is solar energy reliable and powerful enough to be used in home or business​

Answers

Answer 1

Answer:

It all depends on what you are prepared to spend and what sort of system you install. I have both grid tie and stand alone systems installed at my home, and both work really well, although we initially had some inverter problems with the grid tie system until we decided to only use top shelf gear.

We have 6.6 kW grid tie system on the roof of the house which supplies around 3 times our requirements, and a 1.5 kW stand alone system that supplies the backyard workshop and pool pump. The grid tie system cost around $6500 to install, and the small stand alone system cost $4500 although this was designed and built by myself, so a purchased system may well be more (batteries are still expensive, but this price is coming down).

In the current configuration (top tier panels, Fronius grid tie inverter and Victron stand alone inverter and charge regulator), we have had no failures in several years, and power bills are something that happen to other people.

My advice is look at what your requirements are, then double that when you spec out your system and don’t go for the cheapest price. Buy your components based on the quality and reputation of the manufacturer, it will be expensive, but you will save money in the long run. A good manufacturer will guarantee their products for at least 12 years and you should expect to get at least 20 years of life out of them.

Explanation:

Solar energy is more than enough for any business or home, but if you want to know if it is cost effective, you need to run the numbers. It does have to be grid-tied though to provide electricity at night or when cloudy for multiple days. In most cases, batteries are not cost-effective at this time.

♡●♡ jess bregoli ♡●♡

#keep learning!!


Related Questions

Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.​

Answers

Answer:

Legend

Explanation:

In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history

Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.

Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;

"According to legend, Bolster the Giant terrorised the people of Cornwall.​"

Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

c.

by creating a brief animation with optional text insturctions

Hope this helps! Brainliest please

. A store offers a deposit of 6% on the cash price of $462. The deposit amount is?​

Answers

I got $27.72 is 6% of $462.

5 QUESTIONS, BRAINLIEST, PLEASE ANSWER

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?

input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number with a decimal?

float()
int()
print()
string()

Answers

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

Answer:

Cheri's should use  input()

A way to store a sequence of letters, numbers, or symbols

Jabari hould  use float()

Which function converts the user's input to a number with a decimal it is float()

candyCost = input("How much is the candy?")

what are the other way of getting website static​

Answers

Answer:

Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...

Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites

and Hugo

I hope this help =D

Answer:

Ten Static Website Generators

Jekyll. Jekyll is far and away the most popular static site generator. ...

Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...

Hugo. ...

Octopress. ...

Pelican. ...

Brunch. ...

Middleman. ...

Metalsmith.

how do you simplify
[tex] \frac{ \sin(90 - \alpha ) \times \tan( - \alpha ) \times \cos( \alpha - 180) }{ \ \cos(100) \sin(135?) } [/tex]

Answers

Answer:

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]

Explanation:

The given expression is presented as follows;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})}[/tex]

The sine, cosine, and tangent of the common angles are given as follows;

sin(A - B) = sin(A)·cos(B) - cos(A)·sin(B)

∴ sin(90° - α) = sin(90°)·cos(α) - cos(90°)·sin(α) = cos(α)

tan(-α) = -tan(α)

cos(A - B) = cos(A)·cos(B) + sin(A)·sin(B)

∴ cos(α - 180°) = cos(α)·cos(180°) + sin(α)·sin(180°) = -cos(α)

sin(135°) = sin(90° + 45°) = sin(90°)·cos(45°) + sin(45°)·cos(90°) = cos(45°) = √2/2

Therefore, we get;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times -cos( 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{cos( \alpha) \times -tan (\alpha) \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}}[/tex]

[tex]\dfrac{cos( \alpha) \times -\dfrac{sin(\alpha)}{cos(\alpha)} \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) }[/tex]

[tex]\dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) } = \dfrac{sin(2 \times \alpha) }{\sqrt{2} \times cos(100^{\circ}) }[/tex]

Therefore;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]

Question 10 :In a word processor, you can use the Word Count function to:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A count the number of images and animations in a document. B count the number of index entries in a document. C count the number of lines and paragraphs in a document. D count the number of primary and secondary headers in a document.

Answers

Answer:

C. count the number of lines and paragraphs in a document.

Explanation:

A word processor or word processing software application is a type of software designed to enable its users type, format and save text-based documents such as .docx, .txt, and .doc files. Some examples of a word processor are Microsoft Word, Notepad, Sublime text, etc.

In Microsoft Word, the number of words and pages you type in a document are automatically counted and displayed on the status bar at the left-bottom of the workspace.

Basically, you can use the Word Count function of a word processor to count the number of lines, pages, words, characters, and paragraphs in a text-based document.

How to fix my pc from this

Answers

Answer:

Restart it

Explanation:

Answer:

break it and throw it away

Explanation:

cuz why not

Soluciónes tecnológicas cáseras para combatir los rezagos del corona virus

ayuda porfa
pongo corona

Answers

Explanation:

Los cielos: se están enviando drones para responder al brote en todo el país. Desde patrullar los pasillos con altavoces que advierten a los residentes que usen máscaras, hasta pasar por las calles con carteles de códigos QR que los conductores pueden escanear con sus teléfonos para registrar información médica; Los drones permiten a las autoridades obtener información más rápido y, al mismo tiempo, mantener una distancia segura mientras realizan sus funciones. Los drones agrícolas también están rociando desinfectantes en áreas remotas, mientras que otros se han utilizado para entregar suministros médicos cruciales. Los drones utilizados para rociar desinfectante en las calles de la ciudad son 5 veces más eficientes que la pulverización manual 3. Nuestros teléfonos: los teléfonos inteligentes desempeñan un papel fundamental en la reducción de la exposición. Las aplicaciones de entrega ofrecen entrega sin contacto, mediante la cual los conductores dejan la comida en un punto específico, incluida una tarjeta que indica la temperatura de todos los involucrados en cocinar y entregar la comida. Otro ofrece a los usuarios mapas que marcan comunidades residenciales con casos confirmados y su proximidad a ellos. Mientras tanto, las aplicaciones de pago móvil están reduciendo la transmisión a través del papel moneda, que puede transportar virus hasta por 17 días. Con la penetración más alta del mundo de billeteras electrónicas y dos de los pagos móviles más grandes del mundo, la tecnología china está ayudando a frenar la propagación del coronavirus.

Enfermeras robotizadas y diagnósticos de inteligencia artificial: los robots también se utilizan en muchos hospitales chinos para entregar alimentos, medicamentos y otros suministros a los pacientes; desinfectar hospitales y otras áreas públicas; para controlar la temperatura de los pacientes; y para responder preguntas comunes. El coronavirus se diagnostica mediante IA, que puede leer miles de tomografías computarizadas en 20 segundos con una tasa de precisión del 96%.

whats the answer :)?
i will give brainslist​

Answers

Answer:

Transmission medium is the answer

If an if- else statement is true, it will include which kinds of results?

Answers

In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.

Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:

#include <stdio.h>

int main(void) {

int n = 2;

if(n == 3) { // comparing n with 3 printf("Statement is True!\n");

}

else { // if the first condition is not true, come to this block of code

printf("Statement is False!\n"); } return 0;

}

Output:

Statement is False!

What is a header row?

O the title of a document when it is centered

O the top row of a table that shows titles for the cells below

O the bottom row in a table that shows sums of numbers in cells

O the hidden space at the top of each page

Please help ASAP taking unit test

Answers

Answer:

b. the top row of a table that shows titles for the cells below

Explanation:

A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.

In the attached figure, the first row with a darker shade of background color is the header row for the table.

Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be

Answers

Tool box

Hope this helps! :)

All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages

Answers

Answer:

hard copy attachments

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.

In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.

1 which of the following tool is used to remove the area that is common to both when the parts of two objects are connected in inkscape
a union
b difference
c group
d duplicate
2 which of the following is a tool used to combine parts of images together to make them a unit in inkscape
a group
b ungroup
c mask
c false
which of the following tool is used to be to align texts according to the path of an object in inkscape
a test and font
b put and path
c object to path
d convert to text ​

Answers

Answer:

1. group

2. false

3. put and path

When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?

Answers

Answer:

Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.

Explanation:

Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.

Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.

Describe how serial data access finds data

Answers

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController

Answers

od. adding a segue fro. the last viewcontroller

State the feature of a database management system that prints data in a specified format with a title.

Answers

Answer:

Data structuring

A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.

DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.

Hence the format with a title would be data structuring.

Learn more about the database management system that prints.

brainly.com/question/22486925.

the term that orders data numerally or alphabetically is called​

Answers

Answer: To sort

Explanation: I double checked online

Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.

PYTHON CODING

Answers

Answer:

import math  

def isPerfectSquare(n):

 s = int(math.sqrt(n))

 return n == s*s

def countPerfectSquares(k,m):

 q = 0

 for i in range(k,m):

   if isPerfectSquare(i):

     q=q+1

 return q

print(countPerfectSquares(10,40))

Explanation:

Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.

Identify characteristics of object-oriented programming design. Choose all that apply


-It breaks the solution into independent objects.


-it is a simple, uncomplicated approach to programming.


-It uses objects that send data to other objects.


-It supports a modular design that encourages the reuse of code.

Answers

Answer:

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Explanation:

Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program

An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code

Therefore, the correct options are;

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Answer:

all expect b

Explanation:

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

Write a HTML code for displaying the following​

i need an answer urgently

Answers

Answer:

Following are the code to the given question:

Explanation:

<html>

<body>

<p align="center" >VOCATIONAL SUBJECT</p>

<table align="center" border="2">

 <tr>

   <td rowspan="2">YEAR</td>

   <td colspan="5">Vocational course</td>

 </tr>

<tr>

   <td rowspan="1">IT</td>

   <td rowspan="1">CS</td>

   <td rowspan="1">EL</td>

</tr>

    <tr>

   <td colspan="1">2016</td>

   <td colspan="1">66</td>

   <td colspan="1">68</td>

   <td colspan="1">60</td>

 </tr>

 <tr>

   <td colspan="1">2017</td>

   <td colspan="1">77</td>

   <td colspan="1">78</td>

   <td colspan="1">80</td>

 </tr>  

 <tr>

   <td colspan="1">2018</td>

   <td colspan="1">60</td>

   <td colspan="1">67</td>

   <td colspan="1">70</td>

   </tr>

</table>

</body>

</html>

What is machine level language ?​

Answers

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.

why is computer system maintenance important​

Answers

Answer:

Because it helps your computer to have better performance and last longer

Explanation:

Draw an electic bettle and label 3.​

Answers

Explanation:

hope it helps thank you❤

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?

A. Upgrade to a 64-bit version of Windows.
B. Change the memory timings in the BIOS to a slower (higher) setting
C. Return both modules for a replacement
D. Reboot the computer and run memory diagnostic tests on the memory
E. Make sure that both modules are seated properly in their slots.

Answers

Answer: A. Upgrade to a 64-bit version of Windows.

Explanation: In this situation, you are most likely using a 32-bit version of Windows, which can only address a maximum of 4 GS of RAM. Some of the 4 GB is used by drivers hence it only reports 35 GB of System RAM. Upgrading to a 64-bit version of Windows should fix the problem.

The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you will not need to change the memory timings. When you do it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory not recognized by the BIOS.

Explanation:

We should upgrade to a 64-bit version of Windows. Hence option A is correct.

What is Windows?

Windows is defined as a collection of different proprietary graphical operating system families that Microsoft has created and is promoting. Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).

Most likely, you are using a 32-bit version of Windows in this case, which can only address up to 4 GS of RAM. It only reflects 35 GB of system RAM since some of the 4 GB are being consumed by drivers. The issue should be resolved by upgrading to a 64-bit version of Windows. You can detect whether particular memory storage places are failing by testing the memory. Memory that is not recognized by the BIOS will not be enabled by Device Manager.

Thus, we should upgrade to a 64-bit version of Windows. Hence option A is correct.

To learn more about Windows, refer to the link below:

https://brainly.com/question/13502522

#SPJ5

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

Other Questions
which social changes occurred after world War l and prior to world War ll? choose three answers a)Civil rights for African Americansb)increased mobility through technology c)new roles for women d) educational opportunities for veteranse)breaks with tradition can someone answer fast please bc i have a test Got it never mind. The only reason I'm typing more is to fill out the required space What are the causes and effects of gender based violence (300 words)...how can GBV be addressed? How do you say seldom in Spanish?a.todos las semanasb.raramente What global forces are affecting the U.s economy? What consequences are they having? How might they affect your own life? *subject Sociology* Which of these increases the friction of someone walking on the floor? The movement of the progress bar may be uneven because questions can be worth more or less (including zero) depending on your answer.Match each expression on the left with its equivalent on the right. Some answer choices on the right will not be used. which is heavier a kilogram of iron or a kilogram of feathers? Mila is a teacher and takes home 31 papers to grade over the weekend. She can grade at a rate of 8 papers per hour. Write a recursive sequence to represent how many papers Mila has remaining to grade after working for n hours. Alana, a talk show host, invited The studio audience to voice their opinions on raising The driving age. Of the 10 audience members who chose to speak, seven of them were against the idea. Is this sample of the audience members likely to be biased. Yes or no please help fast !!! Find the value of L in the equation. s=(n2)(a+L) Racing Horse Corporation reported net income for 2010 of $200,000, sales of $540,000, expenses (excluding depreciation) of $180,000, and depreciation expense of $60,000. The company's accounts receivable balance increased by $40,000 during the year and its accounts payable balance remained the same. What is the estimated change in cash for the year ? a.Suppose a group of bobcats that normally live and hunt in the tops of mountains, start hunting prey at the base of themountain and move into the valley below. Which of the following will most likely happen to the prey in the valley?Their numbers will soon increase.b. Their numbers will soon decrease.C. They will move to the tops of the mountains.d. They will remain unchanged.Please select the best answer from the choices provided OBCODMark this and retumSave and ExitNextSubmit theal speedthe time.Sundeep travels by train to a meeting in Barcelona.Barcelona is 270 km from where he lives. He catches the trainat 9:45 a.m. The train travels at an average speed of 120 km/h.At what time will the train arrive in Barcelona? can you help me get the answer for this Q, please :) If the profits in your consulting business increase by 6% one year and decrease by 3% the following year, your profits are up by 3% over two years Determine whether the triangles are congruent. Explain your reasoning .SAS (Side, Angle, Side) or ASA (Angle, Side, Angle) describe the processes that are responsible for condensation to take place close to the ground Help pleaseee Thankyou so much!