___ transmission systems transmit tightly focused beams of radio signals from one ground-based microwave transmission antenna to another.

Answers

Answer 1

Answer:

Terrestrial microwave

Explanation:

Based on the information provided it can be said that the type of transmission system being described is called a Terrestrial microwave transmission systems. This is a system used between ground-based microwave transmission antennas which produce a narrow, highly directional signal to another antenna in order to communicate information back and forth. Although very effective, it limits the communication to only the antenna's that have a line-of-sight with each other.

Answer 2

Option d is correct. The correct answer is terrestrial microwave. Terrestrial microwave transmission systems are used for long-distance land-based communications, requiring clear line-of-sight between the antennas due to their high-frequency, short wavelength signals.

These systems require a clear line of sight between the transmitting and receiving antennas due to the short wavelengths of microwave signals, making them suitable for long-distance land-based communications.Microwaves, due to their high frequencies, can carry more information per unit time. This efficiency makes them ideal for both land-based long-distance communications and satellite transmissions. However, unlike cellular systems which use weaker radio transmitters for short distances, terrestrial microwave systems focus on long-distance transmission between antennas.

Hence,option d is correct.

Complete Question:

___ transmission systems transmit tightly focused beams of radio signals from one ground-based microwave transmission antenna to another.

a.Satellite

b.Cellular

c.Downlink

d.Terrestrial microwave


Related Questions

Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Longitudinal design B. Telemarketing C. ​Cross-sectional design D. Experiments E. Casual research

Answers

Answer:

The answer is "Option C".

Explanation:

This technique is also known as walking-sectional experimental research, which only collects information at one stage. The goal of using this strategy is to create a single point, that provides representations to the population of interest, and other choices were wrong, that can be described as follows:

In option A, It is wrong, because this designing technique is used to search the relationship between variables. In option B, It is a form of marketing, that provides communication via telephone, that's why it is incorrect. In option D, It is used in research, that's why it is not correct. In option E, It is wrong, because it is used in business.

Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and find the information they​ need? A. Market intelligence system B. Intranet C. Marketing decision support system​ (MDSS) D. Market research E. Marketing information system​ (MIS)

Answers

Answer:

C. Marketing decision support system (MDSS)

Explanation:

Based on the information provided within the question it can be said that the software that is being described in the question is called the Marketing decision support system (MDSS). This is a system that is used in order to be able to manipulate a database in order to analyze various different business scenarios that would help a manager make a management decision with this information.

Final answer:

The Marketing Decision Support System (MDSS) allows managers to conduct analyses and find information they need by integrating Database Management System functionalities with analytical tools.

Explanation:

The software and interactive system that allows managers to conduct analyses and find the information they need is referred to as the Marketing Decision Support System (MDSS). This type of system combines the attributes of a Database Management System (DBMS) with analytical tools, enabling managers to transform raw data into valuable insights. The MDSS typically integrates database functionalities with sophisticated analytical processes to aid in decision-making, similar to how a Geographic Information System (GIS) transforms geographic data into information by combining spatial data handling capabilities with the attribute data handling of DBMS.

If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to have Tracy reach the right edge of the canvas?
answer choices
4 times

8 times

10 times

50 times

Answers

Final answer:

The number of times the code must be repeated depends on the width of the canvas, which is not provided. If hypothetically assuming a canvas width of 400 pixels, Tracy would need to move 8 times to reach the right edge.

Explanation:

The question 'If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to have Tracy reach the right edge of the canvas?' is asking us to determine the number of iterations required for a movement command in a programming context to cross a given distance. To answer this, we need the width of the canvas in pixels. Once the width is known, we would divide it by the movement distance (50 pixels) to find out how many 50-pixel movements are needed to reach the right edge. Since the width of the canvas is not provided, we are unable to give a specific answer. However, if we assume the canvas is 400 pixels wide (as an example), then Tracy would need to move 400/50 = 8 times to reach the right edge.

Final answer:

To reach the right edge of the canvas, Tracy needs to repeat the code 10 times.

Explanation:

To reach the right edge of the canvas, Tracy needs to repeat the code multiple times. Let's assume that the canvas is 500 pixels wide. If Tracy moves forward 50 pixels each time, she will need to repeat the code 10 times (500/50 = 10) to reach the right edge of the canvas.

During data declaration, a name is binded to a memory location, what else can be identify as part of this process?

Answers

data declaration means a variable which contain data value and it can be declared as integer, float, character, double, boolean (data types).

example:

int r;

char name;

float g;

double k= 23.34;

Where is the typical location of a touchpad inside of a laptop?
Attached to the keyboard
Next to the RAM
Under the bottom panel
Under the case

Answers

Attached to the keyboard is the typical location of a touchpad inside of a laptop.

Attached to the keyboard

Explanation:

The touchpad, by a long shot the most well-known sort, is a level territory, situated underneath your console. A pointing stick is a little catch situated among your PC's keys. The conventional touchpad is a rectangular, contact delicate cushion, generally focused beneath the console in the scratch pad's palm rest. Moving your finger over the outside of this cushion moves the mouse.

And the cushion is devoted left-and right-click catches, and now and again a middle snap. In the event that you need to right-tap on a workstation without utilizing the trackpad, you can do it utilizing a console easy route. Position the cursor and hold down "Move" and press "F10" to right-click. A few workstations additionally have a particular key called a "Menu" key that can be utilized for right-clicking.

A researcher administers a standardized test to the students in a school testing a new program as well as to students in a similar school as a control group. To what extent is comparison of the average scores for the two groups of students useful for determining the effects of the program?
Of limited usefulness as a pilot study but has many threats to validity T/F

Answers

Answer:

True.

Explanation:

An investigator administers a practice test as the intervention group for all the participants in a school testing out a new curriculum as well as for the participants in the individual school. The analysis of just the scores for the two groups of students is thus of limited usefulness as a pilot study but has many challenges to the point that it is useful to assess the results of the program.

Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to the development of the Internet? How or why does autonomy scale?

Answers

Answer:

Explanation:

With an individual domain name we can upload all the content we want, in a free domain or share domain, upload content in some cases have a limit, for example the size of an image, in an individual domain we can add our brand, in a shared, we can add our brand side to company share those domains, we can have our own email address, practically we have a complete autonomy in our website.

Which properties are true of String objects? a. Their lengths never change b. The shortest string has zero length c. Individual characters within a String may be changed using the replace method d. The index of the first character in a string is one e. Only A and B are true

Answers

Answer:

sjdjk

Explanation:

sx'989

If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement binary number are 00 (e.g., the binary number 01100), what does that tell you about the number?

Answers

Answer:

When the last two digits of a 2's complement binary number are 00, this tells us that the number is divisible by 4 in decimal format.

A 2's complement binary number is said to be divisible by 4 in decimal form when its last two digits are 00.

What is binary number?

The binary number system is one of the four varieties of number systems. Binary numbers are only ever represented by the digits 0 (zero) and 1 when they are utilized in computer applications (one).

The binary numbers are represented in this context using the base-2 numeral system. For instance, (101)2 is a binary number. Therefore, 11111111 is the binary representation of the decimal number 255.

The binary number system in mathematics is a positional numeral system with 2 as its base and just 2 symbols needed for its digits, as opposed to the normal 10 symbols used by the decimal system.

Thus, A 2's complement binary number is said to be divisible by 4 .

For more details about binary number, click here:

https://brainly.com/question/15766517

#SPJ2

You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk controller hardware has not been recognized by the computer. What utility would you use to verify that the controller is functioning correctly?
Device Manager T/F

Answers

Answer:

True

Explanation:

Device Manager -

In the microsoft Windows operating system , it is the control panel applet .

It helps to control and view any of the hardware , which is attached external onto the computer or laptop .

The various hardware attached can be easily sorted in a convenient manner .

In case the hard work is not working , the information gets highlighted and in case the hard work is working properly , the data would be displayed to the screen .

Hence , from the given scenario of the question ,

The correct term is device manager .

George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use?
A. Risk Management Guide for Information Technology Systems (NIST SP800-30).
B. CCTA Risk Analysis and Management Method (CRAMM).
C. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE).
D. ISO/IEC 27005, "Information Security Risk Management".

Answers

Answer:

The methodology for suited for George's use is A. Risk Management Guide for Information Technology Systems (NIST SP800-30)

Explanation:

The Risk Management Guide for Information Technology Systems (NIST SP 800-30) was set in place to conduct risk analysis on federal organizations and their information systems in the U.S.

The other options do not apply to U.S federal government agencies. Hence, George is best suited to use the Risk Management Guide for Information Technology Systems (NIST SP 800-30)

Final answer:

The Risk Management Guide for Information Technology Systems (NIST SP800-30) is the best methodology for George, a risk manager at a U.S. federal government agency, to use during his IT risk assessment.

Explanation:

For George who is a risk manager for a U.S. federal government agency and conducting a risk assessment for his agency's IT risk, the best suited methodology would be A. Risk Management Guide for Information Technology Systems (NIST SP800-30).

This is because the National Institute of Standards and Technology (NIST) possesses guidelines specifically for federal agencies to use when assessing and managing IT risks. More importantly, the SP800-30 guide provides steps for carrying out a risk evaluation and assists in risk mitigation efforts to improve the organization's risk posture.

B, C, and D options can also be followed for risk assessment but NIST SP800-30 is specifically created by a U.S. government organization and it is highly recommended to follow local guidelines.

Learn more about IT Risk Assessment here:

https://brainly.com/question/31632025

#SPJ3

Intranets:
a. provide the platform on which a firm builds its information systems.
b. are typically used to communicate with the business's trusted vendors.
c. are based on mainframe technology.
d. use Internet technology for a private company network.
e. are multiple networks joined together.

Answers

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.


A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on other devices?
Same browser
Same encryption certificate
Same Internet provider
Same operating system

Answers

Answer:

Same browser

Explanation:

A user saves a password on a website the user logs into from a desktop. As long as the the browser used is the same and the user has saved the password on the browser, it does not matter which device the user uses, the password would be saved on the website.

Therefore same browser is important for a website to save the password logged in from any other device.

I hope the answer was helpful.

Thanks for asking.

What is an unique text-based internet address corresponding to a computer's unique numeric IP address called

Answers

Answer:

This is called a domain name

Explanation:

A domain name is an address used by internet users to access a website.

Your network is divided into two segments. As the signal travels down the first segment, it becomes weak. To amplify the signals passing to the second segment, the network engineer installed a networking device. Which networking device did the engineer install?

Answers

Answer:

The engineer installed a Bridge

Explanation:

A bridge is a networking device that serves as a link between two or more networks, therefore, making them work as a single network. Bridges function in a similar pattern as hubs and repeaters, however, they are distinct. The MAC address table is maintained to adequately direct transmissions to the receiver.

It is worthy to note that bridges operate on the Data link layer of the OSI (Open system Interconnect) model. It connects and maintains communication between multiple networks.

The bridge installed by the engineer creates stability between the two network segments. It optimizes the signal which makes the network perform better.

In information systems, _____ is information from a system that is used to make changes to input or processing activities.

Answers

Answer:

"Feedback" is the correct answer for the above question.

Explanation:

Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.It is used in communication channels to tell the sender that the message is received by the receiver.It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.

Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough conversions in the last 30 days. What's the minimum number of conversions needed (in the last 30 days) to be eligible to set up a Smart Display campaign?1. At least 50 conversions on Display or at least 100 conversions on Search. 2. At least 30 conversions on Display or at least 50 conversions on Search.3. At least 100 conversions on Display or at least 50 conversions on Search.4. At least 50 conversions on Display or at least 30 conversions on Search.

Answers

Answer:

Option 1 is correct.

Explanation:

She is prepared to begin her initial Smart Display campaign, but her account is not yet worthy because she hasn't had sufficient conversions during the last 30 days. So, at least 50 View Conversions or at least 100 Search Conversions required for the required number of transformations that are worthy of the Smart Display campaign.

Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d. All of the above

Answers

Answer:

Option c is the corrcect answer for the above question.

Explanation:

The text box is a box that is used in the design of the project to enter the name or another field by the user. The project design consists of a form that is used to take the data of the user for any processing. So when there is a need for any data, which is altered by the user, the programmer needs to follow the syntax of the text box.

For example, to enter a name on the website, the programmer needs to write "<input type=" text">" in the HTML language, which provides a text box to enter the text. So the option c is the correct for the above question while the other is not because--

Option 'a' states about the 'button', which is used for any click event.Option b states about the label, which is used to display a message.Option d states about all option which is not correct.

You recently installed a new RAID controller card in a PCIe expansion slot on your computer. After setting up the controller, you transfer data from the backup you created over to the computer. When you finish the setup, you turn the computer off and return it to its normal location. When you turn the computer on, you immediately receive the error message, "RAID not found." What might be the problem?

Answers

Answer:

Expansion card failed or became unseated.

Explanation:

A current RAID controller card was installed in such a PCIexpress slot on the user's system. Once the device is installed, the user transmits information to the device from those in the backup that you made. While the installation is finished, the system is turned off - and returned toward its correct position. Once he turns on his system, then he immediately obtains the error message that is not found on the RAID.

So, Expansion card may have failed or unseated issues may have emerged.

The problem might be :

Expansion card failed or became unseated.

Here,

A current RAID controller card was installed in such a PCI express slot on the user's system. Once the device is installed, the user transmits information to the device from those in the backup that you made. While the installation is finished, the system is turned off - and returned toward its correct position. Once he turns on his system, then he immediately obtains the error message that is not found on the RAID.

Thus,

Expansion card may have failed or unseated issues may have emerged.

Know more about RAID ,

https://brainly.com/question/31935278

#SPJ6

You want to send your photographs to a friend.What should you do to make sure that your friend’s e-mail inbox does not get filled?a. Compress Attachmentb. Format Message c. Use Rich Formatd.Use Default Formatting

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The compress techniques are used to encrypt the file and convert a larget file into a small one. This is used by some compression software. The above question asked about the method by which the receiver email memory is less used when anyone sends the document to him. It is used by the compression techniques. When the sender compresses the file then the receiver memory is less used. So the Option a is the correct answer for the above question while the other is not because:-

Option b states about the format message which can not help to use less memory. Option c states about the Rich format message which also can not help to use less memory. Option d states about the Default format message which also can not help to use less memory.

Which of the following is an example of a protocol?
IPsec
CPU
VPN
PSU

Answers

Answer:

IPsec

Explanation:

CPU & PSU are computer components. VPN is software. IPsec stands for Internet Protocol security

Final answer:

IPsec is an example of a protocol, which is a set of rules for transmitting data, used to secure internet communication across an IP network.

Explanation:

An example of a protocol from the options provided is IPsec. A protocol is a set of rules or procedures for transmitting data between electronic devices, such as computers. In the context of internet security, IPsec, which stands for Internet Protocol Security, is used to secure internet communication across an IP network. IPsec helps to protect data flows between a pair of hosts (end-to-end communication), between a pair of security gateways (network-to-network), or between a security gateway and a host.

Other protocols of note include FTP (file transfer protocol) and its secure version, SFTP (secure file transfer protocol), designed specifically for transferring files in a secure manner.

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?a. Random layer approachb. Divide and conquer approachc. Bottom up approachd. Top down approach

Answers

Answer:

C. Bottom-up approach will be used in this scenario.

Explanation:

The OSI or Open Systems Interconnection is an architecture that comprises of seven (7) layers, each layer unique in its functionality. The layer is listed below:

7. Application layer

6. Presentation layer

5. Session layer

4. Transport layer

3. Network layer

2. Data link layer

1. Physical layer

Layer 1 - 3 are considered the hardware layers, Layer 4 is considered as the heart of the OSI model while layers 5 - 7 are considered the software layers.

Back to our question, once you decide to troubleshoot from the physical layer of the OSI model, you are troubleshooting this problem from a bottom-up approach.

Which is true about POP3 and IMAP for incoming email?
Both keep email on an email server by default
IMAP keeps email on an email server by default
Neither keep email on an email server by default
POP3 keeps email on an email server by default.

Answers

Answer:

Option B is the correct answer.

IMAP keeps email on an email server by default

Explanation:

POP3 stands for Post office protocol version 3. It is the one way mailing protocol that works by downloading the copy of the emails to the device so that they could be viewed offline when needed. The mails are deleted from the server once they are downloaded.IMAP stands for Internet Message Access Protocol. Opposite to POP3, IMAP is the two way mailing protocol that donot download the entire content of the mail rather it downloads the headers only. The IMAP donot deletes the downloaded mails instead keep it one the server so that they could be used when ever needed.

I hope it will help you !

As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on the action from sources on the web, and displaying information on the action in the Excel Help task pane.

Answers

Answer:

Excel Help

Explanation:

Press F1 key to open the excel help window

Or you can also click the excel help button to launch the help window.

Type for whatever you are seeking help for and you will notice suggestions as you type something. These suggestions include online and offline results. If there are too many results then try searching offline it will narrow down the results.

After typing the text and hitting enter, the excel help returns several related topics on the searched query. You can browse through these topics and get help from excel.

How has the perception of the hacker changed over recent years? What is the profile of a hacker today?

Answers

Answer:

Hackers frequently spend long hours examining the types and structures of targeted systems because they must use guile, or fraud to bypass the controls placed on information owned by someone else.

Explanation

The perception of a hacker has evolved over the years.

The traditional hacker profile was a male, aged 14 to 18.76% of hackers are men whose ages are between 14 years (8%) to 50 (11%). The average age is 35 years (43%).A hacker is persevering, patient, creative, bright and having a passion for what he does.Hackers today can be expert or novices.The experts create the software and schemes to attack computer systems.While the novices merely use software created by the experts.

Hackers used to be viewed as people who would sit in a place and try to remotely gain access to a computer. This perception has changed because, hackers can work with people in an organization, suppliers, or may even write a program to do the hacking.

Who is a Hacker?

This is an individual or an organization who is very proficient with the use of the computer and who can use these skills to breach the cyber security of other individuals or organizations.

When a hacker does this to check the limitations and weaknesses of a cyber network so that it can be improved, it is called Ethical Hacking.

Learn more about Hackers at:

https://brainly.com/question/23294592

Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE") print = I like to code

Answers

Answer:

print("I like to code")

Explanation:

In the Programming Languages, print() function is used to print any string, display any output or both at the same time as well as we can print it one by one. We can also print addition, subtraction, multiplication and other problems directly without saving it in other objects or variables.

In the above statement, the correct method of printing any string is to write that string inside the parameter with a double-quote.

The second option is incorrect because in it double-quote is not used.

The third option is incorrect because the following sequence is not correct.

Answer:

answer is A, print ( "I like to code" )

Explanation:

Because I do coding.

Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?

Answers

Answer:

The Process Approach

Explanation:

The process approach attempts to codify organizational knowledge through formalized controls, processes, and technologies. Organizations adopting the process approach may implement explicit policies governing how knowledge is to be collected, stored, and disseminated throughout the organization. The process approach frequently involves the use of information technologies to enhance the quality and speed of knowledge creation and distribution in the organizations.

A network administrator is setting up a web server for a small advertising office and is concerned with data availability. The administrator wishes to implement disk fault tolerance using the minimum number of disks required. Which RAID level should the administrator choose>?

Answers

Answer:

RAID 1

Explanation:

RAID (Redundant Array of Inexpensive Disks or Drives, or Redundant Array of Independent Disks) is a data storage virtualisation technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

RAID 1

Disk mirroring, also known as RAID 1, is the replication of data to two or more disks. Disk mirroring is a good choice for applications that require high performance and high availability, such as transnational applications, email and operating systems. Disk mirroring also works with solid state drives so “drive monitoring” may be a better term for contemporary storage systems.

At the same time (and in the same area of Europe) that Johann Gutenberg invented moveable type, an unidentified artist called the Master of the Playing Cards created the earliest known __________.

Answers

Answer:

In the history of graphic design, Copperplate printing uses a polished plate on which design has been engraved. Johann Gutenberg invented the Master of Playing Cards, which is also known as Copperplate engraving.

Explanation:

Copperplate invented around 1450 in Johann Gutenberg's movable system. Cooper plates are used in the intaglio process, which is also known as the printing process. Thick ink is forced into the grooves.

Copperplate is a smooth plate that has been engraved. It is a block of the plate. In this engraving, design makes on a flat surface. It is a historically significant method in print and map-making. It is used for illustrations of books and magazines.

Types:

Different type of engraving are available such as

Etching, Rotary Engraving, and Laser Engraving.

Tools of engraving:

Dremel with built-in Li-ion battery

Proxxon with Trial Glass

Dremel Engraver

Generic Micro Engraver, etc

A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. (Hint: one word)

Answers

Answer:

Worm

Explanation:

This is what a worm does! It exploits small security holes in networks and computers.

Other Questions
The authors of the textbook advocate using the dialectic approach to understand intercultural relationships. The dialectic approach argues that who we choose to befriend is a result of both our individual preferences and the social, religious and political contexts surrounding the relationship.True/False Cherries on Top, a national ice cream shop, is struggling financially to keep up with the bigger chains. The top executives have decided to close all the stores in the Northeast and Texas, as that will give them an additional one million dollars to put into marketing. This executive is practicing theA. individual approach.B. utilitarian approach.C. moral-rights approach.D. justice approach.E. value system approach. Nick, a hotel general manager, has had great success using MBO. Vivian, his district manager, has found that Nicks employees are highly motivated. Because Nick _________, Vivian is able to discern that he is using MBO. Cici has a colorblind father. Her mother is not colorblind and does not carry a gene for color blindness. What are the chances that she will be colorblind? What equation can be used to find how many fluid ounces are in 4 cups. A sodium atom has a mass number of 23. Its atomic number is 11. How many electrons does a neutral sodium atom have? Lilth makes soap and lotion. It takes her 20 minutes to make a batch of soap and 35 minutes to make a batch of lotion. The cost of producing each batch are $5 for the soap and $15 for the lotion. Lilth has 20 hours available to make soap and lotion. The materials to make the soap and lotion must cost at most $325. The systems of linear inequalities represent this situation. 5x+15y is less than or equal to 325 20x+35y is less than or equal to 1200 what does the solution (53, 4) represent? In year 8, Mondo Magazines began selling one- and two-year subscriptions to its publications. Subscriptions are collected in advance and credited to sales. An analysis of the recorded sales activity revealed the following:____________ Eukaryotes that are not closely related and that do not share many anatomical similarities can still be placed together on the same phylogenetic tree by comparing their ______.A. homologous genes that are highly conservedB. homologous genes that are poorly conservedC. mitochondrial genomesD. plasmids what is 2 3/4 - 1/3 and how did you get that answer When you have a nice steak dinner at a local restaurant, literally thousands of people engage in actions that make your dinner possible. Identify at least 10 people who were involved in your steak dinner and briefly describe their role. 2. Janet baby-sat for 28 hours over two weeks. She earned $5.00 an hour. What was her grosspay? Los hijos de mis hijos son mis? The decibel level of an orchestra is 90 db, and the violin section achieves a level of 80 dB. How does the sound intensity from the full orchestra compare to that from the violin section alone? As people products and ideas diffused throughout North America there was NO impact on the many cultural levels of art and musicTrue False A coffee shop offers 2 types of coffee: regular and decaffeinated; 3 typesof flavoring: vanilla, hazelnut, and caramel; and 2 choices of topping: withor without whipped cream. How many possible choices are there?12 choices16 choices14 choices18 choices TV stations in the U.S. normally broadcast horizontally-polarized signals. Is this TV antenna mounted correctly, or should it be rotated? Which statements best describe the process of radioactive decay? Check all that apply. Solid silver chloride, AgCI(s), decomposes to its elements when exposed to sunlight Write a balanced equation for this reaction with correct formulas for the products. What is the coefficient in front of AgCI(s) when the equation is properly balanced? 01 03 02 04 The field of ____ gives us information about how the four developmental forces interact with each other.