Select the correct answer.
Which option should you select to accept a tracked change?
O A.
Accept
Reject
O C. Review
OB.
O D. Delete

Answers

Answer 1

Answer:

Explanation:

Which option should you select to accept a tracked change?

A.  Accept


Related Questions

If you were to combine blue and orange, this would be an example of:

Question 11 options:

combining two primary colors to get a secondary color.


combining a primary and a secondary color to get a tertiary color.


combining two secondary colors to get a primary color.


combining two tertiary colors to get a secondary color.

Answers

Answer:

the combination of two complimentary colors(sit opposite on the color wheel to each other) or a primary and secondary color to get a tertiary color! hope this helps!

Combining a primary and secondary to get tertiary

dietary patterns play a role in several of the leading causes of death in the united states. from the following list of the 10 leading causes of death in the united states, click to select the six causes of death for which nutrition plays an important role.

Answers

The ones where  nutrition plays an important role are heart disease, cancer, stroke, diabetes, Alzheimer's disease, and  kidney diseases Cause of death are: chronic lower respiratory diseases, accidents, pneumonia/influenza.

What is known as Dietary patterns ?

Dietary patterns is known to be a term that conn defined as “the quantities, as well as the proportions, or combination of different kinds of foods, drinks, as well as  nutrients in diets.

Note that it is also made up of  the rate with which these food are said to be habitually consumed.

Therefore, The ones where  nutrition plays an important role are heart disease, cancer, stroke, diabetes, Alzheimer's disease, and  kidney diseases Cause of death are: chronic lower respiratory diseases, accidents, pneumonia/influenza.

Learn more about dietary patterns from

https://brainly.com/question/13724462
#SPJ1

Which of the following types of digital evidence can be pulled from both a computer and a portable device?
Images
Text history
GPS coordinates
phone call data

Answers

The  types of digital evidence that can be pulled from both a computer and a portable device are:

Text historyImagesGPS coordinates

What type of evidence can be identified and collected from digital devices?

These are known to be Evidence that can be obtained Digitally. They includes:

Computer documentsEmailsText and instant messages,TransactionsImages Internet histories, etc.

The above are all examples of information that can be obtained from electronic devices and can be used very well as evidence.

Therefore, The  types of digital evidence that can be pulled from both a computer and a portable device are:

Text historyImagesGPS coordinates

Learn more about digital evidence from

https://brainly.com/question/18566188

#SPJ1

Answer:

(A) Images

Explanation:

Got it right on my quiz.

The attachment should help you understand why its Images.

To use analytics to collect website data, what must be added to the website page html?.

Answers

Answer:

Analytics Tracking Code

when you arrived at the unit today and listened to the change of shift report, you heard about a patient named jane w. according to the tape-recorded signout, jane "is a 57-year-old woman with abdominal pain and vomiting. she has pain medications ordered p.r.n. [as needed]." during your shift, jane does not request pain medications. near the end of your shift, however, you get a call from jane’s daughter. distraught, she asks why nobody is treating her mother’s pain. when you explain that jane has not requested any pain medications, her daughter exclaims, "but she’s had a stroke! she can’t use the call light! what kind of place are you running over there?"

Answers

The  transition between providers ("hand-over") have contributed to this situation is  option (A) The handoff was too brief and failed to include important information.

What is meant by transition of care?

Transition of Care is known to be a term that connote the movement of a patient and this is one that is often done from one setting of care (such as the hospital, ambulatory specialty care to another.

Note that the individuals that are known to be the most affected by transitions of care are the Older people that are known to have a complex health issues and are also those that are very likely to undergo multiple transitions of care.

Therefore, The  transition between providers ("hand-over") have contributed to this situation is  option (A) The handoff was too brief and failed to include important information.

Learn more about handoff from

https://brainly.com/question/878400

#SPJ1

See full question below

When you arrived at the unit today and listened to the change of shift report, you heard about a patient named Jane W. According to the tape-recorded signout, Jane "is a 57-year-old woman with abdominal pain and vomiting. She has pain medications ordered p.r.n. [as needed]." During your shift, Jane does not request pain medications. Near the end of your shift, however, you get a call from Jane's daughter. Distraught, she asks why nobody is treating her mother's pain. When you explain that Jane has not requested any pain medications, her daughter exclaims, "But she's had a stroke! She can't use the call light! What kind of place are you running over there?"

How might the transition between providers ("hand-over") have contributed to this situation?

(A) The handoff was too brief and failed to include important information.

(B) The handoff was hard to understand.

(C) You weren't paying close attention to the information you were being given.

(D) You had no opportunity for verbal repeat back.

while cleaning the data, you notice there’s missing data in one of the rows. what might you do to fix this problem? select all that apply.

Answers

The thing that a person might do to fix this problem is option a and c in the image attached: Ask a college for guidance or ask a supervisor.

What are the causes of missing data?

Missing data, or missing values is known to be a term that connote when a person do not possess data stored for some variables or participants.

Note that  Data can go missing as a result of an  incomplete data entry, equipment issues, lost files, and others.

Therefore, based on the above, The thing that a person might do to fix this problem is option a and c in the image attached: Ask a college for guidance or ask a supervisor.

Learn more about Missing data from

https://brainly.com/question/22521037
#SPJ1

all of the following are new technology-related trends in mis except: group of answer choices the mobile digital platform. iot. big data. co-creation of business value. cloud computing.

Answers

The option that is note a new technology-related trends in MIS is co-creation of business value.

Technology and Management Information System:

Technology and Management Information System is known to be a term that connote the way a person can know or understand data that is obtained from a lot of units and departments of an organization.

Note that It can be used in the area of integration with other types of technology and as such, The option that is note a new technology-related trends in MIS is co-creation of business value.

Learn more about  business value from

https://brainly.com/question/25528419

#SPJ1

Q1 Give two examples of print () that will lead to errors.​

Answers

Answer:

print(a') print(endl<<)

Explanation:

These are two different statements of print() function which will lead to error because in the first example we have passed the variable with a closing quotation mark and in the second we are passing the manipulator to the function body which will also lead to error.

______is the process of identifying domain names as well as other resources on the target network

Answers

Network enumeration is the process of identifying domain names as well as other resources on the target network.

Network enumeration is the process in which hackers try to find out the maximum data possible about the targeted user in order to enter and get a hold of the user's computer to carry out any threatful activity.

Information regarding user names, domain names, and applications can be achieved by the hacker through the process of network enumeration.

The network enumerator works by searching for any unprotected aspect of the network which can be easily attacked and then alerts the hacker about it by which the hacker can gain access to the computer.

On the other hand, network enumerators can also be beneficial in that they can be used to scan for the unsafe and unguarded aspects of the networks which can then be fixed in an appropriate way before the hacker can attack by using this vulnerability.

To learn more about enumeration, click here:

https://brainly.com/question/13068603

#SPJ4

tim just logged into his cloud management dashboard to check the health monitors of his server fleet. what is the process he completed at login?

Answers

Since Tim logged into his cloud management dashboard to check the health monitors of his server fleet, the process he completed at login is: C. authentication.

What is 2FA?

2FA is an acronym for two-factor authentication and it can be defined as a security system that is designed and developed to require end users or devices to provide two (2) separate but unique forms of identification, so as to enable them access and use a secured resource.

In Cybersecurity, two-factor authentication refers to a security system that uses the combination of something an end user knows with something he or she has such as one-time password, in order to successfully identify and authenticate the request of an authorized end user or device.

In this context, we can infer and logically deduce that the process Tim completed at login is an authentication because he successfully logged into his cloud management dashboard to check the health monitors of his server fleet.

Read more on two-factor authentication here: brainly.com/question/14330595

#SPJ1

Complete Question:

Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process he completed at login?

A.Authorization

B.Accounting

C.Authentication

D.Federation

E.Identity access

within a css style rule, a property declaration includes group of answer choices a property and a selector a property and a value a selector and a value a selector and a declaration block

Answers

Within a CSS style rule, a property declaration includes: B. a property and a value.

What is CSS?

CSS is an abbreviation for Cascading Style Sheets and it can be defined as a style sheet programming language that is designed and developed for describing and enhancing the presentation of a webpage (document) that is written in a markup language such as:

XMLHTML

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language which is used for designing, developing and creating websites or webpages.

In Computer programming, a CSS style rule can be applied to one or more target HTML elements and it must contain a set of CSS properties and a CSS selector. Also, a property declaration includes a property and a value.

Read more on CSS style rule here: https://brainly.com/question/14376154

#SPJ1

What address should you ping if you want to test local ipv6 operation but don't want to actually send any packets on the network?

Answers

If you want to test local IPv6 operation without actually sending any packets over the network, you can use the ping command with the prefix ::1.

A computer network administration tool called ping is used to check whether a host is reachable on an IP network. Almost all operating systems with networking capabilities, including the majority of embedded network administration software, support it.

Ping calculates the amount of time it takes for messages to travel from the source host to the destination computer and back again. The term is derived from active sonar, which uses sound pulses and echo detection to find objects beneath the surface of the water.

Learn more about ping https://brainly.com/question/4671581

#SPJ4

What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?.

Answers

Dequeue() operations take O(1) time to complete. It will take O(N) time to eliminate N elements from the queue (in total). The time required for one enqueue () operation is O(1). The time required to add N elements to the queue is O(N) (in total).

For a single operation, insertion has an O(1) time complexity and deletion, in the worst case, has an O(n) time complexity. Since it still takes O(n) time to delete n elements from the queue, the amortised costs for both are O(1).

In a balanced binary search tree, the time complexity for a single search is O(log(n)). The difficulty of the question may force you to perform n searches in the binary tree, making it O(nlog(n)) in total. A single search in an unbalanced binary search tree has a worst-case complexity of O. (n).

Learn more about queue:

https://brainly.com/question/24275089

#SPJ4

during the course of administration of an investigational drug, the following events occur: on day 7, subject 603 has an unexpected stroke that requires hospitalization. on day 15, subject 415 complains of nausea, vomiting, and headache relieved by aspirin. on day 21, subject 20 has brief dizzy spells upon trying to stand. an ind safety report is most likely filed by the sponsor with the fda for the observations associated with:

Answers

An IND Safety Report would be most likely filed by the sponsor with the FDA for the observations associated with: subject 603 only.

What is FDA?

FDA is an abbreviation for Food and Drug Administration and it can be defined as a federal agency of the government of the United States of America that is saddled with the responsibility of protecting the consumers of drugs and other edible products from hazards (poisons), as well as promoting and enhancing public health safety.

What is an IND Safety Report?

IND Safety Report is a short terminology for Investigational New Drug Safety Report and it can be defined as any findings from tests that are conducted in the laboratory on animals which suggest a significant risk for human subjects, when the drug is used.

Based on the information provided, we can reasonably infer and logically deduce that an Investigational New Drug (IND) Safety Report would be most likely filed by the sponsor with the Food and Drug Administration (FDA) for the observations associated with subject 603 only because it  suggest a higher and significant risk for human subjects.

Read more on IND Safety Report here: https://brainly.com/question/28084797

#SPJ1

in most large and medium-sized companies, a(n) within the it department is responsible for providing user support.

Answers

In most large and medium-sized companies, a help desk, or information center, within the IT department is responsible for providing user support.

What is information technology (IT)?

Information technology (IT) can be defined as a field in computer science that typically deals with the use of computer systems to generate, process, store, retrieve, and exchange different types of electronic data and information over a secured network.

In most large and medium-sized business organizations (companies), a help desk or information center, within the Information technology (IT) department is saddled with the responsibility of providing user support to the members working there.

Learn more about information technology here: brainly.com/question/14426682

#SPJ1

Complete Question:

In most large and medium-sized companies, a help desk, or ____, within the IT department is responsible for providing user support.

A: resource center

B: portal

C: information center

D: technology center

2^7suppose an email message has 500 characters. how many bits would a computer use to store that email, using ascii code having 7 bits per character?

Answers

If an email message has 500 characters, computer would use 7 bits to store that email.

Each character in the basic ASCII set utilises 7 bits. Each character now has a total of 128 different symbols. But the 8 bits used by the wider ASCII character set. This results in a total of 128 more characters.

The additional character in the 8 bits extended ASCII character contains characters from other languages as well as unique symbols and characters that can be utilised to create drawings and visuals.

The most used character encoding format for text data in computers and on the internet is ASCII (American Standard Code for Information Interchange). There are distinct values for 128 extra alphabetic, numeric, special, and control characters in ASCII-encoded data.

Learn more about bits:

https://brainly.com/question/19667078

#SPJ4

write a program that prints the sum of two selected numbers from a line –first line of input contains the number of lines to follow –first number of each line, n>

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that prints the sum of two selected numbers from a line.

Writting the code:

import java.util.*;

public class Main

{

public static void main(String[] args)

{

    // create a Scanner Object

    Scanner sc = new Scanner(System.in);

   

    //declare required variables

    int number_of_lines, total_numbers;

 

    //take input of number_of_lines

    number_of_lines = sc.nextInt();

 

     //initialize array to store the sum of values for each line

     int []sum_arr =  new int [number_of_lines];

 

 

       //loop runs to take the numbers as input and calculate their sum

       //and store in the array.

 for(int i=0;i<number_of_lines;i++)

 {

     // first take the count of numbers to be inserted in each

     //row

     total_numbers =  sc.nextInt();

     

     // since last two are the indices,  create an array with size 2

     //less than total_numbers

     int [] numbers =  new int[total_numbers-2];

     

     //loop to take the numbers into array

     for(int j=0;j< total_numbers-2 ;j++){

         numbers[j] = sc.nextInt();

     }

     int sum_of_numbers = 0;

     

     // take the last two indices as input and find

     //the values in the numbers array

     //then calculate their sum

     sum_of_numbers += numbers[sc.nextInt()-1];

     sum_of_numbers += numbers[sc.nextInt()-1];

     

     //finally store the sum on an array.

     sum_arr[i] = sum_of_numbers;

   

     

 }

 

 //loop to print the sums

 for(int i=0;i<number_of_lines;i++){

     System.out.println(sum_arr[i]);

 }

 

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself? advanced anti-malware measured boot master boot record analytics startup control see all questions back next question

Answers

The operating system feature that is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself is  option d: Measured Boot.

What is Measured Boot?

Measured boot is known to be one of the feature of operating system where there is known to be a log of all boot work that is said to be  taken and saved in a trusted place module for future retrieval as well as analysis by anti-malware software on any kind of remote server.

Note that an operating system (OS) is said to be a kind of a software that is known to helps in  the act of operating both hardware as well as the software of any given computer and it also handles  all other application programs.

Therefore, based on the above, The operating system feature that is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself is  option d: Measured Boot.

Learn more about operating system  from

https://brainly.com/question/22811693
#SPJ1

Which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself?

-Master Boot Record Analytics

-Startup Control

-Advanced anti-malware

-Measured Boot

you are working on shortening the time it takes patients with chest pain to get to the cardiac catheterization lab in your hospital. your aim is to have 90 percent of patients brought to the lab within 45 minutes of arrival to the hospital. you decide to try a care protocol that another hospital in the area implemented with great success. the care protocol was successful at the other hospital. why would it be important to test this proven change at your hospital?

Answers

It would be important to test this proven change at your hospital: Because this change may not be as effective in your hospital.

Changes that are successful in one complicated system might not be successful at all—or even at all—in another. Testing the modifications is the only way to be certain.

Testing "proven" improvements is also recommended to assess expenses, reduce opposition, raise buy-in, and boost your own confidence that the change would improve your setting.

-during the "s" phase of your subsequent pdsa cycle:

S is an acronym for "study." In this stage, you review the information amassed during the "Do" phase. The "Plan" step includes planning for implementation, while the "Do" step includes recording results. Thinking about how to disseminate the PDSA cycle does not include.

Learn more about hospital:

https://brainly.com/question/27126420

#SPJ4

which software is added to the browser (or other program) to provide a capability that is not inherent to the browser

Answers

A software which is added to the web browser (or other program) to provide a capability that is not inherent to the browser is generally referred to as a browser extension.

What is a web browser?

A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

What is a browser extension?

A browser extension is also referred to as a plugin and it can be defined as an extra software application that is (manually) added by an end user to the web browser or other software program, in order to provide a capability that is not present in the web browser. Some examples of a browser extension include the following:

Readability Awesome Screenshot StayFocusdEvernote Web ClipperBuffer

Read more on web browsers here: brainly.com/question/28088182

#SPJ1

what is "tracing" on a
PCB? why is it important?

Answers

Answer: Tracing of PCBs (printed circuit boards) is an important, time-consuming and also complicated process of finding out the mounting locations of conductors and wiring their interconnections to the dielectric plate of the board. You should know the requirements of the specification, current standards, optimal parameters, and as well as restrictions.

what are the two functions available in the tkinter.filedialog module used to support file access in a gui program?

Answers

Asksaveasfilename and askopenfilename the two functions available in the tkinter.filedialog module used to support file access in a GUI program.

There are two functions available in the tkinter.filedialog module that can be used to support file access in a GUI program: asksaveasfilename and askopenfilename.

Asksaveasfilename prompts the user to enter a filename to save a file as, while askopenfilename allows the user to select an existing file to open.

Both of these functions return a string representing the selected filename.

If you're using tkinter to build a GUI application that deals with files, then these two functions will be very useful to you.

Learn more on GUI program here:

https://brainly.com/question/16028777

#SPJ4

Hello guys where's bios chip in this motherboard help me​

Answers

Answer:

Explanation:

Hey there!

Do you see the lower corner?

on the right beside the anti surge thingy

its rectangular, its also black from the center its here







































































































































































Customize this page







Background





Shortcuts





Color and theme






Upload from device






No background











My shortcuts
Shortcuts are suggested based on websites you visit often







Most visited sites
Shortcuts are curated by you





Hide shortcuts
Don't show shortcuts on this page









Cancel
Done





×




















Answers

Answer:

Does it look like I am a make a wish foundation

Which of the following is normally included in the criteria of a design?

Answers

The one that is normally included in the criteria of a design is budget. The correct option is 3.

What is budget?

A budget is an estimate of revenue and expenses for a given period of time that is usually compiled and re-evaluated on a regular basis.

Budgets can be created for an individual, a group of people, a company, a government, or almost anything else that makes and spends money.

Criteria are requirements that the design must meet in order to be successful. Constraints are design limitations.

These may include the materials available, the cost of the materials, the amount of time available to develop the solution, and so on.

Thus, the correct option is 3.

For more details regarding budget, visit:

https://brainly.com/question/15683430

#SPJ1

1. Materials

2. Time

3. Budget

4. Efficiency

Define the following term:
i) Kernel

Answers

Kernel : It is the core that provides basic services for all other parts of the OS. It is the main layer between the OS and underlying computer hardware

in your online presentation you use a video clip. it's obvious from the clip who the speaker is and the context of the video. do you need to cite where you retrieved the clip?

Answers

No, you don't need to cite where you retrieved the clip if it's obvious from the clip who the speaker is and the context of the video.

When using video clips in online presentations, it is not always necessary to cite the source. If the clip is clearly from a recognizable source (such as a well-known TV show or movie), and the context is clear, then a citation is usually not needed.

However, if the clip is from a less well-known source, or if the context is not clear, then it is always best to cite the source. This will ensure that your audience can easily find the original video, and will also help to avoid any potential copyright issues.

Learn more here:

https://brainly.com/question/735700

#SPJ4

a controlled experiment is one that: select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a has many variables b eliminates a key variable c enables personal opinions d is impossible to achieve

Answers

A controlled experiment is one that: C. enables personal opinions.

What is a control experiment?

A control experiment can be defined as a type of experiment in which a condition assumed to be a probable cause of an effect is compared with the same situation without involving or using the suspected condition.

This ultimately implies that, all factors are held constant in a controlled experiment except for the independent variable.

What is a treatment group?

A treatment group can be defined as a a group of participants in an experiment that are exposed to some manipulation in the independent variable such as an administration of medication to a particular group.

In this context, we can reasonably infer and logically deduce that a controlled experiment is one that enables personal opinions.

Read more on controlled experiment here: https://brainly.com/question/17515101

#SPJ1

a cybersecurity analyst is attempting to classify network traffic within an organization. the analyst runs the tcpdump command and receives the following output:

Answers

The statement that is true based on this output is that: 10.0.19.121 is a client that is said to be logging or accessing an SSH server over port 52497.

What is SSH server used for?

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to  be able to talk or communicate.

It is seen as a  protocol used to move hypertext such as web pages. Therefore, The statement that is true based on this output is that: 10.0.19.121 is a client that is said to be logging or accessing an SSH server over port 52497.

Learn more about SSH server  from

https://brainly.com/question/28269727

#SPJ1

A cybersecurity analyst is attempting to classify network traffic within an organization. The analyst runs the tcpdump command and receives the following output:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

$ tcpdump -n -i eth0

15:01:35.170763 IP 10.0.19.121.52497 > 11.154.12.121.ssh: P 105:157(52) ack 18060 win 16549

15:01:35.170776 IP 11.154.12.121.ssh > 10.0.19.121.52497: P 23988:24136(148) ack 157 win 113

15:01:35.170894 IP 11.154.12.121.ssh > 10.0.19.121.52497: P 24136:24380(244) ack 157 win 113

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Which of the following statements is true based on this output?

you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish this? nslookup 10.0.0.3 nbtstat -a 10.0.0.3 dig -x 10.0.0.3 arp 10.0.0.3

Answers

A command you would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system: dig -x 10.0.0.3.

What is a Linux command?

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, a command which an administrator (end user) would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system is dig -x 10.0.0.3.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

Other Questions
What is a catch memory 147 divided by 7(Explanation needed please) the nurse is teaching a pregnant woman about breastfeeding. the nurse determines that the teaching was successful when the woman identifies which hormone as being released when the newborn sucks at the breast? Its time to write your own poem!! You may write a poem about ANY school-appropriate topic you choose. Your poem must include at least 5 of the elements below:alliterationallusion analogyConnotationExtended MetaphorHyperboleImagery metaphorOnomatopoeiaPersonificationSimile *You must CLEARLY LABEL these elements as you use them.(Hint: To reach for a higher score on this assignment, I would encourage you to also EXPLAIN how each of these elements add meaning to your overall poem.) Finally, explain in 3-5 sentences the TONE and MOOD of your poem. Remember, TONE is the authors attitude toward the subject of the poem. MOOD is the feeling that the poem creates for those reading it. As you explain TONE and MOOD, be sure to include specific words and phrases from your poem that prove your TONE and MOOD. Oklahoma and the Early Republic: Mastery Testan agreement between the United States and France; doubled the size of the United Statesended the French and Indian War; France lost its land in North America; Spain gained control ofLouisianaset the boundaries between the Louisiana Territory and New Spain; added most of present-dayOklahoma to the United Statesagreement between the United States and Spain; gave the United States access to the MississippiRiver and the Port of New OrleansPinckney'sTreatyTreaty of 1763LouisianaPurchaseAdams-OnsTreaty What do you think is the biggest challenge facing cities in the world today? Why? 2.345.4. It is 2 p.m. in City A (90 degrees north, 120 degrees east). What time is it in City B at 90degrees south, 15 degrees east? Gary, the school chef, needs to make 40 tacos for every 15 students. How many tacos would Gary need to prepare for 3 students? Who wrote this Sparta or Athens we hold these truths to be self evident What do you call it when there are more babies being born than people dying? arrange the following fractions in ascending order: 3/13, 1/4, 1/7 a man jogs at a speed of 1.5 m/s. his dog waits 2.5 s and then takes off running at a speed of 3.3 m/s to catch the man. how far will they have each traveled when the dog catches up with the man? PLEASEEEEEE HELP ASAPWILL GIVE BRAINLIST!!DONT JUST USE FOR POINTS, ACTUALLY ANSWER IT! (CORRECTLY)THIS IS FOR IXL BTW Which of the following would be an internal customer for a pharmacy technician? 6. The Americans _____ when the Japanese began a second attack. (this had to do with Pearl Harbor) A) hid in bomb sheltersB) radioed the presidentC) started to fight backD) captured hostages Which could be sources of error in the lab? Check all that apply. Find all integer solutions of each system of inequalities.a) 6-4b>0 3b-1>0b) 3-18x0 Which of the following expenses should be included in your budget?A) Clothing allowanceB) Entertainment (ex. going to the movies).C) Gas/travelD) All of these pharmacokinetics of exogenous melatonin in relation to formulation, and effects on sleep: a systematic review which one of the following dysfunctional speech patterns is a normal characteristic of the language development of a preschool child?