difference between tablet and smart phone

Answers

Answer 1

Answer:

What is the difference between tablets and smartphones? The main difference is the size of the screen. Smartphones usually have screen sizes between 4″/10cm and 7″/17cm, a tablet is anything over this. When it comes to processing power and available apps—they usually share the same capabilities.

Explanation:

Tablets are overwhelmingly used to play games and access entertainment (67 per cent), while smartphones are divided between games, social networking, and utilities (to name a few). Basically, tablets are seen as an entertainment platform, while smartphones are considered mostly a communications device.


Related Questions

What is the difference betweem skylights and light wells? (please put some images to demonstate if you can)

Answers

Answer:

It is common for modern structures with a glass roof to be referred to as a lightwell. These differ from a skylight in that they cut an open space through a building from the roof to the ground. An open space within the volume of a building that is designed to provide light and ventilation to interior spaces.

Users can select Ease of Access and _______
to alter the length of time a notification appears.

A) Display
B) Mouse pointer
C) Narrator
D) Magnifier

Answers

Answer:

Display

Explanation:

when writing a disaster plan for implementation during a mass casualty incident (mci), which percentage of victims often require admission to the hospital for further treatment?

Answers

In writing a disaster plan for implementation during a mass casualty incident (mci), 30 percent of victims often require admission to the hospital for further treatment.

What is the meaning of disaster plan?

The disaster plan is known to be a constantly form of maintained document that is known to be composed of the  ways, procedures as well as the information required to hinder , mitigate, prepare for, as well as respond to, and get over from any emergencies.

Therefore, In writing a disaster plan for implementation during a mass casualty incident (mci), 30 percent of victims often require admission to the hospital for further treatment.

Learn more about disaster plan  from

https://brainly.com/question/2916834

#SPJ1

A mind map is a web used to organize a project. Your main project is the center of the map, with tasks necessary to complete the project coming off the central idea. The map you create should have at least three levels, with tasks and due dates. Think of the people, processes, and tools needed to make the project a success. You should print the map out and send it to the teacher. If project software such as Visio is not available, a spreadsheet or word processing document is fine to use.

Answers

Answer:

yu 'of u0j[j]j-g9f7=d==I]idigo[hh[g9[gh;b;[u]in.;h[h]in.;h[uh[ ,;j]u[un.;ji=]in. I=u=u-j;h[-u

Oliver is shopping at his local grocery store. Instead of joining a checkout line manned by a human, he joins a checkout line where he has to
scan the food, but the rest is done by a computer. What Is Oliver experiencing while the computer does the checkout for him instead of a
human cashier? A:social media B: open education resources C:outsourcing D:automation

Answers

D: automation

Not A, B or C :)

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers. True or false?.

Answers

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers: false.

What is a desktop computer?

A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Also, desktop computer plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.

Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit, external monitor, keyboard, which makes them to occupy more space than all-in-one computers.

Read more on all-in-one computers here: https://brainly.com/question/4581809

#SPJ1

when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function properly? select one or more:

Answers

When inputting a formula into excel or in other spreadsheet software, we need to put equal sign before writing the formula and opening and closing parentheses for the formula.

Spreadsheet software such as excel, go-ogle sheets, or office 365 sheets allows you to perform calculations based on the given formula to perform the calculation. Most common formulas are provided by the spreadsheet softwares, such as sum, average, min, max, difference etc. These built-in formulas also called functions.

However, we can write our own formula to perform specific calculations according to our requirement. The components that are required for formula to function properly; you need to write equal sign=” before beginning the formula. The second component of the formula is, you must always close the parentheses for any opening parentheses.

For example, if you want to add or do sum, then the formula is”

=sum(range of cells…)

If you want to take an average of a range of numbers, then you can write

=average(range of cells…)

However, you can write your own formula which can have multiple parentheses, for example:

=(A1+B1+(B1/C2)+(B3+(B4/B5)))

You can learn more about spreadsheet formula at

https://brainly.com/question/1395170

#SPJ4

Hello guys where's bios chip in this motherboard ​

Answers

Answer: This. is an old Asus Board and the chip is missing

Explanation: The BIOS chip goes into the Processor holder. the one with the curved metal arm to help release it (goes into the cage first you use glue made for ) installing the chip, then you place the processor on top of that big part where it resembles a slice of bread.  You lock down the four legs and that is the brain of the MB.

To update the BIOS,in the machine outside of the operating system. ON WIndows it is the command center on Mac it is different.

The CMOS Battery is next to the word ASUS .

The BIOS is code and software that you upload from the manufacturer's site like ASUS.  and in the command environment, you update the bios.

The CHIP is delicate and it ONLY GOES  on ONE WAY! BE Verry very careful installing the chip and processor better to have a pro (like me ) do it ...

Motherboards are very delicate and expensive! All parts go one way and one way only. Be glad you don't have to Sauter anything.

while determining which antibiotics are best to treat ulcers caused by helicobacter pylori, the drugs used in the experiment are called the blank . multiple choice question. placebo experimental variable control dependent variable

Answers

While determining which antibiotics are best to treat ulcers caused by helicobacter pylori, the drugs used in the experiment are called the: B. experimental variable.

What is an experiment?

An experiment can be defined as a scientific investigation which typically involves the process of manipulating an independent variable (the cause), so as to determine or measure the dependent variable (the effect).

What is an experimental variable?

In Science, an experimental variable can be defined as a measurable attribute or physical quantity that changes or varies across an experiment and as such can take on different numerical values.

In this context, we can reasonably infer and logically deduce that the drugs used in this experiment are called the experimental variable.

Read more on experimental variables here: https://brainly.com/question/632913

#SPJ1

is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and​ devices, such as desktop​ computers, mobile​ computers, or smartphones.

Answers

Microsoft .NET is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices, such as desktop computers, mobile computers, or smartphones.

Microsoft .NET is a powerful programming platform that enables developers to create applications that are highly interoperable across a variety of platforms and devices. .NET provides a wide range of tools and technologies that make it easy to develop applications for desktop computers, mobile devices, or even the cloud. .NET is also a great platform for building web applications, as it supports a wide variety of standards and technologies.

Learn more on Microsoft .NET here:

https://brainly.com/question/14526761

#SPJ4

your dod common access card has a public key ifrastructure token approved for acces to the non classified internet protocol router

Answers

A public key infrastructure token on your dod common access card has been authorised for use with the NIPRNet.

This is a non-classified Internet Protocol (IP) Router Network (NIPRNet).

Your DoD common access card comes with a public key infrastructure token that has been authorised for access to the NIPRNet, which is a specific kind of IP network that is typically used to send and receive unclassified data like information topic.

The US Defense Department in Washington oversees Siprnet, a global military internet network that is maintained separate from the public internet.

Learn more about public key:

https://brainly.com/question/18560219

#SPJ4

which command will reset a next generation firewall to its factory default settings if you know the admin account password?

Answers

If you know the admin account password, a command which will reset a next generation firewall to its factory default settings is: c. request system private-data-reset.

What is a firewall?

A firewall can be defined as a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

This ultimately implies that, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

In Computer technology, "request system private-data-reset" is a command which can be used to reset a next generation firewall to its factory default settings provided that the end user knows the admin account password.

Read more on firewall here: brainly.com/question/16157439

#SPJ1

Complete Question:

Which command will reset a next generation firewall to its factory default settings if you know the admin account password?

Select one:

a. reset system settings

b. reload

c. request system private-data-reset

d. reset startup-config

what are the main forces impacting the airline environment? what are the main infrastructure issues?

Answers

The  main forces impacting the airline environment are

Physical Economic Political/legal Socio/culturalDemographicTechnologicalWhat are the main infrastructure issues?

ATC  is one that needs to be consistently updated, but other countries are known to be able to tap in and make use our own technology.

The Capacity in the sky that is the capacity infrastructure is one that is known to have its demand to be higher.

What environmental factors affect the airline industry?

A lot of concerns around the environmental is one that tends to affect the aviation and they are known to be as a result of climate change, noise and air quality.

When all these take place, one find it difficult to make quantitative data on all  of these subjects.

Therefore, The  main forces impacting the airline environment are

Physical Economic Political/legal Socio/culturalDemographicTechnological

Learn more about airline environment from

https://brainly.com/question/15124410

#SPJ1

Question # 3 Multiple Choice A data unit created at the transport layer by UDP is a _____. Responses datagram datagram packet packet frame frame segment

Answers

Answer:

A data unit created at the transport layer by UDP is a datagram.

Explanation:

The User Datagram Protocol (UDP) is a minimal, connectionless network protocol that belongs to the transport layer of the Internet protocol family. UDP enables applications to send datagrams to IP-based computer networks.

represent audio or video data by a series of 0s and 1s.(1 point) telephones optical devices analog devices digital devices

Answers

Devices which represent audio or video data by a series of 0s and 1s is referred to as: D. digital devices.

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system, which comprises 0s and 1s.

In Computer technology, all digital device only understand machine language and these include binary digit (bit) or two-symbol system, which comprises 0s and 1s. Thus, a digital device such as a computer do not understand plain text or high-level language.

Read more on binary encoding here: https://brainly.com/question/13948780

#SPJ1

Companies such as ORACLE, Amazon Web Services, and Microsoft offer courses to learn about their technologies.

Answers

Answer:

True?

Explanation:

by marking up a navigation bar using the element(s), you can add semantic information that helps user agents more accurately render it

Answers

ul, li

By marking up a navigation bar using the ul and li element(s), you can add semantic information that helps user agents more accurately render it.

For example, a user agent could use the ul element to identify a navigation bar as a list of links, and the li element to identify each link in the list.

This would help the user agent render the navigation bar more accurately, and would also make it easier for users to navigate the page.

Learn more here:

https://brainly.com/question/7153205

#SPJ4

If you had a microsoft word document named malachi.docs and you saved it as a pdf without changing the file name, what would the new file name be , including the extension

Answers

The document for a new file will be malachi.pdf. It is because .pdf is the extension for PDF.

Adobe created the Portable Document Format (PDF) in 1992 to present documents, including text formatting and images, in a way that is independent of application software, hardware, and operating systems. PDF is now standardized as ISO 32000. Each PDF file, which is based on the PostScript programming language, contains an exhaustive description of a fixed-layout flat document, including the text, fonts, and vector graphics.

Other than flat text and graphics, PDF files may also contain logical structuring elements, interactive elements like annotations and form fields, layers, rich media (including video content), three-dimensional objects, and others.

Learn more about PDF https://brainly.com/question/28001981

#SPJ4

breast cancer screening and health behaviors among african american and caribbean women in new york city.

Answers

A telephone-based survey regarding breast cancer screening (in terms of insurance status, marital status, and educational attainment) among 300 African American and Caribbean women in New York City aged 40 and over, it was found that they were no more likely to have had a mammogram than the foreign-born women.

Women with a provider referral were eight times more likely to have ever had a mammogram, after adjusting for insurance status and the source of care (AOR 8.01, 95%CI: 3.74-17.14). Compared to 77% of American-born women, just 52% of Caribbean women who were born abroad and have lived in the country for less than half their life had a provider ever recommend a mammogram.

The results support prior research on the significance of physician referral in increasing mammography screening among urban Black women, and they suggest that efforts to communicate breast cancer screening messages to Caribbean-born women should place a strong emphasis on the significance of providers.

Learn more about breast cancer:

https://brainly.com/question/2036981

#SPJ4

that, given a string s representing the total excess billables and an array b consisting of k strings representing the undiscounted bills for each customer. the return value should be an array of strings r (length m) in the same order as b representing the amount of the discount to each customer.

Answers

Using the knowledge in computational language in python it is possible to write a code that  a string s representing the total excess billables and an array b consisting of k strings.

Writting the code:

def solution(A):

answer = 0

current_sum = 0

#Currently there is one empty subarray with sum 0

prefixSumCount = {0:1}

for list_element in A:

   current_sum = current_sum + list_element

   if current_sum in prefixSumCount:

       answer = answer + prefixSumCount[current_sum]

   

   if current_sum not in prefixSumCount:

       prefixSumCount[current_sum] = 1

   else:

       prefixSumCount[current_sum] = prefixSumCount[current_sum] + 1

if answer > 1000000000:

   return -1

else:

   return answer

See more about python at brainly.com/question/18502436

#SPJ1

Given a string variable s that has already been declared, write some code that repeatedly reads a value from console input into s until at last a y or y or n or n has been entered.

Answers

Answer:

s = "";

while (!(s=="Y" || s=="y" || s=="N" || s=="n"))

{

   cin >> s;

}

The code for the String variable is described below.

To achieve the desired functionality of repeatedly reading values from console input into the variable s until either 'y' or 'n' has been entered, you can use a loop.

Here's an example of how you can implement this in Python:

s = ""

while s not in ('y', 'n'):

   s = input("Enter a value (y/n): ")

# At this point, the user has entered 'y' or 'n'

print("You entered:", s)

In this code, the 'while' loop will continue executing as long as the value of s is not 'y' or 'n'.

The 'input()' function prompts the user to enter a value, and the input is stored in the variable s. The loop will keep repeating until the condition s not in ('y', 'n') is false.

Once the loop exits, it means the user has entered either 'y' or 'n', and you can proceed with further processing or printing the value if needed. In the example above, it simply prints the value of s using print().

Learn more about String variable click;

https://brainly.com/question/31751660

#SPJ2

what are the disadvantages of using a workstation as a print server​

Answers

Answer:

Pros and cons of workstation

There are some pros and cons of workstation that are explained below:-

Advantages of workstation

High performance:

This type of computers can give more performance than a normal computer. It is best suited for rendering complex graphics, financial analysis, and digital content creation.

Single user:

A single user can use this type of computer at a time and hence the speed of the system can be improved and there is no other user that can interfere with the performance.

Smart investment:

Investing in such computers is good because it increases our productivity and can do more work than the normal user can do. For example, if you want to edit any animation and then render it then it can be done rapidly.

Used in the entertainment and media sector:

These computers can perform best in entertainment sector where a lot of audio and video processing is needed. Also, such computers work great in the media sector where live broadcasting is done.

Reliability:

You can easily diagnose any problem in the workstation. The IT staff can repair your system if you get a blue screen, or workstation can become unresponsive. IT staff can attach keyboard, mouse, and video and identify the problem in the workstation even the workstation is off.

Large memory:

A workstation has a larger memory than a desktop PC. It has about twice the memory as compared to laptops, tablets, smartphone or other devices. By using larger memory it can do more work in a shorter time. There are nearly no errors in memory while performing any task.

Multiple processors support:

A workstation has multiple processors attached to it. By using multiprocessors you can run multiple applications at a time without any issue. Your system will not slow down by opening multiple applications. A workstation is used by professionals like engineers, scientists, analysts and designers.

Large hard drives and SSD:

A workstation has hard drives which can store terabytes of data so any type of job of any size can be stored in the hard drives. Additionally, SSD (Solid State Drives) are also attached in the workstation to speed up the overall performance of the system.

Easy to use:

The workstation has a large keyboard than a laptop and it is easy to use if you stay in one room.

Disadvantages of workstation

Portability:

It is difficult to move workstation from one place to another. On the other hand, if you use a laptop then you can move it easily from one place to another. For moving workstation, you have to plug out every time you plan to move.

Expensive:

Workstation is expensive than low capacity computers. The higher cost is because of higher RAM, hard drives and multiprocessor support.

High power usage:

The workstation uses more electricity than other devices like tablets, smartphone, laptops and desktop computers.

Examples of workstation

Some examples of the workstation are:-

Apple Power Mac G5

Hp Z series

Dell Precision

Sun Microsystems SparcStation

Silicon Graphics IRIX Machines

Apple Mac Pro

Apple Macbook Pro

Explanation:

should variables that contain numbers always be declared as integer or floating-point data types? why or why not? name potential examples.

Answers

No, it is not necessary that variables that contain numbers should always be declared as integer or floating-point data types.

It is not necessary that variables that contain numbers should be declared as integer and floating point data types. Because number can be declared with different data types.  As we know that data type is a vital aspect in programming. It describes the type of a value that is contained in a variable. It is the data type based on which memory is allocated to a number or any type of variables.

Numbers can be whole decimal/fractional, signed, unsigned, small, and long. Simply, they exist in a variety of values. According to their values range, the amount of memory is reserved.

Different programming languages offer different data types to store numbers, depending on their types and size. Let’s consider some examples of data types used in programming languages in order to declare variables holding numbers.

In Python int, float, and complex are the data types used to declare number type variables.SQL uses INTEGER, SMALLINT , BIGINT , NUMERIC() , and DECIMAL() data types for numbers. To deal with number type variables, Java has six predefined data types, such as int, long, short, byte, float, and double.JavaScript uses a single data type called 'number' to declare numbers.In C++, two fundamental data types, int and float, are used to represent numeric variables. But C++ is not only limited to these two data types. The data type char can also store numbers. Other data types for declaring numbers as variables are derived from int, float and char, such as short int, long int, signed int, unsigned int, double, long double, signed char, unsigned char etc. etc.

So in concluding remarks, declaring a number type variable is not only limited to using integers and floating-points data types. Rather it entirely depends on the respective programming language, and size and type of the number to be stored in the variable.

You can learn more about data types at

https://brainly.com/question/13438922

#SPJ4

Which of the following is used to close up security holes?

Answers

The option that is used to close up security holes is to  Address Internal Threats.

What is security hole in cyber security?

In regards to computer security, the term security hole   is known to be a statement that connote a form of vulnerability as well as any form of weakness that can be seen  in a system.

This is known to be one that may be as a result of  a system design flaw or any form of bug.

If this is unresolved, such flaws can render a system vulnerable to attacks through the use of Internet that could act to compromise the integrity or confidentiality of that given system.

Therefore, The option that is used to close up security holes is to  Address Internal Threats.

Learn more about security from

https://brainly.com/question/25720881
#SPJ1

write code that combines the following variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message. do not edit the values assigned to by, az, io, or qy.

Answers

A code which combines the given variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message is as follows:

by = "You are"az = "doing a great "io = "job"qy = "keep it up!"message = by+" "+az+io+", "+qy

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two (2) main methods for assigning or passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

Read more on variable here: https://brainly.com/question/12978415

#SPJ1

how many ip addresses does a class c network have? 1 point 1 address 65,536 addresses 256 addresses 16,777,216 addresses

Answers

Local hosts belonging to class C have 256 possible addresses.

There are three classes of TCP or IP networks, and each class of TCP or IP networks uses the 32-bit IP address space differently. The classes are as follows:

Class A

The first eight bits of the IP address as part of the network are used for the class A network number.

Class B

16 bits for the network number and the host number is used for the class B network number.

Class C

24 bits for the network number and 8 bits for the host number are used for class C network numbers.

Learn more about networking class here https://brainly.com/question/13182181

#SPJ4

a spring balance pulls on a 0.5 m bar with 10 n

Answers

Answer:

This question cannot be answered with the input you've given. Comment the complete question and the context of it and I will do my best to answer.

you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard drive plugged in. what should you do first? turn on the computer and take screenshots. unplug the external usb hard drive. place the computer in a faraday bag. thoroughly document the state of the equipment.

Answers

The first thing to do is to thoroughly document the state of the equipment before it is hidden which is essential to comply with chain of custody procedures. Failure to do so will render the evidence collected unacceptable.

Security+ can be defined as an entry-level cybersecurity credential offered by the non-profit trade association CompTIA. This is usually the first certification in information security that an IT professional earns. By having Security+, you may get more job opportunities, as you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is an exam that tests the applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam can be defined as a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/14728048

#SPJ4

write a function fullwords(s) that returns a string no longer than 20 characters. if the string s is longer than 20 characters, just truncate at the space closest to the 20th position (so no word is truncated) and return it. if the string s is shorter 20 characters, just return it unchanged.

Answers

Assuming you mean a function that truncates a string to 20 characters:

function fullwords(s){

if (s.length > 20) {

//find the 20th character

var char20 = s.charAt(19);

//if it's a space, return the string up to that point

if (char20 == " ") {

return s.substring(0, 20);

}

//if it's not a space, find the closest space

else {

var spaceBefore = s.lastIndexOf(" ", 18);

return s.substring(0, spaceBefore);

}

}

//if the string is shorter than 20 characters, return it unchanged

else {

return s;

}

}

To use fullwords(), simply pass in a string as the only argument. The function will then return a string that is no longer than 20 characters. If the string you passed in was shorter than 20 characters, it will be returned unchanged.

Learn more on string here:

https://brainly.com/question/28290531

#SPJ4

read two numbers from user input. then, print the sum of those numbers. hint -- copy/paste the following code. the first line of code provided reads a number from input and assigns num1 with that number. repeat for num2. type code where the question marks are to finish the code. num1

Answers

The given program is written in python that finds the sum of two numbers entered by the user.  First, it prompts the user to input two numbers and converts them to integers. Secondly, it calculates their sum and displays the result of addition.

The required code is given as follows:

num1 = int(input())

# prompts the user to input the first number in variable num1. Input () function returns a string value so the entered number is first converted into integer using the function int().

num2 = int(input())

# prompts the user to input the second number in variable num2.  Input () function returns a string value so the entered number is first converted into integer using the function int().

print(num1 + num2)

# adds num 1 and num 2. Then prints result of sum

You can learn more about how to add two number using programming language at

https://brainly.com/question/13014075

#SPJ4

Answer:num1 = int(input())

num2 = int(input())

print(num1 + num2)

Explanation:

Other Questions
a health care team is involved in caring for a client with advanced alzheimer's disease. during a team conference, a newly hired nurse indicates that she has never cared for a client with advanced alzheimer's disease. which key point about the disease should the charge nurse include when teaching this nurse? The theme of the preamble is a continuation of the theme presented on the Declaration of independence; which of the fellowing best represents the theme of both documents?1. Government sole responsibility should be the protection of man natural rights.2. Better Government represents a quest for the betterment of mankind.3. All Government must dictate its own nature4. Humans are self-interested, and, therefore, so is Government. your dod common access card has a public key ifrastructure token approved for acces to the non classified internet protocol router How was De La Penas piece on hunger received? Why do you think this was the case? A cook puts 9.00g of water in a 2.00 -L pressure cooker that is then warmed to 500C . What is the pressure inside the container? what the answerr need help asap 2.4.5 x 10 dm to m researchers collect continuous data with values ranging from 0-100. in the analysis phase of their research they decide to categorize the values in different ways. given the way the researchers are examining the data - determine if the data would be considered nominal, ordinal or ratio (you may use choices more than once). A football player has a mass of 100 kg and can accelerate at 4 m/s. How muchforce does this football player apply? Alonzo's suitcase can weigh no more than 20 kilograms if he wants to take it onthe airplane without paying a fee. His suitcase weighs 220 hectograms. Howrbuch weight will Alanzo have to take out of his suitcase to meet the weight limit?hectograms the marketing mix, often known as the four ps of marketing, represent areas that a firm can adjust to influence demand for its goods, services, or ideas. if a firm wanted to adjust the cost of a service by 2 percent to stay competitive, on which of the four ps would it be focusing? HELP ASAP!!!!!!If a car goes along a straight road heading east and speeds up from 45 ft/s to 60 ft/s in 5 s, calculate the acceleration.fus 2a=Note: If the speed were given in miles per hour, and the time were given in minutes, you could change the minutes to afraction of an hour and do the problem. The answer would be in miles/h. veronica, the marketing manager of qrs children's furniture, is designing a new label for the company's line of highchairs. the two key aspects of the label that she is working on are the assembly instructions and the simple usage instructions. these are examples of the requirements of labeling. Let f be the function that determines the area of a circle (in square cm) that has a radius of r cm. That is, f ( r ) represents the area of a circle (in square cm) that has a radius of r cm. Use function notation to respond to each item below. Represent the area (in square cm) of a circle that has a radius of 3.4 cm. Explain how animals affect the water cycle as the breathe how does competition play a role in a free market or free enterprise economy? how can a Ottoman victory in Constantinople and the Fall of the Byzantine Empire might impact the relationship between Europe and the Middle East. legalizing or decriminalizing illegal drugs falls into which of howard abadinsky's approaches to controlling organized crime? g(x)=4x^2-3x+5, g(x) - g(2)Solve the question. true or false. for this experiment, aeromonas were introduced before vibrio into the larval zebrafish gut.