please answer soon
Anonymity allows you to have freedom of
the internet
downloads
expression
information

Answers

Answer 1
Answer: Internet, I’m pretty sure about my answer.

Explanation: Anonymous communications have an important place in our political and social discourse.
Answer 2

Answer:

[ Freedom of expression ]

Why?

it was either that or internet but internet just means being able to use it rather than do whatever i guess


Related Questions

Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles. Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements.

Answers

Answer:

Explanation:

The following is written in C++ and asks the user for inputs in both miles/gallon and dollars/gallon and then calculates the gas cost for the requested mileages using the input values

#include <iostream>

#include <iomanip>

using namespace std;

int main () {

   // distance in miles

   float distance1 = 20.0, distance2 = 75.0, distance3 = 500.0;

   float miles_gallon, dollars_gallon;

   cout << "Enter cars miles/gallon: "; cin >> miles_gallon;

   cout << "Enter cars dollars/gallon: "; cin >> dollars_gallon;

   cout << "the gas cost for " << distance1 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance1 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance2 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance2 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance3 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance3 / miles_gallon << "$\n";

   return 0;

}

Modify the following code so that:
Make the pool start with a random number ([20, 30] inclusive) of coins.
Based on the number of the randomly generated coins at the beginning,
let the computer determine whether Player 1 or Player 2 will be the
winner based on the winning strategy (by printing out the winner).
After deciding the supposed winner and loser, let the computer play
out both of the roles. For the winner, the computer should be applying
the winning strategy; for the loser, the computer should generate a
random amount of coins while following all the rules of the game
Rules of the game:
a) The game starts with 22 coins in a common pool
b) The goal of the game is to take the last coin
c) Two players take turns removing 1, 2, or 3 coins from the pool
d) A player can NOT take more coins than remaining coins in the pool
e) After each turn, the judge announces how many coins remain in the
pool
f) When the last coin is taken, the judge announces the winner
turn=0 #turn=1 remaining coins-24 print(Take turns removing 1, 2, or 3 coins. ) print(You win if you take the last coin.)

Answers

Answer:

Explanation:

The following code makes all the necessary changes so that the game runs as requested in the question. The only change that was not made was making the number of coins random since that contradicts the first rule of the game that states that the game starts with 22 coins.

turn = 0

remaining_coins = 22

print("Take turns removing 1, 2, or 3 coins. ")

print("You win if you take the last coin.")

while remaining_coins > 0:

   print("\nThere are", remaining_coins, "coins remaining.")

   if turn % 2 == 0:

       # Player1

       taken_coins = int(input("Player 1: How many coins do you take?"))

       turn += 1

   else:

       # Player2

       taken_coins = int(input("Player 2: How many coins do you take?"))

       turn += 1

   if taken_coins < 1 or taken_coins > 3 or taken_coins > remaining_coins:

       print("That's not a legal move. Try again. ")

       print("\nThere are", remaining_coins, "coins remaining.")

       if turn % 2 == 0:

           # Player1

           taken_coins = int(input("Player 1: How many coins do you take? "))

           turn += 1

       else:

           # Player2

           taken_coins = int(input("Player 2: How many coins do you take? "))

           turn += 1

       remaining_coins -= taken_coins

   else:

       remaining_coins -= taken_coins

   if remaining_coins - taken_coins == 0:

       print("No more coins left!")

       if turn % 2 == 0:

           print("Player 1 wins!")

           print("Player 2 loses !")

       else:

           print("Player 2 wins!")

           print("Player 1 loses!")

           remaining_coins = remaining_coins - taken_coins

   else:

       continue

Which three of the following statements are true about using a WYSIWYG editor?

You can preview the web page you’re creating, but it might appear very differently in a web browser.
After creating a web page, you need to inspect the code the editor generates for correctness.
You can write your own HTML code to create a web page.
You can modify the HTML code the editor generates.
You don’t need any knowledge of HTML to be able to create a web page.

Answers

Answer:

It would be 3

You can preview the web page you’re creating, but it might appear very differently in a web browser. You can modify the HTML code the editor generates. You don’t need any knowledge of HTML to be able to create a web page.

What is WYSIWYG editor?

A WYSIWYG editor stands for "What You See Is What You Get" editor. It is a software application that allows users to create and design web pages without needing to know HTML or other coding languages.

The following are true statements about using a WYSIWYG editor:

You can preview the web page you're working on, but it may look very different in a browser.The HTML code generated by the editor can be modified.You do not need any HTML knowledge to create a web page.

It is not always necessary to inspect the code generated by the editor for correctness after creating a web page, as the editor should ideally generate correct code.

Thus, while you can write your own HTML code to create a web page, this is not a feature unique to WYSIWYG editors.

For more details regarding WYSIWYG editors, visit:

https://brainly.com/question/31574504

#SPJ2

can someone write the answers pls :(?

Answers

Answer:

A:  job sharing.

B: part-time working.

C:  flexible hours.

D:  compressed hours.

A: Payroll workers, Typing pool workers, Car production workers, Checkout operators, Bank workers

B: Website designers, Computer programmers, Delivery drivers in retail stores, Computer maintenance staff, Robot maintenance staff.

3: Can lead to unhealthy eating due to dependency on ready meals, Can lead to laziness, Lack of fitness/exercise, Manual household skills are lost.

4: Microprocessor controlled devices do much of the housework, Do not need to do many things manually, Do not need to be in the house when food is cooking, Do not need to be in the house when clothes are being washed, Can leave their home to go shopping/work at any time of the day, Greater social interaction/more family time, More time to go out/more leisure time/more time to do other things/work, Are able to do other leisure activities when convenient to them, Can encourage a healthy lifestyle because of smart fridges analysing food constituents, Do not have to leave home to get fit

Explanation:

I tried really hard to solve these. I hope this answers your questions. can you make me the brainliest, that all I ask since I answered it for you. Pleasure solving these. C:

Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this future network, anti-spoofing and directed broadcast filters are widely deployed. Also, the security of PCs and workstations is much greater, making the creation of botnets difficult. Do the administrators of server systems still have to be concerned about, and take further countermeasures against, DoS attacks? If so, what types of attacks can still occur, and what measures can be taken to reduce their impact? Explain in detail with valid diagram and example.

Answers

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

Give me good answers

1- what is the money?

2- what is the wealth?

How can it be used for good

Answers

Answer:

Money is currency

Explanation:

Is is how you pay for items

Under which menu option of a word processing program does a star appear?
A star appears under the
menu of the word processing program.

Answers

UNDER THE MENU OPTION INSERT.

Answer:

shapes

Explanation:

Plato got it correctly

Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
101
133
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.

Code:

#include
#include // Enables use of rand()
#include // Enables use of time()
using namespace std;

int main() {
int seedVal = 0;

seedVal = 4;
srand(seedVal);

/* Your solution goes here */

return 0;
}

Answers

Answer:

Replace the comment with:

cout<<100 + rand() % 49<<endl;

cout<<100 + rand() % 49<<endl;

Explanation:

To generate random number from min to max, we make of the following syntax:

min + rand()%(max - min)

In this case:

[tex]min = 100[/tex]

[tex]max = 149[/tex]

So, we have:

100 + rand()%(149 - 100)

100 + rand()%49

To print the statements, make use of:

cout<<100 + rand() % 49<<endl;

cout<<100 + rand() % 49<<endl;

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).

Answers

Answer:

In Python:

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

day = int(input("Day: "))

month = input("Month: ")

ind = months.index(month)

   

numday = 0

for i in range(ind):

   numday+=daymonths[i]

numday+=day

print(numday)    

Explanation:

This initializes the months to a list

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

This initializes the corresponding days of each month to a list

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

This gets the day from the user

day = int(input("Day: "))

This gets the month from the user

month = input("Month: ")

This gets the index of the month entered by the user

ind = months.index(month)

This initializes the sum of days to 0

numday = 0

This adds up the days of the months before the month entered by the user

for i in range(ind):

   numday+=daymonths[i]

This adds the day number to the sum of the months

numday+=day

This prints  the required number of days

print(numday)    

Note that: Error checking is not done in this program

You can Hyperlink by:

Question 5 options:

Press CTRL+K (shortcut)


Go to Insert tab, Link Group, Click on Link Icon


Right click on a word / shape / picture and choose Link


All of the above /

Answers

Answer:

All of the above

Explanation:

I tryed them all

Answer: All of thee above

For a company, intellectual property is _______________.


A) any idea that the company wants to keep secret


B) the same as the company’s policies


C) any topic discussed at a meeting of senior management


D) all of the company’s creative employees


E) a large part of the company’s value

Answers

Yea I think it is b but I’m not sure

For a company, intellectual property is any idea that the company wants to keep secret. Thus the correct option is A.

What is intellectual Property?

The type of integrity is defined as "intellectual property" which includes intangible works developed by humans with an innovative and problem-solving approach.

These intellectual properties are protected by companies to avoid leakage of the secret of development as well as to avoid imitation of the creation. This protection of the intellectual property is legally bounded.

If any violation of this act has been noticed and found guilty will have to face consequences in terms of charges of violation as well as heavy penalties based on the type and importance of the work.

Therefore, option A any idea that the company wants to keep secret is the appropriate answer.

Learn more about intellectual property, here:

https://brainly.com/question/18650136

#SPJ2

17
Select the correct answer.
What is the key length of each key in triple DES?
OA 168 bits
ОВ.
56 bits
128 bits
OD
256 bits
OE.
192 bits

Answers

Answer:

OB

Explanation:

bc i said lol

bc i said lol to be 128 bits

Consider the regular expressions:

R1 = (01)* (0*1*) (10)
R2 = (101)* (01)*
R3 = (10) (01*)*(01)
R4 = 10(R2*)|R3

Recall that, for a list of regular expressions, the function getToken() returns the next token from the input that matches one of the regular expressions. If there is more than one match, the longest match is returned. If there is more than one longest match, the token with the longest match that appears first in the list is returned. If there is no match, ERROR is returned. If the function getToken() is called once on input 1000101, it will return:

a. R1
b. R2
c. R3
d. R4
e. ERROR

Answers

Answer:

c. R3

Explanation:

For R1;

there are 10 matches, after these 10 no matches occur again

for R2;

this also does not match more than 10 as we have in R1

for r3;

R3 has the longest match. Its matching can be done 1000101 times.

for r4;

The whole of r4 can be matched.

Error;

we cannot have an error because matches exist.

so in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first. R3 came first

In this exercise we have to use computer knowledge to identify which is the correct sequence of code that best corresponds to the given question, in this way we have that the correct alternative is:

[tex]c. R3[/tex]

So analyzing the first alternative, we find;  

For R1, there are 10 matches, after these 10 no matches occur again.

So analyzing the second alternative, we find;

For R2, this also does not match more than 10 as we have in R1

So analyzing the third alternative, we find;

R3 has the longest match. Its matching can be done 1000101 times.

So analyzing the fourth alternative, we find;

For R4, the whole of r4 can be matched.

So analyzing the fifth alternative, we find;

Error; we cannot have an error because matches exist.

So in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first.

See more about computer at brainly.com/question/950632

In a word processing program, under which tab or menu option can you adjust the picture brightness?

Answers

Explanation:

You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
date?
O Waiting on someone else
O In Progress
O Not started
O Deferred

Answers

I think it’s in progress

Answer: D: Deferred

Explanation:

took test

what are the importance of web browser​

Answers

Answer:

Web browser​ helps to access www.

Explanation:

A web browser is a software program that acts as a person's portal and portal to the Internet. It's easy to forget the browser's value now that it's so popular in our everyday lives. Users had to download software only to talk, watch videos, or play music until web browsers were invented.

please help me faster plzzz
correct plzz​

Answers

Answer:

a. A numeric keypad.

b. An interpreter.

c. A 3D printer.

d. A speaker.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

Also, an input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output and input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, mouse, scanner, projector etc.

Basically, the three (3) key element of a computer system are: a set of memory modules, processor and a set of input-output (I/O) modules. Each of the input-output (I/O) module interfaces to the central switch or system bus and are used to control one or more peripheral (external) devices.

a. A numeric keypad is a device used to input a PIN. It comprises of numbers ranging from 0 to 9.

b. An interpreter analyses and executes a program line by line.

c. A 3D printer produces output in the form of solid objects. It is typically used for inscribing or printing textual informations or graphic images on an object in three dimensions.

d. A speaker produces output in the form of sound. It is an electronic device that converts electrical signals into sound energy (waves).

What Are the Components of a Web Address? *​

Answers

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

For this exercise, you are going to complete the printScope() method in the Scope class. Then you will create a Scope object in the ScopeTester and call the printScope.
The method will print the name of each variable in the Scope class, as well as its corresponding value. There are 5 total variables in the Scope class, some of which can be accessed directly as instance variable, others of which need to be accessed via their getter methods.
For any variable that can be accessed directly, use the variable name. Otherwise, use the getter method.
Sample Output:
The output of the printScope method should look like this:
a = 5
b = 10
c = 15
d = 20
e = 25
public class ScopeTester
{
public static void main(String[] args)
{
// Start here!
}
}
public class Scope
{
private int a;
private int b;
private int c;
public Scope(){
a = 5;
b = 10;
c = 15;
}
public void printScope(){
//Start here
}
public int getA() {
return a;
}
public int getB() {
return b;
}
public int getC() {
return c;
}
public int getD(){
int d = a + c;
return d;
}
public int getE() {
int e = b + c;
return e;
}
}

Answers

Answer:

Explanation:

The following is the entire running Java code for the requested program with the requested changes. This code runs perfectly without errors and outputs the exact Sample Output that is in the question...

public class ScopeTester

{

public static void main(String[] args)

{

       Scope scope = new Scope();

       scope.printScope();

}

}

public class Scope

{

private int a;

private int b;

private int c;

public Scope(){

a = 5;

b = 10;

c = 15;

}

public void printScope(){

       System.out.println("a = " + a);

       System.out.println("b = " + b);

       System.out.println("c = " + c);

       System.out.println("d = " + getD());

       System.out.println("e = " + getE());

}

public int getA() {

return a;

}

public int getB() {

return b;

}

public int getC() {

return c;

}

public int getD(){

int d = a + c;

return d;

}

public int getE() {

int e = b + c;

return e;

}

}

Why would an organization need to be aware of the responsibilities of hosting

personal data in its platforms?

Answers

Answer:

Providing transparent services for platform customers. Following data protection regulations to avoid disruptions from lack of compliance.

How should you schedule a meeting with someone in another time zone?

Answers

If you know what timezone they're in, try to work out what time in your own timezone your free, then tell the other person to do the same. Tell them what times in your timezone and the other can search up what the time is in their own timezone. If there is a specific time when you are both free, use that.

Ex:

You live in the U.S. but you have a meeting with someone in the U.K. You're only free at 4:00pm-6:00pm and they're only free from 10:00am-11:00am. 11:00am in England is 4:00pm in the U.S. so do at that time!

Hope this helps!

1. How important is e-mail communication to you? Why?

Answers

Answer:

Communicating by email is almost instantaneous, which enhances communications by quickly disseminating information and providing fast response to customer inquiries. It also allows for quicker problem-solving and more streamlined business processes.

Assume the data link protocol used by NDAS has the following associated characteristics:

An 8-bit ASCII code is used. Each frame has a size (length) of 11936 bits. A half-duplex circuit with a speed of 1 million bits per second is used for transmission. There is a 30-millisecond turnaround time on the half-duplex circuit. Each frame contains 20 overhead (non-user-data) bytes. Assume that the probability of a frame requiring retransmission due to error in transmission is 1 percent. A millisecond is one-thousandth of a second. Also, 8 bits = 1 character = 1byte

Fill in the blanks

K= _________ bits per bytes
M=_________ bytes
C= _________ overhead bytes

Answers

Answer:

The transmission speed = 0.278 MB/s

Explanation:

K = 8 bits

M = 11936/8 bits = 1492 bits

transmission rate R = 1000000/ 8 = 125000 bps

overhead bytes C = 20

probability = 0.01

time T = 30 ms = 30 x10^-3 s

The data transmission speed formula = K(M-C)(1-p) / (M/R) + T

 = 8( 1492 - 20)(0.99)/ (1492/125000) + 30 x10^-3

 = 0.278 MB/s

is a
square-shaped blade perfect for digging holes for plants and
bushes.​

Answers

Answer:

Yes. Designed to use in tight spaces, the square-shaped blade is perfect for digging holes for plants and bushes, especially in established gardens where you don't want to disturb existing plants.

Explanation:

U $ er Ideas for R 0 B 1 0 X?

Answers

Answer:

umm huh

Explanation:

english please

Answer:

i play ro blox add me wwekane9365

Explanation:

2. How has the internet changed the way that people get news?

Answers

Answer:

Explanation:

you can access news from anywhere and know what is going on

Answer:

Most of the news is fact due to the ablilty of anybody can make it

Explanation:

Which of the following statements is false?


Copyright exists the moment a work is created.


Copyright protects intellectual property such as text, art, film, music, or software.


Omitting the © copyright symbol means your work is not copyrighted.


Copyright is free.


You are not required to register your copyright.

Answers

Everything is false except the third one :)

It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.

What is a copyright?

Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.

The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.

Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.

Thus, the correct option is C.

For more details regarding a copyright, visit:

https://brainly.com/question/14704862

#SPJ2

hy plzz help me friends​

Answers

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer

whats difference between DCE AND DTE serial interface

Answers

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

Other Questions
Whats the answers I got it wrong twice Determining Importance Why is it crucial that people have confidence in the US court system? At what temperature (in K) does NH have a density of 0.812 g/L at 1.17 atm? Can someone please answer this!! Helppp is number 19 and 20 right Can you guys explain to me what Simple, Compound, and Complex Sentences are? i am really having a hard time understanding it :( Brandon wrote a decimal number one of the digits in the number was a 6 that had a bag of 6 * 1/10 which could be the decimal number that he wrote LEE CON ATENCIN LOS SIGUIENTES FRAGMENTOS DE LETRAS DE CANCIONES YCONTESTA A LOS REACTIVOS 1, 2, 3 y 4.Cancin 1Cancin 3Carabina 30 30All en el rancho grande, all donde viviaQue los rebeldes portabanhaba una rancheritaY decan los maderistasque alegre me deciaQue con ellas no matabanque alegre me deciaCancin 2Veracruz, rinconcitoDonde hacen sus nidosLas olas del marCancin 4El dia en que t nacistenacieron todas floresy en la pila del bautismocantaron los ruiseores1. Fragmento que trata sobre la poca de las guerras de la revolucin.A) Cancin 1B) Cancin 2C) Cancin 3D) Cancin 4 PLEASE HELP !! PLSSSSSSSSSSSSSSSS Please if you just want point TELL ME I cant fail this. Match the environmental stresses to what would happen in the chemical reaction. Think through the path from the carbon cycle - how CO2CO2is removed from the atmosphere and stored in sinks and then how CO2CO2is released from sinks and/or produced. Loss of carbon sinks, like treesDecrease in shellfish due to overfishingDecrease the number of farmsIncrease in Earth's temperatureDecrease in number of cars burning gas Alexandra is going to invest $12,000 and leave it in an account for 10 years. Assuming the interest is compounded continuously, what interest rate, to the nearest hundredth of a percent, would be required in order for Alexandra to end up with $19,000? Which of these is a complex sentence that has the correct punctuation?Suzanne didn't believe in ghosts until she heard, a noise in the attic.BUntil she heard a noise in the attic Suzanne didn't believe in ghosts.Until she heard a noise in the attic, Suzanne didn't believe in ghosts.DSuzanne didn't believe in ghosts until, she heard a noise in the attic. Soda or juice that's what my teacher asked me and he know I can't talk because I lost my voice at the age of 13 Question 7 (5 points)How did the Atlantic slave trade benefit the Africans? (5 points)Question 7 options:1) Africans were able to gain protection from the European military during the war.2) Many Africans were able to buy land to start their own plantations.3) Africans eliminated warriors in rival tribes by selling or trading captured prisoners to slave traders.4) Africans voluntarily migrated to the Americas to escape tribal warfare. Please help!!!! Ill mark u as brainlist If 9% of a number equals 10, find 90% of that number. Sean's party will cost $60 if he invites 12 guests. Which expression does NOT equal the amount that Sean will spend per party guest in dollars? Lantana Company has provided you with the transactions that occurred during its first month of operations. The Controller has already recorded the transactions to the T-Accounts and has asked you to prepare the classified balance sheet based on the T-Account balances. Use the information included in the Excel Simulation and the Excel functions described below to complete the task Cell Reference: Allows you to refer to data from another cell in the worksheet. From the Excel Simulation below, if in a blank cell,"-B11" was entered, the formula would output the result from cell B11, or $50,000 in this example. Basic Math functions: Allows you to use the basic math symbols to perform mathematical functions. You can use the following keys: (plus sign to add), (minus sign to subtract). (asterisk sign to multiply), and/(forward slash to divide). From the Excel Simulation below, if in a blank cellC11+C12" was entered, the formula would add the values from those cells and output the result, or 15,000 in this example. If using the other math symbols the result would output an appropriate answer for its function SUM function: Allows you to refer to multiple cells and adds all the values. You can add individual cell references or ranges to utilize this function. From the Excel Simulation below, if in a blank cell " SUM(C11,C12.C13)" was entered, the formula would output the result of adding those three separate cells, or 15,500 in this example. In a reply to a pen friend, write to him , describing how osun osogbo festival celebrated in Nigeria last year Trucks in a delivery fleet travel a mean of 90 miles per day with a standard deviation of 36 miles per day. The mileage per day is distributed normally. Find the probability that a truck drives less than 118 miles in a day. Round your answer to four decimal places.