a user mistakenly types: rm * .html (there is a blank after the asterisk) if this command were run in a directory only containing files and directories owned by the user running the command, what would happen? check all that apply.

Answers

Answer 1

To remove files, use the rm command. The rm command also prompts before deleting folders when the -i and -r arguments are used combined.

The final flag supplied takes effect if both -i and -f are specified. To do this, we enter the desired working directory's pathname after typing cd. A pathname is the path we take through the tree's branches to reach the desired directory. Absolute pathnames and relative pathnames are the two ways that pathnames can be given. Let's start by taking a look at absolute pathnames. Use the rm command along with the recursive option, -r, to delete a directory along with all of its contents, including any subdirectories and files.

Learn more about directory here-

https://brainly.com/question/7007432

#SPJ4


Related Questions

consider a source and destination host. before packets leave the source host, the host needs to define the path over which the packets will travel to reach the destination host. false

Answers

Before packets leave the source host, the source host does not define the path over which the packets will be traveling to reach the destination host. Thus the given statement is false.

When packets are transmitted over the network from a source host to a destination host, the source host does not determine the path through which packets will travel toward the destination host from the source host. Instead, it is the router that defines the best path and directs the packets from the source host to the destination host.

What is a router?

A router is a network layer device that determines the optimal path along which packets are forwarded over the network. Based on network layer information, routers forward packets from one network to the other network.

You can learn more about routers at

https://brainly.com/question/28180161

#SPJ4

When computing a bootstrap confidence interval for a parameter, at least how many times should we re-sample from the original sample?.

Answers

Bootstrap - There is no definitive answer to this question, but a common rule of thumb is to resample at least 1000 times.

What is Bootstrap?
An HTML, CSS, and JS library called Bootstrap aims to make the creation of educational web pages as simple as possible (as opposed to web apps). The main goal of adding to a web project would be to apply the colour, size, font, and layout options of Bootstrap to that project. Therefore, the main determinant is whether the responsible developers like those options. All HTML components have basic style declarations once Bootstrap is introduced to a project. As a result, texts, tables, and form components appear consistently in all web browsers. In order to further personalise the appearance of their contents, developers can make use of the CSS classes defined in Bootstrap.

To learn more about Bootstrap
https://brainly.com/question/8908486
#SPJ4

given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory

Answers

A vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory is given below

The Program

public boolean removeItemType(int index)

 {

   if (index < 0)

   {

     return false;

 }

   else

   itemCount = index;

   index--;

  return true;

 }

 public boolean reStock(int which, int qty)

{

   if (index < 0)

   {

     return false;

 }

   else

     

  return true;

 }

public class ItemType

{

private String name;

 private double price;

 private int quantity;

 public ItemType(String n, int p)

 {

   this.quantity = 0;

   this.name = n;

   if (p <= 0){

     this.price = 5;

   }

   else{

     this.price = p;

   }

 }

 public String getName()

 {

   return this.name;      

 }

 public int getPrice()

 {

   return (int) this.price;      

 }

 public int getQuantity()

 {

   return this.quantity;

 }  

public int addQuantity(int n)

 {

   if (quantity <0) {

   return -9999;  

   }

   else{

     if (quantity + n <= 10)

       quantity += n;

    return quantity;

 }

 }

 public int getItem()

 {

   if (quantity < 1){

     return -9999;

   }

   else

     this.quantity --;

   return quantity;

   

 }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

any computer that stores hypermedia documents and makes them available to other computers on the internet is called a . group of answer choices a. client b. server c. station d. domain

Answers

Option B is correct. A computer program or apparatus that offers a service to another computer program and its user, also known as the client, is referred to as a server.

The term "client" refers to any computer that keeps hypermedia documents and makes them accessible to other computers over the Internet. Anywhere in the world can be used to store hypermedia documents. The Advances Research Projects Agency Network is the owner of the Internet (ARPANET). The Domain Name System (DNS) protocol converts domain names to IP addresses when data is moved between networks. DNS servers are servers that run this protocol and keep a list of computer and website addresses as well as the IP addresses that go with them.

Learn more about documents here-

https://brainly.com/question/20696445

#SPJ4

Which of the following is the most likely disadvantage caused by the inability to access the internet?

A. inability to access educational and other resources
B. inability to communicate with business partners
C. inability to apply for jobs that use online recruitment
D. inability to relate to others in a social network

Answers

The one that is the disadvantage caused by the inability to access the internet is inability to relate to others in a social network. The correct option is D.

What is social networks?

The use of world wide web social media sites to stay connected with family and friends, community, colleagues, or customers is referred to as social networking.

Through all the sites, online communication can serve a social, business, or both purposes.

The disadvantage caused by a lack of internet access is the inability to interact with others in a social network.

Thus, the correct option is D.

For more details regarding social network, visit:

https://brainly.com/question/14312767

#SPJ1

in the tftp protocol: if the client changes its port number on a subsequent connection, but the server does not, what prevents an old-duplicate data packet sent by the server from being accepted by the new client? if the server changes its port number on a subsequent connection, but the client does not, what prevents an old-duplicate data packet sent by the server from being accepted by the new client?

Answers

The client will attempt to establish a TCP connection with the incorrect process or a nonexistent process if you use different port numbers. There will be errors.

An internet message or other network communication that arrives at a server can be redirected to a specific process by using the port number. All network-connected devices have standardized ports with a unique number installed. Multiple connections can be accepted simultaneously by a single listening port. There is a restriction of 64K that is frequently mentioned, but it should be made clear that this applies to each client and each server port. The client will connect to a machine and choose the port to use for communication. If the server is accessible through the port requested by the client, communication occurs.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ4

write a console-based application named sumdoubles that allows the user to enter any number of doubles continuously until the user enters 0.99. display the sum of the values entered, not including 0.99.

Answers

The program of console-based application will be:

public class sumdoubles {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

double num = 0.0;

double sum = 0.0;

while (num != 0.99) {

System.out.print("Enter a double value (0.99 to quit): ");

num = input.nextDouble();

if (num != 0.99)

sum += num;

}

System.out.println("Sum of values entered: " + sum);

}

}

What is console application?

A console application is a computer programme that is intended to be used through a text-only computer interface, such as a text terminal, some operating systems' command-line interface, or even the text-based interface it's included in most graphical user interface (GUI) operating systems, like the Windows Console in Microsoft Windows, the Terminal throughout macOS, and xterm in Unix.

To learn more about console application

https://brainly.com/question/27031409

#SPJ4

write a java program using switch that determine if the employee will not be allowed to attend the class if his/her attendance is less than 80% and you will ask your user to input:
a. How many classes were held?
b. Attendance at classes
c. Display the percentage of class attended
d. Output if he/she allowed to attend the class or not

Answers

import java.util.Scanner;

class check_st {

public static void main(String[] args) {

Scanner f = new Scanner(System.in);

double x,y,d;

System.out.println("How many classes were held?: ");

x = f.nextInt();

System.out.println("Attendance in class: ");

y = f.nextInt();

d = (y/x)*100.0;

float k = (float) Math.round(d * 100) / 100;

System.out.println("The percentage of class attended: %"+k);

int m = (k<80.0) ? 0 : 1;

switch(m)

case 0:

System.out.println("Failed the course!");

break;

case 1:

System.out.println("Passed the course!");

break;

default:

;;

}

}

how is computer Science used in entretainment?​

Answers

Answer:

video editing

Explanation:

there are many ways

what feature allows a firewall to permit traffic to flow from a trusted network (for example, a corporate intranet) to an untrusted network (for example, the internet) and then allow return traffic for that session, while blocking sessions initiated on the untrusted network?

Answers

       A firewall is a security tool, either computer hardware or software, that can assist safeguard your network by filtering traffic and preventing unwanted access to the sensitive information on your computer by outsiders.

It entails running software on a host in order to defend against attacks that have been thoroughly documented?

Firewalls based on hosts

       It is a piece of software—or a group of software—that is included with the operating system. Each host is shielded from assaults and unauthorized access by a host firewall.

Different Forms of Network Security Measures

        Firewall. Network traffic is managed by firewalls using pre-established security rules. Network segmentation, remote access VPN, email security, data loss prevention (DLP), intrusion prevention systems (IPS), sandboxing, and hyperscale network security are a few examples of network security measures.

     Which of the following is another name for a firewall that performs router functions?  A sacrificial host is a firewall that provides protection behind the organization's router. Another name for a sacrificial host is a bastion host.

To Learn more About firewall, Refer:

https://brainly.com/question/13693641

#SPJ4

why is it so common in internet protocols that clients speak before servers do? (in other words, what would be an important advantage of having a client speak first, or, thought differently, an important disadvantage of having a server speak first instead?)

Answers

Answer:

The client will send a request through the API with the TCP protocol, which the server then receives and delivers your request. This makes sure a connection is established. This is the standard quota for all web pages!

Explanation:

Hope this helps you out!

you are given two sequences a and b of n numbers each, possibly containing duplicates. describe an efficient algorithm for determining if a and b contain the same set of numbers, possibly in different orders. what is the running time of this algorithm?

Answers

Given are two sequences, S1 and S2, both with n items and possibly including duplicates. Efficient algorithm would be extremely wasteful to compare two sets of sequences if they were in some random order.

"A collection of finite rules or instructions to be followed in calculations or other problem-solving procedures" is what the word algorithm signifies. Or, "A finite-step process for solving a mathematical problem that frequently uses recursive operations."

As a result, an algorithm is a set of limited procedures used to solve a certain problem. Depending on what you want to do, algorithms might range from simple to sophisticated.

By using the process of making a novel recipe as an example, it can be understood. When following a new recipe, one must read the directions and carry out each step in the correct order. The new meal is cooked to perfection as a result of this procedures.

You employ algorithms every time you use a phone, computer, laptop, or calculator. Similar to this, algorithms assist programmers in carrying out tasks to produce desired results. The developed algorithm is language-independent, meaning that it consists only of simple instructions that can be used to build it in any language and still produce the desired results.

To know more about algorithm click on the link:

https://brainly.com/question/22984934

#SPJ4

Which OSI layer provides switching and routing technologies?
A. Application
B. Network
C. Physical
D. Transport

Answers

Answer:   The correct answer is B. Network

Explanation:   The network layer of the OSI provides switching and routing support through network layer protocols.

verilog code with comments for the 2:4 binary decoder, the 4:2 binary encoder, and the 4:2 prior- ity encoder. do not use behavioral verilog for these descriptions! use the structural and dataflow concepts introduced in the previous lab.

Answers

The Verilog code is /* 4 to 2 priority encoder */

Data flow description is given below:

module two_four_decoder (

input wire [1:0] w, input wire En, output wire [3:0] y);\\input output declaration

assign y[0]= (En & (~w[1] & ~w[0]));\\y0=1 when w1 and w0 are 00;

assign y[1]= (En & (~w[1] & w[0]));\\y1=1 when w1 and w0 are 01

assign y[2]= (En & (w[1] & ~w[0]));\\y2=1 when w1 and w0 are 10

assign y[3]= (En & (w[1] & w[0]));\\y3=1 when w1 and w0 are 11

endmodule

/* 4 to 2 encoder*/

module four_two_encoder(input wire [3:0] w, output wire [1:0] y, output wire zero);

assign y[1]=w[3] | w[2];

assign y[0]=w[3] | w[1];

assign zero= w[3] | w[2] | w[1] | w[0];

endmodule

/* 4 to 2 priority encoder */

module priority_encoder(input wire [3:0] w, output wire [1:0] y, output wire zero);

assign y[1]=w[3] | w[2];

assign y[0]=w[3] | (~w[2] & w[1]);

assign zero= w[3] | w[2] | w[1] | w[0];

endmodule

Learn more about Verilog code here:

https://brainly.com/question/15119491

#SPJ4

in this lab, your task is to: implement your physical security plan by dragging the correct items from the shelf onto the various locations in the building. as you drag the items from the shelf, the possible drop locations are highlighted. to implement your plan, you must:

Answers

The protection measures for an installation or facility are specified in a physical security plan. we will be able to recognize the significance of each component of a physical security plan in defending DOD assets by the end of this short.

Physical security relates to preventing theft, vandalism, natural disasters, man-made disasters, and accidental damage to construction sites, equipment, and the data and software included therein (e.g., from electrical surges, extreme temperatures, and spilled coffee). Access control, surveillance, and testing make up the three key parts of the physical security system. The degree to which each of these elements is implemented, enhanced, and maintained can frequently be used to measure the effectiveness of a physical security program for an organization.

Learn more about Security here-

https://brainly.com/question/28070333

#SPJ4

a level 1 security system is used to protect against unauthorized access. group of answer choices a. users' workstations b. back-end systems c. internal database servers d. front-end servers

Answers

Option D is correct. A software firewall is a software program that you install on your computer that protects your computer from unauthorized incoming and outgoing data.

A software firewall only protects the computer on which it is installed. Additionally, many antivirus scanners include a software firewall. Unauthorized use of computer data for personal gain. B. Transfer funds from someone else's account or debit purchases from someone else's account. Monitor and record keystrokes. It can be a software device or a hardware device. Network traffic capture and recording. "Unauthorized Access" means accessing, breaking into, communicating with, storing data, obtaining data, or otherwise intercepting and modifying computer resources without consent. These laws pertain to these and other actions that disrupt computers, systems, programs, or networks.

Learn more about network here-

https://brainly.com/question/15088389

#SPJ4

you have an azure subscription that includes a network security group named nsg1. you plan to add an inbound security rule named rule1 to nsg1. you need to configure a priority for rule1. rule1 must have the highest priority for inbound security rules in nsg1. which priority should you configure for rule1?

Answers

From the information given about Azure, you need to set the configuration for rule 1 to the highest priority for inbound security rules in NSG1.

What is Azure?

Microsoft Azure, sometimes known as Azure, is a cloud computing service provided by Microsoft that allows for application administration through Microsoft-managed data centers.

Microsoft Azure (previously Windows Azure) is the company's public cloud computing platform. It offers a wide range of cloud services, such as computation, analytics, storage, and networking.

It enables you to access and manage Microsoft cloud services and resources. These services and tools include storing and converting your data according to your needs.

The Azure Firewall has three different types of rules.

NAT RegulationsNetwork Regulations.Application Guidelines.

Your security group's incoming rule must allow traffic on all ports. This is required because the destination port number of any inbound return packets is set to a randomly assigned port number.

To establish an inbound security rule in Azure, follow these steps.

Choose a new network security group.From the left menu, choose Inbound security rules, then Add.You can restrict the Source and Source port ranges as desired, or leave them as is.You can specify a specific destination or leave the default of Any.

Learn more about Azure:
https://brainly.com/question/28813522
#SPJ1

a customer needs to look up tips for proper machine use in the user guide for their product. they do not know where to find the user guide. where should you tell them to look?

Answers

A task-oriented document is a user manual or guide. It includes operating and maintenance instructions as well as technical descriptions, drawings, flowcharts, and diagrams.

Even though instructions on how to use or repair a product are documented, it might not always suit the intended purpose. A user handbook, often referred to as a user guide, is designed to help users use a specific good, service, or application. Typically, a technician, a product developer, or a member of the company's customer support team will write it. Because of this, nonvolatile memory—which retains its data even if a computer's power is switched off or a storage device is unplugged from a power source—is frequently employed in conjunction with RAM. Additionally, unlike some volatile memory, nonvolatile memory does not require periodic content refreshment.

Learn more about memory here-

https://brainly.com/question/28754403

#SPJ4

if they run the tool again (but still with the destination ip address for code.org), in what way could the next packet's path be different? ????️note that there may be multiple answers to this question.

Answers

Answer:

Explanation:

stay the same  

move

what emerging approach allows administrators to manage a network via a controller that does not require physical access to all the network devices?

Answers

Using a controller that doesn't require physical access to every network device, software-defined networking (SDN) enables network managers to operate a network remotely.

What is physical access?
Physical access
to computer and network hardware or other components of a hardware installation means having direct, hands-on access to them on the premises. Security and authenticated the use hardware locations, from standard workstation cubicle to server rooms as well as other places where illegal physical access could pose security threats, are key concerns with physical access. Security professionals and others frequently draw a distinction between "physical access" and "logical access," which involves users interacting with devices remotely via techniques such Internet protocol access methods. When there is physical access, it's crucial to safeguard hardware by safeguarding the area in which it is kept. Physical access is often seen as a component of comprehensive risk management by outside experts.

To learn more about physical access
https://brainly.com/question/14311587
#SPJ4

An image that looks pixelated is one with:

Question 10 options:

A) high resolution.


B) low resolution.


C) typical resolution.


D) rasterized resolution.

Answers

Answer:

B) low resolution.

Explanation:

Low resolution means few pixels. Then, pixels are relatively big, so you can see them.

suppose that a 64-bit processor uses the following cache: 2kb block size, 16-way associativity, and total size of 32mb. determine how many bits are used for the tag, index, and block offset.

Answers

We are aware that 64 KB equals 64K words, or 2 to the power of 14 words (2 to the power of 1 word = 2 to the power of 14 blocks).

Each block has 32 bits of data, a 32-14-2 bit tag, and a valid bit. Therefore, for a 64-KB cache, the overall cache size is (2 to the power 14)*49=784 bits, or 98KB. Since there are 64 bytes per line and a cache line's size equals a main memory block's size, the block offset is 6 bits. Associative 2-way cache stores two lines as a single set. The remaining 18 bits for the tag are calculated as follows: number of sets = total cache lines/2 = (512KB/64)/2 = 212, translating to 12 bits for the set.

Learn more about block here-

https://brainly.com/question/17354891

#SPJ4

tonya needs to buy a new laptop. she compares models from apple, dell, and hewlett-packard on criteria such as processor speed, memory, screen size, and price. what type of consumer product does this represent?

Answers

The shopping product is the second category of consumer goods. Shopping products are those that a client typically compares while picking and buying based on factors like quality, price, and style.

The type of user and two main product categories are related in marketing. Consumer goods are goods bought by the final consumer. Business products (also known as industrial or B2B products) are things that businesses purchase to help create other goods that can be sold. A well defined target market, precise customer needs and wants, and information about what the product will be and do to meet those demands should all be included in the protocol. The protocol's shortcomings would cause issues with product development.

Learn more about product here-

https://brainly.com/question/22852400

#SPJ4

What is output by the following line of code? print(5*2 + 9)

Answers

The output of the given line of code is 19.

What is a Computer Code?

This refers to the sequence of instructions that are given to a computer system in order to perform an action or execute a task.

Hence, we can see that the given computer code tells the computer to print the value of the mathematical operation 5 * 2 + 9 which would be given down below.

Using the BODMAS/PEMDAS rule,

5 * 2= 10

Then 10 + 9 = 19.

This is what the output of the computer code would be as the print function would be executed.

Read more about computer codes here:

https://brainly.com/question/23275071

#SPJ1

what are the three main steps that routers that use a distance vector routing protocol (e.g., rip) perform to keep their routing tables up-to-date?

Answers

A specified destination, a metric (the shortest distance to the destination), and the following hop on the shortest path from the current router to the destination are all included in each item in the table.

This is how distance vector routing operates. A routing table is kept by each router. A router is required by a distance-vector routing (DVR) protocol to periodically notify its neighbors of topological changes. The previous ARPANET routing method was known as (or known as Bellman-Ford algorithm). The Border Gateway Protocol is a distance-vector protocol created for wide area networks (WANs) (BGP). Since BGP is an external gateway protocol, border and exterior routers on the Internet use it. Through a Transmission Control Protocol (TCP) session, it communicates data between routers.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

recitative is... group of answer choices sung in rhythm of ordinary speech with many words on the same pitch a recital a dramatic, serious, or tragic opera the text(lyrics) of an opera

Answers

Rather than emphasizing melody or musical motives, recitative monody (accompanied solo song) stresses and even imitates the rhythms and accents of spoken language.

Recitative, which is based on oratory, emerged in opposition to the polyphonic, or multi-voiced, style of 16th-century choral music in the late 1500s. Singing that is repetitive is more similar to speech than song. Opera and oratorio employ it to advance the plot. An illustration of recitative from the movie Juan, which is based on Wolfgang Amadeus Mozart's 1789 opera "Don Giovanni." A counterpoint to this style of singing is an aria. Since recitative frequently follows speech patterns, the rhythm in R&R alludes to speech rhythm.

Learn more about recitative here-

https://brainly.com/question/14724776

#SPJ4

in c++ Write a program that will read in an array of 10 numbers. Have the program find the largest, the smallest, find the numbers above 0, find how many numbers = 0, or find the numbers less than 0.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that have the program find the largest, the smallest, find the numbers above 0, find how many numbers = 0, or find the numbers less than 0.

Writting the code:

#include<stdio.h>

main()

{

int a[10],i,sum=0;

printf("enter array\n");

for(i=0;i<10;i++)

{

scanf("%d",&a[i]);

sum=sum+a[i];

}

printf("sum of array =%d",sum);

}

See more about C++ at  brainly.com/question/19705654

#SPJ1

A C++ program is one that is used to create high-performance programs. A program that will read an array of 10 numbers can be created by using a chart array.

What is a program?

A program is a specified set of codes that are used to run the computer. They are set instructions for the computer.

The C++ program is;

#include<stdio.h>

main()

{

int a[10],i,sum=0;

printf("enter array\n");

for(i=0;i<10;i++)

{

scanf("%d",&a[i]);

sum=sum+a[i];

}

printf("sum of array =%d",sum);

}

Therefore, a C++ program that will read an array of 10 numbers is given above.

To learn more about the program, refer to the below link:

https://brainly.com/question/28959658

#SPJ1

create a program, gpacalc.py, that takes four letter grade arguments and prints out the corresponding gpa, to two decimals. your program should work both in arguments are upper-case and lower-case.

Answers

Today's environment is highly automated, making computer programming essential. The relationship between people and machines needs to be under human control.

We utilize computer programming to harness such computational power because computers and machines can perform tasks so precisely and effectively. A computer follows a collection of instructions called a program to carry out a certain task. [computing] The size of a computer program affects the likelihood that an error may occur. A program is a group of initiatives that are managed collectively to generate scale-based efficiencies. Program management is the coordination of linked initiatives that are grouped together, just like project management involves the coordination of individual activities.

Learn more about Programming here-

https://brainly.com/question/11023419

#SPJ4

assuming that inputfile is a scanner object used to read words from a text file, select an expression to complete the following code segment, which counts the number of words in the input file.

Answers

A Scanner object may read a text file. Utilizing the methods included with the Scanner class is a benefit of utilizing the Scanner.

To guarantee that the file is closed, the application should define the Print Writer variable in a try-with-resources statement. Leading and trailing spaces are removed by the built-in Java String function trim(). The space character's Unicode value is "u0020." Java's trim() function looks for this Unicode value before and after the text, removes any spaces if they are present, and then returns the string that was omitted. The exception produced inside the try block will be propagated up the call stack if it occurs both inside the try-with-resources block and when a resource is closed (when close() is used).

Learn more about Unicode here-

https://brainly.com/question/17147612

#SPJ4

what solutions will help slow or sluggish website and page loading performance? consent mode analytics 4 gtm template libraries universal analytics server side tagging tag assistant

Answers

The solutions will help slow or sluggish website and webpage loading performance include the following:

GTM Template Libraries Server Side Tagging Universal Analytics Go-ogle Analytics 4

What is a website?

A website is a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.

In Computer technology, Server Side Tagging is a solution that would help a website to improve its performance and the amount of time it takes to load. Other solutions that can help to better mitigate and reduce slow or sluggish website and webpage loading performance include the following:

Go-ogle Tag Manager (GTM) Template Libraries Universal Analytics Go-ogle Analytics 4

Read more on website here: https://brainly.com/question/15827053

#SPJ1

Other Questions
At the deli counter in the supermarket, Nigel paid $10 for 2 1/2 pounds of roast beef. The cost of deli meat is proportional to its weight. What is the equation for the graph of this proportional relationship?(1 point) a spinner contains the numbers 1 through 50. What is the probability that the spinner will land on a number that is not a multiple of 9? Give your answer in fraction form. What is the probability that A occurs given that B occurs ? x2 + 7x + 12 = ** Show Why is agriculture in South Asia so dependent on the monsoon? 1. You have $60 and your sister has $120. You are saving $7 per week and your sister is saving $5 per week. How longwill it be before you and your sister have the same amount of money? Write an equation and solve. Help!! ill give brainlest Make and use a table: to compare mitosis and meiosis in humans. Vertical headings should include: What Type of Cell (Body or Sex), Beginning Cell (Haploid or Diploid), Number of Cells Produced, End-Product Cell (Haploid or Diploid), and Number of Chromosomes in New Cells. Find the multiplicative inverse of 1 x -3/10. Is President Putin's comparison to Peter the Great justified?Why or why not? Give specific examples to explain your argument.(In other words, is this a reasonable comparison?) write a python program to play a simplified version of the game hangman. have user 1 input a secret word with a minimum length of 6. then, take as input from user 2 one letter at a time until they guess a letter not contained in the secret word. at the end of the program, print out the number of guesses and the secret word. The torrid landscape of the desert makes it a difficult place for humans to live. The lack of rain and extreme temperatures create uniqueenvironmental circumstances for plants and animals as well.Which word has the same connotation as torrid as it is used in the passage?1. burning2. heated3. scorched4. warm A line that includes the point (1, 10) has a slope of 1. what is its equation in slope-intercept form? Which line uses all trochees? A. Simple problems, simple feelings B. To each of you i sing this song C. Toy store sausages swung by D. Recently, Faculty trusted me What made the young lord have a change of heart toward the elderly? How might he behave toward them in the future? Use evidence from paragraphs 44-46 to support your answer. Fill in the blank with the correct possessive adjective. Do not capitalize or use punctuation, as it will confuse the system.Activity by Lyndsay Bishop.CC-BY-NC-SA-4.01.2.3.4.madre es bonita. Hiscasa es grande. Ourcarro es verde. Theirprimos son cmicos. My PLS HELP WILL MARK BRILLIANT summary of an event that accured in stage 2 St.Lucy home.for girls raised by wolves A student claimed that reflect a triangle in a line, translating a triangle , rotating a triangle, and reflecting it in a point result in an image that is congruent to the original( pre-image) triangle. explain why they are correct. 3. At a carnival, of the games cost $1. Another 2.5% of the games cost $2. Whatpercent of the games do not cost $1 or $2? Line c has an equation of y = -5x + 3. Parallel to line c is line d, which passes through thepoint (2, -6). What is the equation of line d?