Which of the following is considered an input device?

Answers

Answer 1
Do you have a picture or list?
Answer 2

Answer:

Keyboard

Mouse

Light pen

Microphone

Touch pad


Related Questions

The page-replacement policy means that pages are not placed to make more space. A. True B. False

Answers

Answer:

B. False

Explanation:

A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.

Some of the algorithms or techniques used by the operating system for page-replacement policy are;

1. Last In First Out (LIFO).

2. First In First Out (FIFO).

3. Least Recently Used (LRU).

4. Least Frequently Used (LFU).

5. Optimal (OPT or MIN).

Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.

The answer to this question is false.

This is due to the fact that the page-replacement policy helps to decide the pages of memory that needs to be paged out or swapped out.

This becomes necessary at a time when it is necessary for the allocation of a memory page.

It helps the operating system to know the memory space that can be moved out in order to know what space can be made available for the current page.

Read more on https://brainly.in/question/7169703

For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2

Answers

import math

def getResults(r):

   return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))

print(getResults(3.5))

I hope this helps!

Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False

Answers

Answer:

True

Explanation:

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

13 List five examples of functionality that can be added when using express
cards?

Answers

Answer:

This Answer Was Pasted Over From ayushisingh5

Explanation:

ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...

a good look of a web page depends upon?​

Answers

Answer: See explanation

Explanation:

• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.

• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.

• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.

In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.A) requirements planningB) user designC) constructionD) cutover

Answers

Answer:

C) construction

Explanation:

Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :

requirements planning, user design, construction, cutover

The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.

Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]

Answers

def lastfirst(lst):

   newlst = []

   newlst1=[]

   for x in lst:

       w = x.split(",")

       newlst.append(w[1].strip())

       newlst1.append(w[0].strip())

   newlst2 = [newlst], [newlst1]

   return newlst2

lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])

print(lastfirst(lst1))

I hope this helps!

A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence

Answers

Answer:

D

Explanation:

because it is a sequence it does more than one thing

Answer:

B

Explanation:

I took the test

When would it be necessary to edit the information shown on an electronic business card?

Answers

Answer:

It's D dear

Explanation:

Answer:

D. to show only relevant information to people inside your organization

Explanation:

hope this helps :)

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

Crowdsourcing is not only used for relatively simple tasks such as designing a Web site or designing a case for a smartphone. Today, it is increasingly being used in more complex designs as well. Precyse Technologies provides supply-chain products and solutions that assist organizations in tracking their inventories using RFID technology. It was having difficulty improving the performance and battery life of a particular RFID device; there were not adequate internal resources to tackle the problem. So, Precyse asked InnoCentive, a crowdsourcing provider, for assistance, believing that crowdsourcing would provide quick access to a worldwide talent pool and a higher return on investment (ROI). Ultimately, the company received more than 300 ideas from global experts for solving its problem. It narrowed the pool down to three finalists, from which a winner was chosen. The whole process took approximately four months, and Precyse estimated that it saved the company $250,000. 1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing reduce the systems design cost and are there certain problems you would not want to use crowdsourcing to solve?

Answers

1) SOME APPLICATIONS OF CROWD SOURCING ARE;

- MARKETING STRATEGY; There is finalizing of marketing strategies by firms and this is based on the crowd sourcing ideas.

- THOUGHT LEADERSHIP; There has been catering to crowdsourcing for high level thought leadership by many firms and this is done in various fields such as Human resources.

- DESIGNING; Designing is very common for crowdsourcing and this is seen where a bunch of talent pool is being used for the purpose of designing websites,applications and as well as other prototypes.

SOME OF THE ADVANTAGES OF CROWDSOURCING ARE;

- An individual can actually save lots of costs,this is because they don't need to hire a permanent resource and this resource can be quite expensive.

- Another advantage of crowdsourcing is that one can actually get services and idea from pool of professionals that are far talented across the world.

- It also play a role in obtaining of ideas from a group of people and this can go a way in shortening the resolution process, therefore saving time.

CROWDSOURCING HELPS IN GETTING IDEAS AND SERVICES FROM A WIDER POOL OF PROFESSIONALS THAT ARE TALENTED,So;

Lots of time are being saved when there is actually a large talent pool.

This then translates into shorter span in the system design process and it also results in the saving of costs.

However,a firm don't necessarily need to hire permanent resources for critical inputs I'm the design process and this also results in saving of costs s well.

People are known to be using Crowdsourcing. The applications of crowdsourcing is often done so as to gather information or work product.

This helps to gather or seeks money to aid individuals, charities, or for one to start a business. The advantages of crowdsourcing are cost savings, speed, etc.

Crowdsourcing is known to help man to remove the various costs due to  functioning as a pay-per-task model.

A well managed crowdsourcing can be used to pay workforce.

Learn more about Crowdsourcing from

https://brainly.com/question/6983872

if there was no technological advancement what would be our society like​

Answers

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.

The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.

Answers

Answer:

strVar.replace(pos, n, str);

Explanation:

The strVar.replace() is a javascript function of searching and replacing a string for a defined value, whereby it finds and returns a new string where the defined values are replaced.

For example: to return a string where "Trump" is replaced with "Biden":

We have

var str = "Welcome Trump!";

var res = str.replace("Trump", "Biden", str);

Hence, in this case, the correct answer is strVar.replace(pos, n, str);

Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.

Answers

Answer:

The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm

Explanation:

The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.

For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)

It will work as follows (recall that the memory partitions are in order and must remain so):

A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next

B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100  KB, 350 KB, 200 KB, 750 KB, 125 KB), next  

C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB)  next

D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB)  next

E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB,  200KB, 17KB, 125KB)

One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.

Cheers

Help Quick Please!!!!

Ann sent out a business letter three weeks ago, hoping to increase sales. However, she has not seen an increase. She thinks that making the communication more impressive will increase the business. Ann should _____.

Answers

Ann should make flyers and but then put in local spots where lots of people go

Which of these can be sorted with a bubble sort?

['red', 'blue', 'green', 7]

{41:5,32:10, 20: 234}

​[7, 10, 2.5, 1.566]

[1, 2.5, 'book']

Answers

C because a bubble sort only compares numbers

Answer:

C

Explanation:

ed 2021

The art element line is a moving point.


True or False

Answers

i’m pretty sure the answer is true

If an app asks for a user's age, it may be because the app requires a user to be over a certain age to use some of the services it provides. Write a function called checkAge that takes one parameter of type String. The function should try to convert this parameter into an Int value and then check if the user is over 18 years old. If he/she is old enough, print "Welcome!", otherwise print "Sorry, but you aren't old enough to use our app." If the String parameter cannot be converted into an Int value, print "Sorry, something went wrong. Can you please re-enter your age?" Call the function and pass in userInputAge below as the single parameter. Then call the function and pass in a string that can be converted to an integer.
Go back and update your function to return the age as an integer. Will your function always return a value? Make sure your return type accurately reflects this. Call the function and print the return value.
func checkage(age: String)->Int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}

Answers

Answer and Explanation:

Here the programming language swift is being used. There is a slight error in the program shown above:

var userInputAge=9

func checkage(age: String)->int?

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

The program should be revised :

func checkage(age: int?)->String

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

We call the functions :

checkage(userInputAge)

checkage("15")

Note: we revised the program for errors in the first line of the code where the int optional parameter(int?) was supposed to be used instead of the String parameter in the function. We then called the function using the userInputAge variable defined as the parameter and then we now also used a String as the parameter for calling the function the second time.

Answer:

def checkage(age: "String")->int:

   if age >= 18:

       return "Welcome!"

   return "Sorry, but you aren't old enough to use our app."

   

for _ in iter(list,0):

   myage = int(input("Please enter your age: "))

   if myage is int(myage):

       result = checkage(myage)

       print(result)

       break

   print("Sorry, something went wrong. Enter integer value as age.")

   

Explanation:

The python code above lets the user input the age value for continuous comparison. If the age is an integer, it checks to know if the age is greater than 18 or not. If yes, it returns "Welcome!" else "Sorry, but you aren't old enough to use our app". But if the age is not an integer, it displays the message "Sorry, something went wrong. Can you please re-enter your age?" then prompts the user again for the age.

Note: the ': "String" ' and "->int" is for documentation purposes. They are used to describe the type of parameters (for later) and return value (the former).

anyone know how to fix black screen of death on computer​

Answers

Answer:

you asked a question so you must have fixed it

Explanation:

logic

Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.

Answers

Answer: See explanation

Explanation:

A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.

Examples of Internet entities that may want secure communication include:

i. Two routers

ii. Our laptop and web server.

iii. Connection that exists between two DNS name servers.

Given main(), complete the Car class (in file Car.java) with methods to set and get the purchase price of a car (setPurchasePrice(), getPurchasePrice()), and to output the car's information (printInfo()).
Ex: If the input is:_______.
2011
18000
2018

Answers

Answer:

Explanation:

This a java code for a car and can be written as follows:

public class Car {

   private int modelYear;

   private int purchasePrice;

   private int currentValue;

   public int getModelYear() {

       return modelYear;

   }

   public void setModelYear(int modelYear) {

       this.modelYear = modelYear;

   }

   public int getPurchasePrice() {

       return purchasePrice;

   }

   public void setPurchasePrice(int purchasePrice) {

       this.purchasePrice = purchasePrice;

   }

   public int getCurrentValue() {

       return currentValue;

   }

   public void calcCurrentValue(int year) {

       int age = year - modelYear;

       currentValue = (int) Math.round(purchasePrice * Math.pow(0.85, age));

   }

   public void printInfo() {

       System.out.println("Car's information:");

       System.out.println("   Model year: " + modelYear);

       System.out.println("   Purchase price: " + purchasePrice);

       System.out.println("   Current value: " + currentValue);

   }

}

Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents and structure. Close the file, but do not make any changes to the document.

Answers

Answer:Use your editor to open the tny_july_txt.html and tny_timer_txt.js files from the ... 3 Take some time to study the content and structure of the file, paying close ... the nextJuly4() function, insert a function named showClock() that has no parameters. ... Declare a variable named thisDay that stores a Date object containing the ...

Explanation:

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

Help very please??????

Answers

Answer:

Z = 100

C = 200

School = "Emirates American School"

print(Z,C,School)

x = 5

y = 5

output = (x == y)

print(output)

txt = "I study at {}"

print(txt.format(School))

print(School.upper())

Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade point average. The user will type in input containing the student's name, then a number of scores, followed by that many integer scores. Then, the method will print out the average of all grades entered. Here are two example dialogues: Enter a student name: Maria Enter the number of courses: 5 Course 1 Grade: 72 Course 2 Grade: 91 Course 3 Grade: 84 Course 4 Grade: 89 Course 5 Grade: 78 Maria's grade is 82.8 Enter a student name: Jordan Enter the number of courses: 4 Course 1 Grade: 86 Course 2 Grade: 71 Course 3 Grade: 62 Course 4 Grade: 90 Jordan's grade is 77.25

Answers

import java.util.Scanner;

public class JavaApplication40 {

   public static  void printGPA(Scanner scan){

       System.out.println("Enter a student name:");

       String name = scan.nextLine();

       System.out.println("Enter the number of courses:");

       int courses = scan.nextInt();

       double total = 0;

       for (int i = 1; i <= courses; i++){

           System.out.println("Course "+i+" Grade:");

           double grade = scan.nextDouble();

           total += grade;

       }

       System.out.println(name+"'s grade is "+(total/courses));

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       printGPA(scan);

   }

   

}

I hope this helps!

Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to a file, and then write the second program so that it reads the data from this file. However this process can be difficult and time consuming, especially if you don't know how to program in C# or C++. What feature of the UNIX/Linux shell can you use to simplify the process of sharing data between programs?

Answers

Certain ways exist to simplify the process of data sharing between programs.some of these ways are;

A) When there are two programs that are not running at the same time,then the pipes or the sockets won't be able to work as their buffers would not be able to hold large files because they are small.

Looking at this scenerio,shared memory can be used.

The Sysv IPC shared memory API, POSIX shared the memory API or rather files on a tmpfs system of files can actually be used for shared memory operations.

B) Another possible solution can be named file. Instead of using an unnamed and shell pipeline,a name pipeline them uses the file system.

However,it can be treated with the use of mkfifo() or mknod() commands and then two separate programs or also processes can as well access the pipe by making use of the name of the pipe.

But one process(program) can actually open the pipe but as a reader for reading purposes and the other for writing purposes as a writer.

____________________________ and _________________________ are 2 negative impacts of the internet on businesses.

A)Unlimited Availability and Low Confidence in the business


B)Competition and Poor Impersonality


C)Competition and Unlimited Availability


D)Low Confidence in the business and Improved Communication

Answers

Answer:

i no you its me remember and the answer is b.

Explanation:

Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.

Answers

Answer:

A. precomputes the most efficient route and uses it to ensure rapid packet delivery.

Explanation:

In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.

For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.

What is the first step a user should take toward generating an index?

--finding and marking words or phrases that should be included in the index
--making sure that headers at different levels are using consistent styles
--bolding every word or phrase that should be included in the index
--writing down information about the author and publisher of other books used

Answers

Answer:

I think that it's A

Explanation:

Other Questions
Ruby has observed that plants in her garden vary in height. She wants to investigate whether a plant species (species A) grows faster than the other garden species (species B, C, and D). Select the statement that describes Ruby gathering enough evidence to support a scientific explanation concerning plant growth rates A quadrilateral has no pairs of parallel sides, what two shapes could it be? If x = 4 and y = 3, then xy 2x = A 4 B 6 C 19 D 40 PLEASE ANSWER THESE 2 QUESTIONS!!!!!! THIS IS A MAJOR GRADE!!!!!!!!!!!!!!!!! In what industry did J.J. McAlester earn his fortune?gascoaloilRailroad A mudslide left 42 acre-feet of mud in a valley. The mud is beingremoved at the rate of 5 acre-feet per day. The amounts a soft drink machine is designed to dispense for each drink are normally distributed, with a mean of 12.1 fluid ounces and a standard deviation of 0.3 fluid ounce. A drink is randomly selected.Required:a. Find the probability that the drink is less than fluid ounces. b. Find the probability that the drink is between and fluid ounces. c. Find the probability that the drink is more than fluid ounces. Can this be considered an unusual event? Explain your reasoning. In a typical mammalian cell, what is the average percentage of total cell weight for protein and dna? What does the word immobilized mean? 1. untidy and messy2. to make wrinkles3. plain and obvious4. forced to be still 21. Select the adjective in the sentence below. The children were happily painting colorful pictures. a. hapily b. colorful O c. painting d. pictures The figure below shows the first 3 steps in the construction of a Sierpinski Triangle.1 equilateral 3 congruent 9 congruenttriangleequilateral equilateraltrianglestrianglesWhich property explains why each of the 9 small triangles in step 3 is similar to the large triangle in step 1?A. The side-side property of congruent triangles can be used because all the sides of an equilateral triangle are similar.B. The side-side property of similar triangles can be used because all the sides of an equilateral triangle are congruent.C. The angle-angle property of congruent triangles can be used because all the angles of an equilateral triangle are similar.D. The angle-angle property of similar triangles can be used because all the angles of an equilateral triangle are congruent. Write the improper fraction 62/9 as a mixed number. Two amino acids unite by forming a(n) bond between them and releasing a molecule of . The union of many amino acids forms a macromolecule called a . How many atoms are in this given equation 6Mn3C2 4. From Hatshepsut's early life, what Cause and Effect changed the course of her life? Asha borrowed Rs.24000 from a moneylender at a rate of 4% per annum compounded semi annually ,what payment will she have to make after 1year and 6 months to the moneylender to clear her debt ? The drawing of the building, shown below, has a scale of 1 inch to 30 feet. What is the actual height, in feet, of the building? By what mechanism does cyclohexanol react when treated in concentrated sulfuric acid/phosphoric acid and what compound results? Why do chemical properties change?What do the prefixes exo- and endo- mean?What happens to heat in an exothermic reaction? What happens to heat in an endothermic reaction? WILL GIVE BRAINLIEST!! Which statement best explains the difference between the Louisiana constitution and the United States Constitution?The Louisiana constitution provides the structure of government and laws for Louisiana. The US Constitution provides the structure of government and laws for the nation.The Louisiana constitution provides the structure of government for Louisiana only. The US Constitution provides the structure of government and laws for the nation and all state laws.The Louisiana constitution provides the laws for Louisiana only. The US Constitution provides the structure of government for the nation and all states and the nations laws.The Louisiana constitution provides the structure of government and laws for Louisiana. The US Constitution provides the nations structure of government only, leaving all laws up to the states.