What is system software?

No Spam

Answer quickly

Answers

Answer 1

[tex]\large{\underline{\underline{\pmb{\tt{Answer:}}}}}[/tex]

System software controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.
Answer 2

Answer:

[tex]\large\mathsf{\red{\underline{\underline{\pmb{System~ Software}}}}}[/tex]

[tex]\textsf{It is a set of programs}[/tex] [tex]\textsf{that control and manage the }[/tex] [tex]\textsf{operations of computer hardware.}[/tex]

[tex]\textsf{It also helps application programs}[/tex][tex]\textsf{to execute correctly.}[/tex]

[tex]\textsf{System Software are designed to}[/tex] [tex]\textsf{control the operation and extend}[/tex][tex]\textsf{the processing functionalities of}[/tex][tex]\textsf{ a computer system.}[/tex]

Related Questions

Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting.
Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

Based on the naming recommendations in the book, which of the following is a good identifier for a variable that will be used to hold an employee’s phone number? a. EmployeePhoneNumber b. emphonumber c. employee_phone_number d. empPhoneNum

Answers

Answer:

A good identifier for a variable that will be used to hold an employee’s phone number is:

a. EmployeePhoneNumber

Explanation:

An identifier is a string that uniquely identifies or names the entity or an object.  The object or entity may be a constant, variable, structure, function, etc. Identifiers can be formed from uppercase and lowercase letters, digits, and underscores.  Meaningful identifiers mostly favor the use of long descriptive names like EmployeePhoneNumber.  However, the other options can still be used.

College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away

Answers

Answer:

Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...

Browse Online Tutorials. ...

Build-up online profile. ...

Learn new Tools. ...

Implement what you learned. ...

Enrich your skillset. ...

Try-out and Apply.

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's n is different than N.

Answers

Answer:

The program in Python is as follows:

char = input("Character: ")[0]

string = input("String: ")

kount = string.count(char)

print(kount,char,end="")

if kount!=1:

   print("'s")

Explanation:

This gets character input

char = input("Character: ")[0]

This gets string input

string = input("String: ")

This counts the occurrence of char in string

kount = string.count(char)

This prints the number of occurrence and the character

print(kount,char,end="")

This prints 's, if kount is other than 1

if kount!=1:

   print("'s")

What are the differences between sequential and random files? Which one do you think is better and why?

Answers

Answer:

Sequential is better

Explanation:

Sequential is more organized while the more easier to make but less dependable one is random.

sequential is used for things such as date of birth, or where someone was born.

you can't do that with a random file.

What is the definition of: a computer network? data communications? telecommunications? a local area network? a personal area network? a metropolitan area network a wide area network? network management? convergence? g

Answers

Answer:

The answer is below

Explanation:

1. Computer Network: this is a system of interconnection of computers and computing devices that utilizes wires or radio waves over certain reachable locations.

2. Telecommunications: this is known to be the system or combination of telephones device and networks that transmit telephone signals.

3. A local area network: often referred to as LAN, is a system of networks that covers a smaller area usually within a room, floor, building, or campus.

4. Personal area network: often referred to as PAN, this is a network that covers few distances, usually between wireless devices like PDAs, laptops, and other devices.

5. Metropolitan area network: often referred to as MAN, this is a system of the network that serves quite a larger area, usually between that serve an area of 1 to 30 miles radius. For example, a typical city.

6. Wide area network: often referred to as WAN, this is a system of a large network that covers a large area such as parts of states, many states, countries, and the world at large.

7. Network management: this is defined to be a process of designing, installing, and supporting a computer network, such as computer hardware and software

8. Convergence: this is known to be a connection, combination, and integration of two or more computer technologies in a single device or system for operation.

g Add a throw statement to the processNumbers function that throws the message "An element in the list is not a number." if one of the elements in toProcess is not a number. Hint: The function isNaN() returns true if the parameter is not a number.

Answers

Answer and Explanation:

function processNumbers(alist){

var Ourarray= new array(alist);

Ourarray.foreach(

if(isNaN()){

Console.log( "An element in the list is not a number."};

break;

}

}

processNumbers(alist)

From the above, we have defined a function that takes an array parameter(the following array variable will make sure of that). We test each element in the array using foreach array function. The for each function runs the if statement and if isNan is true for each of the elements in the array.

Question 3 of 5.
Which of the following option(s) explain the need for ETL?
O ETL provides a method of moving the data from various sources into a data warehouse.
ETL is a predefined process for accessing and manipulating source data into the target database.
Allow verification of data transformation, aggregation and calculations rules.
O All of the above

Answers

The correct option is "All of the above".

ETL simply means “extract, transform, and load.” ETL is a vital process in the strategies of data integration.

ETL also allows for verification of data transformation, aggregation and calculations rules.

Furthermore, ETL enables companies to be able to gather data from different sources and then consolidate the data hats gathered into a single and centralized location.

ETL also allows different types of data to be able to work together.

In conclusion, based on the information given above, the answer will be All of the above.

Read related link on:

https://brainly.com/question/13333461

(viii) Word does not allow you to customize margins.
true/false:-​

Answers

In Word, each page automatically has a one-inch margin. You can customize or choose predefined margin settings, set margins for facing pages, allow extra margin space to allow for document binding, and change how margins are measured.

I would say false

The operating system (OS) of an information system contains the software that executes the critical functions of the information system. The OS manages the computer's memory, processes, and all of its software and hardware. It allows different programs to run simultaneously and access the computer's memory, central processing unit, and storage.

a. True
b. False

Answers

Answer:

a. True

Explanation:

An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).

Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.

A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products

Answers

Answer:

The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".

Explanation:

In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.

To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.

Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.

Discuss the DMA process​

Answers

Answer:

Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).

Explanation:

A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.

In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.

ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.

ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.

A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:

   I/O addresses    Memory addresses.    Interrupt request numbers (IRQ).    Direct memory access (DMA) channels.

DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.

A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.

With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.

In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.

However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.

Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.

Answer:

See explanation

Explanation:

DMA [tex]\to[/tex] Direct Memory Access.

The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.

The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.

Write a void function SelectionSortDescendTrace() that takes an integer array and sorts the array into descending order. The function should use nested loops and output the array after each iteration of the outer loop, thus outputting the array N-1 times (where N is the size). Complete main() to read in a list of up to 10 positive integers (ending in -1) and then call the SelectionSortDescendTrace() function. If the input is:

Answers

Answer:

Explanation:

The following program is written in Java. The main method asks the user to enter 10 different integer values. These values are saved to an integer array and passed to the SelectionSortDescendTrace() method. This method sorts the array in descending order while printing the entire array after every outer loop cycle. The program was tested and the output can be seen in the attached image below.

import java.util.*;

class Brainly {

   // Main Method

   public static void main(String[] args)

   {

       Scanner in = new Scanner(System.in);

       int[] myArr = new int[10];

       for (int i = 0; i < 10; i++) {

           System.out.print("Enter an integer: ");

           myArr[i] = in.nextInt();

           System.out.print('\n');

       }

       SelectionSortDescendTrace(myArr);

   }

   public static void SelectionSortDescendTrace(int[] myArr) {

       int temp;

       for (int i = 0; i < myArr.length; i++)

       {

           for (int j = 0; j <myArr.length; j++)

           {

               if (j != myArr.length - 1)

               {

                   if (myArr[j] < myArr[j + 1])

                   {

                       temp = myArr[j];

                       myArr[j] = myArr[j + 1];

                       myArr[j + 1] = temp;

                   }

               }

           }

           System.out.println(Arrays.toString(myArr));

       }

   }

}

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)

Answers

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

Where ArraySize is the variable that holds the size of newArray (in bytes)

If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?

a. the physical head on the cable os not the correct type

b. one of the ports on either device is damaged or under powered

c. the computer is not running the correct application

d. cable is not the correct color

Answers

Answer should probably be B. I don’t think you’d need an application to transfer data, and the computer wouldn’t even tell you if the data couldn’t transfer if you have the wrong cable head. It wouldn’t even be connected.

The root cause at the time when transferring the data from mobile device to the computer is that the port on the device is either damaged or it is underpowered.

The following are not the root causes for the error message at the time of transferring the data from a mobile device to the computer:

The cable is not of accurate type.The computer does not run the right application.The cable is not of accurate color.

Therefore we can conclude that the root cause at the time when transferring the data from a mobile device to the computer is that the port on the device is either damaged or it is underpowered.

Learn more about the data here: brainly.com/question/10980404

Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution

Answers

Answer:

Explanation:

The following pseudocode for this method using operations of the ADT list would be the following

swap(aList, indexI, indexJ) {

    initialize temp_variable = Retrieve(indexI, aList)

    Insert(Retrieve(indexJ, aList), indexI, aList)

    Insert(Retrieve(indexI, aList), temp_variable, aList)

}

This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.

write a program that keeps taking integers until the user enters in python

Answers

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to

Answers

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

Which of these is a tool for creating mobile apps?

Appy Pie

C#

Apple Pie

C++

Answers

Answer:

C++

Explanation:

C++ is used in application development

Compute the acceleration of gravity for a given distance from the earth's center, distCenter, assigning the result to accelGravity. The expression for the acceleration of gravity is: (G * M) / (d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of the earth 5.98 x 1024 (in kg) and d is the distance in meters from the earth's center (stored in variable distCenter).
#include
using namespace std;
int main() {
double G = 6.673e-11;
double M = 5.98e24;
double accelGravity;
double distCenter;
cin >> distCenter;
/* Your solution goes here */
cout << accelGravity << endl;
return 0;
}

Answers

Answer:

Replace /* Your solution goes here */ with the following expression

accelGravity = (G * M) / (distCenter *distCenter );

Explanation:

Required

Complete the code

The equivalent expression of (G * M) / (d^2) is:

(G * M) / (distCenter *distCenter );

The expression must be stored in accelGravity.

So, we have:

accelGravity = (G * M) / (distCenter *distCenter );

In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics

Answers

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

Write a C program to input a character, then check if the input
character is digit, letter, or other character.

Answers

Answer:

// CPP program to find type of input character

#include <iostream>

using namespace std;

void charCheck(char input_char)

{

// CHECKING FOR ALPHABET

if ((input_char >= 65 && input_char <= 90)

|| (input_char >= 97 && input_char <= 122))

cout << " Alphabet ";

// CHECKING FOR DIGITS

else if (input_char >= 48 && input_char <= 57)

cout << " Digit ";

// OTHERWISE SPECIAL CHARACTER

else

cout << " Special Character ";

}

// Driver Code

int main()

{

char input_char = '$';

charCheck(input_char);

return 0;

}

Explanation:

// CPP program to find type of input character

#include <iostream>

using namespace std;

void charCheck(char input_char)

{

// CHECKING FOR ALPHABET

if ((input_char >= 65 && input_char <= 90)

|| (input_char >= 97 && input_char <= 122))

cout << " Alphabet ";

// CHECKING FOR DIGITS

else if (input_char >= 48 && input_char <= 57)

cout << " Digit ";

// OTHERWISE SPECIAL CHARACTER

else

cout << " Special Character ";

}

// Driver Code

int main()

{

char input_char = '$';

charCheck(input_char);

return 0;

}

Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of students from a user and store their details in an array of type Student (class). The student class should have: • studName, indexNo, remarks as variables of type string, marks as integer, and grade as char. • A void function called getData which is used to get students’ details (index number, name, and marks). • A void function called calculate which will work on the marks entered for a student and give the corresponding grade and remarks as give below. Marks Grade Remarks 70 – 100 A Excellent 60 – 69 B Very Good 50 – 59 C Pass 0 – 49 F Fail • Should be able to display the results for all students (index number, name, marks, grade, remarks). 2. Draw a flowchart for the calculate function above. 3. Create a folder with name format ICTJ254_indexnumber (eg

Answers

Answer:

Explanation:

// C++ Program to Find Grade of Student

// -------codescracker.com-------

#include<iostream>

using namespace std;

int main()

{

   int i;

   float mark, sum=0, avg;

   cout<<"Enter Marks obtained in 5 Subjects: ";

   for(i=0; i<5; i++)

   {

       cin>>mark;

       sum = sum+mark;

   }

   avg = sum/5;

   cout<<"\nGrade = ";

   if(avg>=91 && avg<=100)

       cout<<"A1";

   else if(avg>=81 && avg<91)

       cout<<"A2";

   else if(avg>=71 && avg<81)

       cout<<"B1";

   else if(avg>=61 && avg<71)

       cout<<"B2";

   else if(avg>=51 && avg<61)

       cout<<"C1";

   else if(avg>=41 && avg<51)

       cout<<"C2";

   else if(avg>=33 && avg<41)

       cout<<"D";

   else if(avg>=21 && avg<33)

       cout<<"E1";

   else if(avg>=0 && avg<21)

       cout<<"E2";

   else

       cout<<"Invalid!";

   cout<<endl;

   return 0;

}

A choropleth map is used to
Group of answer choices

do a scatter plot.

show live satellite images.

present geographical regions in 3D.

present geographical regions coloured, shaded, or graded according to some variable.

Answers

4- present geographical regions colored, shaded, or graded according to some variable :)

Fit a boosting model to the training set with Purchase as the response and the other variables as predictors. Use 1,000 trees, and a shrinkage value of 0.01. Which predictors appear to be the most important

Answers

Answer and Explanation:

For the training set consist of 1000 observations, let's have a set consist of the observations such as sets.seed train boost.caravan gbm(Purchase., data = Caravan.train , distribution = "gaussian" , n trees = 1000 summary(boost.caravan) The tree classification such as tree(formula = Purchase data - train where variable are used in tree construction and number of terminal nodes 0 and deviance is 0.7 and error is 0.165

Brooke is trying to save enough money in the next year to purchase a plane ticket to Australia. Every month Brooke saves $200. Write a for loop that displays how much money Brooke will save at the end of each month for the next 12 months.

Answers

Answer:

var monthlyDeposit = 200;

var accountBalance = 0;

for(var i = 0;i<12;i++){

   accountBalance += monthlyDeposit;

   console.log(accountBalance);

}

A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents

Answers

Answer:

D. Excessive disk space consumption due to storing large documents.

Explanation:

When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.

how many dog breed are there

Answers

Answer:

360 officially recognized breeds (would appreciate if given brainliest) <3

The usa recognizes 160 breeds while 360 are recognized worldwide

Code Example 4-1 int limit = 0; for (int i = 10; i >= limit; i -= 2) { for (int j = i; j <= 1; ++j) { cout << "In inner for loop" << endl; } cout << "In outer for loop" << endl; } (Refer to Code Example 4-1.) How many times does "In inner for loop" print to the console? a. 1 b. 0 c. 2 d. 5 e. 7

Answers

Answer:

"In inner for loop" is printed twice.

Answer: C. 2

Explanation:

Code:

int main()

{

   int limit = 0;

   for  (int i =0; i>=limit; i-=2) {

       for (int j = i; j <= 1; ++j){

           cout << "In inner for loop" << endl;

       }

       cout << "In outer for loop" << endl;

   }

   return 0;

}

Output:

In inner for loop

In inner for loop

In outer for loop

The output "In inner for loop" print twice.

Thus, option (c) is correct.

In the given code example, the inner for loop has a condition j <= 1.

This condition means that the loop will execute as long as j is less than or equal to 1.

However, the initial value of j is i, and the value of i decreases by 2 in each iteration of the outer for loop.

When i = 8, the inner loop has the condition j ≤ 1.

The loop will iterate as long as j is less than or equal to 1.

So the inner loop executes twice: once when j = 8, and then when j = 9. The statement "In inner for loop" prints twice.

Therefore, the output print twice.

Thus, option (c) is correct.

Learn more about Output problem here:

https://brainly.com/question/33184382

#SPJ4

The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels. Thus, the following lists will have the following ALL-LENGTHs.
(A B C) => 3
((A (B C) D (E F)) => 6
(NIL NIL (NIL NIL) NIL ) => 5

Answers

Answer:

bc

Explanation:

Other Questions
what is efficiency of a machine? In addition to the dangers of the Nazis finding them, what were 3 other reasons that hiding was extremely challenging for children-and which often could lead to death? Jacinda's father had dreams for her. Each day, she was made to practice the piano for hours, until she could hear the scales in her head and thought her fingers might fall off. Every day was the same. Under the covers, however, Jacinda pored over comic books and spent her nights practicing her drawing. She knew what she'd rather do with her life. Which statement best explains how Jacinda's motivation leads to a conflict in the story? O A. Jacinda's hatred of music makes her resent her father. O B. Jacinda's passion for art clashes with her father's goals for her. O C. Jacinda's pride in her skill causes her to disagree with her father about whether she is good at the piano. O D. Jacinda's desire to read comic books shows that she cannot obey her father. what do you know about the formulation of the present constitution of Nepal? 22. Which of the following does not demonstrate evidence regarding the ability to consummate a refinancing of short-term debt? A) Management indicated that they are going to refinance the obligation. B) Actually refinance the obligation. C) Have capacity under existing financing agreements that can be used to refinance the obligation. D) Enter into a financing agreement that clearly permits the entity to refinance the obligation. An object of mass 80 kg is released from rest from a boat into the water and allowed to sink. While gravity is pulling the object down, a buoyancy force of 1/50 times the weight of the object is pushing the object up (weight=mg). If we assume that water resistance exerts a force on the abject that is proportional to the velocity of the object, with proportionality constant 10 N-sec/m, find the equation of motion of the object. After how many seconds will the velocity of the object be 40 m/s? Assume that the acceleration due to gravity is 9.81 m/sec^2. The establishment of the British Raj created which major change in India?(Image with answer choices attached) Select all the correct answersHannibal is worried about consuming Information from blased media outlets. What are two questions Hannibal should consider when heconsumes Information from media?Who will this message benefit or who will gain from it?How many reviews did the message receive?Whose voice is excluded?Are other outlets sharing the same story? Which best describes the language excerpt we hold these truths A firm's market-to-book ratio might be greater than 1.0 due to accounting reasons. An example of an accounting reason that would cause the market-to-book ratio to increase is y= -(x+3)^2 -5 What is the leading coefficient?How do you find the vertex? Help please! Need this answered quick! Match the term in column 1 with the definition in column 2.Naturalizedcitizens?Social relationships,particularly among peoplewho are related by familyconnectionKinship ties?Immigrants who obtaincitizenship in their newcountryHousehold?People who live togetherin a single residenceClan2A large group of people.united by kinship ties Which key correctly represents the information below? A. 11 | 2 = 12 B. 1 | 2 = 12 C. 11 | 2 = 112 D. 11 | 2 = 13 Which expression is equivalent to (3a)2? How did president Roosevelts big stick policy affect the construction of the Panama Canal Solve for hhh: h-\left(-2.22\right)=-7.851h(2.22)=7.851h, minus, left parenthesis, minus, 2, point, 22, right parenthesis, equals, minus, 7, point, 851 h =h=h, equals 2. Explaining According to Ashoka, who can win "heavenlybliss" and how? a /beautiful/it/is/what/sence! An improvement in a country's balance of payments means a decrease in its balance of payments deficit, or an increase in its surplus. In fact we know that a surplus in a balance of payments A) is always beneficial. B) is usually beneficial. C) is never harmful. D) is sometimes harmful. E) is always harmful.