chemical reaction to metal​

Answers

Answer 1

Answer:

Metals can react with water, acid and oxygen. The reactivity of the metal determines which reactions the metal participates in.

Explanation:

In general, acids react with metals to give salt and release hydrogen gas. In general, bases do not react with metals and release hydrogen gas.When metals react with other substances, the metal atoms lose electrons to form positive ions .


Related Questions

Here is source code of the Python Program to multiply all the items in a dictionary. The program output is also shown below.d={'A':10,'B':10,'C':239}tot=1for i in d: tot=tot*d[i]print(tot)

Answers

Answer:

Following are the output to this question:

Output:

23900

please find the code in the attachment file.

Explanation:

In the above-given Python code, a dictionary "d" is defined, that holds key and values, in the next step, the "tot" an integer variable is defined, that holds a value "1".

In the next step, for loop is defined, that uses the "tot" variable to multiply the dictionary value and store its value.

Outside the loop, the print method is used, that prints its values.  

What happens when convergence on a routed network occurs?

Answers

Answer:

Convergence. When a change occurs in your network topology, routing tables have to be updated. Each router will send out the contents of its routing tables to other routers. This exchange of information will happen until all routers have updated their routing tables to reflect to new network topology.

1.1.5 practice: analyzing business culture

a. Recall what you have learned about positive culture and business practices in this lesson. With an

understanding that some things must change with company X, discuss ways in which Company X can

still focus on making changes but also focus on keeping positive culture practices while these changes

are being made. (1 point)

Answers

Answer:

 

A positive culture is an advantage when changes need to be made in the company. Making organisational changes and maintaining a positive culture a mutually complementary rather than mutually exclusive.

In a positive culture environment, people are happy and feel valued. When people feel happy and valued, it makes it easy for management to garner their buy-in cooperation when changes need to be made within the business.

In a culture that is negative, people don't feel valued and as such are always after their own interest rather than that of the company. There is also a tendency to always be on the defensive side of any change that is about to come looking out for one's self rather than what is best for the collective good. In this case, staff are much likely to sabotage new initiatives and changes rather than work to actuate them.

The obverse is true for a business with a positive culture.

Cheers!

Which of the following can indicate what careers will be enjoyable ?

Answers

Answer: c. Interests

Explanation:

A person's interests are things that they love to do because they find those things to be enjoyable for example, gaming, writing or travelling.

To find out what careers a person would find enjoyable therefore, the interests can be looked at because if the person enjoy doing those things without it even being a job then they would probably enjoy those things in a career setting as well. For instance a person who enjoys writing would probably find a career in jornalism to be enjoyable.

What are some of the shortcomings of antivirus software today?

Answers

Answer:

The answer is below

Explanation:

There are various shortcomings of antivirus software today, some of which are:

1.  Endless Upgrade system: today's antivirus requires users to upgrade every now and then,

2.  Excessive Ads: there are too much and unnecessary advertisements on the software

3.  It takes a longer time to perform scans.

4.  Some antivirus shares users' computer usage data online, which can be considered as an invasion of privacy.

5.  Some lack superior scanning operation.

HELP AS SOON AS YOU CAN!!! what word best describes an appropriate study area?​

Answers

Answer:

Quiet

Explanation:

Really anywhere thats quiet you can just sit down and study. For example a library

What is the purpose of testing a program with sample data or input?

Answers

Answer:

testing to make sure that the program is functioning as intended

Explanation:

Sample Data, Test Data, or Inputs are all used with the main purpose of testing to make sure that the program is functioning as intended. The "sample data" needs to provide a very specific output value when inserted into the program. This output value is already known beforehand, therefore if the program outputs the correct "expected" value then the program is functioning correctly.

Which of the following is true of public methods?
A) They can only be accessed by methods in the same package
B) They can only be accessed by methods in the same class
C) They can only be accessed by methods in a different package
D) They can be accessed by any method in the same program

Answers

Answer:

D) They can be accessed by any method in the same program

Explanation:

Public methods is a form of access modifier in a programming language such as Java, Phython, C#. However, unlike other types of access modifiers like Private Methods, Protected Methods etc they do not put any form of restriction on the access. Hence, in Public Methods members, methods and classes can be accessed from anywhere.

Therefore, what is true of Public Methods is that, they can be accessed by any method in the same program

In multi-level inheritance one class inherits how many classes?

Answers

Answer:

Only one class

Explanation:

The classes will inherit only from one class. This will continue as each class inherits only one class. There should not be any class that inherits from two or more classes or which have more than one subclass.

How to find the largest number in an array java?

Answers

Answer:

One of the ways is to sort the array, then print the last element of the sorted array.

In Java, you can make use of the following code

import java.util.Scanner;

public class Assignment{

public static void main(String [] args)

{

int n;

Scanner input = new Scanner(System.in);

System.out.print("Array Length: ");

n = input.nextInt();

int [] myarray = new int[n];

System.out.print("Input Array: ");

for(int i=0;i<n;i++)

{

           myarray[i]=input.nextInt();

}

int temp;  

for (int i = 0; i < n; i++)  

       {  

           for (int j = i + 1; j < n; j++)  

           {  

               if (myarray[i] > myarray[j])  

               {  

                   temp = myarray[i];  

                   myarray[i] = myarray[j];  

                   myarray[j] = temp;  

               }  

           }  

       }  

           System.out.println(myarray[n - 1]);

       }

}

Explanation:

This line declares n as length of array

int n;

Scanner input = new Scanner(System.in);

This line prompts user length of array

System.out.print("Array Length: ");

This line gets the user input

n = input.nextInt();

An empty array pf length arrowed

int [] myarray = new int[n];

This line prompts user array elements

System.out.print("Input Array: ");

The following iteration gets array element from user

for(int i=0;i<n;i++)

{

           myarray[i]=input.nextInt();

}

This line declares a temporary variable temp

int temp;

This iterations iterates through the elements of rge array

for (int i = 0; i < n; i++)  

       {  

           for (int j = i + 1; j < n; j++)  

           {  

The following if condition checks for the larger of two variables and swap their position

               if (myarray[i] > myarray[j])  

               {  

                   temp = myarray[i];  

                   myarray[i] = myarray[j];  

                   myarray[j] = temp;  

               }  

           }  

       }  

This line prints the largest number of the array

           System.out.println(myarray[n - 1]);

Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his presentation with the class he is trying to connect a cable from his computer to the larger video output screen but Sanjay his hands are shaking so badly from nerves that he is having trouble plug in the cable until what part of his computer the port the disk drive the cabling the hard disk Drive

Answers

I think that would be the (HDD) Hard Disk Drive! Hope this helps!

which of these outcomes become more likely for someone with strong personal finance skills

Answers

Answer:

give me the outcomes

Explanation:

be a banker if thats your skill

Why would an administrator want to use the MAP Toolkit? Which tasks, other than the ones performed in this exercise, can administrators use the MAP TOOLKIT TO PERFORM?

Answers

Answer:

The MAP TOOLKIT is used to inventory the Microsoft computer devices in a network to check its readiness for upgrade and for mapping the utilisation of computer servers.

Explanation:

The Microsoft Assessment and Planning toolkit plays a vital role in the work of an IT administrator as it is automatic in inventory the users, devices and applications used in a computer network. It creates a mysql database as a default setup and is used to locate and upgrade servers in a network by analysing it's utilisation in the network.

How to chnage email adresss on slate from tophat?

Answers

Answer:

First visit the Tophat website on https://tophatblue.com.

To access and manage your Slate account on Slate:

Log in to the server with your username and password. Click your profile picture or your initials and select My Account and then select Profile.

Under the profile, you will see the following profile information: You can verify and edit them.

- Name

- Username

- Email

- Set a new password

To verify or edit your email address, click Email.

Upon verification of your email by the Slate server, a check appears alongside it.

Should you need another verification email, select the Verify email option.

In real-world environments, risks and their direct consequences will most likely span across several domains. However, you selected only the domain that would be most affected. What was the primary domain impacted by the risk, threat, and vulnerability?

Answers

Answer: LAN to WAN domain

Explanation:

The following are the common threats to LAN to WAN domain:

Unauthorized port scanning.

Unauthorized probing.

The vulnerability of operating system, internet protocol, router, and firewall.

Vulnerable to malicious attacks.

Vulnerable to denial of service attack.

Vulnerable to network trafficking.

Vulnerable to theft of information and data.

Remote data gets compromised.

explain the evolution of computers​

Answers

Answer:

vintage computers

Computers have changed drastically since the 1930s. AP

From the 1930s to today, the computer has changed dramatically.

The first modern computer was created in the 1930s and was called the Z1, which was followed by large machinery that took up entire rooms.

In the '60s, computers evolved from professional use to personal use, as the first personal computer was introduced to the public.

In the 1980s, Apple introduced its first computer, the Macintosh, and has dominated the computer industry ever since with laptops and tablets.

Visit Insider's homepage for more stories.

Although computers seem like a relatively modern invention, computing dates back to the early 1800s.

Throughout computing history, there has not been a lone inventor or a single first computer. The invention of the computer was incremental, with dozens of scientists and mathematicians building on their predecessors. The modern computer, however, can be traced back to the 1930s.

The 1930s marked the beginning of calculating machines, which were considered the first programmable computers.

computer in the 1930s

A calculating machine in the 1930s. AP

Konrad Zuse created what became known as the first programmable computer, the Z1, in 1936 in his parent's living room in Berlin. He assembled metal plates, pins, and old film, creating a machine that could easily add and subtract. Although his early models were destroyed in World War II, Zuse is credited with creating the first digital computer.

In the 1940s, computers took up entire rooms, like the ENIAC, which was once called a "mathematical robot."

computer room vintage

A computer room. AP

John Mauchly created the ENIAC during World War II to help the Army with ballistics analytics. The machine could calculate thousands of problems each second. The large-scale ENIAC weighed 30 tons and needed a 1,500-square-foot room to house the 40 cabinets, 6,000 switches, and 18,000 vacuum tubes that comprise the machine.

Some call this invention the beginning of the computer age.

In the 1950s, computers were strictly used for scientific and engineering research, like the JOHNNIAC, which was once described as a "helpful assistant" for mathematicians.

A man working at a computer in the '50s. AP

The JOHNNIAC was completed in 1954 and was used by RAND researchers. The massive machine weighed just over two tons with over 5,000 vacuum tubes. This early computer operated for 13 years or 51,349 hours before being dismantled.

In the 1960s, everything changed when the Programma 101 became the first desktop computer sold to the average consumer.

Programma 101. Pierce Fuller/ Wikimedia Commons

Up until 1965, computers were reserved for mathematicians and engineers in a lab setting. The Programma 101 changed everything, by offering the general public a desktop computer that anyone could use. The 65-pound machine was the size of a typewriter and had 37 keys and a printer built-in.

The Italian invention ushered in the idea of the personal computer that would last to this day.

As personal computers became popular in the 1970s, the Xerox Alto helped pave the way for Steve Jobs' Apple.

Xerox Alto. Francisco Antunes/ Flickr

The Xerox Alto was created in the '70s as a personal computer that could print documents and send emails. What was most notable about the computer was its design, which included a mouse, keyboard, and screen. This state-of-the-art design would later influence Apple designs in the following decade.

The Alto computers were also designed to be kid-friendly so that everyone — no matter the age — could operate a personal computer.

In the '80s, Apple's Macintosh was described as a game-changer for the computer industry.

The Macintosh. Raneko/ Flickr

When Steve Jobs introduced the first Macintosh computer in 1984, Consumer Reports called it a "dazzling display of technical wizardry." Like the Xerox Alto, the Macintosh had a keyboard, a mouse, and a small 9-inch screen. The computer — which weighed in at 22 pounds and cost $2,495 — was applauded for its interface of windows and icons.

this is very long chapter cannot be type here so please watch video regarding this or search it in Google. I would have definitely helped you but it is not possible to type and help you , it is so long chapter that it might consume 15 to 25 pages to explain it .

Don't think and take my suggestion negatively. I am really sorry.

During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement actions used?

Answers

Hello. This question is incomplete. The full question is:

During the Inspect and Adapt event, how are a reflection, data collection, problem-solving, and identification of improvement actions used?

a. To help the team bond and work more efficiently together

b. To enhance and improve the innovation and planning processes

c. To evalutate better implementation steps

d. To increase the quality and reliability of the next PI

Answer:

d. To increase the quality and reliability of the next PI

Explanation:

During the event Inspect and adapt, reflection, data collection, problem solving and identification of improvement actions are used to increase the quality and reliability of the next IP. This allows the organization and establishment of a high quality IP with considerable efficiency that will allow a good functioning of the system and the optimization of its reliability, because it allows possible problems to be located and resolved quickly, leaving the exit free and functional.

Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a border to her report. First, Angelina navigates to the Design tab and then to the

Answers

Answer:

✅ Page background

✅ Page Borders

✅ Color

Explanation:

EDGE 2022

First, Angelina should navigate to the Design tab of the Word document and then to the Page background.

What is Microsoft Word?

Microsoft Word refers to a word-processing software application that is designed and developed by Microsoft Inc., so as to avail its end users an ability to type, format, adjust and save text-based documents.

In this scenario, Angelina can adjust the presentation of her Word document as follows:

Angelina should first, navigate to the Design tab of the Word document and then to the Page background.Next, she should click on the Page Borders.Finally, she should choose the style, width, and color of the border.

Read more on Microsoft Word here: https://brainly.com/question/25813601

#SPJ2

What are the four principal services provided by S/MIME?

Answers

Answer:

Explanation:

Secure/Multipurpose Internet Mail Extensions, is a technology that permits you to encrypt your emails. S/MIME is based on asymmetric cryptography to protect your emails from unauthorized access. It also allows you to digitally sign your emails to verify you as the legitimate sender of the message, making it an effective weapon against many phishing attacks.

The four principal services presented by S/mime includes ;

Authentication, Non-repudiation of origin utilizing digital signatures, Message Integrity and message Privacy.

Principles act as a guard in any system. The four principal services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy.

S/MIME are known to carry out cryptographic security services for electronic messaging applications. Their functions includes;

Authentication. Message integrity. Non-repudiation of origin (using digital signatures) Privacy etc.

They make sure that an email message is sent by an authentic sender and gives encryption for incoming and outgoing messages.

Learn more from

https://brainly.com/question/14316095

What file format can excel save files as

Answers

Answer:

.xlxs

but it supports pretty much any spreadsheet format.

Compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.

Answers

Answer: D

The Ruined Man Who Became Rich Again Through a Dream

An adaptation of a story from 1,001 Arabian Nights

Once there lived in the city of Chongqing a very wealthy man who lost all his belongings and his treasures and became very poor. He was so poor that he could only earn his living by laboring day and night. One night, extremely late, he lay down to rest. He was exhausted, dejected, and sick at heart. He fell into a deep sleep and dreamt that a wise old soul came to him and said, "Your fortune is in the city of Beijing; go there and seek it."

The next day, he set out for Beijing. He arrived there deep into the night and he lay down to sleep for a bit in a hostel. Presently, as fate would have it, a company of thieves entered the hostel. They made their way into the house that adjoined the hostel. Soon, the people of the house, aroused by the noise, awoke and cried out, "thieves, thieves!" An alarm was raised and the chief of the police came to their aid with his officers. The robbers made off; but the police entered the hostel and found the man from Chongqing asleep there. They cast him into prison, where they kept him for three days. The chief of police sent for him and said, "Where did you come from?"

"From Chongqing," whispered the man.

"And what brought you to Beijing?" asked the chief.

"I saw in a dream an old soul who said to me, 'Thy fortune is at Beijing; go there at once to find it.' But, when I came here, the fortune that I was promised proved to be an arrest and a jail stay."

The chief of the police laughed until he showed his white, wide, broad teeth. He said to the man from Chongqing, "O man of little wit! Three times have I seen an old soul in a dream who said to me, 'There is a fashionable house in Chongqing, with a fountain in the front garden. Under the fountain there is buried treasure— a great sum of money. Go there and take it.' Of course I did not go. You, on the other hand, you of little wit, have journeyed from place to place, on the faith of a dream, which was but an illusion of sleep."

Then the chief of police gave the man from Chongqing money, saying, "This is to help you get back to your native land."

Now, the house that the chief described was the man's very own house in Chongqing! When he traveled home, he immediately dug underneath the fountain in his garden and discovered a great treasure! He received an abundant fortune in his own yard!

Which of these events from the story best shows the conflict?

The next day, he set out for Beijing.

Soon, the people of the house, aroused by the noise, awoke and cried out, "thieves, thieves!"

The robbers made off; but the police entered the hostel and found the man from Chongqing asleep there.

The chief of the police laughed until he showed his white, wide, broad teeth.Explanation:

Answer:

Explanation:

A way of making a tree diagram is through the use of fundamental counting principle.A fundamental counting principle is a much easier way of finding the possible outcomes in a sample space.The two ways has the same outcome.The difference is that it’s easier to find the possible outcomes in a sample space using the fundamental counting principle compared to the tree diagram.

Assume for arithmetic, load/store and branch instructions a process has CPIs of 1.3, 14.9 and 5.4. On 1 processor the program will require 3*10^9 arithmetic instructions, 1.6*10^9 load/store instructions and 2*10^6 branch instructions. Assume that the processor has a 7GHz clock frequency. Assume that, as the program is parallelized to run over multiple cores, the number of arithmetic and load/store instructions per processor is divided by 0.7 x p (where p is the number of processors) but the number of branch instructions per processor remains the same. If there are 6 processors, what's the total execution time in milliseconds (you'll need to multiply your answer by 1000) (Your answer should a WHOLE NUMBER round up from 0.5, round down otherwise)

Answers

Answer:

the answer is the middle of a butt whole

Explanation:

definition of asymptotic analysis

Answers

asymptotic analysis is a method of describing limiting behavior. hope this helps!

Write a c ++ program that reads unknown number of integers from the user and stores them into a vector. The user will indicate the end of numbers by entering a 0. The program should then print out these numbers in reverse order.

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

int main() {

vector<int> numberlist;

int number;

while (1) {

 cout << "Enter a number: ";

 cin >> number;

 if (number == 0) break;

 numberlist.push_back(number);

};

reverse(numberlist.begin(), numberlist.end());

for (int number : numberlist) {

 cout << number << " ";

}

return 0;

}

Explanation:

There is a built-in function to reverse the contents of a vector.

Which statements reflect your experience with studying? Check all that apply.

Answers

Answer:

The end of an experience is a great time to reflect on your learning. With every research experience you will gain new skills, learn more about the type of environment you enjoy being in, further explore your strengths and interests, and test out your motivation to further study or pursue a career in a field or discipline.

Explanation:

A business would use a website analytics tool for all of the following EXCEPT _____.
A. viewing the number of pages a person visited
B. viewing the number of new and returning visitors
C. viewing why someone visited your webpage
D. deciding when to increase bandwidth

Answers

Answer:

C. viewing why someone visited your webpage

Explanation:

Website analysis often referred to as Web analytics is a term that is used to describe a form of website distribution, activity, and proportion relating to its performance and functionality.

Some of the things Web analytics does include the following:

1.  measures the number of pages a user or visitor viewed or assessed

2.  counts the number of new and returning visitors

3.  helps website administrator to know when to increase bandwidth

Hence, in this case, the correct answer is option C. viewing why someone visited your webpage

Which OS function does a CLI fulfill? A User interface B Running applications C Hardware interface D Booting

Answers

Answer:

User Interface

Explanation:

The function of OS in the CLI is to form the user interface. Thus, option A is correct.

What is Command Line Interface (CLI)?

The command line interface is given as the application interface that has been used for the purpose of running the program, managing the files, and interacting with the computer system.

The operating system (OS) in the CLI performs the major function of following the link with the interface between the system and the user. Therefore, the function of OS in CLI is the user interface. Thus, option A is correct.

Learn more about the command-line interface, here:

https://brainly.com/question/14298740

#SPJ2

What is the impedance mismatch problem? Which of the three programming
approaches minimizes this problem?

Answers

Answer:

The problem that created due to the difference in the model of programming language and the database model.

Explanation:

The practical relational model has three components which are as follows

1. Attributes

2. Datatypes

3. Tuples

To minimize this problem  

1. We switch low pass L-Network to high pass L-network

2. We switch high pass L-Network to low pass L-network

3. We use the impedence matching transformer

Which of the following is not an advantage of a flowchart?
a) Better communication
b) Efficient coding
c) Systematic testing
d) Improper documentation

Answers

Answer:

d) Improper documentation

Explanation:

A flowchart is a type of diagram in which it presents the flow of the work or how the process is to be followed. It is a diagram that represents an algorithm that defines step by step approach to solving the task. In this, there are various boxes that are linked with the arrows

There are various advantages like in this, there is a better communication, coding is to be done in an efficient way, system could be tested also there is a proper documentation

hence, the correct option is d

Which of the following is not an advantage of a flowchart?

a) Better communication

b) Efficient coding

c) Systematic testing

d) Improper documentation

Technologies designed to replace operating systems and services when they fail are called what?

Answers

Answer:

Bare metal recovery.

Explanation:

Technologies designed to replace operating systems and services when they fail are called bare metal recovery.

Basically, it is a software application or program which is primarily designed to enable users to reboot the affected system and services that have failed, usually from a removable media, CD-Rom using an image file of the operating system backup.

Other Questions
Billy jogs 4/5 kilometers every minute how many kilometers does he jog after 6 1/8 minutes Om/u/0/w/MTIZNDIyNjcyMTg1/t/all45. Read this sentence and the dictionary definition that follows.Mr. Williams seems to believe his daily quotations are profound, but on closerexamination, they are simply nonsense.profound (proh FOWND) adj. 1. having an intense quality or feeling; 2. intellectuallydeep or insightful; 3. difficult to understand; 4. reaching far below the surfaceWhich definition best matches the meaning of profound as it is used in thesentence?a definition 1b. definition 2C. definition 3d. definition 4 the study of Earth and its people, places, and natural surroundings, or environment is Last year, Dr. Lopez quit his $100,000 job at the MegaMall Dental Clinic and opened his own dental practice. His revenue for the first year was $400,000. He paid $80,000 in rent for the dental office, $60,000 for his office managers salary, $25,000 for the dental hygienist, $150,000 for insurance, and $10,000 for other miscellaneous expenses. Based on this information, which of these statements is correct? What is the traditional dress of Magar, Bhojpuri, Urdu? Select all decimals that are equivalent to ( 9 100 ) + ( 2 10 ) + ( 3 1 10 ) + ( 5 1 100 ) . A. 92.35 B. 920.350 C. 902.35 D. 92.350 E. 920.35 F. 920.035 Were the Alien and Sedition Acts an effective weapon against outside interference? The relative location of the Pacific Ocean in relation to Asia re f(x) = 2x-5 and g(x)= x + 5inverses? Explain. What is an equation of the line that passes through the point (-7,-6) and is parallel to the line x - y =7 Legislation passed during Hardings administration was the The site identifies five different reasons whyEuropean immigrants came to the United Statesduring this 100-year period. What are these fivereasons? Write at least one paragraph for eachof the reasons, describing how each reasoninfluenced individuals to immigrate to the UnitedStates. In 1936 J.W. McKay crossed a stock melon plant that produced tan seeds with a plant that produced red seeds and got the following results: tan seeds x red seeds F1 13 tan seeds F2 76 tan + 24 red seeds a) Which is dominant, red or tan seeds? b) Why did you answer as you did in a)? c) What is the genotype of the F1 melons? d) Look at the F2 results to decide whether the normal phenotypic ratio is within experimental error of 3:1. which process must occur for clouds to form? A catapult launches a large stone from ground level at a speed of 45.2 m/s at an angle of 57.0 with the horizontal. The stone returns to ground level shortly thereafter.(a) How long is it in the airs(b) What maximum height does the stone reach? (Neglect air friction.)Im Which part of an organism is preserved in cast and mold fossils? a. skin b. bone c. muscle d. soft tissue please help me with this thank you :)! Select the correct answer. Both Pakistan and India have claimed the Kashmir region. This situation has resulted in which of the following consequences? A. increasing unity between the countries B. the formation of a new country C. the formation of a new religion D. increasing tensions between the countries The base composition of a double-stranded DNA molecule is 26% adenine. What percentage of this molecule is the base guanine? Give only the answer in numerical form so that Moodle will grade your answer correctly. Do not write "%". Jackie performs an experiment on how the type of music played in a room can affectplant growth. In her experiment, the independent variable is theA. Color of flowerB. Type of musicC. Height of plantD. Type of plant