Fill in the blanks
A highway is 80km in length 3/4 of the Highway is paved. How many km of the Highway is
paved​

Answers

Answer 1

Answer: 60km

Explanation:

Since the highway is 80km in length and 3/4 of the highway is paved. Therefore, the number of km of the highway that is paved will be gotten as:

= Fraction of highway that's paved × Length of highway

= 3/4 × 80km

= 60km

Therefore, 60km of the highway is paved.


Related Questions

Which technique helps designers achieve continuance in a design?
A.
grouping items
B.
pointing at items
O c. sorting colors
D.
resizing items

Answers

Answer:

c

Explanation:

I think it's c because they need o sort items to know where things are to design

Answer:

Pointing at items

Explanation:

I got it right on my test.

When looking over a written document, you should reread for meaning, add, rearrange, remove and replace. What process are you using

Answers

The revision process includes three rounds of editing: the structure edit, the copy edit, and proofreading. The structural edit is performed at the paragraph level and concentrates on the logic and thought flow.

Is editing or revision done first?

It's time to move on to editing your work when you've done rewriting it. Editing involves changing the way sentences are put together and how they are phrased, but rewriting entails making significant, comprehensive changes to your paper's overall structure and arrangement.

What happens during a document revision?

In order to ensure that the document fulfills its objective, revision entails examining the global level and paragraph level organization of the draft and making modifications at the global, paragraph, and sentence levels.

To know more about editing visit:-

https://brainly.com/question/21263685

#SPJ4

Refer to Exhibit: Which access controls list allows only TCP traffic with a destination port range of 22-443, excluding port 80

Answers

Access Control List (ACL) 1 allows only TCP traffic with a destination port range of 22-443, excluding port 80

Which access control list disallows all other communication other than TCP traffic with a destination port range of 80 through 243?The access controls list that allows only TCP traffic with a destination port range of 22-443, excluding port 80, is an access control list (ACL) that uses network layer filtering.This type of ACL is configured to filter traffic based on its source or destination IP address, port numbers, or protocol. In this case, the ACL will be configured to explicitly deny any TCP traffic with a destination port of 80, while allowing only TCP traffic with a destination port range of 22-443.This ACL will be applied to the router or firewall and can be configured using access control entries (ACEs).Each ACE will specify the source and destination IP address, port numbers, and protocol.The ACEs will also specify whether to allow or deny the traffic.This type of ACL will provide a high level of security by limiting the type of traffic that can pass through the network.

To learn more about Access Control List (ACL) 1 refer to:

https://brainly.com/question/29830414

#SPJ4

epeat the previous process using recursion. Your method should not contain any loops. How much space does your method use in addition to the space used for L?

Answers

To repeat the previous process using recursion, we can create a recursive function that calls itself with a modified version of the input until the base case is reached. In this specific case, the base case would be when the input list (L) is empty.

Here is an example of a recursive function that performs the process:

def recursive_process(L):

   if not L: # base case: if the list is empty, return

       return

   # perform the process on the first element of the list

   process(L[0])

   # call the function again with the rest of the list (excluding the first element)

   recursive_process(L[1:])

In terms of space usage, the function uses O(n) space in addition to the space used for the input list L. This is because for each recursive call, a new stack frame is created, and these stack frames take up memory. Since the function is called once for each element in the input list, the total space usage is proportional to the size of the input list.

Learn more about recursive function, here https://brainly.com/question/30027987

#SPJ4

Which of the following programs would produce the following output: 1. honey 2. bread 3. jelly 4. plates

Answers

Here is the code that can be used to produce that's output

my_list = ["honey", "bread", "jelly", "plates"]

for index in range(len(my_list)):

print str(index+1) + ". " + my_list[index]".

The code snippet you provided uses a few key programming concepts to produce the desired output.

Lists: A list is a collection of items, represented by square brackets []. The items in a list can be of any data type, such as strings, integers, or even other lists. In this case, my_list is a list of strings.For loop: A for loop is used to iterate over a sequence of items. In this case, the for loop iterates over the range of the length of the my_list.Range(n): This function returns a list of integers from 0 to n-1. In this case, range(len(my_list)) will return a list of integers from 0 to len(my_list) - 1.Index variable: The variable "index" is used to access the current item in the list during each iteration of the for loop.String concatenation: The "+" operator is used to concatenate strings. In this case, the code concatenates the index variable, a period, and a Space to the corresponding element of my_list.Print statement: This statement is used to print the output to the console.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

A predetermined overhead rate includes: the actual total amount of the allocation base in the denominator.

Answers

A predetermined overhead rate includes the actual overhead costs by actual amount of the cost driver or allocation base.

A predetermined overhead rate is used to apply the projected production costs overhead to cost components for a specific reporting period.

The correct formula to compute the predetermined overhead rate is  Predetermined overhead rate = Estimated total manufacturing overhead costs ÷ Estimated total units in the allocation base.

Interest rates are one of the main pillars of the American socioeconomic system. They affect borrowing costs, savings yields, and greatly contribute to the overall return on many different types of assets. Additionally, some interest rates provide insight about impending financial and economic activities.

Learn more about predetermined overhead rate  at https://brainly.com/question/29829712

#SPJ4

A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the backend authentication system supports EAP and TTLS. What should the network administrator implement

Answers

The wireless network administrator can deploy 802.1x utilizing EAP with MSCHAPv2 for authentication since the back end uses a RADIUS server.

Which statement about how a DHCP reservation functions is TRUE?

OBJ-1.8: When a client sends a network message to the DHCP server asking for an IP address, the DHCP server will allocate the client an IP from its DHCP scope and reserve it based on client's MAC address.

What is the safest way to strengthen security on your wireless network?

Information that is exchanged between wireless routers and wireless devices is encrypted using Wi-Fi Protected Access (WPA), WPA2, and WPA3. Strongest encryption are available right now is WPA3.

To know more about wireless system visit:-

https://brainly.com/question/13313405

#SPJ4

Which of the following increases or decreases how crisp the objects in a photo appear?
a. brightness
b. sharpness
c. crispness
d. contrast

Answers

the answer is b. sharpness

You need to deploy a small piece of software using a script file. You have a variety of options available to you based on what method you use in writing the script. Which of the following would NOT be an option for file scripting?
A) .bat
B) .ini
C) .sh
D) .py

Answers

A script file must be used to deploy a little piece of software. Depending on the approach you take when composing the script, you have a range of alternatives. Choice (B). Ini is accurate.

Software definition and examples :

In this application, "software" refers to the running scripts, programs, and apps on a device. It can be compared to the variable portion of a computer, whereas the invariable portion is the hardware.

A software device is what?

Software Device refers to any apparatus on or through which software applications and its accompanying visual representations, either with sounds, may be embodied / recorded for use in the Game and later operation, manipulation, or communication to users.

To know more about Software visit :

https://brainly.com/question/1022352

#SPJ4

What happens to information in short-term memory that is not further processed or rehearsed?
A) The information moves back into sensory memory.
B) The information is transferred to working memory until it is ready to be processed further.
C) The information is sent to long-term memory until it is ready to be further processed.
D) The information fades or decays.

Answers

Short-term memory serves as the initial stage of information processing before moving on to long-term memory. rehearsal for maintenance.

What transpires to information in short-term memory that is not retained any longer?

The knowledge is quickly lost from short-term memory without practice or without repeating the number until it is committed to memory.

What happens to the knowledge stored in short-term memory?

The term "short-term memory" refers to the brain's memory mechanisms that help people recall bits of information for a brief period of time, frequently up to 30 seconds. The brain stores information in short-term memory as a sort of "visuospatial" sketch that will later be converted into memories.

To know more about Short-term memory visit :-

https://brainly.com/question/7095837

#SPJ4

Calling functions.
Write code that assigns maxValue with the return value of calling the function GetMaxValue passing userNum1 and userNum2 as arguments (in that order). Then, assign maxValue with the return value of calling GetMaxValue passing maxValue and userNum3 as arguments (in that order).
Function GetMaxValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2
Function Main() returns nothing
integer userNum1
integer userNum2
integer userNum3
integer maxValue
userNum1 = Get next input
userNum2 = Get next input
userNum3 = Get next input
// Your solution goes here
Put "Max value: " to output
Put maxValue to output
has to be in Coral

Answers

An expression of the form expression (expression-listopt), where expression is a function name or evaluates to a function address, and expression-list is a list of expressions, is referred to as a function call.

What is meant by calling function?You must perform four things in order to call a function, which is another way of saying "instruct the computer to carry out the step on this line of the instructions": Put the function's name in writing. The function name should be followed by parenthesis (). Any parameters the function requires should be added inside the parentheses, separated by commas.An essential component of the C programming language is a function call. When calling a function is necessary, it is invoked inside of a programme. Only in a program's main() method is it called by its name. The arguments can be sent to a function that is called from the main() method.

Explanation :

Required Program in Coral Function GetMaxValue(integer value1, integer value2) returns integer result    // return first value if it is greater    if value1 > value2       result = value1    // else return the sec

Learn more about calling function refer to :

https://brainly.com/question/28961942

#SPJ4

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Define a function called OutputLeapYear that takes an integer as a parameter, representing a year, and output whether the year is a leap year or not. Then, write a main program that reads a year from a user, calls function OutputLeapYear() with the input as argument to determines whether that year is a leap year. coral code

Answers

The function OutputLeapYear() takes an integer as a parameter, representing a year, and prints whether the year is a leap year or not. The main program reads a year from the user, calls the OutputLeapYear() function with the input as an argument to determine whether that year is a leap year.

What is meant by coral code? Coral code, also known as CSS (Cascading Style Sheets), is a coding language used to create a visual presentation of webpages. It is used to design the layout, colors, and fonts of a website. CSS helps to create a unified look and style across a web page and website by controlling the overall presentation of the HTML elements. It allows web developers to easily style web pages without having to write complex HTML code. CSS is often used to create responsive websites, ensuring the website looks good on all devices and screen sizes. It can also be used to create animations, transitions and interactive elements on a website. In short, Coral code is a powerful and versatile language used to create visually appealing and interactive webpages.

To learn more about coral code refer to:

https://brainly.com/question/27921913

#SPJ4

Need the answer ASAP plz !!!!!

Answers

Performance would be the answer

current microsoft oss include ipv6, but to use it, you must enable it first. true of false

Answers

Ipv6 is present in current Microsoft operating systems (open-source software), but it must first be enabled in order to be used.

What is Microsoft's mission?

Our offerings range from desktop and network management tools to software development tools as well as system software for laptops ("PCs"), servers, smartphone, and some other embedded systems. We also provide server applications for decentralized cloud computing, productivity apps, business apps, and games.

Why is Microsoft so prosperous?

They are a young firm by many measures, having been founded in 1975, which may have contributed to her success, but a big part of that success has been her resilience and capacity to adapt to emerging technology, market demands, and economic prospects. Fewer purchases by Microsoft, such as WebTV, Link Interchange, Massive, and Danger, led to failures and disposal of assets.

To know more about Microsoft visit:

https://brainly.com/question/26695071

#SPJ4


1.Explain five measures that protect users in the computer laboratory (10mks)

Answers

This chapter covers safe lab techniques, fundamental workplace safety precautions, proper instrument usage, and computer disposal.

What security precautions are in place in the computer lab?

When you are through using the device, turn it off. Never connect external devices without first checking them for malware. Since there are numerous devices and they might rapidly overheat in a lab, it is important to maintain a cool temperature in the space.

What safety measures in laboratories are most crucial?

Put on safety lab gear: As soon as you enter the lab, make sure you are wearing PPE. Before entering the lab, put on a lab coat with long sleeves, closed-toe shoes, and safety goggles. Keep your hair long if you have long hair.

To know more about computer laboratory visit:-

https://brainly.com/question/14751939

SPJ1

1. Which sentence best expresses the main idea
A. Even modern computers are not truly user-friendly.
8. Word processing has lots of bugs, and the industry should be ashame
C. When the computer wins, and you lose, get angry.
D. The wise typist "saves" often.
2. The following are statements mentioned in the selection EXCEPT...
A. You can sit and yell at the machine when your stuff disappears.
B. Working on a computer can be very frustrating.
C. One for word processing is "Unsave your work frequently."
D. You can bang the keyboard.​

Answers

B is the answer

Hope this helps




Even modern computers are not truly user-friendly. is the sentence that best expresses the main idea. You can bang the keyboard is the statement mentioned in the selection that is not mentioned in the given sentences. So, the correct options for 1 and 2 are A and D respectively.

What are Computers?

Computers are electronic tools that can carry out a wide range of functions when given specific instructions from a user. They have the ability to process data, store and retrieve data, and interact with users or other devices.

A central processing unit (CPU), memory, input and output devices like a keyboard, mouse, and display screen, as well as storage devices like a hard disc or solid-state drive, are all parts of the hardware that make up a computer. They are controlled by software programme that are created to carry out particular functions, including word processing, surfing the internet, or multimedia processing.

Computers are now an essential component of contemporary life because to technological advancements, and they are utilized in a variety of contexts such as business, study, entertainment, and communication.

So, the correct options for 1 and 2 are A and D respectively.

Learn more about Computers, here:

https://brainly.com/question/21080395

#SPJ2

Which of the following is an advantage that text-based programming languages (i.e. Python) have over block-based programming languages (i.e. Scratch)

Answers

When writing a programme, text-based programming languages give programmers more in-depth control over lower-level functionality.

In block-based applications, we are constrained to use the blocks that are provided to us and frequently have a limited range of options for doing so. We have more freedom to customise lower-level functionality in text-based languages since we are not constrained by a predetermined number of available blocks.

Python is usually used for making websites and applications, automating repetitive tasks, and analysing and display of data. Python has been utilised by many non-programmers, including accountants and scientists, for a different kind of routine activities including managing finances since it is very simple to learn.

To learn more about Python

https://brainly.com/question/18502436

#SPJ4

Which can be used to view a web page?
File viewer
Text editor
Web browser
WYSIWYG

Answers

The answer is C: web browser

so we use web browsers to look at web pages

hope this helped

-scav

microsoft’s risk management model includes _____, which specifies the risk type.

Answers

Microsoft’s risk management model includes probability , which specifies the risk type.

What is Microsoft's rating for risk?

You can overcome the difficulties of developing a successful security program with the use of the Microsoft Security Risk Assessment (MSRA).

                        The purpose of the MSRA, a two-week project, is to assess how well the defense-in-depth concept is being used in your security plan.

What models of risk management are there?

Model risk management is a term used to describe a group of strategies aimed at ensuring that a financial model is operating as intended while reducing the likelihood of model risk. These actions seek to identify, minimize, and project the potential effects of a model's limits on the operations of a corporation.

Learn more about Microsoft’s risk management model

brainly.com/question/8816652

#SPJ4

Accenture i one of everal hundred companie that ha igned on to the United Nation Global Compact (UNGC) Buine Ambition pledge

Answers

It was for the 1.5° Pledge, which was also supported by a large number of other businesses.

What is UN Global Compact Business Ambition?In response to the global climate catastrophe and in the run-up to the next UN Climate Action Summit, a communications and advocacy campaign called Business Ambition for 1.5 °C: Our Only Future is urging businesses to stand up and play their part in limiting global temperature rise to 1.5 °C. We aspire to create the society we want by organizing a global movement of sustainable businesses and stakeholders through the UN Global Compact. That is our goal.The target temperature increase from pre-industrial levels should not exceed 1. 5 Celsius.The company signed the UN Global Compact Business Ambition to demonstrate its participation.It was for the 1.5° Pledge, which was also supported by a large number of other businesses.The pledge's main goal is to forge a business-to-business alliance to manage the climate.They have taken an oath to preserve the Paris Climate Agreement and contribute to keeping global warming below 1.5° Celsius.They are committed to achieving emission oblivion.They also emphasize neutrality while describing the procedure for balancing their carbon emissions. This might potentially aid in reducing the consequences of climate change.

To learn more about UNGC refer to:

https://brainly.com/question/29237338

#SPJ4

Which statement about broadcasting a slideshow online is true?

1. All transitions are properly displayed to the audience when broadcasting online.
2. Broadcasting a slideshow online is not an option for most PowerPoint users.
3. Third-party desktop sharing software must be used to broadcast online.
4. PowerPoint has a free, built-in service for broadcasting online.

Answers

Answer: PowerPoint has a free, built-in service for broadcasting online.

Explanation:

The statement that's true about the broadcast of a slideshow online is that PowerPoint has a free, built-in service for broadcasting online.

Option 1 is wrong as all transitions are not properly displayed to the audience when broadcasting online.

Option 2 is wrong as broadcasting as slideshow online is an option for most PowerPoint users.

Option 3 is wrong because when broadcasting online, third party desktop sharing software isn't necessarily an option and it isn't a must that it must be used.

Therefore, the correct option is 4.

Answer:

D

Explanation:

A group of users is installing an application on a laptop computer and encounters a problem. No
documentation was attached while downloading the application; only the installation file is
available. They believe that they have done something wrong. What is the first thing that they
should look for a possible solution to their problem? (1 point)
O runbook
O README
O comments
O frequently asked questions

Answers

Only the installation file is provided if no documentation was downloaded with the application. They ought to search the commonly asked questions for a potential answer.

How to repair Your computer's linked device and Windows have a communication issue?

This error can be brought on by failing hardware, such as a hard disc or CD-ROM drive, or by unplugging a removable storage device such an external USB drive while it is in use. Restart your computer after making sure all removable storage is securely attached.

What safety measures must to be taken when utilizing various computer software applications?

The following safety measures should be followed when utilizing various computer software types:

1. Avoid utilizing too many software programs at once when using them. Your computer will slow down if you don't.

2. Keep the data in tabular form while using Excel. Likewise, insert the information in order.

To learn more about software installation visit:

brainly.com/question/20325490

#SPJ1

What specific term does the U. S. Department of Justice use to label all illegal access to computer or network systems

Answers

A computer cracker is someone who tries to access computer systems without authority, according to the Glossary. These people, as opposed to hackers, are frequently evil.

What does NBTscan's NBT portion stand for?

TCP/IP over NetBIOS. When working with Windows NT, 2000, and Windows XP computers, the what enumeration tool is quite helpful.

What does the command Nbtstat accomplish?

The NetBIOS over TCP (NBT) connection for the Node is described in detail by the nbtstat command. The IP addresses for the interfaces, the broadcast IP mask, the IP addresses of the active WINS servers, and details about the node's registered NetBIOS identities are also displayed.

To know more about NetBIOS visit:-

https://brainly.com/question/15085605

#SPJ4

Project stem 2.3 code practice question 2

Answers

Answer:

"Write a program that accepts two decimal numbers as input and outputs their sum."

a = float(input("Enter an integer: "))

b = float(input("Enter an integer: "))

print(a + b)

Explanation:

We are just entering an integer and having the code float the variable down to our print function thats why we have added the "float" variable

Glad to help!
Stay up and Stay Blessed!

Write a program that reads an integer representing a year input by the user. The purpose of the program is to determine if that leap year is a leap year (and therefore has 29 days in February) in the Gregorian calendar. A year is a leap year if it is divisible by 4, unless it is also divisible by 100 but not 400. For example, the year 2003 is not a leap year, but 2004 is. The year 1900 is not a leap year because even though it is divisible by 100, it is also divisible by 400. python

Answers

A program that reads an integer representing a year input by the user. The purpose of the program is to determine if that leap year is a leap year (and therefore has 29 days in February) in the Gregorian calendar. A year is a leap year if it is divisible by 4, unless it is also divisible by 100 but not 400. For example, the year 2003 is not a leap year, but 2004 is. The year 1900 is not a leap year because even though it is divisible by 100, it is also divisible by 400 can be write as follows:

import java.util.Scanner;

public class Main{

  public static void main(String[] args) {

      int year;

      Scanner scanner = new Scanner(System.in);

      System.out.print("Please enter a year\n\n");

      year = scanner.nextInt();

      while (year < 1582) {

          System.out.print("\nPlease enter a different year above 1582\n");

          year = scanner.nextInt();

      }

      if (year % 4 == 0) {

          if(year % 100 ==0 && year % 400 != 0){

                  System.out.println(year + " is not a leap year\n\n");

          }else {

              System.out.println(year + " is a leap year\n");

          }

      } else {

          System.out.println(year + " is not a leap year\n\n");

      }

  }

}

Learn more about java at https://brainly.com/question/29897053

#SPJ4

write a program to calculate the sum of numbers 15and 10 and print the steps involved​

Answers

Answer:

//In c++

#include<iostream>

using namespace std;

int main(){

int sum;

sum=15+10;

cout<<sum;

}

output: 25

Explanation:

oracle and sql server support the ____ operator but microsoft access does not.

Answers

The INTERSECT operator is supported by Oracle and SQL Server, but not by Microsoft Access.

what is intersect command?

With the UNION clause in SQL, all matching rows from two SQL queries are combined into a single table.

In order to combine, the two searches must return the same number of columns and compatible data types. Unless UNION ALL is used, all duplicate records are immediately deleted.

In data warehouse applications where tables are not properly normalized, UNION can be helpful.

[2] A straightforward illustration would be a database with two tables, sales2005 and sales2006, which are separated for performance reasons despite having identical architecture. The output from both tables might be combined with a UNION query.

Keep in mind that the rows' order is not guaranteed by UNION ALL. Rows from the first operand may be mixed in with rows from the second operand or may come first. In.

Hence, The INTERSECT operator is supported by Oracle and SQL Server, but not by Microsoft Access.

learn more about sql click here:

https://brainly.com/question/23475248

#SPJ4

a firewall cannot be deployed as a separate network containing a number of supporting devices. true or false

Answers

This claim is untrue; a firewall cannot be installed as a standalone network with a variety of auxiliary hardware.

What kind of proxy access should be used to prevent HTTP traffic from internal networks when web services are provided outside the firewall?

When Web services are provided outside the firewall, HTTP traffic from inside networks should be restricted using a proxy access method or DMZ architecture. All data that cannot be verified as authentic should be denied according to good firewall rules. By protocol name, certain firewalls can filter packets.

Which of the subsequent best sums up a firewall?

Incoming and outgoing network traffic is managed by a combination of hardware and software.

To know more about standalone network  visit :-

https://brainly.com/question/29809789

#SPJ4

to use the predefined function tolower, the program must include the header file ____.

Answers

To use the predefined function to lower, the program must include the header file cc type

What is the variable in the heading of a function called?

What are the variables that are defined in the function heading known as? formal parameters. What are the actual parameters of a function? The expressions, variables or constant values that are used in a function call.

What is the variable in the heading of a function called?

What are the variables that are defined in the function heading known as? formal parameters. What are the actual parameters of a function? The expressions, variables or constant values that are used in a function call.

To know more about program visit:-

https://brainly.com/question/14718387

#SPJ4

who is first prime ministers of nepal?​

Answers

Answer:

Bhimsen Thapa

...............

Answer:

The first Prime Minister of Nepal was Bhimsen Thapa

but if it is asked first elected Prime Minister then

he is B. P Koirala.

Hope it will help :)❤

Other Questions
Which numbers are all characteristics of life things?1. Complex, ordered organization consisting of one or more cells2. Use and transforms energy to perform work3. Sensitive and responsive to the external environment4. Regulate internal conditions5. Grow, develop, and reproduce6. Evolutionarily adapt and over time undergo descent but with modification what is the value of x How do we know what the temperature of the Earth was in the past?What is the relationship between CO2 (carbon dioxide) and temperature on Earth?What is the greenhouse effect?Why are global sea levels rising? A new resident in Virginia desiring to register his / her vehicle must obtain a vehicle ____________ certificate and verification of the vehicle ______________ number. What is the pattern for 0, 1, 3, 7, 15, 31, 63 My friend said I was socially draining him but all I do is respond to his texts and try not to sound dry. Im so hurt because he also gets mad at me so randomly and I just let them slide because I thought it was my fault. For example, once he got mad at me for not answering his call, which I text him to apologize for. Now he says sorry and acts like nothing has happened. Am I being unreasonable feeling hurt and not wanting to really talk with him anymore/be friends? 1. What is "federalism" again? Can someone help me out my grades are bad C. Escribe la forma correcta del participio pasado entre parntesis. Prestaatencin si el sustantivo (noun) es masculino, femenino, singular o plural.1. Las empanadas estn.2. Necesito 100 g. de carne.3. Las nueces ya estn4. Los huevos estn5. No me gustan los huevos6. La mesa est poner).7. Tampoco quiero comer la carne poco.8. Las verduras ya estn9. Se puede hacer una empanada10. El paquete de azcar ya est11. El flan y la torta ya estn(freir)(picar)(asar)(hervir)(revolver)(poner)(servir)(hacer)(limpiar)freir)(abrir)(preparar) What is the value of x?O 66V312O 12o12V360 please help Which line from "Rain Forest Doctor" is an example of figurative language? A I didn't bother to wash my face or comb my hair. B I never got used to how beautiful it was. C The helicopter lifted into the air like a really big, clumsy bug. D As soon as I was inside the helicopter, I put on the headphones. PLEASE HELP ME ASAP I'M BEING TIMED!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1What is the name of the movement where Africa in the late 1800s was invaded and divided among the European powers?A. New ImperialismB. ColonialismC. NationalismD. The Scramble for Africa What is the value of x between the two triangles? *no bots or else you will be reported* What is the most important contributing factor to premature death in our society group of answer choices? help plss sjsjsjd SUUWU What are silent mutations called? Medical science has developed several medications to help men who suffer from erectile difficulties. Which of these is NOT one of these medications The DNA of a cell is not programmed to coordinate the activities needed to keep a large cell alive. How does cell division help the cell avoid DNA overload A catering company is setting up tables for a big event that will host 764 people when they set up the tables they need 2 forks for each child and 5 forks for each adult the company ordered a total of 2992 forks set up a system of equations involving the number of adults,a and the number of children,c and solve to find out how many of each attended the event Solve for the roots in the following equation. Hint: Factor both quadratic expressions.(4+5x-36)(2x+9x-5) = 0