the run-around should be at least ____ and should be the same for all graphics in a document.

Answers

Answer 1

The run-around should be at least 0.125 inches and should be the same for all graphics in a document.

What is the recommended minimum run-around?

The run-around refers to the amount of space or margin that should be left around a graphic element such as an image or a chart in a document. It ensures that the graphic is visually separated from the surrounding text and other elements.

To maintain consistency and aesthetic appeal, it is generally recommended to have a minimum run-around of 0.125 inches for all graphics throughout the document. This uniformity helps create a professional and cohesive look in the layout.

Read more about run-around

brainly.com/question/30842227

#SPJ1


Related Questions

business analysts integrate the work of the programmers, testers, and users.

Answers

Business analysts play a critical role in ensuring the successful completion of software development projects by integrating the work of programmers, testers, and users.

They ensure that all parties involved collaborate effectively, understand each other's requirements, and work towards a common goal, resulting in a successful project outcome.

They act as a liaison between the technical teams and the business stakeholders, helping to identify and translate business needs into technical requirements. By understanding the needs and perspectives of both the business and technical sides, business analysts can effectively communicate and coordinate the efforts of programmers, testers, and users to ensure the project meets the business goals and objectives.

Learn more about stakeholders here:

brainly.com/question/30241824?

#SPJ11

in the following public key encryption scenarios where you are communicating with me, please tell me the secrecy/authentication purpose of the following exchanges
(a) I send you a message: Encrypt(KEYmohammad_private, "Homework is due tomorrow") (b) You send me a message: Encrypt(KEYmohammad_public. Encrypt(KEYmy_private, "I need another day."))

Answers

In the first scenario, where you send me a message encrypted with the private key of Mohammad, the purpose of the exchange is authentication. This is because only Mohammad would have access to his private key, and so the fact that the message was encrypted with it provides assurance that the message was indeed sent by Mohammad and has not been tampered with by anyone else.

However, this exchange does not provide secrecy, as anyone can obtain Mohammad's public key and decrypt the message. In the second scenario, where I send you a message encrypted with both Mohammad's public key and my private key, the purpose of the exchange is both secrecy and authentication. This is because the message can only be decrypted by someone with access to both Mohammad's private key and my public key, which should be only me and Mohammad respectively.

This provides assurance that the message has not been tampered with and that only the intended recipient can read it. Additionally, the fact that the message was encrypted with both keys provides authentication that the message came from me and that Mohammad is the intended recipient. Overall, these two scenarios demonstrate the different purposes of public key encryption, which can be used for both secrecy and authentication depending on how the keys are used.

Learn more about encryption here-

https://brainly.com/question/30225557

#SPJ11

T/F : C was chosen as the base language for C++ because it contained class constructs.

Answers

False. C was not chosen as the base language for C++ because it contained class constructs.

C++ was designed as an extension of the C programming language, primarily by Bjarne Stroustrup. The objective was to enhance C's capabilities by adding support for object-oriented programming (OOP) concepts. While C++ does incorporate class constructs and other OOP features, such as inheritance and polymorphism, into its syntax, the decision to base C++ on C was primarily driven by compatibility and practicality. By building on top of C, C++ could leverage existing C codebases and provide a smooth transition for developers familiar with C. However, the inclusion of class constructs in C++ was a deliberate design choice to enable OOP, rather than being inherited directly from C.

Learn more about C++ here ; brainly.com/question/29225072

#SPJ11

which of the following is not a method for copying user accounts from on-premises active directory?

Answers

One method for copying user accounts from on-premises Active Directory is using the Active Directory Migration Tool (ADMT), which is specifically designed for this purpose. However, it is important to note that the ADMT is a valid method and not the incorrect one.

To identify the method that is not used for copying user accounts from on-premises Active Directory, we need to consider other options. Some commonly used methods for copying user accounts include:

1. Manual account creation: This involves manually creating user accounts in the target Active Directory system by replicating the necessary attributes and settings from the source Active Directory.

2. PowerShell scripting: PowerShell scripts can be used to automate the process of copying user accounts by extracting the required information from the source Active Directory and recreating the accounts in the target Active Directory.

3. Third-party migration tools: There are several third-party tools available that offer user account migration capabilities, allowing for a more streamlined and process automation.

Based on the options provided, the method "Manual account creation" is not a method for copying user accounts from on-premises Active Directory. It is a time-consuming and error-prone approach, especially for larger user bases, and is typically not recommended due to its inefficiency compared to other available methods.

To learn more about Process automation - brainly.com/question/30096797

#SPJ11

a recursive function has two parts: a piece that the function knows how to do and a piece that the function does not know how to do.a. trueb. false

Answers

The answer is a. true. A recursive function is a function that calls itself until it reaches a base case. In the process, the function breaks down the problem into smaller subproblems that it knows how to solve, and then combines the results to solve the original problem.

The part of the function that it knows how to do is the base case, which terminates the recursion, and the part that it doesn't know how to do is the recursive case, which calls the function again with a smaller subproblem.

Therefore, a recursive function always has a part that it knows how to do and a part that it doesn't know how to do.

Learn more about recursive function here:

brainly.com/question/26993614

#SPJ11

which lets you change keywords, campaigns, ads, ad groups, and product groups?

Answers

The platform that allows you to change keywords, campaigns, ads, ad groups, and product groups is typically an online advertising platform, such as Go ogle Ads (formerly known as Go ogle Ad Words).

What is goo gle ads

Go ogle Ads provides a comprehensive interface where you can manage and modify various aspects of your online advertising campaigns.

Within Go ogle Ads, you can make adjustments to your keyword lists, create or modify campaigns, design and edit ads, organize and optimize ad groups, and manage product groups for campaigns that involve Goo gle Shopping.

This platform empowers advertisers to have control over their online advertising efforts and allows them to make changes to different elements of their campaigns to optimize performance, reach their target audience, and achieve their advertising goals.

Read more on campaigns, ads, here https://brainly.com/question/11698706

#SPJ4

______ is when an unauthorized user follows an authorized user into a restricted area. [Choose all that apply]
A.Tailgating
B.Brute force entry
C.Piggybacking
D.Biometric entry

Answers

Tailgating and piggybacking are both types of unauthorized access in which an unauthorized person gains entry into a restricted area by following an authorized person.

Tailgating and piggybacking are both physical security breaches that involve an unauthorized person gaining access to a restricted area by following an authorized person. Tailgating occurs when an unauthorized person physically follows an authorized person through a secure entry point, such as a door or gate. Piggybacking is similar to tailgating, but it occurs when the unauthorized person asks the authorized person to hold the door open for them or otherwise gain entry. Brute force entry, on the other hand, refers to a type of cyber attack in which an attacker repeatedly attempts to guess a password or encryption key. Biometric entry refers to the use of biometric data, such as a fingerprint or retina scan, to gain access to a secure area.

Learn more about Tailgating here:

https://brainly.com/question/31021547

#SPJ11

Page numbers must be added to a report in Design view. True/False

Answers

False. Page numbers are typically added to a report in Layout view, not Design view.

Design view is used for designing the structure and layout of the report, while Layout view allows for the inclusion and formatting of elements such as page numbers. In Layout view, you can https://brainly.com/question/15093505the header or footer section of the report and insert page numbers using the appropriate tools or options provided by the reporting software or application you are using.

Learn more about Design view here:

https://brainly.com/question/13261769

#SPJ11

Mobile devices such as laptops are stolen on average once every 20 seconds.a. Trueb. False

Answers

Answer:(B) false

Explanation:

The statement is false. Mobile devices such as laptops are not stolen on average once every 20 seconds. While it is true that theft of mobile devices can occur, the frequency at which it happens varies depending on several factors such as the location, population density, security measures in place, and individual circumstances.

The claim that laptops are stolen every 20 seconds would imply an extremely high rate of theft, which is not supported by statistical data. While it is difficult to provide an exact figure, the actual rate of laptop theft is much lower and varies from one region to another.

It is important to note that mobile device security is a significant concern, and precautions should be taken to protect personal devices. This includes implementing strong passwords, using encryption, enabling device tracking and remote wiping features, and being mindful of where and how devices are used and stored. Additionally, it is recommended to keep backups of important data to minimize the impact of a potential theft.

To learn more about mobile devices

brainly.com/question/4673326

#SPJ11

____ is a fault-tolerance technique that links multiple servers together to act as a single server.

Answers

Answer:

The answer is "Clustering"

Explanation:

10. where in the html of your webpage should you place analytics tracking code?

Answers

While there are multiple locations in the HTML of a webpage where analytics tracking code can be placed, the ideal location is in the header section.


The header is the first section of a webpage that loads and contains important information about the page. By placing the analytics tracking code in the header, it will be loaded before any other content on the page, ensuring that the tracking starts immediately.

It is also important to consider the type of analytics tracking code being used. Some tracking codes require specific placement in the HTML, while others can be placed in either the header or footer. It is recommended to follow the instructions provided by the analytics provider to ensure proper placement and accurate tracking.

To know more about header visit:

https://brainly.com/question/9979573

#SPJ11

the heads of a hard disk drive touch the surface of the platter to read or write the data

Answers

The main answer to your question is yes, the heads of a hard disk drive do touch the surface of the platter to read or network write data. However, the explanation behind this process is a bit more complex.

In a hard disk drive, the platter is coated with a magnetic material that stores the data. The read/write heads, which are located at the end of the actuator arm, use a magnetic field to either read the data from the platter or write new data to it.  When the drive is powered on, the actuator arm moves the read/write heads to the correct position over the platter. The heads are designed to be very close to the platter surface, but not actually touching it.

During operation, the platters spin at high speeds (usually thousands of revolutions per minute), and the read/write heads move back and forth across the surface of the platter to access the data. Because the heads are so close to the platter, there is always a risk of them coming into contact with the surface, which can cause damage to both the heads and the platter.

To know more about electronic network visit:

https://brainly.com/question/8808445

#SPJ11

which of the following functions should be used to insert the current date and time in a cell?

Answers

The answer to your question is that the function you should use to insert the current date and time in a cell is the NOW e-mail function.

The NOW function is used to display the current date and time in a cell, and it updates automatically every time the worksheet is opened or recalculated.  the NOW function is that it returns the current date and time as a serial number, which Excel recognizes as a date and time value. You can format the cell containing the NOW function to display the date and time in a variety of formats, such as "dd/mm/yyyy hh:mm:ss" or "mm/dd/yyyy hh:mm am/pm".

However, if you only want to display the current date or the current time, there are separate functions for each of those as well. The function for the current date is TODAY, which returns the current date as a serial number, and the function for the current time is TIME, which returns the current time as a decimal value that represents the fraction of a day.

To know more about e-mail visit:

https://brainly.com/question/13460074

#SPJ11

The computers in a lab on a floor of a building would be connected using a _______.a) LANb) WANc) PANd) MAN

Answers

The computers in a lab on a floor of a building would most likely be connected using a Local Area Network (LAN).

A LAN is a network that connects computers and devices in a small geographic area, such as a single building or office floor. LANs typically use Ethernet cables or Wi-Fi to connect devices to a central router or switch, allowing users to share resources such as files, printers, and internet access.

While WANs (Wide Area Networks), MANs (Metropolitan Area Networks), and PANs (Personal Area Networks) are all types of computer networks, they are typically used to connect larger geographic areas or specific types of devices, such as mobile phones or Bluetooth-enabled devices. So in this case, a LAN would be the most appropriate choice for connecting the computers in a lab on a single floor of a building.

To know more about LAN visit:-

https://brainly.com/question/31792858

#SPJ11

T/F Instead of using the sheet tab shortcut menu, you can copy a worksheet by holding down the Ctrl key while dragging the worksheet tab from one location to another.

Answers

The answer to your question is True. Copy a worksheet by holding down the Ctrl key while dragging the worksheet tab  Agile from one location to another.

This method is a quick and easy way to duplicate a worksheet within the same workbook. It's important to note that this method only creates a copy of the worksheet, not a link or reference to it.  Alternatively, you can also use the sheet tab shortcut menu to copy a worksheet. To do this, right-click on the worksheet tab and select "Move or Copy" from the menu. In the "Move or Copy" dialog box, select the "Create a Copy" checkbox and choose the location where you want to copy the worksheet to.

Overall, both methods can be used to copy a worksheet, but the Ctrl+drag method is often faster and more convenient if you need to make a quick duplicate within the same workbook.

To know more about Agile visit:

https://brainly.com/question/15134547

#SPJ11

to serialize an object and write it to the file, use this method of the objectoutputstream class.

Answers

The method in the `ObjectOutputStream` class that is used to serialize an object and write it to a file is not mentioned in the question.

However, the statement suggests that there is a specific method in the `ObjectOutputStream` class that can be used to serialize an object and write it to a file. The `ObjectOutputStream` class is used to write data types and graphs of Java objects to an OutputStream. To write an object to a file, you would typically use a `FileOutputStream` in combination with an `ObjectOutputStream`. The specific method used for serializing and writing an object to a file with `ObjectOutputStream` will depend on the specific use case.

Learn more about Java here:

https://brainly.com/question/29897053

#SPJ11

ipsec is used for ________ vpns. ipsec is used for ________ vpns. a. neither a nor b site-to-site b. both a and b remote-access

Answers

IPsec is used for both site-to-site and remote-access VPNs.

IPsec (Internet Protocol Security) is a protocol suite that provides secure communication over IP networks. It offers encryption, authentication, and data integrity to protect the confidentiality and integrity of network traffic. IPsec can be used for both site-to-site and remote-access VPNs, making it a versatile solution for establishing secure connections.

1. Site-to-site VPNs: In a site-to-site VPN, IPsec is used to create a secure connection between two or more network sites or locations. It allows organizations to connect their local networks securely over the internet, creating a virtual private network between the sites. This enables secure communication and data transfer between the interconnected networks.

2. Remote-access VPNs: IPsec is also utilized in remote-access VPNs, which enable remote users to securely access a private network from a remote location. It provides a secure tunnel between the user's device and the corporate network, ensuring that data transmitted between them is encrypted and protected. Remote-access VPNs are commonly used by employees, contractors, and business partners to access resources and services within a private network remotely.

Therefore, IPsec is suitable for both site-to-site VPNs, where it connects multiple network sites, and remote-access VPNs, which allow secure remote connectivity to a private network.

To learn more about IPsec (Internet Protocol Security) click here: brainly.com/question/10230272

#SPJ11

a(n) ____ operating system is required to perform a command within a certain time frame.

Answers

A real-time operating system is required to perform a command within a certain time frame.

Real-time operating systems are commonly used in embedded systems, such as medical equipment, industrial control systems, and aerospace applications. These systems require precise and predictable timing for their operations. Real-time operating systems guarantee timely execution of tasks and have a minimal response time to events. They are designed to handle high-priority tasks efficiently and can handle multiple tasks simultaneously.

Learn more about real-time operating systems here:

https://brainly.com/question/30366611

#SPJ11

Which Hyper-V feature found in Windows Server provides temporary memory that allows a virtual machine to restart even when there is not enough physical memory available?

Answers

Answer:

Smart Paging allows a virtual machine to restart when there is not enough available memory to restart the virtual machine.

75) What type of company has stock that is widely held and available for sale to thegeneral public?A) private corporationB) public corporationC) general partnershipD) limited liability corporationE) professional corporation

Answers

The type of company that has stock that is widely held and available for sale to the general public is a public corporation. These types of corporations can issue stocks to anyone who is interested in purchasing them, making them widely available.

This is different from private corporations, which are owned by a small group of individuals and their stocks are not available to the general public. Public corporations have more liability than private corporations as they have a greater number of shareholders who have invested in their company. The corporation's success or failure affects all the shareholders, so they must be mindful of the risks involved. In summary, a public corporation is a type of company that has stock widely available to the public, and as such, it carries a higher level of liability.

To know more about Company visit:

https://brainly.com/question/30285105

#SPJ11

You have eight computers located in one office building and want to share resources among them. All computers are running Windows 7. What is the easiest option to configure to share files and folders?A. WorkgroupB. HomegroupC. PAND. LAN

Answers

When you have eight computers located in one office building and you want to share resources among them, the easiest option to configure to share files and folders would be a LAN (Local Area Network). A LAN is a network that connects computers and devices in a limited geographical area, such as an office building, using wired or wireless connections.

To set up a LAN, you will need to connect all the computers using Ethernet cables or a Wi-Fi network. Once the computers are connected, you can configure the network settings on each computer to enable file and folder sharing. In Windows 7, you can easily set up file and folder sharing by creating a homegroup or workgroup.

The option of a workgroup would be a good choice if you want to share resources between computers running different versions of Windows or if you have a mix of computers running different operating systems. A workgroup is a collection of computers that are all on the same network and are identified by a common workgroup name. You can set up a workgroup by going to the Control Panel and selecting System and Security, then clicking on System and selecting Change settings under the Computer name, domain, and workgroup settings section.

On the other hand, if all the computers are running Windows 7, then creating a homegroup would be the easiest and most convenient option to share files and folders. A homegroup is a network that allows you to easily share resources, such as files and printers, between computers running Windows 7. You can set up a homegroup by going to the Control Panel and selecting HomeGroup, then following the on-screen instructions.

Learn more about LAN connection here:
https://brainly.com/question/2879706

#SPJ11

why is udp needed? why can’t a user program directly access ip?

Answers

UDP (User Datagram Protocol) is needed because it provides a lightweight, connectionless communication protocol that allows for fast and efficient transmission of data. User programs cannot directly access IP (Internet Protocol) because IP operates at a lower level, handling network routing and addressing, while UDP provides a higher-level interface for applications.

UDP is a transport layer protocol that operates on top of IP. It is used when a fast and efficient communication method is required, especially in situations where low latency and minimal overhead are more important than reliability and error checking. UDP provides a lightweight mechanism for transmitting data packets without establishing a connection between the sender and receiver. User programs cannot directly access IP because IP operates at the network layer, responsible for routing packets across networks and managing IP addresses. It handles tasks such as fragmentation, reassembly, and routing decisions. On the other hand, UDP provides a higher-level interface that allows user programs to send and receive data using ports and provides basic error-checking functionality.

By utilizing UDP, user programs can focus on the application-specific aspects of communication, such as defining the data format and payload structure, without having to worry about the lower-level details of IP routing and addressing. UDP is particularly useful for real-time applications like video streaming, VoIP (Voice over IP), and online gaming, where speed and responsiveness are crucial, and minor data losses can be tolerated.

Learn more about programs here: https://brainly.com/question/30613605

#SPJ11

which of the following was the first algorithm used for both encryption and digital signing and is still widely used?

Answers

The first algorithm used for both encryption and digital signing was the RSA algorithm, which was invented by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977.

The RSA algorithm is named after the three inventors' last names. The RSA algorithm uses a public key and a private key to encrypt and decrypt data. The public key is used for encrypting data, while the private key is used for decrypting data. Additionally, the RSA algorithm is also used for digital signing. Digital signing is a process in which a digital signature is attached to a document to verify its authenticity and integrity. The RSA algorithm is still widely used today in various applications, such as secure communication, digital signatures, and electronic commerce.

The RSA algorithm is considered to be a secure algorithm due to its large key sizes, which make it difficult to break using brute force attacks. Overall, the RSA algorithm has played a crucial role in the development of secure communication and digital signatures, and it is likely to continue to be used for many years to come.

Learn more about RSA algorithm here:

https://brainly.com/question/31329259

#SPJ11

Which of the following statements regarding a domain functional level is accurate? a. Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised. b. It represents the oldest Windows Server version that can be used on a domain controller. c. A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level. d. It applies to domain controllers, clients, and other servers that are present in the domain

Answers

The accurate statement regarding a domain functional level is d. It applies to domain controllers, clients, and other servers that are present in the domain.

Domain functional level represents the minimum operating system version required for domain controllers in a domain, and it affects the features and capabilities available to domain controllers and other entities within the domain, such as clients and other servers. It does not represent the oldest Windows Server version that can be used on a domain controller, and it does not restrict the use of newer server versions in a domain. Additionally, once the domain functional level is raised, it cannot be reverted to a previous level.

Learn more about Domain here: brainly.com/question/31949706

#SPJ11

the most common web server today, controlling 65 percent of the market, is:

Answers

The most common web server today, controlling 65 percent of the market, is Apache HTTP Server. It is an open-source web server that is widely used due to its flexibility, reliability, and stability.

Apache HTTP Server can run on various operating systems such as Windows, Linux, Unix, and macOS. It supports different programming languages like PHP, Perl, Python, and Java, making it a popular choice among developers. Apache is also known for its robust security features and easy customization options. In addition, it has a large community of developers who continuously update and improve the software. Overall, Apache HTTP Server is a powerful web server that is trusted by millions of websites around the world.

To know more about Server visit:

https://brainly.com/question/29220726

#SPJ11

Which of the following tasks can be performed by the apt-get command?a removeb installc upgrade

Answers

The  tasks that can be performed by the apt-get command are:

removeinstallupgradeWhat is the apt-get command?

Apt-get is a package management tool for Debian-based Linux, like Ubuntu, that simplifies software package management. The apt-get command installs packages from repositories by retrieving the package and its dependencies.

The apt-get remove command removes installed packages and their dependencies by specifying their names as arguments. Apt-get upgrade command updates installed packages to their latest versions by retrieving information from repositories.

Learn more about apt-get command from

https://brainly.com/question/31755723

#SPJ1

which of these are reasons to outsource? select all that apply. a. cut costs b. focus on core functions c. all of these d. improve service

Answers

Reasons for outsourcing can include cutting costs, focusing on core functions, and improving service.

Cutting costs is often a significant motivation for outsourcing, as it can be less expensive to contract with an outside firm that specializes in a particular function or service than to maintain an in-house team. Outsourcing can also allow organizations to focus on their core competencies by delegating non-core functions to outside experts. This can improve efficiency and effectiveness, as external providers may have specialized skills and resources that are not available in-house. Improving service is another reason to outsource, as external providers may have greater expertise, experience, and technology that can lead to higher quality service and better outcomes.

Learn more about outsourcing here:

https://brainly.com/question/29544430

#SPJ11

a netbios name can contain a maximum of how many characters?

Answers

A NetBIOS name can contain up to 15 characters and is used to identify a device on a local area network. While it has largely been replaced by newer protocols, it is still important to understand how it works and how to configure it if necessary.

A NetBIOS name is a unique identifier used by devices on a local area network (LAN) to communicate with each other. It is used by the NetBIOS protocol, which was developed by Microsoft for LAN communication. A NetBIOS name can contain up to 15 characters, including letters, numbers, and hyphens. The name is used to identify a device on the network and must be unique within the LAN.

It's important to note that the NetBIOS protocol has largely been replaced by more modern protocols like TCP/IP, which use longer, more complex names. However, NetBIOS is still supported by some older systems and applications, so it's important to understand how it works and how to configure it if necessary.

Learn more about NetBIOS here:

https://brainly.com/question/32111634

#SPJ11

Which command can export the directory content of an organization?

Answers

  The command that can export the directory content of an organization is "ls" (list) in Unix/Linux or "dir" in Windows.

  The "ls" command is used in Unix/Linux systems to list the files and directories in a specific directory. By specifying the appropriate options and directory path, the "ls" command can generate a listing of the directory content. The output can be redirected to a file using the ">" symbol followed by the desired filename, allowing for the export of the directory content to a file.

  Similarly, in Windows, the "dir" command is used to list the files and directories in a given directory. By running the "dir" command with the appropriate parameters and specifying the directory path, the command will display the directory content. The output can also be redirected to a file using the ">" symbol followed by the desired filename for exporting the directory content.

  Thus, the "ls" command in Unix/Linux and the "dir" command in Windows can be used to list and export the directory content of an organization by directing the output to a file.

Learn more about filename here: brainly.in/question/11768248

#SPJ11

when using fixed allocation dhcp, what's used to determine a computer's ip?

Answers

When using fixed allocation DHCP (Dynamic Host Configuration Protocol), the computer's IP address is determined based on the pre-configured assignment set by the network administrator.

In fixed allocation DHCP, the IP addresses are assigned to specific computers based on their unique identifiers, such as the Media Access Control (MAC) address of the network interface card. The network administrator manually associates a specific IP address with each computer's MAC address in the DHCP server configuration. When a computer requests an IP address from the DHCP server, it sends its MAC address as part of the request. The DHCP server checks its configuration and assigns the pre-defined IP address that corresponds to the MAC address of the requesting computer. This ensures that each computer consistently receives the same IP address every time it connects to the network. Fixed allocation DHCP is commonly used in situations where specific IP addresses need to be assigned to particular devices or where IP address management requires stricter control. It eliminates the need for dynamic IP address assignment and provides a reliable and consistent IP address assignment for individual computers.

Learn more about IP address here:

https://brainly.com/question/31171474

#SPJ11

Other Questions
if a sales agent leaves a real estate brokerage what happens to the listings of that agent HCl , HI , H2SO4 , LiCl , and KI are all classified asstrong electrolytes.acids.weak electrolytes.nonelectrolytes. open the file . a) prepare a scatter plot of co emissions vs. hydrocarbon emissions and find the correlation coefficient. how strong is the association between these variables? b) prepare a scatter plot of no emissions vs. hydrocarbon emissions and find the correlation coefficient. how strong is the association between these variables? c) what relevance do parts a) and b) have to the setting of emissions standards for engines of the type tested? from a physicist's point of view, in which of the following cases has significant work been done? Which of the following statements is accurate about the selective serotonin 5-HT3 receptor antagonist Alosetron?a. It is indicated for women only.b. It is indicated for gastric ulcers only.c. It can improve constipation.d. Its use is limited to hospitalized patients. suppose that you buy a 1-year maturity bond with a coupon of 7% paid annually. if you buy the bond at its face value, what real rate of return will you earn if the inflation rate is 8% and ytm remains changed?2.88%0.94%-0.93%-0.88% what is the correct sequence of parts in the colon moving from the small intestine to the anus? If a party to a contract engages in an anticipatory repudiation of the contract, which of the following statements is correct?A. The repudiation is a material breach of the contract.B. The repudiating party cannot retract the anticipatory repudiation.C. The other party never has a duty to mitigate any losses resulting from the repudiation.D. The other party cannot take action against the repudiating party until the time for performance has passed and performance has not occurred. adebtor with a credit n balance of 100 and must be transferred to the creditors Ledger how to do that in the noteadaptor with a credit no notes balance of 120 must be transferred to the creditors Ledger how to do that in the asset notes the temperature of a sample of silver increased by 23.1 c when 255 j of heat was applied. what is the mass of the sample? A woman is four times as old as her daughter in five years times the square of her age will exleed the Square of her daughter age by 120 years find the of the daughter what three choices do you have in responding to illegal interview questions attempts to explain how the actual, imagined or implied presence of others influences the thoughts, feelings and behaviors of individuals. In an effort in the late Romantic to intensify emotion, composers:A. increased chromaticismsB. leaned towards the diatonicC. used random harmoniesD. reduced the size of the orchestra Which is more, the average of the 4 even whole numbers from 8 to15 or the average of the 4 odd whole numbers from 8 to 15? which of the following types of foods sustain satiety longer than other foods? Which is the best example of a well-designed word list for a word chain activity? (4pts) Assume that adults have IQ scores that are normally distributed with a mean of 100 and a standard deviation of 15 (as on the Wechsler test). Find the IQ score separating the top 14% from the othersA) 83.7B) 116.2 C) 108.6 D) 99.3 The pure functional structure does not enable the organization to be:a cost leader.efficient.flexible.stable T/Fchannel conflict often results when a manufacturer opens a new distribution channel, especially if it directly competes with its existing intermediaries