your house surveillance cameras or require a straightforward system for a modest rental.

How reliable are Eufy cameras?

Most of the time, eufy cameras are our second choice rather than our first.They provide dependability, superior video quality, several power options, cost-effective options, and interoperability with smart homes.

Is Eufy an Asian business?

The Chinese business Anker Innovations' Eufy Security advertises to save recorded video data inside the HomeBase, that is a smart home gateway on overdrive.

To know more about Security Cameras visit:

https://brainly.com/question/28388195

#SPJ4

a(n) is a flash memory storage device that contains its own processor to manage its storage. a. magnetic hard disk b. thumb drive c. optical disc

Answers

The term "thumb drive" refers to a flash memory storage device with its own processor for storage management.

A thumb drive (also known as a USB drive or flash drive) is a type of flash memory storage device that contains its own processor to manage its storage. It is small, portable, and typically connects to a computer via a USB port.

Flash drive is a type of flash memory storage device that contains its own processor to manage its storage. It is small, portable, and typically connects to a computer via a USB port. It is also known as a thumb drive or USB drive. It stores data in flash memory, which is a type of non-volatile memory that retains data even when the power is turned off. Flash drives are commonly used for storing and transferring files between computers, and for storing backup copies of important data.

Learn more about Flash drive here:

https://brainly.com/question/30366040

#SPJ4

zenmap and nessus can identify devices, operating systems, applications, database servers, and services on those devices. which of the two applications can also identify known vulnerabilities or bugs on the devices being scanned?

Answers

Just Nessus, zenmap is Nmap's user interface, thus.

The aesthetic design of all visible components of a digital product's user interface, including the presentation and interactivity of the product, is referred to as user interface design, or UI design. UX design, usually referred to as user experience design, is frequently confused with UI design. Although UI and UX designers collaborate frequently, the two professions focus on different stages of the creative process.

UX design is the process of increasing customer happiness by making a product, website, or app more usable and accessible. Contrarily, UI design refers to the layout of the product's user interface, or what the user actually sees when interacting with the product.

Here you can learn more about User Interface (UI) in the link brainly.com/question/15704118

#SPJ4

The purpose of this lab is to help reinforce container class concepts in C++ Specifically, you will be repeating the lab from last week except you will be using a dynamic array for the sequence class. Note that there is no upper bound on the size of the sequence. You need to use the author's files sequence2. H and sequence_exam2. Cpp. This Lab assignment requires you to implement all functions for this sequence class. Refer to bag2. H, bag2. Cxx and sequencel. Cpp (implemented in your previous lab) to get an idea ofhow to work on this lab

Answers

/DieRolls FirstName LastName.java (rename the class as you desire) (rename the class as you like)

Coding

introduce JavaIOFile;

the import of java.io.FileNotFoundException;

bring up the Java.IO.PrintWriter;

import random from java.util;

a common class FirstName LastName DieRolls

throws a FileNotFoundException in the public static void main(String[] args) function.

constructing a PrintWriter object to publish the outcomes to the Rolls.txt file

Writer: = new PrintWriter("Rolls.txt"), new File);

launching the random number generator in /

random = fresh Random();

the quantity of rolls

numrolls int = 10,000;

/ Counts of each roll are stored in six variables.

one is equal to zero, two to four, three to five, and six to zero;

/ Repeatedly looping for numrolls

i++ for (int I = 0; I numrolls);

/ producing a result in the range of 1 and 6

roll an int at random.

next

Int(6) + 1;

/ raising the relevant counters.

If (roll == 1), then

ones++;

if (roll == 2), then else

twos++;

Otherwise, if (roll == 3)

threes++;

Otherwise, if (roll == 4)

fours++;

if not else (roll)

Learn more about the Java here: https://brainly.com/question/26789430

#SPJ4

betty wants to display negative percentages in red text with parentheses. what type of number format should she apply?

Answers

Select Format > Format Cells from the Home tab. Click Custom under the Category list in the Format Cells box. The negative percentage will now be highlighted in red.

When it detects a pattern, Flash Fill fills your data for you automatically. Flash Fill can be used, for instance, to split up first and last names from a single column or to combine first and last names from two different columns. Go to the Formulas tab, the Formula Auditing group, and click the Show Formulas button in your Excel worksheet. Microsoft Excel does not immediately show the results of formulas in cells. The cells display the formulae rather than the value as soon as the "Show Formulas" button is activated.

Learn more about column here-

https://brainly.com/question/13602816

#SPJ4

remember for a moment a recent trip you have made to the grocery store to pick up a few items. what pieces of data did the point of sale (pos) terminal and cashier collect from you and what pieces of data about the transaction did the pos terminal pull from a database to complete the sale? in addition to the data collected and retrieved what information was generated by the pos terminal at the end of the order, as it is being completed? this posting should offer an original and thoughtful response to the discussion topic. you are also required to respond to at least one original post.

Answers

The point of sale (POS) terminal and cashier will collect data from you such as your name and address if you are using a payment method such as a credit card, as well as any other information such as a loyalty card number or coupon code.

What is credit card?

A credit card is a plastic card issued by a financial institution that allows the holder to purchase goods and services on credit. Credit cards are a form of revolving credit and can be used to pay for goods and services from any merchant that accepts the card.

The POS terminal will also pull data from a database to complete the sale such as the product’s price and any applicable discounts. The POS terminal will also generate information such as a customer receipt, the total price of the order, and any applicable taxes. At the end of the transaction, the POS terminal will generate a receipt with the customer’s name, address, and the items purchased, as well as the total cost of the order.

To learn more about credit card
https://brainly.com/question/28964146
#SPJ4

A student wrote the future of optical media is one of obsolescence in the next 5 years. Discuss this statement by referring to modern technologies

Answers

Despite this, optical media is no longer used for some professional applications and its sales are declining in the consumer markets.

What does optical media's future hold?

The next generation of Archival Optical Discs will offer quicker data transfer rates, reduced cost per bit, and increasing disc capacity up to 1 TB.

What is the optical industry's future?

Additionally, consumers will raise their expectations for products. Future technologies like 3D printing and so-called "smart glasses" will be more prevalent, and online eye exams will soon be available in Europe. Finally, as automation and digitization progress, businesses will be able to optimize their value chains.

To know more about optical media visit:-

https://brainly.com/question/29805368

#SPJ4

it is not possible to name a worksheet history in excel T/F

Answers

True, in Excel you cannot give a worksheet history a name. When you attempt to name a worksheet History, Excel will notify you that the name "History" is a reserved name.

The required details for Excel in given paragraph

Does Excel not allow you to give a worksheet history a name?

The sheet designated for "monitoring changes between shared workbooks" is referred to by the reserved word "history." It will launch the Highlight Changes dialog.

In Excel, how can I make a worksheet history?

Selecting the Highlight changes on screen check box will make changes to the worksheet stand out. By checking the option labeled "List changes on a new sheet," you may display the history worksheet while also generating a list of changes on a different worksheet.

To know more about Excel visit:-

brainly.com/question/30334694

#SPJ4

Finish the format string to get the output shown below.
'Answer: 0.99'
'Answer: {
}' .format(0.987654)
HELP ASAP!!!

Answers

The output of the given question of format string 'Result:{___}' .format(0.2345789) will be 4.2f.

What is string?

In computer programming, a string is often a series of characters that can be either a literal constant or a type of variable.

The latter can either be fixed with its elements and length fixed, or its elements and length adjusted (after creation).

A string is frequently represented as an array data structure made up of bytes (or words) that uses some type of character encoding to store a succession of components, usually characters.

More expansive arrays or other sequence (or list) data types and structures can also be represented by strings.

Given,

The ^ symbol centers 'Root' in a field eight characters wide. 4.2f rounds to two decimal places and places the number in a field 4 characters wide.

Thus, 4.2f will be the output.

For more details regarding string, visit:

https://brainly.com/question/30099412

#SPJ1

void elements, also known as empty elements, only have a starting tag that includes the / before the right angle bracket. true false

Answers

The statement is True. Void elements, also known as empty elements, only have a starting tag that includes the / before the right angle bracket. They do not have an end tag, and they typically do not have any content between the opening and closing tags. Examples of void elements include <img> and <br>.

Void elements, also known as empty elements, are HTML elements that do not have a closing tag and do not have any content between the opening and closing tags. Examples of void elements include <br>, <hr>, <img>, <input>, <meta>, <link>, and <area>.

These elements are used to add structure and formatting to pages and are usually used in combination with other elements. Void elements are self-closing and do not require a separate closing tag.

Learn more about Void elements:

https://brainly.com/question/12949818

#SPJ4

which type of network-based attack prevents legitimate users from accessing a system by overwhelming the network?

Answers

A DoS attack is an attack that floods a network with requests, preventing legitimate users from accessing the system.

Denial of Service (DoS) Attack: Preventing Legitimate User Access

A Denial of Service (DoS) attack is a type of network-based attack that seeks to prevent legitimate users from accessing a system by overwhelming the network with malicious requests. It does this by saturating the target machine with external communications requests, such as ping requests or malformed packets, so that it cannot respond to legitimate traffic, or by consuming the bandwidth of the victim so that it can no longer communicate effectively.

Learn more about Network: https://brainly.com/question/8118353

#SPJ4

How to solve : invalid plugin detected. adobe acrobat reader dc will quit

Answers

Change the temporary location of each file. Remove all api files from the plug_ins folder. Half of the files in the temp folder are restored using the binary chop method. If the pdf file works now, restore half of the previous files.

What does it imply when it says "invalid plugin detected"?

The error could be brought on by incompatibility between program versions; Please try installing the most recent version of Acrobaat to see if that helps. Select "Check for Updates" from the Help menu when you open Acrobaat. I hope that is of use.

How can I set up the plugin for Adobe Reader?

If you haven't already, get Adobe Reader for your computer and install it. Open Googgle Chrrome and type "chrome plugins" into the address bar to access the plugins settings tab. In the plugins list, you should be able to find Adobee Reeader or Acrobbat. Select "Enable" to enable it.

To know more about binary visit :-

https://brainly.com/question/19802955

#SPJ4

A 3-D formula in Excel allows you to simultaneously select multiple adjacent worksheets.
True
False

Answers

Yes, that is true. Excel's 3-D formula lets you choose many nearby worksheets at once.

Does an Excel 3-D formula allow you to select numerous nearby worksheets at once?

Excel's 3-D formulas let you choose many nearby worksheets at once. Using paste special with values just and the transpose option, it is possible to reorient the data in a spreadsheet.

Which Excel function enables simultaneous work on many worksheets?

At the bottom of the screen, select the Insert Worksheet tab. Click Sheet1, Sheet2, and so on while holding down the CTRL key to select all of your spreadsheets.

To know more about worksheets visit:-

https://brainly.com/question/13129393

#SPJ4

write a script hat utilizes both a while loop and condition statement to round numbers to the nearest tenth place. test this script on 6.88. the answer should be 6.9.

Answers

The practice of providing healthcare remotely through the use of communication networks is known as telemedicine (TM).

It has the potential to increase patient access to care, enhance patient health outcomes, and lower healthcare expenditures. Understanding the potential effects of TM on patients, medical professionals, and healthcare delivery is crucial as TM applications develop further. We took into account randomized controlled studies of interactive TM that involves direct patient–provider interaction and was given to patients with any clinical condition in addition to, or as a substitute for, usual care as opposed to usual care alone. Telephone-only treatments and fully automatic self-management TM interventions were not included.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ4

he payroll department keeps a list of employee information for each pay period in a text file. the format of each line of the file is write a program that inputs a filename from the user and prints a report to the terminal of the wages paid to the employees for th

Answers

Following are the required code to make a report in tabular format by using the appropriate headers:

Python code:

file_name = input('Enter input filename: ')#defining a variable file_name that inputs file value

try:#defining try block that uses thr open method to open file

 file = open(file_name, 'r')#defining file variable that opens file

except:#defining exception block when file not found

 print('Error opening file ' , file_name)#print message

 exit()#calling exit method to close program

print('{:<12s} {:>10s} {:>10s}'.format('Name', 'Hours', 'Total Pay'))#using print method to print headers

for l in file.readlines():#defining loop that holds file value and calculate the value

 name, hour, wages = l.split()#defining variable that holds the value of file

 hour = int(hour)#holiding hour value

 wages = float(wages)#holiding wages value

 total = hour * wages#defining variable total variable that calculates the total value

print('{:<12s} {:>10d} {:>10.2f}'.format(name, hour, total))#print calculated value with  message

file.close()#close file

Required file (data.txt) with the value:

Database 34 99

base 30 90

case 34 99

What is code explanation?

Defining the variable "file_name" that uses the input method to input the file name with an extension. Using the exception handling to check the file, with using the try block and except block. In the try block check file, and in except block print message with the exit method when file not found. In the next line, a print method has used that prints the header and uses a loop to read the file value. Inside the loop, a header variable is used that splits and holds the file value, calculates the value, prints its value with the message, and closes the file.

To know more about python code,

https://brainly.com/question/21888908

#SPJ4

why can't i get audio output on my headphones hooked up to a canon camera witha rode newsshooter kit

Answers

Automatic Gain Control AGC is enabled by default on many cameras, along with other audio processing functions like wind-noise reduction. You should disable these.

How do I connect my camera's sound to my microphone?

A microphone adapter for the camera is involved. Similar to how a tripod is mounted, attach the XLR cable adapter to the camera's bottom. Connect the microphone and adapter with an XLR cable.

Why is there no detection of my external microphone?

Open the app Settings. Click on Sound in the left sidebar of the System setting. In the Input devices settings, click Manage sound devices under the Troubleshoot button. Locate your device in the "Disabled" section further down, and then click "Enable" to turn on your microphone.

To know more about audio processing visit :-

https://brainly.com/question/24228690

#SPJ4

when building a high-fidelity prototype in figma or adobe xd, what do you do once you connect the screen or elements within the screens?

Answers

Mockups should be laid out, screens connected, interaction details added, and animations adjusted before all screens are finished.

What are animations?

Animation is a method for making still images appear to be in motion.

Traditional animation entails manually painting or drawing images on sheets of transparent celluloid, which are then photographed and filmed.

Today's most popular animations are made with computer-generated visuals (CGI). In contrast to 3D computer animation, which can be incredibly detailed, 2D computer animation (which occasionally mimics traditional animation) may be used for artistic reasons, minimal bandwidth, or quicker real-time renderings.

Other common animation methods employ a stop-motion approach to produce clay figures, paper cutouts, and puppets in two and three dimensions.

A cartoon is an animated movie with a bizarre visual aesthetic.

Hence, Mockups should be laid out, screens connected, interaction details added, and animations adjusted before all screens are finished.

learn more about animations click here:

https://brainly.com/question/28218936

#SPJ4

write a program that squares an integer and prints the result.

Answers

Computer programming is the process of creating instructions and coding to enable certain tasks in a computer, application, or software program.

Is programming for computers difficult?

Although it might seem challenging at first, learning to code is not tough. It could be challenging to learn something new at first. Coding gets easier with experience, perseverance, and patience. If you're considering learning to code, it's easy to become overwhelmed by the difficulty.

import java.util.Scanner;

class Main

{

public static void main(String[] args)  

{

  System.out.println(" Enter the the two numbers:");

   Scanner input = new Scanner(System.in);

    int a = input.nextInt();

    int b = input.nextInt();

    int c = sumsquareFunction(a, b);

    }

sumsquareFunction(int n1, int n2) is a public static int.

    int c= n1*n1 + n2*n2;

    return c;  

 }

}

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ4

aditya recently assumed an information security role for a financial institution located in the united states. he is tasked with assessing the institution's risk profile and cybersecurity maturity level. what compliance regulation applies specifically to aditya's institution?

Answers

There are numerous techniques or instruments for organizing a program's logic. They include Warnier-Orr diagrams, Nassi-Schneiderman charts, hierarchy or structure charts, pseudocode, HIPO, and flowcharting.

It is expected of programmers to be able to comprehend and use pseudocode and flowcharts. It gives designers and lead programmers the chance to express the design in great detail and gives programmers a thorough template for the subsequent step of building code in a particular programming language (Techtarget, 2005). Depending on the creator, algorithms to tackle a specific problem may have different syntax. You can choose complete items with the selection tool. You can choose points on a path or the contents of a frame with the Direct Selection tool. With the page tool, you can alter the page size of a document.

Learn more about programming here-

https://brainly.com/question/30246925

#SPJ4

Other Questions
a scientific experiment testing a new drug used two groups, one getting the drug and one getting a sugar pill. if the group getting the drug did much better than the group with the sugar pill: his state no longer recongizes alienation of affection as an issue that can be litigated. which motion should During the sales-oriented era, firms found an answer to their _____ by adding salespeople to find new buyers. Kennedy Company reports the following costs and expenses in May. Factory utilities $ 16,500 Depreciation on factory equipment 12,650 Direct labor Sales salaries Property taxes on factory building Repairs to office equipment Factory repairs Advertising 23,000 Depreciation on delivery trucks Indirect factory labor Indirect materials Direct materials used Factory manager's salary Instructions 3,800 48,900 70,800 157,600 8,000 2,500 1,300 2,000 From the information, determine the total amount of:_______. (a) Manufacturing overhead. (b) Product costs. (c) Period costs HELP ME PLEASE I WILL GIVE YOU BRAINLY a second-grade student is given a test that measures simple phoneme segmentation and blending and does well. however, when given the past, he cant perform advanced phonemic awareness tasks. what would be the best skills for him to practice based on these results? Amelia grabbed 50% of the M&M's from a bowl. Then, Jess took 50% of what was left. Dominick takes 50% of the remaining M&M's. There were 3 left. How many M&M's were in the bowl before Amelia arrived. Computer Science.1.14 zyLab training*: One large programMost zyLabs are designed to be completed in 20 - 25 minutes and emphasize a single concept. However, some zyLabs (such as the one large program or OLP) are more comprehensive and may take longer to complete.Incremental development is a good programming practice and is the process of writing, compiling, and testing a small amount of code, then repeating the process with a small amount more (an incremental amount), and so on.Suggested process to complete longer zyLabs:- Implement Step 1 and submit for grading. Only one test will pass.- Continue to implement one step at a time and resubmit for grading. At least one additional test should pass after each step.- Continue until all steps are completed and all tests pass.Program Specifications: For practice with incremental development, write a program to output three statements as specified.Step 1 (4 pts). Use print() to output "Step 1 complete". Submit for grading to confirm one of three tests passes.Output should be:Step 1 completeStep 2 (3 pts). Use print() to output "Step 2 as well". Submit for grading to confirm two of three tests pass.Output should be:Step 1 completeStep 2 as wellStep 3 (3 pts). Use print() to output "All steps now complete". Submit for grading to confirm all tests pass.Output should be:Step 1 completeStep 2 as wellAll steps now complete One angle measures 18, and another angle measures (6d 6). If the angles are complementary, what is the value of d? how much of a radioactive kind of actinium will be left after 132 years if you start with 301,184 grams and the half-life is 22 years? Kara needs to pick a pair of matching socks from a drawer consisting of 4 black socks, 11 blue socks, 3 white socks, and 5 brown socks. If the first sock that Kara draws is blue, what is the probability that she will get a matching sock on her second draw?A. 0.22B. 0.78c. 0.93d. 0.07 the nursing team, consisting of one nurse, one lpn/lvn, and one unlicensed assistive personnel (uap), receives a report from the previous shift. at the completion of the report, it is most important for the nurse to take which action? Ryan needs 3 and 1/4 cups of flour for the cookie recipe she is baking. She has already added 2 and 1/2 cups of flour. How much more flour does she need to add? Please help- What number goes in the blank to make the number sentence true? 3 x (1 + 6) = (3 x 1) + ( x6) How to collect all items that once belonged to Johnny Silverhand? Suppose an oil exploration company wishes to collect, codify, and store knowledge that is used in the organization, they should use _______ a. a virtual reality systemb. an expert systemc. a transaction processing systemd. a knowledge management system Why is it important to check the copyright date on a book of sample resumes?Its important to use resume books with a wide variety of copyright dates.Resume books published before 2019 are no longer valid.Older books may have resume samples that look old-fashioned or outdated.Newer books may have samples that look too different from what employers are used to. Can someone check my answer for the first one and help me with the rest? Thank you! why did the authors ain the 2nd matrix article the authors argue that cypher should not have made the choice to go back into the matrix because he would betray his friends.rgue that How do you proof Triangle BSR is congruent to Triangle DUT