The default print setting for worksheets is________
Print Vertically
Print Selection
Print Entire Workbook
Print Active Sheets

Answers

Answer 1

Answer:

Print Active Sheets .

Explanation:

This question refers to the default printing system of the Excel program. Thus, when printing a job using this program, the default option will print all the active sheets, that is, all those spreadsheets where information has been entered. To be able to print in another option, such as selecting certain cells, rows or columns, you must configure the printing for this purpose.


Related Questions

A state university locks in costs for a student once a student starts attending the university. The total cost is $24,500. A student has the following help in covering the costs of school.

An academic scholarship of $10,700.
Other scholarships and grants of $5,000.
Relatives pay $1,600.
What is the amount that the student will need to save every month in order to pay off the remaining costs in 10 months?


$500

$550

$600

$720

Answers

10,700+5000+1600=17,300
24,500-17,300=7,200
7,200/10=
$720.00 will need to be saved every month.

Answer:

720

Explanation:

What is block chain?

Answers

Answer:

Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.

A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Hope this helps.

x

Blockchain is a distributed database existing on multiple computers at the same time. It is constantly growing as new sets of recordings, or ‘blocks’, are added to it. Each block contains a timestamp and a link to the previous block, so they actually form a chain. The database is not managed by any particular body; instead, everyone in the network gets a copy of the whole database. Old blocks are preserved forever and new blocks are added to the ledger irreversibly, making it impossible to manipulate by faking documents, transactions, and other information. All blocks are encrypted in a special way, so everyone can have access to all the information but only a user who owns a special cryptographic key is able to add a new record to a particular chain.

Read Chapter 2 in your text before attempting this project. An employee is paid at a rate of $16.78 per hour for the first 40 hours worked in a week. Any hours over that are paid at the overtime rate of one-and-one-half times that. From the worker's gross pay, 6% is withheld for Social Security tax, 14% is withheld for federal income tax, 5% is withheld for state income tax and $10 per week is withheld for union dues. If the worker has three or more dependents, then an additional $35 is withheld to cover the extra cost of health insurance beyond what the employer pays. Write a program that will read in the number of hours worked in a week and the number of dependents as input and will then output the worker's gross pay, each withholding amount, and the net take-home pay for the week.

Answers

Answer:

Answered below

Explanation:

#Answer is written in Python programming language

hrs = int(input("Enter hours worked for the week: "))

dep = int(input ("Enter number of dependants: "))

pay = 16.78

ovpay = pay * 1.5

if hrs <= 40:

wage = hrs * pay

else:

wage = hrs * ovpay

ss = wage * 0.06

fedtax = wage * 0.14

statetax = wage * 0.05

dues = 10

if dep >= 3:

ins = 35

net_pay = wage - ss - fedtax - statetax - dues - ins

print(wage)

print ( ss, fedtax, statetax, dues, ins)

print (net_pay)

Write a program that calculates the tip and total amount to pay per person given the bill. The program gets the bill, tip percentage and number of people as input and outputs the amount of tip per person and total per person. Check the Programming Guideline document on Blackboard to know what to submit. Sample run given below where the red bold numbers are the inputs from the user: TIP CALCULATOR Enter the bill : 20.25 Enter the percentage of the tip : 20 Enter the number of people : 3 Tip per person is $1.35 and total per person is $8.10.

Answers

Answer:

Answered below.

Explanation:

#program is written in Python programming language

#Get inputs

bill = float(input('Enter bill: "))

tip = float(input("Enter tip percentage: "))

people = float(input ("Enter number of people: ")

#calculations

amount_per_person = bill / people

tip_per_person = amount_per_person * tip

total_per_person = amount_per_person + tip_per_person

#output

print(tip_per_person)

print (total_per_person)

We have looked at several basic design tools, such as hierarchy charts, flowcharts, and pseudocode. Each of these tools provide a different view of the design as they work together to define the program. Explain the unique role that each design tool provides (concepts and/or information) to the design of the program.

Answers

Answer:

Answered below

Explanation:

Pseudocode is a language that program designers use to write the logic of the program or algorithms, which can later be implemented using any programming language of choice. It helps programmers focus on the logic of the program and not syntax.

Flowcharts are used to represent the flow of an algorithm, diagrammatically. It shows the sequence and steps an algorithm takes.

Hierarchy charts give a bird-eye view of the components of a program, from its modules, to classes to methods etc.

Write a method that evaluates to true or false depending on whether a box completely fits inside another:
public boolean nests( Box outsideBox )
This is potentially a difficult method, since the box may fit or not fit depending on how it is rotated. To simplify the method, write it so that it returns true if the two boxes nest without considering rotations (so height is compared to height, length compared to length, and so on.)

Answers

Answer:

box outside box

Explanation:

It is used to display a window with many options, or buttons, in Easy GUI. It can be used in situations when it is necessary to determine which option is the first selection because it returns 1 for buttons with index 0 and 0 for buttons with other indexes.

What public boolean nests contain box outside box?

One of the built-in data types in Python is the Boolean type. It serves as a representation of an expression's truth value. For instance, the statement 0 == 1 is False while the statement 1 = 2 is True.

To write effective Python code, one must have a solid understanding of how Python's Boolean values operate.

A boolean value describes the checked attribute. Whenever it is present, it indicates that a checkbox next to an input> element should be selected (checked) before the page loads.

Therefore,  The checked attribute can be applied to both checkbox and radio input types. Additionally, JavaScript can be used to modify the checked attribute after the page has loaded.

Learn more about boolean nests here:

https://brainly.com/question/28660200

#SPJ5

(1) Prompt the user for an automobile service. Output the user's input. (1 pt) Ex: Enter desired auto service: Oil change You entered: Oil change (2) Output the price of the requested service. (4 pts) Ex: Enter desired auto service: Oil change You entered: Oil change Cost of oil change: $35 The program should support the following services (all integers): Oil change -- $35 Tire rotation -- $19 Car wash -- $7 If the user enters a service that is not l

Answers

Answer:

In Python:

#1

service = input("Enter desired auto service: ")

print("You entered: "+service)

#2

if service.lower() == "oil change":

   print("Cost of oil change: $35")

elif service.lower() == "car wash":

   print("Cost of car wash: $7")

elif service.lower() == "tire rotation":

   print("Cost of tire rotation: $19")

else:

   print("Invalid Service")

Explanation:

First, we prompt the user for the auto service

service = input("Enter desired auto service: ")

Next, we print the service entered

print("You entered: "+service)

Next, we check if the service entered is available (irrespective of the sentence case used for input). If yes, the cost of the service is printed.

This is achieved using the following if conditions

For Oil Change

if service.lower() == "oil change":

   print("Cost of oil change: $35")

For Car wash

elif service.lower() == "car wash":

   print("Cost of car wash: $7")

For Tire rotation

elif service.lower() == "tire rotation":

   print("Cost of tire rotation: $19")

Any service different from the above three, is invalid

else:

   print("Invalid Service")

most of the answers for this test is wrong.

Answers

Answer: C, Showing professional behavior.

Explanation:

You are a computer consultant called in to a manufacturing plant. The plant engineer needs a system to control their assembly line that includes robotic arms and conveyors. Many sensors are used and precise timing is required to manufacture the product. Of the following choices, which OS would you recommend to be used on the computing system that controls the assembly line and why

Answers

Answer:

Linux operating system is suitable for the operation of the automated system because it is more secure with a free open-source codebase to acquire and create new applications on the platform.

Explanation:

Linux operating system is open-source software for managing the applications and network functionalities of a computer system and its networks. It has a general public license and its code is available to users to upgrade and share with other users.

The OS allows user to configure their system however they chose to and provides a sense of security based on user privacy.

Consider the following incomplete method, which is intended to return the longest string in the string array words. Assume that the array contains at least one element.

public static String longestWord(String[] words)
{
/* missing declaration and initialization */
for (int k = 1; k < words.length; k++)
{
if (words[k].length() > longest.length())
{
longest = words[k];
}
}
return longest;
}

Which of the following can replace /* missing declaration and initialization */ so that the method will work as intended?

a. int longest = 0;
b. int longest = words[0].length();
c. String longest = "";
d. String longest = words[0];
e. String longest = words[1];

Answers

Answer:

String longest = "";

Explanation:

The initialization that would allow the method to work as intended would be the following

String longest = "";

This is because the method is looping through the array provided as an argument and comparing each word in the array with the word saved inside the variable called longest. The length of both are compared and if the word in the array is longer than the string saved in the variable longest then it is overwritten with the word in the array.

describe a sub routine​

Answers

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

Green Fields Landscaping Company sells evergreen trees which are priced by height. Customers have a choice of purchasing a tree and taking it home with them or purchasing a tree and having it delivered. Write a program that asks the user the number of trees purchased, the height of the trees, and if they want the trees delivered. Based on that information the program should then generate an invoice. Assume that ALL the trees purchased by a customer are the same height.

Answers

Answer:

Answered below

Explanation:

//Program is written in Python programming //language.

number_of_trees = int(input ("Enter number of trees purchased: "))

height_of_trees = float(input("Enter height of trees: "))

delivery_status = input("Do you want trees delivered? enter yes or no ")

price_of_two_meters = 20

total_price = number_of_trees * price_of_two_meters

//Invoice

print (number_of_trees)

print(height_of_trees)

print (total_price)

print (delivery_status)

Write a program that calculates the average of 4 temperatures. Function 1--write a function to ask a user for 4 temperatures and return them to main. Validate that none of them is negative. Also return a boolean indicating that the data is good or bad. Function 2--write a value-returning function to calculate the average and return it as a double if the data is good. Display an error message if any score was negative.

Answers

Answer:

Answered below

Explanation:

Answer written in Python programming language

temp_list = []

count = 0

sum = 0

n = 0

is_good = True

def temperatures(temp1, temp2, temp3, temp4){

temp_list = [temp1, temp2, temp3, temp4]

for i in temp_list:

if i < 0:

is_good = False

break

return is_good

}

def average ( ){

if is_good:

for i in temp_list:

sum += i

count++

average = sum / count

return average

}

What Game is better Vacation Simulator Or Beat Saber

Answers

Answer:

I love Beat Saber and Beat Saber is the best!!!!

Explanation:

Answer:

I would have to agree with the other person I think Beat Saber is better than Vacation Simulator

Explanation:  

                               ~Notify me if you have questions~

                               have a nice day and hope it helps!

                                                         ^ω^

-- XxFTSxX

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format with the appropriate layer of the OSI model.

a. Packets
b. Segments
c. Bits
d. Frames

1. Session Layer
2. Transport Layer
3. Network Layer
4. Data Link Layer
5. Physical Layer

Answers

Answer:

a. Packets - Network layer

b. Segments - Transport layer

c. Bits - Physical layer

d. Frames - Data link layer

Explanation:

When TCP/IP protocols are used for communication between two network hosts, there is a process of coding and decoding also called encapsulation and decapsulation.

This ensures the information is not accessible by other parties except the two hosts involved.

Operating Systems Interconnected model (OSI) is used to standardise communication in a computing system.

There are 7 layers used in the OSI model:

1. Session Layer

2. Transport Layer

3. Network Layer

4. Data Link Layer

5. Physical Layer

6. Presentation layer

7. Application layer

The information formats given are matched as

a. Packets - Network layer

b. Segments - Transport layer

c. Bits - Physical layer

d. Frames - Data link layer

When importing data using the Get External Data tools on the Data tab, what wizard is automatically
started after selecting the file you want, to help import the data?
Text Import Wizard
Excel Data Wizard
Import Wizard
Text Wrap Wizard

Answers

Answer: text import wizard

Explanation:

Given that the variable named Boy = "Joey" and the variable named Age = 6, create statements that will output the following message:

Congratulations, Joey! Today you are 6 years old.

First, write one statement that will use a variable named Message to store the message. (You will need to concatenate all of the strings and variables together into the one variable named Message. If you don't know what that means, read the section in Chapter 1 about concatenation.)
Then write a second statement that will simply output the Message variable.

Answers

Answer:

isn't it already showing it if not put text box

Explanation:

Consider an entity set Person, with attributes social security number (ssn), name, nickname, address, and date of birth(dob). Assume that the following business rules hold: (1) no two persons have the same ssn; (2) no two persons have he same combination of name, address and dob. Further, assume that all persons have an ssn, a name and a dob, but that some persons might not have a nickname nor an address.
A) List all candidate keys and all their corresponding superkeys for this relation.
B) Write an appropriate create table statement that defines this entity set.

Answers

Answer:

[tex]\pi[/tex]

Explanation:

Help need right now pls
Read the following Python code:
yards - 26
hexadecimalYards = hex (yards)
print (hexadecimalYards)
Which of the following is the correct output? (5 points)
A. 0b1a

B. 0d1a

C. 0h1a

D. 0x1a

Answers

Answer:

d. 0x1a

Explanation:

If an excel column will contain prices of smartphones, which number format should you uss

Answers

Answer:

You can use number formats to change the appearance of numbers, including dates and times, without changing the actual number. The number format does not affect the cell value that Excel uses to perform calculations. The actual value is displayed in the formula bar. Excel provides several built-in number formats.

Explanation:

Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.

-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.

Answers

Answer:

The SANS Top 20 Critical Security Controls For Effective Cyber Defense

Explanation:

Password/PIN Policy

Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.

Device Controls

Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.

Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.

Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.

As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.

Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.

Internet/Web Usage

Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.

Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.

Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.

Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.

Encryption and Physical Security

You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.

Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.

If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.

Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.

Security Policy Reporting Requirements

Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.

Empower Your Team

One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.

Answer:

anyone know if the other answer in right?

Explanation:

Questions Presscomion

Answers

Answer:

i dont get what you are trying to ask

Explanation:

The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants

Answers

Answer:

D. Refrigerants

Explanation:

In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .

The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.

Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.

Answer:

D

Explanation:

importance of spread sheets​

Answers

Answer:

Spreadsheets are an essential business and accounting tool. They can vary in complexity and can be used for various reasons, but their primary purpose is to organize and categorize data into a logical format. Once this data is entered into the spreadsheet, you can use it to help organize and grow your business.

Explanation:

Spreadsheets are an essential business and accounting tool. They can vary in complexity and can be used for various reasons, but their primary purpose is to organize and categorize data into a logical format. Once this data is entered into the spreadsheet, you can use it to help organize and grow your business.

Write a program that simulates picking a card from a deck of 52 cards. Your program should display the rank (Ace, 2, 3, 4, 5, 6, 7, 8, 9, 10, Jack, Queen, King) and suit (Clubs, Diamonds, Hearts, Spades) of the card using python

Answers

Answer:

Explanation:

The following is a python function that has arrays with all the cards available and then uses random to choose a random card from the dictionary. Finally it prints out the card chosen...

import random

def choose_card():

   card = ["Ace", 2, 3, 4, 5, 6, 7, 8, 9, 10, 'Jack', 'Queen', 'King']

   symbols = ['Clubs', 'Diamonds', 'Hearts', 'Spades']

   chosen_card = str(card[random.randint(0, len(card))])

   symbols = symbols[random.randint(0, len(symbols))]

   print("Chosen Card: " + chosen_card + " of " + symbols)

In the following code segment, assume that the ArrayList numList has been properly declared and initialized to contain the Integer values [1, 2, 2, 3]. The code segment is intended to insert the Integer value val in numList so that numList will remain in ascending order. The code segment does not work as intended in all cases.

int index = 0;
while (val > numList.get(index))
{
index++;
}
numList.add(index, val);

For which of the following values of val will the code segment not work as intended?

a. 0
b. 1
c. 2
d. 3
e. 4

Answers

Answer:

e. 4

Explanation:

The code segment will not work as intended if the value of the variable val is 4. This is because the while loop is comparing the value of the variable val to the value of each element within the numList. Since there is no element that is bigger than or equal to the number 4, this means that if the variable val is given the value of 4 it will become an infinite loop. This would cause the program to crash and not work as intended.

The program illustrates the use of while loops.

The code segment will not work as intended when the value of val is 4

Loops

Loops are used to perform repeated operations

The program

From the program, the while loop is repeated under the following condition:

val > numList.get(index)

This means that:

The loop is repeated as long as val has a value greater than the index of numList (i.e. 3)

From the list of options, 4 is greater than 3.

Hence, the code segment will not work as intended when the value of val is 4

Read more about loops at:

https://brainly.com/question/19344465

Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and removes all elements values in the range min through max (inclusive). For example, if an ArrayList named list stores [7, 9, 4, 2, 7, 7, 5, 3, 5, 1, 7, 8, 6, 7], the call of removeRange(list, 5, 7); should change the list to store [9, 4, 2, 3, 1, 8

Answers

Answer:

Answered below

Explanation:

public ArrayList<Integer> removeRange(ArrayList<Integer> X, int min, int max){

int i; int j;

//Variable to hold new list without elements in //given range.

ArrayList<Integer> newList = new ArrayList<Integer>();

//Nested loops to compare list elements to //range elements.

if(max >= min){

for( i = 0; i < x.length; I++){

for(j = min; j <= max; j++){

if( x [i] != j){

newList.add( x[i] );

}

}

}

return newList;

}

}

Mark is a stockbroker in New York City. He recently asked you to develop a program for his company. He is looking for a program that will calculate how much each person will pay for stocks. The amount that the user will pay is based on:


The number of stocks the Person wants * The current stock price * 20% commission rate.


He hopes that the program will show the customer’s name, the Stock name, and the final cost.


The Program will need to do the following:


Take in the customer’s name.

Take in the stock name.

Take in the number of stocks the customer wants to buy.

Take in the current stock price.

Calculate and display the amount that each user will pay.

A good example of output would be:

May Lou
you wish to buy stocks from APPL
the final cost is $2698.90

Answers

ok sorry i cant help u with this

In which cloud service model, virtual machines are provisioned? Iaas

Answers

Answer:

SaaS is the cloud service in which virtual machines are provisioned

You are considering upgrading memory on a laptop. What are three attributes of currently installed memory that HWiNFO can give to help you with this decision?

Answers

Answer:

Some of the qualities of the installed memory which HWiNFO can reveal are:

Date of manufactureMemory type Speed of memory

Explanation:

HWiNFO is an open-source systems information app/tool which Windows users can utilize as they best wish. It helps to detect information about the make-up of computers especially hardware.

If you used HWiNFO to diagnose the memory, the following information will be called up:

the total size of the memory and its current performance settingsthe size of each module, its manufacturer, and model Date of manufactureMemory type Speed of memorysupported burst lengths and module timings, write recovery time etc.

Cheers

Other Questions
What does "barrier" mean in Health? if 10 calculator cost 120 how much does 8 cost? Black skin color is dominant to pink skin color in pigs. Two heterozygous black pigs are crossed. a. What is the probability that their offspring will have pink skin? b. What is the probability that the first and second off- spring will have black skin? c. If these pigs produce a total of three piglets, what is the probability that two will be pink and one will be black? The chart in the text Power from Nature is titled U.S. Energy Use from 19492010. What kind of information can you expect in this chart? A. dialogue B. opinions C. facts D. stories Which characteristics should a text have to be relevant? Check all that apply. .It should be believable. It should be current. It should be distinctive. It should be new. It should be topical. FDR strengthened the power of the presidency when creating the New Deal.3 pointstruefalse Read this sentence from the passage:While scientists have never determined whether the earthquake in 1990 directly caused the volcanic eruption a year later, the two events are generally considered to be related.What evidence from the passage supports the argument that the earthquake and volcanic eruption in Luzon were probably related? All of the energy comes from the sun but ______________ capture this energy.(Copy pasted)Please answer Find the area of triangle ABC.Give your answer correct to 1 decimal Need help pls help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additionalquestions.Online Content: Site 1Describe the difference between collaboration and plagiarism as they relate to academic integrity. I want to get back to writing my books, but the thing is Im kind of stuck in writers block. Danganronpa is about a death game, so I need to get back into writing my book for that universe, and His Last Words is about depression, being transgender, and two boys falling in love. And I need more memes for the The Everyday Life of the One Braincell Gang. I want to write more gore and horror books, but this is my school account. If I could, Id write more stories on that stuff. Thats what I like to write, so it feels weird to have to hide that part of me. Im pretty good at gore, as I can write pages of a detailed torture session, but it feels strange to not put that in a book. I really like writing books with gore and horror, but I can't do that because this is my school account. Any advice?and plz, if u have hate keep it to yourself Determine which choice best shows the distributive property of multiplication.Question 1 options:7 9 = 9 77 (9 + 6) = (7 9) + (7 6)7 (9 6) = (7 9) 61 7 = 7 HELP MIDDLE SCHOOL QUESTION Which is not a force of flight?A. LiftB. DragC. ThrustD. Mass Refer to Explorations in Literature for a complete version of this speech.Which evidence from The American Promise is sufficient to prove Lyndon B. Johnsons argument that we must fight to ensure that all Americans have the right to vote?"The Constitution says that no person shall be kept from voting because of his race or his colorWe must now act in obedience to that oath.""For the fact is that the only way to pass these barriers is to show a white skin.""For with a country as with a person, 'What is a man profited, if he shall gain the whole world, and lose his own soul?'""Somehow you never forget what poverty and hatred can do when you see its scars on the hopeful face of a young child." Which of these human behaviors has the least potential to harm theenvironment?A. Focus on harvesting of high-value resourcesB. Unregulated rates of harvesting resourcesC. Use of technology to speed harvesting of resourcesD. Focus on steady harvesting of abundant resourcesID Suppose 35% of students in a class have blue eyes. Five blue-eyed students join the class. Now 48% of the students have blue eyes. How many students were originally in the class? The functions g and h are such that g(x)=2x+5 and h(x)=ax+b Pablo shares 525 cupcakes in the ratio of 3 : 4 between his bakery and a supermarket.How many cupcakes does the supermarket get?