Which of the following demonstrates how digital music are files played? An analog player changes the recording to digital, and sends the digital signal to a speaker to be played. A digital music player reads the file and plays the recording through a digital music speaker to be played. A digital music converter reads the file as analog and sends the signal to a speaker to be played. An analog converter changes the digital recording back to analog and sends the signal to a speaker to be played.

Answers

Answer 1

Answer:

An analog player changes the recording to digital, and sends the digital signal to a speaker to be played.

Explanation:

An audio signal can be defined as a representation of sound, either as an analog or digital signals.

An analog audio signal refers to a continuous signal that is represented by a changing level of quantity such as voltage with respect to time and sequence of bits such as 16kbps, 32kbps, 64kbps, 96kbps, 128kbps, 196kbps, and 320kbps.

Note: Kbps means kilobits per seconds.

On the other hand, a digital audio signal can be defined as the recording, storage and reproduction of sounds by encoding the audio signals in a digitized format.

An analog player is a type of audio player such as a turntable, which is designed to read informations as a continuous signal.

In order to play a digital audio or music files, an analog player changes the recording to a digital format and sends the digital signal to a speaker to be played.

A speaker can be defined as an electronic output device that is typically used for the conversion of an electromagnetic wave to sound wave.

Basically, this conversion is done through the help of a hardware electronic component known as transducers.


Related Questions

Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positive and negative effects of the internet on business. He recently bought a second-hand camera online, which he hadn't been able to find in any store. A bookstore down the road shut down because people preferred the cheaper online bookstores. Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office. His friend sells printed T-shirts online, storing them in his basement and promoting them on social media. One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

Answers

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.


Which slide should you change so that it reflects on all the slides of your presentation?
Any change that you make to the
will reflect throughout the slides of your presentation.

Answers

It’s monika here to help okay

Answer: Slide Master is the slide at which you made any change, the change will reflect on all slides. Explanation: In power point, slide master is the toll that is used to control change the font size, font style , themes, colors and background of the slide.

Answer:

SLIDE MASTER

Explanation:

which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​

Answers

Answer:

Answer is memory bus.

Explanation:

Answer is memory bus.

Which factors make the prevention of cyberbullying difficult? Check all that apply.
speaking out publicly that cyberbullying is a problem
disbelieving that cyberbullying causes serious harm
convincing others that cyberbullying is harmless
refusing to take responsibility to stop cyberbullying
using technology to participate in cyberbullying
collecting evidence that cyberbullying has occurred

Answers

Answer:

disbelieving that cyberbullying causes serious harm

convincing others that cyberbullying is harmless

refusing to take responsibility to stop cyberbullying

using technology to participate in cyberbullying

Explanation:

We can categorize the 6 given options into 2 categories.

(1) The factors that makes the prevention easy

(2) The factors that makes the prevention difficult

Options (a) and (f) can be categorized under 1 because when one speaks up or gather evidence when one gets cyberbullied, that means that an awareness has been created and as such, one and others would know how to prevent themselves from being cyberbullied.

However, the same cannot be said for (b), (c), (d), and (f). In fact, these 4 options contribute to the growth of cyberbullying. One must shun each of these 4 activities.

What is part of the third step in troubleshooting a computer problem?
O locating the problem and identifying it
O trying a number of simple fixes initially
O researching ways to solve the problem
O seeking help to solve the problem

Answers

Answer:

locating the problem and identifying it.

When you apply _______ you insert a number slightly above the the line of text

A. Subscript
B. Underlining
C. Superscript
D. Text effects

Answers

Subscript 2020 on the edge

Liam and his team developed a social networking group site for their company. They launched the site, and more than 100 users have already
joined, with the number of users growing each day. Above all else, which critical user requirement must Liam and his team meet?
ОА.
ability to access old messages posted by users
OB.
free access to the site
Ocability to upload user videos
OD.
user privacy and confidentiality issues

Answers

Answer:

D. user privacy and confidentiality issues

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Basically, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.

Above all else, the critical user requirement Liam and his team must meet is user privacy and confidentiality issues.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

ANSWER IN C++ PLEASE!!!!!
Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles.

Output each floating-point value with two digits after the decimal point, which can be achieved by executing
cout << fixed << setprecision(2); once before all other cout statements. Note: End with a newline.

Answers

Answer:

#include <iostream>

#include <iomanip>  

using namespace std;

int main()

{

   double mpg, ppg;

   cout << "Enter your car's gas mileage (miles/gallon): ";

   cin >> mpg;

   cout << "Enter the gas price (dollars/gallon): ";

   cin >> ppg;

   cout << fixed << setprecision(2);

   for (int miles : { 20,75,500 }) {

       cout << miles << " miles will cost $" << miles * ppg / mpg << endl;

   }

}

Explanation:

I really like the new for(x:y) construct!

The program, with a car's miles/gallon and gas dollars/gallon (both doubles) as input, is written below.

What is programming?

Writing code to support certain activities in a computer, application, or software program and giving them instructions on how to do is known as computer programming.

#include <iostream>

#include <iomanip>  

using namespace std;

int main()

{

  double mpg, ppg;

  cout << "Enter your car's gas mileage (miles/gallon): ";

  cin >> mpg;

  cout << "Enter the gas price (dollars/gallon): ";

  cin >> ppg;

  cout << fixed << setprecision(2);

  for (int miles : { 20,75,500 }) {

      cout << miles << " miles will cost $" << miles * ppg / mpg << endl;

  }

}

Therefore, the programming codes are written above.

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ2

what are network services?​

Answers

Answer: A networking service is a low-level application that enables the network to perform more than basic functions.

An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is useful in stopping denial of service attacks. Traffic heading to these IPs can be captured for analysis or discarded. Considering the given strategies, which does this technique relate to? Select all that apply.
A. Black hole
B. Sinkhole
C. Forward proxying
D. Reverse proxying

Answers

A. In network architecture, a black hole drops traffic before it reaches its intended destination, and without alerting the source. A simple example is traffic sent to an IP address that an admin mapped to a non-existent host.
B. A sinkhole is similar to configuring a black hole, and often used interchangeably. With sinkholing however, an admin usually retains some ability to analyze and forward the captured traffic.

Which is the default data type of Ms-Access? (i) Memo (ii) Number (iii) Text (iv) Auto number​

Answers

Answer:

(iii) Text

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).

Text is the default data type of Microsoft Access (Ms-Access).

A __________________ is the amount of something that occurs in a given unit of time.

Answers

Answer:

A  system time is the amount of something that occurs in a given unit  of time.

Explanation:

Prompt: Create a program that asks the user continuously the dollar amount of their recent Amazon purchases until they say done. Store those numbers in a list. Afterwards calculate the following:
Total Amount Spent
Maximum amount spent on a single purchase
Minimum amount spent on a single purchase
Number of purchases
Amount of money spent on taxes. (Sales tax in NY is 8.875 percent).

Things to keep in mind:
Input is stored as string so you need to convert to float.
If you or your family use Amazon, try using your own data!

Pls Dont scam me

Answers

Answer:

oh sorry I don't know that but...

Explanation:

Thanks for the points hehe

A car dealership only sells cars that have fewer than 10 000 miles and are 5 years old or less. (i) Write an algorithm that will: • ask the user to enter the number of miles and the age of a car • validate the input to check that only sensible values that are in the given range are entered • output True if valid data has been entered or False if invalid data has been entered.

Answers

Answer:

Algorithm:

ValidateCarData (milesDrives, age)

Start

Prompt the user to enter the number of miles and the age of a car.Get the input from the user.Store the number of drives in the variable named milesDrives and the age of the car in the variable named age.if ( milesDrives < 10000 and age <= 5)

               Display true.

else

              Display false.

Stop

Explanation:

Algorithm: An algorithm is a step-by-step solution to a problem in a finite number of steps.

A car dealer sells only the car that

drives less than 10000 milesand the age of the car is equal to or less than 5 years.

Prompt the user to enter the number of miles and the age of a car.

Validate the user-entered data.

when the user-entered data is valid (car drive fewer than 10000 miles and 5 years or less old)

Display true (user enters the valid data).

else (car drives more than 10000 miles or more than 5 years old)

Display false (user enters the invalid data).

why should one avoid noise in the computer room​

Answers

is this a joke bc if so why?
This one not a joke hi it’s monika here

Do not make noise in the computer room.
I love to help

The names of the governing body or organizationds that creates rules for information technology and information communication technology

Answers

Answer:

Alliance for Telecommunications Industry Solutions

Explanation:

Alliance for Telecommunications Industry Solutions  is the main body that creates rules for information technology and information communication technology.

This agency create solutions to supports the release of new products and services into the communications marketplace. It also act as an agency that standardizes the  wireless and wireline networks activities. It is accredited by the American National Standards Institute (ANSI).

question no.3 a. Can someone pls help me

Answers

Answer:

A=1

B=1

C=0

X= OR

Explanation:

A is XOR

B is NOT

C is AND

X is OR

Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data

Answers

Answer:

The two ways the calendar meets the criteria of showing the correct date are;

1) The calendar can give dates in the 12 months in a year

2) The calendar can show up to the 31 different days in a month

Explanation:

The two ways in which the calendar meets the criteria of showing the correct date are;

1) The number number of long blocks with 4 different months each = Three

Therefore, the total number of months the blocks can hold = 3 × 4 months = 12 months = The number of months in a year

2) The number of faces on each dice = 6 faces

The number of dice = 2 dice

The total number of faces = 12

The number of identical faces = 2 (11th and 22nd of the month)

The number of unique faces = 10

The number of combinations of the dices = ₁₀C₂ = 45

The number of combination of faces required to show = 1 to 31 = 31 combination

Therefore, there are adequate combinations on the dice to show all the dates of month

The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. Your company has completed the legal documents needed to protect you and the company. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. After a week, the company executive lets you back into the IT Admin's office after hours again. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. Remove the keylogger from ITAdmin. Move the consultant laptop from the Shelf to the Workspace. Plug the keylogger into the consultant laptop's USB drive. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Open the LOG.txt file and inspect the contents. Find the olennon account's password. Find the Administrator account's password. Answer the questions.

Answers

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

Can you identify one syntax error and one logic error in these lines? How do you think you could avoid making logic errors like the one in this code?

You are creating a program in which the user will input his or her age. The program will calculate the year that the user was born and will then tell the user which decade he or she was born in. Here is part of the code:if year > 1989 and year < 2000 print("You were born in the 1980s")

Answers

Answer:

(a) Syntax Error: Missing colon symbol

(b) Logic Error: The condition is wrong

Explanation:

The programming language is not stated; so, the syntax error may not be correctly identified.

Assume the programming language is Python, then the syntax error is the missing colon symbol at the end of the if statement. This is so because, Python required a colon symbol at the end of every if condition statement.

The logic error is also in the condition.

The condition states that all years later than 1989 but earlier than 2000 are 1980s. This is wrong because only years from 1980 to 1989 (inclusive) are regarded as 1980s.

Match the feature to its function.
1. Normal view
displays thumbnails
provides filename and Minimize
2. Notes view
icon
provide rows of icons to perform
3. Slide pane
different tasks
the place where information for
4. Title bar
handouts can be added
the working window of a
5. toolbars
presentation

Answers

Answer:

Match the feature to its function.  The answers are as below:

1. Normal view the place where creating and editing occurs  

2. Notes view an area in which information for handouts can be added  

3. Slide pane the place where the slide order can be changed

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks  

Explanation:

It is the normal view where the editing and the creation of the slides occur. And it's the notes view where you can add the information for handouts. You can arrange the slides in the slide pane. And you can get a list of commands for creating the presentation in the Menu bar. Also, Toolbar is the rows of icons which helps in performing a various set of tasks. And all these are definitions and prove our above selections are correct.

Summary

In this lab, you complete a partially written C++ program that includes a function requiring multiple parameters (arguments). The program prompts the user for two numeric values. Both values should be passed to functions named calculateSum(), calculateDifference(), and calculateProduct(). The functions compute the sum of the two values, the difference between the two values, and the product of the two values. Each function should perform the appropriate computation and display the results. The source code file provided for this lab includes the variable declarations and the input statements. Comments are included in the file to help you write the remainder of the program.
Instructions

Write the C++ statements as indicated by the comments.
Execute the program by clicking the Run button at the bottom of the screen.

Grading

When you have completed your program, click the Submit button to record your score.



++// Computation.cpp - This program calculates sum, difference, and product of two values.
// Input: Interactive
// Output: Sum, difference, and product of two values.

#include
#include
void calculateSum(double, double);
void calculateDifference(double, double);
void calculateProduct(double, double);
using namespace std;

int main()
{
double value1;
double value2;

cout << "Enter first numeric value: ";
cin >> value1;
cout << "Enter second numeric value: ";
cin >> value2;

// Call calculateSum

// Call calculateDifference

// Call calculateProduct

Answers

Answer:

The functions are as follows:

void calculateSum(double n1, double n2){

   cout<<n1+n2<<endl; }

void calculateDifference(double n1, double n2){

   cout<<n1-n2<<endl; }

void calculateProduct(double n1, double n2){

   cout<<n1*n2<<endl; }

Call the functions in main using:

calculateSum(value1,value2);

calculateDifference(value1,value2);

calculateProduct(value1,value2);

Explanation:

This defines the calculateSum() function

void calculateSum(double n1, double n2){

This prints the sum

   cout<<n1+n2<<endl; }

This defines the calculateDifference() function

void calculateDifference(double n1, double n2){

This prints the difference

   cout<<n1-n2<<endl; }

This defines the calculateProduct() function

void calculateProduct(double n1, double n2){

This prints the product

   cout<<n1*n2<<endl; }

This calls each of the function

calculateSum(value1,value2);

calculateDifference(value1,value2);

calculateProduct(value1,value2);

See attachment for complete program

Below are the possible answer to each question write your answer in the space provided before each number

Answers

Answer:

Please find the complete question in the attached file:

Explanation:

1. primary memory

2. secondary memory

3. dynamic ram

4. HDD

5. SSD

6.Rom

7. video card

8. VRAM

9. random access memory  

10. processor

In which patten the modern computer work ?​

Answers

Answer:

Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.

Se le conoce así cuando el analista mismo desarrolla el software necesario para implementar el diseño

Answers

Answer:

Desarrollo de software.

Explanation:

El método clásico de desarrollo de software se denomina modelo en cascada, lo que significa que cada fase de desarrollo del programa debe completarse antes de que comience la siguiente, y que se lleva a cabo un extenso trabajo de especificación antes de que comience el desarrollo real del programa. La especificación es tradicionalmente de arriba hacia abajo y el desarrollo se basa en una programación estructurada, es decir, se formula primero un objetivo final para el proyecto, y luego el programa se divide gradualmente en partes funcionales más pequeñas.

Los métodos más nuevos son ágiles y basados ​​en pruebas. Se basan en el desarrollo gradual de muchas entregas parciales del programa y permiten que las distintas fases de desarrollo se lleven a cabo de forma cíclica o en paralelo. Los clientes y usuarios ganan influencia a lo largo del proceso de desarrollo. El desarrollo y las pruebas de prototipos comienzan lo antes posible, antes de que estén listos todos los detalles de la especificación de requisitos. Las decisiones sobre la especificación de requisitos de las versiones de entrega se toman lo más tarde posible, cuando los usuarios han probado y comprendido lo que realmente quieren y existe un buen conocimiento de las necesidades, posibilidades técnicas y dificultades. Cambia entre el método de arriba hacia abajo (para comenzar desde el propósito y el objetivo) y el método de abajo hacia arriba (para comenzar con lo que ya tiene y puede reutilizar, y comenzar con casos especiales simples pero gradualmente hacer que el programa sea cada vez más general).

In a forest ecosystem, which of the following is the best example of a limiting factor for a rabbit population?

Answers

Answer:

A rise in the population of predators is followed by a decrease in the population of prey.

Which can be used to create a poll on a web page?
CSS
HTML
JavaScript
Text editor​

Answers

Answer:

HTML can be used to create a poll on a web page.

Answer:

HTML

Explanation:

The diamond shape is used exclusively for
_signs.
A. School crossing
B. Yield
C. Warning
D. Regulatory

Answers

Answer is C. warning signs

The diamond shape is used exclusively for warning signs.

Which sign is a warning sign?

Diamond-shaped signs indicate warnings. Rectangular signs with a longer direction horizontal supply direction information. Pentagons characterize school zones.

The form of a diamond sign stands utilized only for warning signs (For example: cross the road ahead, end/begin divided road, merging traffic, curves, and construction warning signs).

Therefore, the correct answer is option C. Warning.

To learn more about warning signs

https://brainly.com/question/26105318

#SPJ2

One of the users in your company notices some strange behavior on his PC. After describing what is being seen, you do a little research and determine that the best course of action is to update the UEFI firmware. Before performing the upgrade, if possible, which of the following is the BEST action to take?
A. Upgrade the processor
B. Password protect the system
C. Connect the computer to a UPS
D. Change the motherboard battery

Answers

Answer:

B

Explanation:

I don't know the explanation to this

The best action to take is to password protect the computer system. Hence option B is correct.

What is computer system?

Computer system is defined as a fundamental, full-featured, and operational hardware and software arrangement that includes all necessary components to implement computer performance. Computers are currently extremely significant since they are highly accurate, quick, and capable of completing a variety of jobs with ease.

Keeping your anti-virus software up to date and regularly scanning your computer for viruses is one of the most crucial tasks in maintaining your computer's efficiency and security. Always put password on the computer so that unknown person does not easily user your computer or hacker will not able to hack your computer easily.

Thus, the best action to take is to password protect the computer system. Hence option B is correct.  

To learn more about computer system, refer to the link below:

https://brainly.com/question/17206337

#SPJ5

Pls answer this
The figure above is a type of thread known as
A. Acme thread B. Buttress thread
C. Square thread D. Vee thread

Answers

Answer:

It looks like an Acme thread.

Explanation:

Other Questions
Radiation is a concern with travelling away from the Earth.What kind of radiation is concerning to astronauts in this journey? ( the trip to Mars) I think its B but im not sure I need your math skills or I go to summer school! There are 6 kittens in the litter, five kittens are black and 1 is brown, what percent of kittens is black? fill in the blank in spanish?me vas a llamar? -si ___ voy a llamar Write the precipitation reaction for cobalt(II) hydroxide in aqueous solution: Be sure to specify the state of each reactant and product. Balance LCM method H2+Cu2O=CU+H2O pls help me being timed 20 points Which taxes generate the most revenue in Washington? Check all that apply. multiflat taxincome taxpoll taxproperty taxsales tax log 7 (x2 + 11) = log 7 15 An investment opportunity requires a payment of $910 for 12 years, starting a year from today. If your required rate of return is 6.5 percent, what is the value of the investment to you today Help plz..And No links!! I repeat No links!! A. Amphetamines B. Barbiturates C. Heroin D. Hallucinogens E. Alcohol 4. Which of the following statements about the typical pattern of sleep cycles is false? A. If someone has been sleep-deprived, he or she enters REM sleep sooner after falling asleep than he or she otherwise would B. Infants spend more time in REM sleep than do adults. C. Near the end of a good night s sleep, a person spends most of his or her time in Stages NREM-1, NREM-2, and REM. D. The first stage of sleep is NREM-1. E. We most often naturally awaken during NREM-3 sleep. If c is the number of cats, which variable expression represents the phrasebelow?The sum of the number of cats and 15 dogsA. C+15B. C-15C. c. 15D.15 How many minutes is it from 11:50 to 12:18 Matthew lives on a farm he takes care of flock of geese if each goose eats eight ounces of cracked corn each day how many ounces of corn will he need to feed seven geese for two days? Is this graph standard, vertex, or intercept? The sum of two numbers is 106. The bigger number is 22 more than the smaller number. Then what is half of the smaller number?(1 Point)a) 84b) 21c) 42d) 327Rakesh's mother's age is three times the present age of Rakesh. After 5 years their ages when added together, will become 66 years. The equation that represents the above is as follows;(1 Point)a) x + 3x = 66b) x + 3x + 5 = 66c) 4x + 15 = 66d) 4x + 10 = 668Equation 1 is : 2 x - 3 = - 9 and Equation 2 is : x - 7 = 2. The first equation has solution (x = - 3), and the second equation has solution (x = 9) and both these answers are correct for the respective equations. Choose the correct statement from below.(1 Point)a) Since the first equation has a negative solution, the second equation only is a Linear equation, as it has a positive solutionb) Both equations have solutions which are rational numbersc) The first equation is called a Negative Linear Equation as it has a negative solutiond) None of the statements a, b or c are True9Please see the Figure A, and choose the correct statement that matches the figure from the options given below.(1 Point)a) The above figure is a Polygon with 5 sidesb) The above figure is a Concave Polygonc) The above figure is not a Polygond) The above figure is a Regular Pentagon10The sum of measures of the exterior angles of any polygon is (1 Point)a) 180 degreesb) 360 degreesc) ( n 2 ) x 180 degreesd) ( n 2 ) x 360 degrees11In a quadrilateral, if all sides are equal and the diagonals bisect each other at right angles, then the quadrilateral (1 Point)a) Is a Squareb) Is a Rhombusc) Could be a Square, or could be a Rhombus, we need to know more about the length of the diagonalsd) None of the above statements is correct12A rectangular wire frame could be bent and turned into a Parallelogram keeping the same 4 original sides, but the following must be true for this to happen..(1 Point)a) That the diagonals remain equalb) That the diagonals continue to bisect the angles at the vertices equallyc) The lengths of the diagonals changed) The diagonals are now bisecting each other in 4 equal parts13Which statement is True for the following two Figures A and B, given below(1 Point)a) Figure A is a Rhombus and Figure B is a Kiteb) Figure A and B are both Rhombusc) Figure A and B are both Kitesd) Figure A is a Kite and Figure B is a Rhombus14Which statement out of the four options below, is True?(1 Point)a) All Rectangles are Squaresb) All Rhombuses are Parallelogramsc) All Squares are Concave Polygonsd) All Convex Polygons have diagonals outside them15(1 Point)16If 4368 28 = 156, then if the same 4368 is now divided by 0.28, what will be the answer?(1 Point)a) 156b) 15600c) 15.6d) 1.561712.00001 0.600001 is closest to ..(1 Point)a) 0.02b) 2c) 20d) 20018Complete:(1 Point)19The equation : 12 x + 16 = 20 is the same as (1 Point)a) 12 x + 8 = 12b) 12 x = 20 + 16c) 12 x 16 = 20 16d) 12 x 20 = 162020. Find the value of a quarter of the angle QRT which is x if angle PRS is 2x as shown in the figure below. Consider Triangle PRQ and Triangle RST to be equilateral triangles of different sizes.(1 Point)21Which number will give us a quotient of - 4, if we divide - 24 by ..(1 Point)a) 4b) - 6c) - 4d) 622If 2 ( 3 2 x ) = 3 ( x 5 ) then x = .(1 Point)a) 3b) 3c) 6d) 623The teacher asked the class to divide a given number by 24- Rohit divided the number by 24 and got the correct answer 20- Mohit divided the number by 6 and got an answer which he again divided by 4 and obtained the final answer- Rakesh divided the number by 2.4 and then divided the answer again by 10- Allen divided the number by 2.4 and then multiplied the answer obtained by 10 Now choose the best solution from the below options.(1 Point)a) Only Rohit got the correct answerb) Both Rohit and Mohit got the correct answerc) Rohit, Mohit and Rakesh all got the correct answerd) Rohit, Mohit and Allen all got the correct answer24Abhay and Binu both started walking starting at the same time and at the same rate of 5 km / hour. Abhay walked on the boundary of a big circle and Binu walked on the boundary of a small circle and both these circles were having the same center. Abhay completed 3 circles, whereas Binu completed 7 circles after half an hour. After half an hour ...................(1 Point)a) Abhay has walked more than Binu, as he walked on the boundary of the bigger circleb) Binu has walked more than Abhay, as he has walked more circles than Abhayc) Both of them have covered the same distanced) With the information given above, we cannot say who walked more25Which sign will you put in between [ 120 .. ( 3 / 11 ) ], so that the answer or result is the highest number(1 Point)a) +b) c) xd) Shelton Company has the following account balances at year-end: Accounts receivable $140,000 Allowance for doubtful accounts 7,200 Sales discounts 4,800 Shelton should report accounts receivable at a net amount of:__________a. $120,000. b. $ 12,800.c. $1 08,000. d. $115,200 What percent of 8 is 1,280? A 16096 O B. 16,000% O O O C. 1,600% D. 1.6% does anyone know how to solve this