What are three examples of information technologies you use in your everyday life? Which do you consider to be the most important to you on a daily basis and why?

Answers

Answer 1

Although IT is crucial to many other daily tasks, other examples of IT systems include the internet, mobile phone networks, broadcast radio and TV systems.

What information technologies use in your everyday life?

Information technology has made it possible for people to connect with one another more quickly, simply, and affordably than ever before. Texting and making video calls are so easy these days. There are numerous apps available online that provide these services.

Therefore, radio and phone equipment for video conferencing. Individual computers, For handling goal-setting and performance reviews, use performance management software.

Learn more about information technologies here:

https://brainly.com/question/14426682

#SPJ1


Related Questions

Introduction to Database: Tutorial
10 of
Name
Nancy
Date of Birth Age Blood Type
9/17/97
17 o positive
10/23/97 17 A positive
Hobby
Talent Show Registration Unique ID
drawing and painting, music Yes
A_001
reading, creative writing Yes
A_002
William
Philip
2/22/97
18
B positive
Yes
A_003
Jean
7/25/97
17
No
A_004
playing guitar
sports
George
7/29/98
16
Yes
A_005
Allan
8/16/97
17
Yes
O positive
A negative
O positive
o positive
o negative
AB positive
computer games
sports
A_006
A_007
17
No
Roger 12/11/97
Kimberly 5/12/98
16
Yes
A_008
Anne
6/10/97
17
Yes
A_009
video games
watching TV
reading fiction
listening to music
William
5/22/98
16
O positive
Yes
A_0010
Diane
3/24/97
17
A positive
Yes
A_0011
Part A
What are the field names in the database? Explain what data type is appropriate for each field.
B I y X
Х.
Font Sizes
AA
= = 三 三 三 三

Answers

Answer: this is the best situation

Explanation: it shows the process

Answer:

PLATO ANSWER. Sample Answer

Explanation:

The field names in the database are Name, Date of Birth, Age, Blood Type, Hobby, Talent Show Registration, and Unique ID. Here are the types of data that you can enter into each field.

Name:This field has 5 to 10 characters and accepts text data only.

Date of Birth: This field accepts dates only. It uses a medium-length entry in the form of month/day/year (mm/dd/yy).

Age: This field is numerical and contains numerical data only.

Blood Type: This field contains text data, with a maximum of 11 characters.

Hobby: This field can be a memo, and it can accept large volumes of data in any format. This data type can include null values as well.

Talent Show Registration: This is a Boolean data field that contains the values Yes or No.

Unique ID: This field accepts alphanumeric data, so this, too, is a text field.

will give brainliest

The height or amplitude of a wave is related to the input of ________

a. energy
b.matter
c.energy and matter

Answers

Answer:

a. energy

Explanation:

The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.

Hope this helped!!!

1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disabled?

Select one:

Backdoor

Rootkit

Logic Bomb

Trojan Horse

Answers

Answer:

it would be logic bomb.

Explanation:

I hope this helps

The process of editing includes which of the following?
(A) Transferring photos to a computer
(B) Combining media
(C) Naming Files
(D) Keeping files secure

Answers

The answer should be

(B) combining media

FREE POINTTTTTTTTTTTTTTTTTTT

Answers

Answer:

THXXXXXXXXXX

Explanation:

Help! I don’t know what this is.

Answers

Answer:

Best: Option 4

Worst: Option 1

Explanation:

The co-worker might be oblivious to the detrimental effect of his actions on work atmosphere. Talking to him and telling him to stop is the first step to improve this.

Option 2 is not as effective, as the co-worker would not know the reason and might just talk behind people's backs to other people, thus no actual progress would be made, except less communication overall.

Option 3 is likely to antagonize people, with the engineers being unhappy about your co-worker, and the co-worker being mad at you for telling on him. This option is the most likely to end up with someone leaving the job.

Option 1 is just expanding the circle of bad behavior, hence probably the worst possible.

C++

Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message and prompt again for a valid data point. If entry has no comma Output: Error: No comma in string. (1 pt) If entry has more than one comma Output: Error: Too many commas in input. (1 pt) If entry after the comma is not an integer Output: Error: Comma not followed by an integer. (2 pts)

Answers

Answer:

In Python:

entry = input("Sentence: ")

while True:

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

   else:

       ind = entry.index(',')+1

       if entry[ind].isnumeric() == False:

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

       else:

           break

print("Valid Input")

Explanation:

This prompts the user for a sentence

entry = input("Sentence: ")

The following loop is repeated until the user enters a valid entry

while True:

This is executed if the number of commas is 0

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

This is executed if the number of commas is more than 1

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

This is executed if the number of commas is 1

   else:

This calculates the next index after the comma

       ind = entry.index(',')+1

This checks if the character after the comma is a number

       if entry[ind].isnumeric() == False:

If it is not a number, the print statement is executed

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

If otherwise, the loop is exited

       else:

           break

This prints valid input, when the user enters a valid string

print("Valid Input")

Note that: entry = input("Sentence: ") is used to get input

Which of the following statements are true of
software engineers? Check all of the boxes that
apply.
They are responsible for writing programming
code.
They are usually strong problem-solvers.
They spend most of their work hours running
experiments in a laboratory.
They must hold advanced degrees in
computer science.

Answers

Answer:

Option A - They are responsible for writing programming

Option B - They are usually strong problem-solvers

Explanation:

A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.

Hence, both option A and B are correct

Answer:

A & B

Explanation:

The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.

Answers

Answer:

(a): Replace

(b): Hyperlinks

(c): Document Inspector

(d): Compatibility checker

(e): Accessibility checker

Explanation:

You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.

However, further explanation is as follows;

(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.

(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.

(c): Document inspector checks hidden data such as personal information.

(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.

(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.

The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;

REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKER

A) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.

B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.

C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.

D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.

E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.

Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179

Which best describes how a supporting database will be structured?

data operations

Data systems

data functionalities

Data modeling

Answers

Answer:

DATE SYSTEMS

Explanation:

DATA SYSTEMS

SO SORRY IF IM WRONG

31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure

Answers

Answer:

31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;

a) Something the individual knows;

The Personal Identification Number (PIN)

The password to an account

Answer to a (complete) set of questions

b) Something the individual possesses

An ATM card

A SIM card

Other examples includes;

Physical keys to a lock

Smart cards

Electronic Key-Card used for physical entrance into an apartment

c) Something the individual is (Static biometrics)

The fingerprint

Face recognition

Retina recognition

d) Something the individual does (dynamic biometrics);

Recognition of typing rhythm

Characteristics of the users handwriting

Voice pattern recognition

32) a) Specific account attack

A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password

Countermeasure;

Limiting the number of password guesses

The use of strong passwords having over 8 characters that includes special characters

Use of multi-factor authentication

b) Workstation Hijacking

The attacker takes advantage of an logged-in unattended workstation

Countermeasure;

The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device

c) Password Guessing

Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password

Countermeasure;

The use of a two or more of authentication method also known as a multi-factor authentication MFA

Explanation:

the basics of color theory assume what central tenets

Answers

Color has important psychological and visual effects on the audience

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

Which element is the first thing you should complete when making a movie?
A script
A storyboard
Opening credits
A video segment

Answers

Answer:

storyboard!!!

Explanation:

its important to have the concept in mind before starting

I think it’s a story book

you would use conditional formatting on a cell when you want to _____

Answers

Answer:

to format a cell based on the value in it

Explanation:

you would use conditional formatting on a cell when you want to format a cell based on the value in it.

Reason -

Conditional formatting allows you to format a cell based on the value in it.

For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.

How would you highlight cells with negative values in it?

You can use conditional formatting.

What is a System software that serve as a platform/supports other programs/software in a computer system

Answers

Answer:

Operating system.

Explanation:

An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.

condition of watering a plant

Answers

Answer:

Hydration?

Explanation:

PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST

Answers

1.His story is told here deep detailed history of the company’s you love coming in everyday.

2.The contribution was the computer
Oct 4 1903-June 15 1995

When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender

Answers

D:calendar is it i think

Ummmm pls helppp



Which are the features of conditional formatting?
Conditional formatting enables you to_______
and_______

Answers

Answer:

A conditional format changes the appearance of cells on the basis of conditions that you specify.

Explanation:

If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates to True or False).

Edhesive 9.1 lesson practice answers

Answers

Answer:

1. False

2. Rows and columns

3. Grid

Explanation: Bam

Tonya wants to keep her class schedule, assignments, and notes all in one place. Which online note-taking tool would be the best one to use?

A) electronic sticky notes
B) an electronic notebook
C)a web clipping tool
D) digital flash cards
PLS HELP AND PLS HURRY!!

Answers

Answer:

C) an electronic notebook

Explanation:

i just did it

The online note-taking tool that would be the best one to use is an electronic notebook. The correct option is B.

What is an electronic notebook?

A computer application meant to replace paper laboratory notebooks is known as an electronic lab notebook (ELN). Scientists, engineers, and technicians utilize lab notebooks to document research, experiments, and procedures performed in a laboratory.

Some downsides include security problems, inability to upgrade, damage potential, and limited capability. Smart notebooks are one approach to bridge that gap: they allow you to write on actual paper with a real pen and then transfer your notes to your smartphone, tablet, or computer, albeit the method varies depending on the sort of smart notebook you use.

Therefore, the correct option is B) an electronic notebook.

To learn more about electronic notebooks, refer to the link:

https://brainly.com/question/1569710

#SPJ2

Internet search criteria can be refined by using ____.

• complete sentences
• Boolean operators
• alphabetized lists
• small words

Answers

Try : Boolean operators

I GOT A 65% LAST TIME AND IM DOING RETAKE! PLEASE DONT FAIL ME THIS TIME

which information will help you figure out how often your website should be updated

a. cost of updates
b. time for updates
c. visitor frequency
d. resources to update it

Answers

Answer:

Explanation: c vecause am pro

I say I’m between B and D

which type of protocol allows for a secure data transmission using encryption methods?

Answers

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

A local pharmacy added a new regulation about wearing gloves when in contact with any drug. It also bought a new insurance policy. The pharmacy then replaced the pill counting machine that was incorrectly dispensing medications. Which best explains the actions the pharmacy has taken to promote safety?

Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.

Answers

Answer:

First option.

Wearing gloves reduces risk.

The insurance policy shares the risk.

The new machine is a quality improvement strategy that will reduce the probability of errors.

WILL GIVE BRAINLIEST
Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.

Consider this program:
Cost1 = input("Please enter the first expense: ")
Cost2 = input("Please enter the second expense: ")
print("Your total for both expenses was", Cost1 + Cost2)
If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line when this program is run? If this result in not what the programmer intended, how would you explain what went wrong?

You are writing a line of code that should ask the user to input the balance of their bank account in dollars and cents. The program will then perform a multiplication problem to tell the user how much interest they can earn. Identify three errors in your line of input code and explain why they are incorrect. Include the corrected line of code in your answer. Here is the code:
1num = input(What is your balance?)

What are some kinds of comments that might be useful for a programmer to include in a program?

If you were planning how to write a program, at what point would a flowchart be helpful? At what point would pseudocode be helpful? Explain your reasoning.

Answers

Answer:

G i v e   s e v e r a l   r e a s o n s   w h y   P y t h o n   i s   s u c h  a  gr e a t   p r o g r a m m i n g   l a n g u a g e.   E x p l a i n   h o w   P y t h o n   i s        r e l a t e d   t o   f l o w c h a r t s.

P y t h o n   i s   s u c h   a   g r e a t   p r o g r a m m i n g   l a n g u a g e b e c a u s e   i t   i s   s i m p l e,   p o p u l a r,   a n d   p o w e r f u l   e n o u g h   t o   c r e a t e   s o m e   a w e s o m e   a p p s.   P y t h o n   i s   r e l a t e d   t o   f l o w c h a r t s   b e c a u s e   F l o w c h a r t   P y t h o n    i s              e s s e n t i a l l y   t h e   P y t h o n   p r o g r a m m i n g   l a n g u a g e   i n   v i s u a l   f o r m.

C o n s i d e r    t h i s   p r o g r a m :  

C o s t 1   =   i n p u t ( " P l e a s e   e n t e r   t h e   f i r s t   e x p e n s e :  "  )

C o s t 2  =   i n p u t ( " P l e a s e   e n t e r   t h e   s e c o n d                        e x p e n se: ")

p r i n t ( " Y o u r   t o t a l   f o r   b o t h   e x p e n s e s   w a s " ,   C o s t 1   +   C o s t 2 )  

I f   t h e   u s e r   i n p u t s   “ 1 0 ”   f o r   t h e   f i r s t   e x p e n s e   a n d   “ 2 0 ”   f o r   t h e   s e c o n d   e x p e n s e ,   w h a t   w i l l   t h e               i n t e r p r e t e r   s h o w   i n   t h e   f i n a l   l i n e   w h e n   t h i s             p r o g r a m  i s   r u n ?   I f   t h i s   r e s u l t   i n   n o t   w h a t   t h e   p r o g r a m m e r   i n t e n d e d ,   h o w   w o u l d   y o u   e  x p l a i n   w h a t w e n t   w r o n g ?  

Y o u   a r e   w r i t i n g   a   l i n e   o f   c o d e   t h a t   s h o u l d   a s k   t h e   u s e r   t o   i n p u t   t h e   b a l a n c e   o f   t h e i r   b a n k   a c c o u n t   i n   d o l l a r s   a n d   c e n t s .   T h e   p r o g r a m   w i l l   t h e n   p e r f o r m   a   m u l t i p l i c a t i o n   p r o b l e m   t o   t e l l   t h e   u s e r   h o w   m u c h   i n t e r e s t   t h e y   c a n   e a r n .   I d e n t i f y   t h r e e   e r r o r s   i n   y o u r   l i n e   o f   i n p u t   c o d e   a n d   e x p l a i n   w h y  t h e y   a r e   i n c o r r e c t .   I n c l u d e   t h e   c o r r e c t e d   l i n e   o f   c o d e   i n   y o u r   a n s w e r .   H e r e   i s   t h e   c o d e :  

T h e   f i r s t   e r r o r   i s   t h a t   t h e   v a r i a b l e   s t  a r t s   w i t h   a   n u m b e r ,   w h i c h   i s   a   r u l e   y o u   c a n ’ t   b r e a k ,   o r   e l s e   t h e   c o m p u t e r   w o n ’ t   k n o w   t h a t   i t ’ s   a   v a r i a b l e .   T h e   n e x t   e r r o r   i  s   t h a t   t h e y   d i d n ’ t   d e c l a r e   t h e   v a r i a b l e   a s   a   f l o a t .   T h e   f i n a l   e r r o r   i s   t h a t   t h e r e   a r e   n o   q u o t a t i o n   m a r k s   i n   t h e   p a r e n t h e s e s ,   w h i c h   a r e   n e e d e d    t o   t  e l l   t h e   c o m p u t e r   t o   o u t p u t   t h a t   o u t   t o   t h e   s c r e e n ,   o r   e l s e   i t s   g o i n g   t o   t h i n k   t h a t   y o u   w a n t   t h e   c o m p u t e r  t o   f i l l   t h a t   i n   i t s e l f .  

1 n u m = input(What is your balance?)

What are some kinds of comments that might be useful for a programmer to include in a program?

some kinds of comments that might be useful is when there is a bug, something that needs to be fixed, something that is easy to hack, and something the programmer needs to finish if the programmer released the program early.

If you were planning how to write a program, at what point would a flowchart be helpful? At what point would p s e u d o c o d e be helpful? Explain your reasoning.

A flowchart is helpful in the beginning of writing a program when you are planning what to do. The p s e u d o c o d e would be helpful before you start the coding. The reason is because flowcharts are helpful for planning out your course of action, while pseudocode helps you plan what you are going to write, so it should be right before you start coding, so you know everything that you were thinking about whilst writing the p s e u d o c o d e , and you know that if one thing doesn’t work, you still have all the previous thoughts on that line.

Explanation:

I have the same text questions so I don't want to get anything wrong. I also want to be a developer of  M i n e c r a f t , so I pay attention in my coding class.

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

In Python, a function is _____.

a group of instructions that can be used to organize a program or perform a repeated task

a value that can be passed back to the calling part of a program

a formula that pairs each x-value with a unique y-value

a value that can be passed

Answers

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

Other Questions
How many molecules are in6.0 moles of methane (CH4)?Let's begin by setting up our equation.What belongs in the green box?6.0 moles CHAA. 1 mole CH4B. 6.02 x 1023 molecules CH4 Please help me!! No files allowed. I need the answer and an explanation! What is the slope of the line containing pointsA(4, -1) and B(0, 2)?A.3/4B. 4/3C. -3/4D. -4/3 Which is the correct use of thefollowing participle phrase:running quickly down the pathA. Running quickly down the path, I saw thepark was empty.B. Running quickly down the path, the park wasempty.C. Running quickly down the path, an emptypark was seen. An English teacher reviewed 2/3 of an essay in 1/4 of an hour. At this rate, how many essays can she review in 1 hour? LearningDiagnosticAnalyticsRecommendationsskill plansMathE StandardsAlgebraXS Exponential growth and decay: word problems UKOIf a city with a population of 100,000 doubles in size every 28 years, what will the populationbe 56 years from now? Choose the correct demonstrative word or phrase._____ es vuestro.seEstasAquellosEse Determine the value of A What is Kings conclusion in this passage? divide 54 books between A and B in the ratio 13:14 Factor the expression using the GCF.42 12 = ASAP ! The radius of a circle is 12 ft.8.37 ft?48012 ft28.72 ft100.48 ftWhat is the area of a sector bounded by an 80 arc? (use 3.14 for 1)16.75 ft What is the length of ACA)72B)8C)None of theseD)136E)132F)96 A builder has an 6-acre plot divided into 1 4 -acre home sites. How many 1 4 -acre home sites are there? IM GIVING BRAINLIEST!!PLEASE HELP!! complete the inequality statement 4/13 __6/13 Find the area of the shape shown below. Please help :( help me out and ill give brainliest 3-6 x (34 divided by 30)2 PLSSS HELPPPPPPP CORRECT ANSWERS PLSSSS