a data tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. is a language associated with a database management system that end users and programmers use to manipulate data in the database.

Answers

Answer 1

Text mining tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Here's the complete question:

__________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

- OLAP

- Text Mining

- Web mining

- Web content mining

What is Text mining?

Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

Learn more on Text mining from:

https://brainly.com/question/25578967?referrer=searchResults

#SPJ4


Related Questions

after taking over from a departed systems administrator, you find the directory and some files in it that cannot be deleted, no matter what the permissions you set on them with the chmod command. which command will you use to discover the problem?

Answers

To assist you in solving the issue, this command displays the permissions of each file in the directory. The group permissions on the directory are probably set wrongly.

When examining a script that runs successfully from the user's home directory but not from any other location, a relative path is being used. The file has more links than one. The file and another file have the same inode number. The file and another file have the same data. The ls command lists the working directory's contents by default (i.e. the directory you are in). Using the pwd command, you can always determine which directory you are in.

Learn more about command here-

https://brainly.com/question/14583083

#SPJ4

Question 5: Which category best represents: a student has a friend who's
parent is a teacher at their school. The student uses his friend to obtain the
teachers username and password. Grades end up getting changed in the
digital grading system and it is soon discovered that the teacher also has the
same password in their family's online banking system.
A. illegal file sharing
B. software pirating
C. cyber bullying
D. identity theft
E. it's just not right or responsible.

Answers

Answer:

E

Explanation:

it's not right and it is also irresponsible and the teacher shouldn't have used that as her bank details and also that student's mother is Bankrupt by now

in the stage of the application development life cycle, the deliverable is a set of user requirements. a. systems analysis b. programming c. systems design d. prototyping

Answers

The correct option is C system design. Developing stakeholder expectations, technical requirements, logical decompositions, and design solutions are the four phases that go into system design.

Systems design is the process of defining a system's components, including modules, architecture, components, their interfaces, and data, depending on the requirements that have been given. A methodical approach to developing and engineering systems is necessary for system design. we must consider every aspect of an infrastructure when creating a strong system design, from the hardware and software to the data and the way it is kept. Allocating a large system's requirements to hardware and software components is the aim of system design. After the system requirements study is finished, the system design activity begins.

Learn more about Requirements here-

https://brainly.com/question/2929431

#SPJ4

you need to create a user account via the useradd utility. after checking this distribution's account creation configuration files, you discover that the home directive points to a different location than desired. which useradd option will allow you to create the home in an alternative location?

Answers

The useradd option that will allow you to create the home in an alternative location when creating a user account via the useradd utility is -d

What is the useradd command?

The useradd command is the most basic method through which you can add a user on a Linux OS. In a useradd command, there are so many options to choose from when adding or creating a new user account. They include: -d, -r -u -G jellyfin etc.  

Learn more on Useradd command from:

https://brainly.com/question/28635202?referrer=searchResults

#SPJ4

ry seven years, your company provides a 6-week sabbatical for every employee. vera edwards (vedwards), corey flynn (cflynn), and bhumika kahn (bkahn) are leaving today, while maggie brown (mbrown), brenda cassini (bcassini), and arturo espinoza (aespinoza) are just returning. the company security policy mandates that user accounts for employees gone for longer than two weeks be disabled. in this lab, your task is to complete the following: lock the following user accounts: vedwards cflynn bkahn unlock the following user accounts: mbrown bcassini aespinoza when you're finished, view the /etc/shadow file to verify the changes.

Answers

Since the company security policy mandates that user accounts for employees gone for longer than two weeks be disabled, the task function are:

Type:

usermod -l vedwards

usermod -l cflynn

usermod -l bkhan

usermod -u mbrown

usermod -u bcassini

usermod -u aespinoza

What language is used for programming computers?

Python as well as JavaScript are more frequently used in web-based startups. Larger businesses typically use PHP to create their web applications and C# or Java to create their internal software applications.

Programming languages like R and MATLAB are frequently used in data analytics programs. Both languages are widely used in programming and computer science due to the fact that C and C++ programmers have access to compilers for a wide range of platforms, the portability of the applications they create is generally high. C and C++ are regarded as high-performance programming languages.

Therefore, A programming language is a notational scheme used to create computer programs. The majority of formal programming languages are text-based, though they can also be graphical.

Learn more about Programming from

https://brainly.com/question/16936315
#SPJ1

See full question below

Every seven years, your company provides a 6 week sabbatical for every employee. Vera Edwards (vedwards), Corey Flynn (cflynn), and Bhumika Kahn (bkahn) are leaving today, while Maggie Brown (mbrown), Brenda Cassini (bcassini), and Arturo Espinoza (aespinoza) are just returning.

The company security policy mandates that user accounts for employees gone for longer than two weeks be disabled.

Task:

-Lock (disable) the following user accounts:

vedwards

cflynn

bkahn

-Unlock (enable) the following user accounts:

mbrown

bcassini

aespinoza

are those data that visitors and customers produce when they visit a website and click on hyperlinks. group of answer choices cookies erp clickstream data rfid

Answers

Clickstream data  are those data that visitors and customers produce when they visit a website and click on hyperlinks.

What is a clickstream data analysis?

A clickstream is a record of information about mouse or touchpad clicks made by website visitors on computer screens. This kind of data offers a visible record of user behavior together with thorough feedback. 24

Note that the tracking and analysis of website visits is known as clickstream analysis and is a type of web analytics (see separate article). Clickstream analysis commonly uses the Web server log files to monitor and measure website activity, while there are different ways to gather this data.

Hence, option C is correct.

Learn more about Clickstream data from
https://brainly.com/question/28334815

#SPJ1

See full question below

_____ are those data that visitors and customers produce when they visit a website and click on hyperlinks.

1. ERP

2. Cookies

3. Clickstream data

4. RFID

The distance from the Earth to the Moon is an example of _____.
A. misinformation
B. the unknowable
C. a biased opinion
D. an easily verifiable fact

Answers

Answer: D. an easily verifiable fact

Explanation: Because scientists have calculated that and have used those calculations to make the moon landings possible.

modify the program in listing 2.15.2 so that it prompts the user to enter an entire line, reads the line, then echoes the entire line. read only one byte at a time from the keyboard.

Answers

The reply is a categorical no if this is a datagram socket (UDP). You will obliterate crucial data if you read even one byte from a datagram socket. The read sizes should (at the very least) match the send sizes.

If this is a steam socket (TCP), reading a byte at a time has no negative semantic effects. Either way, the outcome will be accurate. This is not to argue that it is a wise decision. Every call to read necessitates entering kernel mode and carrying out numerous tasks. Whether you are recovering one byte or lots, they are both expensive. Therefore, it is strongly advised that you always perform greater reads in terms of performance.

Learn more about datagram here-

https://brainly.com/question/15518389

#SPJ4

When troubleshooting, which of the following should be the very first step?

A.
find the root cause

B.
identify the problem

C.
verify

D.
make and execute a plan

Answers

Answer:

B. identify the problem

Answer:

B. Identify the problem

The Boolean operator NOT _____ terms from a search query.
A. eliminates
B. isolates
C. standardizes
D. includes

Answers

Answer:

eliminates

Use NOT in a search to: eliminate words from your search.

A ______ is a block of code that can be run by calling it by name

Answers

Answer:

Function

Explanation:

A function is a name or command that is used in code to run or complete a task.

A function is a block of code that can be run by calling it by name.

Why functions are essential in coding?

Functions are essential in coding because they enable the user to decompose a problem or concern into smaller fragments. Each of these fragments is able to perform a particular task. They authorize an identical fragment of code to run multiple times.

According to the context of this question, functions are considered one of the most essential parts of programming languages. They are significantly reusable fragments of code that can be organized in order to perform a single task which eases the work of a programmer.

Each and every function has a function name. The function is significantly utilized within the program in order to facilitate a particular task.

Therefore, a function is a block of code that can be run by calling it by name.

To learn more about Functions in programming, refer to the link:

https://brainly.com/question/20476366

#SPJ2

listen to exam instructions consider the following ipv6 address: fd01:0001:0001:005::7/64 drag the component parts of this address on the left to the corresponding descriptions on the right. not all descriptions on the right have corresponding components on the left. drag drop global routing prefix subnet id interface id prefix length global id unique local unicast prefix

Answers

The corresponding components on the left are:

Global Routing Prefix:

Subnet ID - FD01:0001:0001:005

Interface ID-  ::7

Prefix Length - /64

Global ID - 01:0001:0001

Unique Local Unicast Prefi - FD

What is IPv6 used for?

Since we've used up the 4.3 billion IPv4-created TCP/IP address identifiers, IPv6's main purpose is to enable the creation of additional. This is one of the primary factors making IPv6 such a significant advancement for the Internet of Things (IoT).

Therefore, an IPv6 address is made up of eight fields, each of which is 16 bits long and is delimited by the use of a colon. In contrast to IPv4 addresses, which use the dotted-decimal syntax, each field must include a hexadecimal value.

Learn more about Ipv6 address from

https://brainly.com/question/5296366
#SPJ1

to display the function arguments dialog box, click the tab, click the button in the function library group, and then click if at the drop-down list.

Answers

Click the Formulas tab, select the Logical button under the Function Library group, and then select it from the drop-down list to open the Function Arguments dialog box.

Displayed is the Function Arguments dialog box. Depending on the quantity and kind of parameters needed for the selected function, this dialog will direct you through entering the arguments. The function is placed directly into the Rules Editor when one of the functions does not require parameters. Information supplied into a function can be referred to as either an argument or a parameter. From the perspective of a function: A parameter is a variable that is specified in the function definition between parentheses. When a function is called, a value is passed as an argument. Python supports default values for function parameters. By utilizing the assignment operator, we can provide an argument a default value.

Learn more about Function here:

https://brainly.com/question/17448971

#SPJ4

What symbol is used to show the path relative to the folder that a file is in?

A.
.

B.
/

C.
_

D.

Answers

Answer:

B. /

Explanation:

If you look at the long bar just to the right of the search bar in your Windows Explorer, there is a long text. That text is called the file path. You'll also notice that they are separated with slashes to show the order at which each of the files come after each other. There you have it.

a list of employees that has been sorted in descending order needs to be reversed. which xxx completes the algorithm to sort the list in ascending order? ascendinglist(emplist, begin, end) { if (begin >

Answers

We can actually deduce here that the xxx that completes the algorithm to sort the list in ascending order is: AscendingList(empList, begin + 1, end - 1).

What is algorithm?

An algorithm is actually known to be a sequence of instructions that have been set in order to solve specific problems. Also, algorithm is actually used to perform computations.

In mathematics and computer science, algorithms are employed in calculations and processing of data.

Thus, we see that in the given question above, AscendingList(empList, begin + 1, end - 1) is the xxx that completes the algorithm to sort the list in ascending order.

Attached is the complete question.

Learn more about algorithm on https://brainly.com/question/24953880

#SPJ1

8: operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space. this disk location is called .

Answers

Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space. this disk location is called Virtual memory.

What is a virtual memory?

A Virtual memory is referred to as a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).

Learn more on Virtual memory from:

https://brainly.com/question/28562174

#SPJ4

What result would the search expression (insects AND bugs) –spiders give you in the Go.ogle search engine?
A. information about bugs and spiders
B. information about insects, bugs, and spiders
C. information about spiders
D. information about insects and bugs, without including spiders

Answers

Explanation:

information about insects, bugs, and spiders

use a loop invariant to prove that the following algorithm converts the positive binary integer, which is stored in the array b, to decimal. for example, the binary integer 10011, which is 19 in decimal, is stored as b[1]

Answers

A condition [among program variables] that is unavoidably true just before and just after each iteration of a loop is known as a loop invariant.

Key details that describe why code functions are captured by loop invariants. This means that you should add a comment that specifies the loop invariant whenever you create code in which the invariant is not immediately apparent. This makes the code easier to comprehend for other programmers and helps prevent future modifications from inadvertently breaking the invariant. When seen as an assertion that specifies significant relationships among the variables that must be true at the beginning of each iteration and when the loop closes, a loop invariant can aid in the design of iterative algorithms.

Learn more about Loop here-

https://brainly.com/question/14390367

#SPJ4

a user presents a smart card to gain access to a building. authentication is handled through integration to a windows server that's acting as a certificate authority on the network. review the security processes and conclude which are valid when using kerberos authentication. (select all that apply.)

Answers

When you Review the security processes and to conclude which are valid when using Kerberos authentication, the options that applies are option A and C:

A.) Inputting a correct PIN authorizes the smart card's crypto processor to use its private key to create a Ticket Granting Ticket (TGT) request.

C.) The Authentication Server (AS) trusts the user's certificate as it was issued by a local certification authority.

What is Kerberos authentication and how it works?

Kerberos is seen as a form of computer network security protocol that is known to often authenticates service requests that often exist between two or a lot of trusted hosts over a course of an untrusted network, such the internet.

Note that it is one that often authenticates client-server applications and confirms users' identities using secret-key cryptography and a reliable third party.

Hence, a computer network authentication protocol called Kerberos uses tickets as its foundation to enable nodes communicate over an insecure network to securely verify each other's identities.

Learn more about security processes from

https://brainly.com/question/15008697
#SPJ1

See full question below

A user presents a smart card to gain access to a building. Authentication is handled through integration to a Windows server that's acting as a certificate authority on the network. Review the security processes and conclude which are valid when using Kerberos authentication. (Select all that apply.)

A.) Inputting a correct PIN authorizes the smart card's cryptoprocessor to use its private key to create a Ticket Granting Ticket (TGT) request.

B.) The smart card generates a one-time use Ticket Granting Service (TGS) session key and certificate.

C.) The Authentication Server (AS) trusts the user's certificate as it was issued by a local certification authority.

D.) The Authentication Server (AS) is able to decrypt the request because it has a matching certificate.

Explain employment opportunities in the networking field 

Answers

These are some possible opportunities I don’t know how you want it explaining though Network and Computer Systems Administrator. ...
Computer and Information Systems Manager. ...
Computer Network Architect. ...
Computer Systems Analyst. ...
Computer Network Support Specialist.

46.5% complete question a hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwords in conjunction with multiple usernames. what specific type of password attack is the hacker most likely performing?

Answers

The specific type of password attack is the hacker most likely performing  Because brute force assaults are one of the most popular and straightforward ways for hackers to access accounts, they are widely used.

A possible birthday password The owner or boss will almost certainly use the same password, so there is an 80% chance that the hacker will use that password if they obtain the worker information. If they obtain your information, they could view your passwords and attempt to hack the company computer. This is because if the workers all share the same password because the company computer requires a common password, the hacker could simply use that password.

Learn more about Password here-

https://brainly.com/question/14580131

#SPJ4

an analyst working for a british school system just downloaded a dataset that was created in the united states. the numerical data is correct but it is formatted as u.s. dollars, and the analyst needs it to be in british pounds. what spreadsheet tool can help them select the right format?

Answers

Since the an analyst working for a British school system just downloaded a dataset that was created in the united states, the spreadsheet tool that can help them select the right format is  format as currency.

What is a spreadsheet  about?

A spreadsheet is seen as a kind  of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.

Note that Microsoft's Excel spreadsheet program is a part of the Office family of business software programs. Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Therefore, A decimal point (.) is used in the format of United States (U.S.) currency to distinguish between dollars and cents. In some nations, the distinction is denoted by a comma (,) rather than a decimal.

Learn more about spreadsheet tool from

https://brainly.com/question/26919847
#SPJ1

problem 11 number of needed usable hosts network address address class default subnet mask custom subnet mask total number of subnets total number of host addresses number of usable addresses number of bits borrowed 8,000 135.70.0.0 what is the 6th subnet range? what is the subnet number for the 7th subnet? what is the subnet broadcast address for the 3rd subnet? what are the assignable addresses for the 5th subnet?

Answers

510 host IP addresses are available, which is 512 minus 2. This would surely work for a network of 20 users today and 300 hosts in the future. With that knowledge, we can conclude that the network's most effective subnet mask is 255.255.254.0.

Total number of subnets: The value 248 (11111000) of the subnet mask 255.255.255.248 shows that 5 bits are utilized to identify the subnet. Simply raise 2 to the power of 5 (25) to determine the total number of subnets available. The answer is 32 subnets. The local broadcast address, which is only transmitted within the network, is represented by the number 255.255. By default, this broadcast data cannot pass across routers. It is a restricted broadcast address, in other words.

Learn more about Subnet here-

https://brainly.com/question/15055849

#SPJ4

identify the command that will output the first 15 lines in a log file called hostnames where the system writes in chronological order starting from the top of the file.

Answers

A host name, such as www.example.com, is used to identify a host, or website, on the Internet. Sometimes, host names are referred to as domain names.

IP addresses are mapped to host names, but there is no direct correspondence between a host name and an IP address. When a web client sends an HTTP request to a host, a host name is utilized. To begin, go to your Start Menu, select the search box, type cmd, and hit Enter. we should type ipconfig /all and push Enter to launch a window in black and white. Between the command ipconfig and the switch of /all, there is a space. An IPv4 address will be assigned to us.

Learn more about IP address here-

https://brainly.com/question/16011753

#SPJ4

e a function called isshortsweather. it should accept a single number argument, which we will call temperature(but you can name it whatever you want, of course). if temperature is greater than or equal to 75, return true. otherwise, return false

Answers

function isShortsWeather(temperature) {

   if (temperature < 75); {

       return false;

   }

   if (temperature >= 75) {

       return true;

   }

}

console.log(isShortsWeather(80)) //true

console.log(isShortsWeather(48)) //false

console.log(isShortsWeather(75)) //true

A function in Python is a collection of connected statements that work together to complete a given goal. Our program is divided into manageable, modular pieces with the aid of functions. Functions help our program stay orderly and manageable as it gets bigger and bigger. Additionally, it prevents repetition and makes the code adaptable. The Python interpreter has predefined the built-in functions for Python. 68 built-in Python functions are available. Depending on the needs of the user, these functions carry out a specific purpose and can be utilized in any software. In general, there are two categories of functions: User-defined functions are those that the user defines to carry out a particular task. Built-in functions: In Python, they are already defined functions.

Learn more about Function here:

https://brainly.com/question/17448971

#SPJ4

What database term was used to describe a single consolidated worksheet composed of values retrieved from multiple worksheets using excel vloookup that was created with the goal of improving the visibility of key information used in decision making?.

Answers

The database term was used to describe a single consolidated worksheet composed of values retrieved from multiple worksheets using excel vlookup that was created with the goal of improving the visibility of key information used in decision making is VLOOKUP.

What is VLOOKUP?

Vertical lookup is referred to as VLOOKUP. This is the process of using a spreadsheet's lookup function to search for data vertically across the entire sheet in Excel.

Vertical Lookup is referred to as VLOOKUP. VLOOKUP is a built-in Excel function that, as its name implies, enables you to find a specific number by looking for it vertically across the page. Although VLOOKUP in Excel may seem difficult, you will learn how to use it.

Therefore, When you need to search by row in a table or a range, use VLOOKUP. For instance, you could use the part number to check the cost of an automobile part or the employee ID to seek for a person's name.

Learn more about vlookup from

https://brainly.com/question/14042837
#SPJ1

what is mini computer

Answers

computer that was smaller, less expensive, and less powerful than a mainframe or supercomputer but more expensive and more powerful than a personal computer

in order to identify the transmissions that belong to each vlan, a switch will add a tag to ethernet frames that identifies the port through which they arrive at the switch.

Answers

True, In order to identify the transmissions that belong to each vlan, a switch will add a tag to ethernet frames that identifies the port through which they arrive at the switch.

Here's the complete question:

In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the VLAN through which they arrive at the switch.

True or False?

The method of identifying packets or transmission that belongs to each VLAN or travelling through links is known as Frame Tagging or VLAN Tagging. This method was developed by CISCO.

Learn more on Frame Tagging from:

https://brainly.com/question/14137985?referrer=searchResults

#SPJ4

Think of all the activities you do in a day that involve electrical energy. Use this sheet to make a list of 5-8 activities. Describe how electrical energy is used in each case. When you are done, consider which ones you might be able to do without to save electricity. Activity Description of how electrical energy is used

Answers

Some everyday activities that involve electricity can be:

TelevisionCellphoneComputerAir conditioningHair dryerHow is electrical energy used in daily activities?

Let's go into more detail about the use of electricity in each case identified in the list above. The TV, for example, works by converting electrical energy into sound and light energy, in addition to thermal energy as some components of the device are heated.

Cell phone batteries use chemical energy that is transformed into electrical energy to recharge the devices. In the computer, there is a transformer that converts the electrical energy and distributes it to the components of the machine.

The air conditioner also works as a transformer that uses the ambient air temperature and transforms it into cold air using refrigerant gas. In the hair dryer, there is a conductor that transforms electrical energy into heat.

Therefore, electrical energy is present in the lives of individuals in daily activities, being essential for work, health and human well-being.

Find out more about electrical energy here:

https://brainly.com/question/60890

#SPJ1

How are classified the network classes?, and write and IP number valid in each network class.

Answers

The network classes are classified into A, B and C and each one has a different number of characters for the IP number.

What are class A networks?

Class A networks are a type of network that is characterized by using the first 8 bits (characters) of the IP address as the network part and the remaining 24 bits as the host part.

What are class B networks?

Class B networks are a type of network that is characterized by using the first 16 bits as the network part and the remaining 16 bits as the host part.

What are class C networks?

Class C networks are a type of network that is characterized by using the first 24 bits (characters) as part of the network and the remaining 8 bits as part of the host.

Examples of network classes:Class A: 1.1.1.1Class B: 128.1.1.1Class C: 192.1.11.

Learn more about IP number in: https://brainly.com/question/20377104

#SPJ1

Other Questions
Describe one of the strongest literary images (not a picture or drawing from the reading) you encountered from any of the following literature: from Of Wolves and Men by Barry Holstun Lopez "Birches" by Robert Frost "Haiku" by Kaga no Chiyo "Haiku" by Basho "Spring is like a perhaps hand" by E.E. Cu*mings from An Inconvenient Truth by Al Gore "The Deadliest Tsunami in History?" by National Geographic News "Orphans Give Indian Couple Will to Live; 2004 Tsunami Killed Their Son, Two Daughters" by Shaikh Azizur Rahman "Wave" by Dale WiselyWhy is this image menorable? How does the author use vivid desciptive details to help the reader visualise what is being described? How does this image contribute to the main idea os the text? Please use specific details from the text to support your answer. Paulette, quentin, and rosie each donated money to a charity. Paulette gave as much money as quentin and rosie gave together. If quentin had given three times more than he gave, he would have given $40 more than paulette. And if rosie had given $20 less, she would have given half as much as paulette. How much did paulette give?. What is 84,787 in expanded form? Good question for compound 3.5-8.6 Answer to the 2nd decimal places According to the Declaration of Independence, a government shouldA.protect the rights and liberties of its citizens.B.define what rights a citizen can have.C.function without consent of the governed.D.promote a strong monarchy to lead citizens. How did the Mayflower Compact influence the development of the Massachusetts Bay Colony? Find b A 16B 23C 92D76 Why did crusading knights from Europe pillage (attack) Constantinople during the Fourth Crusade?hatred for Muslimstensions from the Great Schismjealousy of Constantinople's economic successopportunity for land Multiply using the FOIL method.(8z + 7)(9z-1) VI.Change the sentences below to active voice. 1. The offer will be accepted by her.2.Homework pad being finished by Jay.3.They were helped by me.4. Five poems have been written by me.5. The volcano was watched by the people6. Lena was ignored by the girls.Whi asnwer this all i will make brainlest What is soil pollution?A. Pollutants of any kind that end up in the soil andaffect plants' ability to grow.B. Pollutants that end up in the air from plants inpolluted soil.C. Pollutants in the soil that evaporate into the air.D. Pollutants that come out of soil into water. Exercise 5. Complete the text with on, in, by or at. Last year 1 Easter I went to England for a short holiday. I arrived in London 2 Friday 3 11 oclock 4 the evening. I went to my hotel by taxi, which got me there in about an hour. I was so tired by then that I went straight to bed. When I woke up 5 the morning I remembered that I had made an appointment to meet a friend 6 10:30. I thought I could never get ready 7 time, but in the end I had reached the cafe 8 10.15. My friend arrived 9 time. 10 1 o'clock we went to a restaurant for lunch and 11 afternoon we went to a museum simplify the equation if a=3. b=-1 and c=54a+6-ac+b Write an equation in slope-intercept form for the line with slope -4/3 and y-intercept 3I got that but Im not sure if its right. pdf a ball thrown vertically upward continues upward until it reaches a certain position, and then falls downward. the ball's velocity is instantaneously zero at that highest point. is the ball accelerating at that point. describe an experiment to prove or disprove your answer. jack is considering adding toys to his general store. he estimates the cost of toy inventory will be $4,200. the remodeling and shelving costs are estimated at $1,500. toy sales are expected to produce net annual cash inflows of $1,200, $1,500, $1,600, and $1,750 over the next four years, respectively. should jack add toys to his merchandise if he requires a three-year payback period? why or why not? multiple choice yes; because the payback period is 2.94 years yes; because the payback period is 2.02 years yes; because the payback period is 3.80 years no; because the payback period is 2.02 years no; because the payback period is 3.80 years Pls help me all u have to do is tell me what is wrong in the cell that is causing this to happen Ostriches are mostly active during the day, so they should be classified as__________.A)crepuscularB)perennialC)diurnalD)nocturnalE)biurnal A geologist determines that a rock is approximately 123,000,000 years old. Which of the following is the correct way to express the number in scientific notation?