What does "CYBER-COCKROACH" mean??

Answers

Answer 1

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:


Related Questions

Help me what is that my phone I will mark brainslist

Answers

Answer:

Following are the ways to resolve this error:

Explanation:

To solve this error there two methods, that is available, which can be defined as follows:

The First way by the turn off screen time:

To turn off screen time goto the setting app on your iPad, iPhone, or other devices.In this, there is a screen time option in which we click on turn off the screen time, and confirm it.After that, go to the apps store and download the app.

The Second way by the re-login on apple id:

To re-login on apple id first, we log out it and for logout go to setting inside this go to iTunes & app store.After open this option click apple id after the click, this click in the sign-out option after sign out re-login in by your id and password. To install the app first delete the app by a tap on the app this provides the option to delete the app, then go to the apps store. In this go to the purchase option then select the option that not in the device then download the file.

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

How can artificial intelligence be used in learning science?

Answers

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

What do you mean by Bandwidth? Pls give full explanation

Answers

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:

PLEASE HELP!!!! I'll mark Brainliest for whoever is first!!!!

What does this snippet of code do? birds = ["robin", "finch", "grackle", "crow", "wren"] for i in birds: print(i)

It counts the number of birds in the list.
It prints the index and then each bird name.
It prints each bird name on a separate line.
It prints each index number on a separate line.

Answers

Answer:

It counts the number of birds in the list.

Explanation:

The snippet of code works in counting the number of birds in the list.

What is a code Snippet?

A code snippet is a word that is used in computer programming to inform a little chunk of reclaimable source code, machine code, or text. Some text skilled worker, code skilled worker, and IDEs have a property called Code Snippets. The code in this snippet counts the number of birds in the list.

Therefore, option A is correct.

Learn more about the code Snippet, refer to:

https://brainly.com/question/15003149

#SPJ2

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer demand B. rates of unemployment and inflation C. consumer behavior and preferences D. national income and its sourcesics?

Answers

Answer:

The correct answer is C. Consumer behavior and preferences.

Explanation:

hope it will help :)

Answer: the answer is C consumers behavior and preferences.

Explanation: just took the test please add thanks and brainliest

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}

Answers

Answer:

Following are the code to this question:

RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value  

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value

Explanation:

In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal"  is defined, that holds a value that is 0.

In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.

please find the attachment of the code file and its output.

Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150 GB hard drive. What should you do

Answers

Answer:

Delete unnecessary apps

Explanation:

If you don't need it and its installed it's just using up memory the system could be using for something else

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
What are responsibilities of employees? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders.

Answers

Answer:

The correct options are;

1) To own businesses

To be responsible to employees

2) To work for companies

To be responsible to stakeholders

Explanation:

The entrepreneur is responsible for setting up and managing the establishment as well as provision of motivation for the employees. The entrepreneur gives direction and vision to the business which the employees follow, and as such the entrepreneur is responsible for being laudable and dependable and consistent

The employees are responsible for the work they do for the companies is done in a safety and healthful to them

The employees are responsible for the health and safety of other stakeholders for their actions and in-actions and to cooperate with the safety efforts of the employer

Answer:

to own business, to be responsible for employees, to work for companies.

Explanation:

what is network and also how many types of network are there as well

Answers

Answer:

Summary:

Type of computer networks can categorize according to their size as well as their purpose

PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant

LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area

WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area

A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region

WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.

SAN is a storage area network is a type of network which allows consolidated, block-level data storage

System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications

POLAN is a networking technology which helps you to integrate into structured cabling

Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home

Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations

Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area

A VPN is a private network which uses a public network to connect remote sites or users together

Explanation:

Answer: Network is what is making you ask these questions.

Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks

Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that tells the computer how to execute commands. A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet. A computer system is a collection of hardware and software components that work together to meet the needs of the user. A computer system is a group of hardware devices that work together.

Answers

Answer:

I believe it's  A computer system consists of the operating system that tells the computer how to execute commands.

Explanation:

Does anyone know what happened to Cole Morgen, the actor?

I looked on the internet about him and it turned out that he was 24 years old, but it is the only thing that appears about him.​

Answers

Answer:

Cole Morgen has been on stage acting in theatre and dance since the age of 4.He has been a part of many local theatre productions. His first professional play was "Dead End" starring Jeremy Sisto and directed by Nicholas Martin at the Ahmanson Theatre followed by and a part in the Arthur Miller's play "All My Sons" directed by Randall Arney at the famous Geffen Playhouse.

Cole was cast in his first feature film as Kevin James's son Eric in the current Adam Sandler film "I Now Pronounce You Chuck and Larry" directed by Dennis Dugan.Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.Besides acting, Cole loves tap dancing and is always looking to improve his skills. He won the national tap competition last summer taking the title of Mr. Junior Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.

state the function of font group in the home tab​

Answers

Explanation:

This group provides access to all the Character Formatting commands.

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

last option: When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated.

Explanation:

A function, when it is called, uses the stack to allocate local variables. When it exits, those variables are no longer needed (since they are local), so the stack pointer is reset to the position it had before calling the function.

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................

Answers

Answer:

parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.

serial communication conveys only a single bit at a time over a communication channel or computer bus.

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

What is computer Network?​

Answers

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

Give two examples of a large databases that might be used to help members of the public

Answers

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

When developing a new software package, logically, the software must be designed before the code is written, and the code must be written before it is tested. These activities are dependent on each other by _________ constraints.

Answers

Answer: Technical

Explanation: When making decisions, we may have to follow a certain pattern or order due to restrictions brought about by circumstances rules or conditions. These restrictions or limitations are regarded to as constraints. Technicality may be explained as the knowledge, expertise or initiative required for an operation, production or design. Therfore, we may view technical constraint as limitations or restrictions brought about by the technical guidelines or expertise required for a certain products. From a technical perspective, before a software package can be built, the engineer must know why and what he wants the software to be capable of doing, then he writes the code then tests the code. It is a sequence, a test cannot be performed without a written code and code cannot be written without a planned design.

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive

Answers

The answer is positive

Answer:

negative

Explanation:

this is because not many people have the skills to operate the machines. In short not everyone is able to operate them

Other Questions
Which occurs when the body responds to the environment by maintaining a stable internal environment despite changingexternal conditions?spontaneous generationhomeostasisgrowth and development reproduction For his persuasive speech, Tomas first identified all the objections to his position, and then he used evidence to argue against those objections. What organizational pattern is Tomas using for his speech A leaf blower was marked up 100% from an original cost of $152. If Eva bought the leaf blower and paid 7% sales tax, how much in total did she pay? Calculate the work performed by an ideal Carnot engine as a cold brick warms from 150 K to the temperature of the environment, which is 300 K. (Use 300 K as the temperature of the hot reservoir of the engine). The heat capacity of the brick is C what is 76.32 divided by 24.98 using compatible numbers to estimate each quotient? Question #2: Choose the answer that makes the sentence most effective. The delegates cooperated together to design a finance bill. A.with each other B.as a group C.Eliminate this part. You have just been instructed to develop a schedule for introducing a new product into the marketplace. Below are the elements that must appear in your schedule. Arrange these elements into a work breakdown structure (down through level 3), and then draw the arrow diagram. You may feel free to add additional topics as necessary.1. Production layout2. Market testing3. Review plant cost4. Select distributors5. Analyze selling cost6. Analyze customer reactions7. Storage and shipping cost8. Select salespeople9. Training salespeople10. Trained distributors Mustang Corporation had 100,000 shares of $2 par value common stock outstanding. On December 31, 2015, the company's board of directors declares a 20 percent stock dividend. This stock dividend will be distributed on January 20, 2016 to the stockholders of record on January 15, 2016. The market price of the company's stock is $10 per share on December 31, 2015. Required:Complete the necessary journal entry to record the declaration of the stock dividend by selecting the account names and dollar amounts. plz ans asap i havd limited time ill give brainliest Information processing errors consist of:_________ a. forecasting errors. b. overconfidence. c. conservatism. d. framing. Milano Gallery purchases the copyright on an oil painting for $510,000 on January 1, 2017. The copyright legally protects its owner for 12 more years. The company plans to market and sell prints of the original for 19 years. Requried:Prepare entries to record the purchase of the copyright on January 1, 2017, and its annual amortization on December 31, 2017. 23-[12+{16-(123)}] simplify The Big Five Personality refers to the structures and propensities of people that explain their patterns of thought, emotion, and behavior. Although there are literally thousands of traits that can be used to describe an individual's personality, most traits reflect one of five broad dimensions or factors of personality: conscientiousness, agreeableness, neuroticism, openness to experience, and extraversion. It is especially useful for managers to understand the personality traits of their employees since these traits often have important implications for workplace attitudes and behaviors, such as performance and commitment. The following activity takes you through the thought process of a manager trying to hire a new sales associate based on personality assessments of the candidates. Imagine that you are a midlevel manager at a paper company and you are in the process of hiring a new sales associate. So far, you have scheduled interviews with three potential candidates. You just concluded your first interview and want to spend some time reflecting on the notes you took. In particular, you want to make sure that you have a solid grasp of each candidate's personality traits since you know how important that can be on the job. Read through the notes and classify them according to the Big Five Taxonomy of personality. Conscientiousness Agreeableness Neuroticism Took Initiative Openness to Experience Cold Hardworking Extraversion Jay is copying an angle. His work so far is shown below. Explain the importance of his next step, which is placing the point of the compass on L, opening the compass to N, and drawing an arc.A. This ensures that when he draws another arc for angle Y, that it will be the right distance from point Z. CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output for the given program Gus Bob Ann 1 short_names- Your solution goes here 2 # print names 4 print(short_names[0]) 5 print(short names [11) 6 print(short_names[2]) Lisa has a diagnosed learning disability and is not succeeding in a regular classroom. After discussion of this by a multidisciplinary team, Lisa is recommended for specialized instruction in a special education classroom so she can most effectively access the general curriculum. This provision is an example of Help uhh i need to know this answer On January 1, the listed spot and futures prices of a Treasury bond were 95.4 and 95.6. You sold $100,000 par value Treasury bonds and purchased one Treasury bond futures contract. One month later, the listed spot price and futures prices were 95 and 94.4, respectively. If you were to liquidate your position, your profits would be a Group of answer choices $125 profit. $1,060.50 loss. None of the options are correct. $125 loss. $1,062.50 profit. Diana made a recipe that yields 6 and 1 over 2 cups. If each serving is 1 over 4 cup, which expression will help Diana determine the number of servings her recipe will yield? 6 and 1 over 2 1 over 4 6 and 1 over 2 1 over 4 6 and 1 over 2 + 1 over 4 6 and 1 over 2 1 over 4 Would activity-based costing or activity-based management be useful for the airport store? Why or why not?