Which operating system is not proprietary and does not rely on cloud-based applications?
Question 2 options:
a. Windows

b. Chrome

c. macOS

d. Linux

Answers

Answer 1
Option A just yoke the test
Answer 2
Answer is = A windows

Related Questions

Can computers be opened from the All programs submenu

Answers

Answer:

I am pretty sure...if not try duck duck go

You have cut the range A1:A5, and want to paste it to C1:C5. Which of the following statements is true?
a.Before you paste it, you need to select C1:C5.
b.Before you paste it, you only need to select cell C1.
c.After you paste it, the information is deleted from the Clipboard.
d.After you paste it, the information is deleted from the original location.

Answers

The answer is Options a & d,

Before you paste it, you need to select C1:C5.After you paste it, the information is deleted from the original location.

The question described the process of Copy only the formatting of the cell range A1:A5 and paste it to the cell range C1:C5.

What is Range in Excel?

The range ("A1:A5") can pick many cells at once. The cells from A1 through A5 will be selected by the word "select." Things to Keep in Mind All of the RANGE property-related methods are also available in VBA.

A cell or group of cells is all that a range is. In VBA, the word range is frequently used to choose a specific cell or group of cells. Everything in VBA refers to cells and ranges, just like it does when working with Excel. Comprehending the fundamentals of range in VBA is crucial for understanding the VBA.Move cells by using Cut and PasteSelect a cell or a cell range.Select Home > Cut Cut or press Ctrl + X.Select a cell where you want to move the data.Select Home > Paste Paste or press Ctrl + V.

To know more about Range in Excel refer to :

https://brainly.com/question/28144037

#SPJ4

There are various ongoing competitions or complexities facing logistics and transportation companies in managing its supply chain operations either domestically or internationally, from the point of shippers until the point of consumption. These complexities have become a barrier and less competitive force among the other competitors in leveraging the profit margin and to be consistent in the market. Elaborate FIVE (5) competitions or complexities and meantime, propose solutions to overcome those competitions or complexities.​

Answers

Complex network of suppliers, manufacturers, and customers: Logistics and transportation companies often have to manage a complex network of suppliers, manufacturers, and customers, which can be challenging to coordinate and optimize. One solution to this complexity is to implement a supply chain management software that can help track and manage the flow of goods and information throughout the supply chain.

Limited capacity and resources: Logistics and transportation companies may face limited capacity and resources, which can impact their ability to meet demand and deliver goods on time. One solution is to implement just-in-time inventory management, which allows companies to only stock the necessary inventory needed to meet demand and reduce waste.

Volatility in demand and supply: Demand and supply can be volatile, which can make it difficult for logistics and transportation companies to forecast and plan effectively. One solution is to implement demand planning and forecasting tools, which can help companies predict and plan for changes in demand.

High transportation costs: Transportation costs can be a major factor in the logistics and transportation industry, and they can be difficult to manage and control. One solution is to implement a transportation management system (TMS), which can help companies optimize routes and reduce transportation costs.

Regulatory compliance: Logistics and transportation companies must adhere to a range of regulations, including safety regulations, environmental regulations, and trade regulations. One solution is to invest in compliance management software, which can help companies ensure compliance with all relevant regulations.

opportunities & challenges of emmerging technology for ethiopia​

Answers

Answer:

There are many potential opportunities and challenges that emerging technologies could bring to Ethiopia. Some potential opportunities include:

Improved access to information and education: Emerging technologies such as the internet and mobile devices could help to increase access to information and educational resources, which could in turn improve educational outcomes and economic opportunities for people in Ethiopia.Increased efficiency and productivity: Emerging technologies such as artificial intelligence, robotics, and automation could help to improve the efficiency and productivity of various industries in Ethiopia, which could help to drive economic growth and development.Improved healthcare: Emerging technologies such as telemedicine and medical devices could help to improve access to healthcare services in Ethiopia, particularly in rural and remote areas where access to healthcare is often limited.Improved communication and connectivity: Emerging technologies such as 5G networks and satellite technology could help to improve communication and connectivity in Ethiopia, which could have numerous benefits for both individuals and businesses.

However, there are also potential challenges that emerging technologies could bring to Ethiopia, including:

The potential for job displacement: As emerging technologies become more prevalent, they could potentially displace workers in certain industries, which could lead to unemployment and social unrest.The potential for increased inequality: If emerging technologies are not adopted and implemented in an equitable way, they could exacerbate existing inequalities and create new ones.The need for infrastructure and investment: In order for emerging technologies to have a positive impact in Ethiopia, significant investment in infrastructure and training will be necessary. This could pose a challenge for a country with limited resources.The potential for security and privacy concerns: Emerging technologies also raise important security and privacy concerns, which will need to be addressed in order to ensure the safe and responsible use of these technologies.

java the withdraw method works differently: it should first check if the balance is greater than amount to withdraw to allow the transaction to go. and also to look at the new balance and see if it goes below minimum balance to decide whether to subtract the fees from the current balance.

Answers

To implement the withdraw method as described, you could use the following pseudocode:

def withdraw(amount):

 if balance > amount:

   balance -= amount

   if balance < minimum_balance:

     balance -= fees

 else:

   print("Insufficient funds.")

The withdraw method first checks if the balance is greater than the amount being withdrawn. If it is, it subtracts the amount from the balance. Then, it checks if the new balance is below the minimum balance. If it is, it subtracts the fees from the balance. If the balance is not greater than the amount being withdrawn, it prints a message indicating that there are insufficient funds.

How do you make a spreadsheet with formulas to show foriegn currency

Answers

Excel's Simple Currency Conversion function can be used to create a spreadsheet containing formulas to display foreign currencies is VLOOKUP(C2,F2:G7,2,0)*A2.

How can I have Excel perform currency conversions automatically?All you have to do is visit the sheet that has the exchange rates. Refresh All may be found under Queries & Connections > Refresh All. The currency conversion formula used by Excel would automatically update in addition to refreshing the exchange rates imported from the internet.Excel's Simple Currency Conversion function can be used to create a spreadsheet containing formulas to display foreign currencies: =VLOOKUP(C2,F2:G7,2,0)*A2. The Vlookup syntax finds the currency in the Excel Table, then gets the current exchange rate from column G and converts the USD value.        

To learn more about Currency conversion formula refer to:

https://brainly.com/question/17906368

#SPJ1

1. Machine learning is

A) Program building technology, which includes training on Examples (with or without a teacher)

B) construction of the hardware architecture of modern computers c) implementation of multithreaded computing algorithms

Answers

Answer: A

Machine learning is a form of AI which a machine is subjected on a dataset to learn from the data, often to generate new media.

phanteks (ph-p1000gc) revolt pro series, 80plus gold, fully modular, patented power combo technology, 1000w atx power supply review

Answers

Power combo technology with a 1000w atx power supply, 670 Review of all high grade construction.

Is Phanteks a reliable brand of PSU?

A potent yet effective PSU is the Phanteks AMP 1000W White Edition. It received an 80 Plus Gold rating because it is 92% efficient at half load.

How effective is Phanteks?

When it comes to mainstream ATX chassis, the Phanteks Eclipse G360A stands out because it offers good airflow and RGB. It has some design flaws, but for $100 and with three aRGB PWM fans that help deliver excellent thermal performance, it's a fantastic chassis for builders on a budget.

To know more about technology visit:-

https://brainly.com/question/9171028

#SPJ4

Why is it important to judge relevance of facts prior to performing scientific experiments?

Answers

It is important to judge the relevance of facts prior to performing scientific experiments because this helps to ensure that the experiments are well-designed and focused on answering specific research questions. By considering the relevance of the facts, researchers can identify the most important variables to measure and control in the experiment. This helps to reduce the risk of collecting unnecessary or irrelevant data, which can waste time and resources.

Additionally, judging the relevance of facts can help researchers to identify any potential biases or limitations in their experiments. This can help them to design experiments that are more objective and accurate, and to interpret their results more carefully.

Overall, judging the relevance of facts is an important part of the scientific process because it helps researchers to focus their efforts on answering important research questions and to design and conduct experiments that are more likely to produce meaningful and reliable results.

Use the most appropriate notation among O, Q, and W to indicate the time efficiency class of sequential search a) in the worst case. b) in the best case. c) in the average case.

Answers

Notation(O) is used to measures the worst case time complexity. In the best case, the time complexity of Linear Search is O. (1). In the worst-case scenario, the time complexity is O. (n).

What is linear search ?A linear search, also known as a sequential search, is a method of finding an element within a list in computer science. It checks each element of the list in turn until a match is found or the entire list has been searched.Linear search is usually very simple to implement and useful when there are only a few elements in the list or when performing a single search in an un-ordered list.When searching for multiple values in the same list, it is often advantageous to pre-process the list in order to use a faster method. For example, one could sort the list and perform binary search on it, or construct an efficient search data structure from it.If the list's content changes frequently, repeated re-organization may be more trouble than it's worth.

To learn more about linear search refer :

https://brainly.com/question/26533500

#SPJ1

suppose we have a 32bit virtula address, 4gb physical memory, 16kb pages, and a 32kb l1 cahce with 32b cache lines

Answers

Think of a device having a 32-bit logical address range. A page table may contain up to 1 million entries (232/212) if the system's page size is 4 KB (212).

A 32-bit system: What is it?

Computer systems containing a processor, memory, and other significant system components that operate on data in 32-bit units are referred to as 32-bit computing in computer architecture. 32-bit computers are more effective at handling massive calculations and processing more data per clock cycle than computers with lesser bit widths.

Describe a 32-bit example.

OS/2 and Windows NT are two excellent examples of the first 32-bit operating systems. 32-bit Windows versions are sometimes referred to as WOW32. Currently, 64-bit operating systems are replacing 32-bit operating systems.

To know more about 32-bit system visit;

https://brainly.com/question/14564853

#SPJ4

From the options given below, choose the lead that provides the most direct transverse plane view of the interventricular septum of the heart.
a. lead V1
b. lead V3
c. lead V5
d. lead V7

Answers

The interventricular septum of the heart can be seen most clearly in the transverse plane through lead V1.

Which leads track the electrical activity of the heart's frontal plane?

The strength of the electrical signal is measured in certain directions inside the frontal plane by the standard and augmented limb leads. The unipolar chest leads measure the potential difference between the chest's surface and an unrelated composite electrode.

Which precordial lead offers a transverse view of the anterior wall of the left ventricle?

Groups of the precordial chest leads can be used to see various parts of the heart. The anterior leads, also known as leads V1, V2, V3, and V4, collectively provide a clear view of the anterior region of the heart. Together, leads V5 and V6 scan the left ventricle's lateral wall.

To know more about transverse visit:-

https://brainly.com/question/13618693

#SPJ4

which of the following statements is true? you can open multiple documents at once by control-clicking or shift-clicking in the splash screen. you can open multiple documents at once by control-clicking or shift-clicking in the open dialog box. you can only open one document at a time in photoshop. you can open multiple documents at once by choosing select all in the import dialog box.

Answers

Answer: The answer is  you can open multiple documents at once by choosing select all in the import dialog box.

Explanation: Hope this was helpful

Answer:

u can open multiple documents at once by choosing select all in the import dialog box

hope this helps

python sets are a powerful tool in programming, and are made even more useful and dynamic with many methods. match these correctly

Answers

Python sets are a powerful tool in programming, and are made even more useful and dynamic with many methods. This statement is true because Python serve you with many library.

What is Python Programming?

Python is a computer programming language commonly used to build websites and software, automate tasks, and perform data analysis. Python is a general-purpose language. H. It can be used to create a wide variety of programs and is not specific to any particular problem. Python has a simple syntax similar to English. Python has a syntax that allows developers to write programs in fewer lines than other programming languages.

Learn more about Python: https://brainly.com/question/26497128

#SPJ4

Analyze and compare iOS and Android operating systems (OS) to accurately differentiate between the two. (Select all that apply.)
Android releases updates often, while iOS is more sporadically released.
iOS is limited to Apple products, while Android has multiple hardware vendors.
Android is an open source OS based on Linux, unlike iOS, which is a closed and proprietary system.
iOS is more vulnerable to attack due to being a closed source, while Android is more secure with multiple partners working to secure the OS.

Answers

iOS is only compatible with Apple devices, but Android supports a variety of hardware manufacturers and is open source platform based on Linux, in contrast to iOS, and that's a closed or patented system.

Describe operating systems in simple terms.

An software (OS) is the software that controls most other application applications running on a computer after being installed into the system first by a boot program. Throughout a stated api, the network applications seek services first from software (API).

What function does OS serve?

The most crucial bit of technology that runs on a machine is the operating system. This then handles the resources, functions, program, and hardware of the computers. We can interact only with computer using this method even if you don't understand its language.

To know more about Operating system visit:

https://brainly.com/question/1763761

#SPJ4

which of the following is not a computer application

Answers

The technological feature which is not a computer application is: c. Apple OSX.

What is an application software?

In Computer technology, an application software can be defined as a type of software program which is designed and developed to enable end users perform a variety of tasks on a computer system.

This ultimately implies that, an application software avails end users an opportunity to accomplish tasks such as create text documents through the use of Microsoft Word.

Furthermore, Apple OSX is an example of a system software (operating system) while the other examples of an application software include the following:

Internet ExplorerPaintWindows Media PlayerNotepad

Read more on software here: brainly.com/question/25703767

#SPJ1

Complete Question:

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

Question 10 of 25
Which three statements describe impacts of computers on the world around
you?
A. Computers control traffic lights and public transportation
systems.
B. Computers are used to order meals from paper menus in
restaurants.
C. Computers allow people to take classes and complete
assignments remotely.
D. Computers are used to track and keep records for health care and
education.

Answers

Answer:

A. Computers control traffic lights and public transportation systems.

C. Computers allow people to take classes and complete assignments remotely.

D. Computers are used to track and keep records for health care and education.

Explanation:

Computers have had a significant impact on many aspects of modern life, including transportation, education, and healthcare. They are used to control traffic lights and public transportation systems, which helps to improve efficiency and safety. They are also used to facilitate distance learning and to keep track of important records in the healthcare and education sectors.

create a view named to10paidinvoices that returns three columns for each vendors

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that create a view named to10paidinvoices that returns three columns for each vendors.

Writting tge code:

CREATE OR REPLACE VIEW customer_addresses AS

   SELECT

   c.customer_id,

  email_address,

   last_name,

   first_name,

   ba.line1 AS bill_line1,

   ba.line2 AS bill_line2,

   ba.city AS bill_city,

   ba.state AS bill_state,

   ba.zip_code AS bill_zip,

   sa.line1 AS ship_line1,

   sa.line2 AS ship_line2,

   sa.city AS ship_city,

   sa.state AS ship_state,

   sa.zip_code AS ship_zip

FROM

   customers c

       JOIN

   addresses ba ON c.customer_id = ba.customer_id

       AND c.billing_address_id = ba.address_id

       JOIN

   addresses sa ON c.customer_id = sa.customer_id

       AND c.shipping_address_id = sa.address_id;

/*

2

Write a SELECT statement that returns these columns from the customer_addresses

view that you created in exercise 1: customer_id, last_name, first_name, bill_line1.*/

SELECT

   customer_id, last_name, first_name, bill_line1

FROM

   customer_addresses;

See more about JAVA at brainly.com/question/18502436

#SPJ1

when would it make sense not to use database system ​

Answers

 not needed for the user as it can cast a huge amount and overheads of purchasing the database and maintaining it:

Explanation:

14. The Hazard Communication Standard (HCS) is also known as the "right to know" law. A. O True B. O False​

Answers

Answer:

A. True

Explanation:

The Hazard Communication Standard (HCS) is also known as the "right to know" law. This law was enacted in the United States in 1986 and requires employers to provide employees with information about hazardous chemicals that are used in the workplace. The HCS is based on the principle that workers have a "right to know" about the hazards of chemicals that they may be exposed to at work.

write a pseudocode statement that multiple the variable subtotal by 0.15 and assign the result to the variable totalfee

Answers

Answer:

Set totalFee = subtotal * 0.15

Explanation:

Consider a Shortest Job First (SJF) CPU scheduler, with the following process workload:
Process Arrival Time CPU Burst
P1 t 5
P2 t+6 7
P3 t+10 5
P4 t+2 3
P5 t+8 9
P6 t+4 1
Assume that the CPU is free and no other processes exist in the ready queue when P1 enters the ready queue at time t. Determine the schedule of process execution and compute the wait times for each of the above six processes. Which of the following is a TRUE statement about the average wait time and the maximum wait time for the six processes?
A. The average wait time is between 5.0 and 5.5 time units; the maximum wait time is between 11 and 12 time units.
B. The average wait time is between 3.5 and 4.0 time units; the maximum wait time is between 11 and 12 time units.
C. The average wait time is between 4.0 and 4.5 time units; the maximum wait time is between 12 and 13 time units.
D. The average wait time is between 4.0 and 4.5 time units; the maximum wait time is between 11 and 12 time units.

Answers

Answer:

Shortest Job First (SJF) CPU scheduler:- Process Arrival Time CPU Burst P1 t 5 P2 t+6 7 P3 t+10 5 P4 t+2 3 P5 t+8 9 P6 t+4 1 Since we have to deal with the Waiting time therefore we will assume t=0, so that to make our calculations easier.

mary is interested in moving into a career as a penetration manager. which of the following it certifications should she pursue? CEH, CISM, CISSP

Answers

Pursuit of a CEH certificate you can find employment in one of the IT industries that is expanding the quickest with this qualification.

What does penetration serve to accomplish?Penetration testing's primary goal is to assess how likely it is that systems or end users will be compromised and to assess any potential effects that might result from such an incident on the resources or operations that are at stake.Typically, testers that are ethical hackers will conduct pen tests. These IT professionals are ethical hackers that assist businesses in locating potential entry points into their infrastructure by using hacking techniques.   Pursuit of a CEH certificate You can find employment in one of the IT industries that is expanding the quickest with this qualification.    

To learn more about Penetration testing's refer to:

https://brainly.com/question/26555003

#SPJ4

Which of these is associated with a specific file and provides a way for the program to work with that file?a. Filenameb. Extensionc. File objectd. File variable

Answers

Answer:

C................................

Which construction sites are more likely to be affected by biological hazards?
Select the 3 answer options that apply.

Those where groundwork is taking place


Those where refurbishment is taking place


Those where framing is taking place


Those where demolition work is taking place

Answers

Biological hazards are more likely to affect areas where demolition is going place.

What biological risks are there in construction?

When working on air handling systems, repairing sewers, demolishing buildings, or other construction projects, workers may come into touch with contaminated or disease-carrying soil. water. bird or bat droppings, insects (such as mosquitoes and ticks),

What are the top 4 dangers, as identified by OSHA?

The Big Four Construction Hazards—falls, electrocution, caught-in, and struck-by—are the main topics of these talks. The four risks that are frequently present on construction sites will be included in all training materials, with an emphasis on how to identify and prevent them.

To know more about biological hazards visit:

https://brainly.com/question/29602984

#SPJ1

C# is strongly typed language means that every data value doesn't need to have an associated data type.

true
or
false​

Answers

C# is strongly typed language means that every data value doesn't need to have an associated data type is false​

What does a strongly typed language means?

A language that enforces strong typing demands that every object have a type. For an operation to be permitted on an object in the highly typed language, it must first be checked at runtime. There is no way to go around the type system. If we attempt to apply an operation on an object that does not support that operation in a strongly typed language, an error will be raised.

A language is said to be statically typed if type checking is done at compile time rather than run time.

Therefore, According to the description of strongly typed, we are concerned that checks are performed at run-time in strongly typed while C does not. The strongly typed implementation of C is thus avoided.

Learn more about strongly typed language from

https://brainly.com/question/29692224
#SPJ1

Going from my previous question... Your system crashes on Friday. How would you restore your system using the dump levels that were used in the previous questions

Answers

Testing backups is as important as data backup & restoration. Data backup's main objective is to enable data restoration in the future.

What happens when system crashes?

When it comes to computers, a crash is when a program or the operating system stops working properly. When: Hardware has failed in a way that cannot be repaired. Data in the operating system have become tainted.

What causes a system to crash?

Errors in the computer hardware or the operating system (OS) cause computers to crash. Although software faults are undoubtedly more frequent, hardware errors can be extremely damaging and are more difficult to detect. In order for a computer to operate properly, a number of hardware components

To know more about system visit:

brainly.com/question/17313982

#SPJ1

How can an Excel table be added to a Word document? Check all that apply

Answers

by using the Insert Object dialog box
by linking an Excel table to a Word document
by drawing the Excel table in the Word document
by using the Convert Text to Table option in Word
by inserting Quick Tables into the Word document


The answers will be A & B.

Fill in the countdownFrom method, so it prints a line with each number starting with the first number down to the second number. For example, calling countdownFrom(5, 2) will print: 5 4 3 2 You may assume that the second parameter will be no larger than the first number. Make sure your run method calls countdownFrom(10, 5)!

Answers

Answer:

def countdownFrom(first, second):

   for i in range(first, second - 1, -1):

       print(i)

countdownFrom(10, 5)

Explanation:

since you didnt mention what program to use, im assuming you are using python

A potential customer would like to try Microsoft 365 Business Premium for a few days, just to test it. Is that possible?

Answers

If a customer like to try Microsoft 365 Business Premium for a few days, just to test it. It is possible, the person can go for a free trial subscription.

What is Microsoft 365 Business Premium?

Microsoft 365 Business Basic will replace Office 365 Business Essentials. Microsoft 365 Business Standard will replace Office 365 Business Premium.

Keep current with the latest versions of Word, Excel, PowerPoint, and other programs. Use Outlook, Exchange, and Microsoft Teams to communicate with customers and coworkers. Manage your files from anywhere with 1 TB of OneDrive cloud storage per user.

Therefore, it is possible Microsoft 365 Business Premium for a few days by taking a free trial subscription.

To learn more about Microsoft 365 Business Premium, refer to the link:

https://brainly.com/question/29732272

#SPJ1

Other Questions
the subject of kobayashi eitaku's body of a courtesan in nine stages of decomposition from the 1870s comes from a(n) context. Genetic variation among humans is relatively small when compared to other species. Where in the human genome does most of the diversity occur?. which of the following represents the definition of information management? group of answer choices the act of conforming, acquiescing, or yielding information. a method or system of government for information management or control. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively. If m is the centroid of triangle abc, am = 44, ce =54, and dm = 23, find each missing measure. fm=? Rewrite the equation in logarithmic form.9^5 = 59,049 Do you think that practicingmathematics will bring Peaceand Harmony in your life?.Explain your thinking. Which political party function involve putting where a candidate tand on the "iue" into writing?financing a campaigndeigning a platformrunning a campaignchooing a candidate What practice by retreating Soviet troops prevented resource gains for German troops? The Soviets froze the oil inside the military tanks. The Soviets initiated a blitzkrieg against the Germans. The Soviets enacted a scorched earth policy. The Soviets cut off the supply lines from the Axis powers. Which celebrity recently made amends at the 7-11 where he regularly shoplifted as a teen?. Select each equation which is equivalent to 60% of 25. 0.6 25 = x x 1.6 = 25 610=x25 60100=25x x25=60100 6.0 25 = x considering the innervation of the circular muscles of the bladder neck, which classification of drug is used to treat bladder neck obstruction? Briefly describe Thomas Jefferson's relationship with the institution of slavery. How did Jefferson's public and private beliefs and actions differ? For this assignment, you will complete the following steps:Respond to Short-Answer QuestionsRespond to a Long-Answer Question Online entertainment streaming services have gained in popularity in recent years as an alternative to traditional television. One such company has seen steady growth in each period of 3 months, called a quarter, over the past 4 years. The scatterplot shows the relationship between the number of quarters passed since January 2014 and the number of members to the streaming service. A least-squares equation that summarizes this relationship is Based on the residual plot, is a linear model appropriate for summarizing this relationship?A linear model is appropriate because the value of r is close to 1.A linear model is appropriate because the residual plot is curved.A linear model is not appropriate because the residual plot shows a clear pattern.A linear model is not appropriate because the scatterplot relating time and subscribers shows a clear pattern.PLS HURRY To be effective at helping the sugar from the blood move into the cells, insulin (which is a protein) should be taken orally sublingually by injection sub-Q (subcutaneously - under the skin), by injection IM (into the muscle). 8. going public establishes a market value for the firm's stock, and it also ensures that a liquid market will continue to exist for the firm's shares. this is especially true for small firms that are not widely followed by security analysts. When working with a family in need, which resources are emphasized whenever possible?family education servicesfamily food stamp servicesfamily housing servicesfamily preservation services Classify the following triangle. Check all that apply.A. Equilateral. B. Obtuse. C. ScaleneD. RightN E. AcuteF. Isosceles swhat happens to the diagonal of a rectangle when the rectangle is reflected across a line of symmetry? what does this suggest about the diagonals of rectangles? What was the significance of the impeachment of President AndrewJohnson?OIt threatened the constitutional separation of powers.It accelerated postwar economic growth in the North.It helped white Southerners recover their losses from the Civil War.OIt showed the Presidency had become more powerful than Congress. Need this question answer quickly