why are women more exposed to mass media?

Answers

Answer 1

Women are more exposed to mass media because their voice is of high frequency which is clear to listen to, and it's soothing and people think it is a safer app or knowledge than that provided by males.

What is mass media?

Mass media is the media responsible for broadcasting or speaking information that reaches a large number or audience. It includes radio, advertisement, movies, magazines, T.V, etc.

Women are more exposed to these mass media because of their voice, which is said to be soothing, and more generous. Their voice is technology friendly.

Thus, due to the fact that women's voices have a higher frequency, are easier to hear, are calming, and are perceived as offering a safer source of information than men's, they are more exposed to the media.

To learn more about mass media, refer to the link:

https://brainly.com/question/14974921

#SPJ2


Related Questions

Why is it important to act according to a code of ethics?

Answers

Answer:

because it clearly lays out the rules for behavior and provides the groundwork for a preemptive warning

#Python: The given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented. The program fails and throws an exception if the second input on a line is a string rather than an integer. At FIXME in the code, add try and except blocks to catch the ValueError exception and output 0 for the age.

Ex: If the input is:

Lee 18
Lua 21
Mary Beth 19
Stu 33
-1
then the output is:

Lee 19
Lua 22
Mary 0
Stu 34

"# Split input into 2 parts: name and age
parts = input().split()
name = parts[0]
while name != '-1':
# FIXME: The following line will throw ValueError exception.
# Insert try/except blocks to catch the exception.
age = int(parts[1]) + 1
print('{} {}'.format(name, age))

# Get next line
parts = input().split()
name = parts[0]"

Answers

The program illustrates the use of catching exceptions.

What are exceptions?

Exceptions are program statements that are used to control program errors, and prevent a program from crashing.

How to fix write the exception

The statements that catch the exception in the program are:

try:

       age = int(parts[1]) + 1

       print('{} {}'.format(name, age))

       # Get next line

       parts = input().split()

       name = parts[0]

   except ValueError:

       print('Invalid value!')

       # Get next line

       parts = input().split()

       name = parts[0]

The complete program

The complete program is as follows:

# Split input into 2 parts: name and age

parts = input().split()

name = parts[0]

while name != '-1':

   # FIXME: The following line will throw ValueError exception.

   # Insert try/except blocks to catch the exception.

   try:

       age = int(parts[1]) + 1

       print('{} {}'.format(name, age))

       # Get next line

       parts = input().split()

       name = parts[0]

   except ValueError:

       print('Invalid value!')

       # Get next line

       parts = input().split()

       name = parts[0]

Read more about program exceptions at:

https://brainly.com/question/25012091

How is technology powerless?

Answers

Answer:

Bluetooth

Explanation:

I am not fully aware of what the full quisten is but I think this is the answer you are looking for

why is the statement if x=y not working in python

Answers

Answer:

x=1

Explanation:

Re-run your installer (e.g. in Downloads, python-3.8. 4.exe) and Select "Modify". Check all the optional features you want (likely no changes), then click [Next]. Check [x] "Add Python to environment variables", and [Install]

A web application is configured to run on multiple servers. When a webserver goes down, the user connected to it needs to re-login to the application. What could be the likely cause for this behavior

Answers

There are different uses of the computer. The likely cause for this behavior is Browser cookies not shared between servers.

What are browser cookies?

The computer is often used for browsing or surfing the internet.  Cookies are known to be files that has been formed by websites when you visit it.

They are known to make your online experience very easy by saving your browsing information. With the advent of cookies, sites often keep you signed in, and also remember the site you visit most.

See options below

a) Session state maintained by individual servers and not shared among other servers.

b) Browser cookies not shared between servers.

c) Server IP address changes

d) The user has to re-authenticate due to security reasons.

e) Browser using sticky session cookies

Learn more about Browser cookies  from

https://brainly.com/question/14102192

what is computer science and what kinds of there jobs?

Answers

Answer:

Careers in Computer Science

One of today’s most popular and lucrative fields of study amongst international students is the field of computer science. In fact, computer science is the third most popular area of study for international students coming to the United States. While the reasons for this are many, the exceptional prospects for careers in computer science play a key role in drawing students to the field. Aside from being one of the best funded and most internationally renowned fields of study within US academics, careers in computer science are among the most in-demand, lucrative, and stable options for today’s college graduates.

Careers in Computer Science

Computer science jobs are in high demand in every industry. Additionally, the high standing of computer science schools in the US has led to increased funding for these computer science departments. This increase in funding translates into a series of implications for international students within the computer science field, including the noteworthy diversification and specialization of the career field. The computer science field offers many potential applications for the degrees international students will be receiving.

What Salary Can You Expect

In addition to the numerous applications of these degrees, computer science graduates are among the highest paid majors, according to Money Magazine. Some example careers in computer science and their national median salaries are:

Software Developer $80,500Software Test Engineer (STE) $84,000Senior Software Engineer $98,000Software Development Manager $115,000Software Architect $116,000Programmer Analyst $74,800Systems Developer $93,800Web Developer $58,000Software Development Engineer, Test (SDET) $82,000Application Support Analyst $69,000Computer Systems Analyst $68,300Database Administrator (DBA) $85,100Systems Administrator $62,900Systems Engineer (IT) $83,300Systems Analyst $81,900Network Administrator, IT $59,000Network Engineer, IT $83,900Business Analyst, IT $81,500Program Manager, IT $111,000Information Technology Specialist $64,200

In addition to the exceptional starting salaries and highly diverse range of applications of computer science jobs, computer science is a highly stable career field. Not only are computer science degrees needed for a number of applications across nearly every industry, but the total number of computer science jobs has also been steadily increasing. In fact, according to the U.S. Department of Labor Bureau of Labor Statistics projection for 2002-2012, 6 of the 10 occupations in the country with the most new jobs are in the field of computer science.

Using the Mclaurin’s series only, prove categorically that e=2.71828

Answers

Answer:

import math

e = n = 0

while(round(e, 5) != 2.71828):

 e = e + 1/math.factorial(n)

 print(n, e)

 n = n + 1

Explanation:

Above McLaurin series implementation shows that you approximate e to 5 decimals already after 8 iterations.

What is the overall purpose of the app?

Answers

Answer:

To help students with homework and their education

Explanation:

Brainly is a Polish education technology company based in Kraków, Poland, with headquarters in New York City. It provides a peer-to-peer learning platform for students, parents, and teachers to ask and answer homework questions. In an ideal world, Brainly would be a supportive group learning environment where students could teach each other what they know. ... The point system can encourage students to give valuable answers, but points (and the "Brainliest" title) are awarded by the question asker, not an expert.

It's a rapid sign-up process and, if you're looking for answers for something specific, the search function is simple to use and gives instant gratification. We also like that you can quickly scan for verified answers, which have been vetted by Brainly expert volunteers and are determined to be correct and accurate.

Hope this helped! Have a nice day!

Please give Brainliest when possible!

:3

it’s to help students with homework and questions that are quite specific and it’s also a chance for people to help others with their knowledge to benefit their learning as well as their own!

1.) Which three Windows 10 editions allow you to restrict updates to only security updates?
2.) Which method of backing up system files was available in Windows 7 and is now available again in Windows 10?
3.) Following a failed attempt to upgrade Windows 8 to Windows 10, which two folders on drive D: might contain log files to help you troubleshoot the problem when Windows setup files are stored on drive D:?
4.) Under what circumstances might the product key for Windows be stored on firmware on the motherboard?
5.) Windows 10 has become corrupted and you decide to reinstall the OS. Will the setup process request a product key during the install? Why or why not?

Answers

Answer:

1. Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.

2.  Backup and Restore Center

3. I'm not sure

4. I'm not sure

5. Yes it will ask for it, but you'll have the option to choose to do it later. When you are loaded into Windows, it will automatically detect your computer and activate. The reason for this is that you might be trying to download a new version of Windows such as Pro.

Pet information (derived classes)

The base class Pet has private data members petName, and petAge. The derived class Dog extends the Pet class and includes a private data member for dogBreed. Complete main() to:

create a generic pet and print information using PrintInfo().
create a Dog pet, use PrintInfo() to print information, and add a statement to print the dog's breed using the GetBreed() function.
Ex. If the input is:

Dobby
2
Kreacher
3
German Schnauzer
the output is:

Pet Information:
Name: Dobby
Age: 2
Pet Information:
Name: Kreacher
Age: 3
Breed: German Schnauzer
________________________________________________

the given code:

Main.cpp:

#include
#include
#include "Dog.h"

using namespace std;

int main() {

string petName, dogName, dogBreed;
int petAge, dogAge;

Pet myPet;
Dog myDog;

getline(cin, petName);
cin >> petAge;
cin.ignore();
getline(cin, dogName);
cin >> dogAge;
cin.ignore();
getline(cin, dogBreed);

// TODO: Create generic pet (using petName, petAge) and then call PrintInfo


// TODO: Create dog pet (using dogName, dogAge, dogBreed) and then call PrintInfo


// TODO: Use GetBreed(), to output the breed of the dog


}

___________________________________________________________________________________________

Pet.h

#ifndef PETH
#define PETH

#include
using namespace std;

class Pet {
protected:
string petName;
int petAge;

public:
void SetName(string userName);

string GetName();

void SetAge(int userAge);

int GetAge();

void PrintInfo();
};

#endif
_________________________________________________________________________--

Dog.h

#ifndef DOGH
#define DOGH

#include
#include "Pet.h"

class Dog : public Pet {
private:
string dogBreed;

public:
void SetBreed(string userBreed);

string GetBreed();
};

#endif

____________________________________________________________

Pet.cpp

#include "Pet.h"
#include
#include
using namespace std;

void Pet::SetName(string userName) {
petName = userName;
}

string Pet::GetName() {
return petName;
}

void Pet::SetAge(int userAge) {
petAge = userAge;
}

int Pet::GetAge() {
return petAge;
}

void Pet::PrintInfo() {
cout << "Pet Information: " << endl;
cout << " Name: " << petName << endl;
cout << " Age: " << petAge << endl;
}

__________________________________________________________________

Dog.cpp

#include "Dog.h"
#include
#include
using namespace std;

void Dog::SetBreed(string userBreed) {
dogBreed = userBreed;
}

string Dog::GetBreed() {
return dogBreed;
}

Answers

Answer:

I think the answer is Breed: German Schnauzer don't listen too mee

________________________________________________

the given code:

Main.cpp:

#include

#include

#include "Dog.h"

don't listen

Explanation:

Processor speed is a measurement of what?


How fast the ROM loads and executes the operating system

How fast the chip processes the instructions it receives in binary code

How fast the power supply processes alternating current into direct current

How fast data travels along the internal and external buse

Answers

Answer:the number of cycles your cpu executes per second

Explanation:

Today
ABCDEFGH. What letter comes three to the right of the
letter that comes immediately to the left of the letter
that comes three to the right of the letter immediately
to the left of the letter B?

Answers

Answer:

Ourr letter is D. On three positions right, the letter is G. → Thus, our answer is G. So, G is the letter which is three to the right of the letter immediately to the left of the letter three to the left of the letter two to the right of letter F.

Explanation: hope it helps friend

Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the technologies you would need to deploy to implement a college campus network with multiple buildings, hundreds of faculty and staff, and dozens of computer-equipped - classrooms and labs. Think of the ancillary technologies you might need to integrate into the network such as data projectors, smart whiteboards, campus security systems, and so forth. Consider consulting with the IT staff at your school or another school to see what technologies they use. Instructions: Write a post of at least four paragraphs outlining the technologies you would use to connect student and faculty computers, servers, multiple buildings and so forth.​

Answers

Technology allows for easy accessibility, communication and information technology could connect student and faculty computers and servers.

What is computer networking?

It is the ability of computers to communicate with one another. It makes use of a communication technology that would allow different computers to be connected to each other.

Technologies that will be used include,

Communication technologyInformation technology

The different types of networking systems that can be used for communication and information include,

Local area networkWide area networkComputer area network

Local Area Network (LAN):  It is a computer network that can be used in a small confined area such as a school, laboratory, office, or group of buildings.

Thererfore, technologies you would use to connect student and faculty computers, servers, multiple buildings include communication and information technology.

Learn more on technology here,

https://brainly.com/question/23418761

3. (A) Differentiate between RAM & ROM.
(B) What is a virtual memory and how it is different
from cache memory?
(C) Discuss Primary memory and different types of pri-
mary memory
4. (A) What is Mail Merge? Explain the process to create
Mail Merge
(B) What is chart in Ms - Excel? Discuss the creation
of various charts in Ms - Excel.
(C) Explain the process of making a power point pre-
sentation?
5. (A) What is Internet? Discuss how internet is useful in
Business?
(B) Write a detail note on search engines.
(C) Write short Notes on -
(1) Server
(ii) e-Paper
(iii) Domain Name.

Answers

Answer:

RAM Data can be changed while ROM its content can be read but cannot be changed during normal computer operations


When using VLOOKUP we can search for information from more than one spreadsheet.
True or False

Answers

heyy man it's true for sure

Drawing board rough surfaces needs _____.
A. cleaning
B. oiling
C. tightening
D. sharpening

NEED ANSWER ASAP

Answers

Answer: d

Explanation: because like sand paper when you rub against it while drawing  it creates rough surfaces.

#include <iostream>
using namespace std;

int main()
{
int num1, num2,r,i;

cout<<"Enter a start: ";
cin>>num1;
cout<<"Enter an end: ";
cin>>num2;
cout<<"\n\nODD NUMBERS\n";

for(i=num1; i<=num2; i++){
r=i%2;
if(r==1)
cout<<" "<<i;

}
cout<<"\nEVEN NUMBERS\n";

for(i=num1; i<=num2; i++){
r=i%2;
if(r==0)
cout<<" "<<i;
}
if(num1>num2){
cout<<"ERROR! Starting Number is GREATER THAN the Ending Number!!!";
return 0;
}
}

Using while loop, do while and for loop write a C++ program that lets you input a starting and ending integer (range) then display all the odd integers and the even integers within the range then compute the sum of each set of integers.:

If the starting number is greater than ending number, the program should display “ERROR! Starting Number is GREATER THAN the Ending Number!!!”.

Sample output:

Enter a start: 1

Enter an end: 10

ODD NUMBERS

1 3 5 7 9 Sum: 25

EVEN NUMBERS

2 4 6 8 10 Sum: 30


the attached pic has been my progress so far. please help me reach the expected output.​

Answers

Explanation:

...........................

Components of a network

Answers

Answer:

4 basic components

Explanation:

Networks are comprised of four basic components: hardware, software, protocols and the connection medium. All data networks are comprised of these elements, and cannot function without them.

"web browsers cant be downloaded for free? TRUE OR FALSE​

Answers

Answer:

false

Explanation:

there are lots of free browsers:

chrome

brave

opera

etc

What does this mean startUp()

Answers

Answer: a startup or start-up is a company or project undertaken by an entrepreneur to seek, develop, and validate a scalable business model.

Explanation:

1. What is a situation—other than developing software—where it would be useful to follow the software development life cycle? Describe what this process might look like.

2. In this unit, you learned about four types of operating systems. Imagine that you had been hired as a consultant to a new start-up that was going to create and sell a new emergency medical device. Which kind of operating system would you recommend to them? As part of your answer, explain why the other three types of operating systems would be less appropriate.

3. Describe three different software applications that you have used recently.

4. In this unit, you learned about procedural, object-oriented, and event-driven programming. Describe an example of each one in commonly used software.

5. Many people express frustration when they have to contact customer support for help with their software. Describe two things that companies can do to make customer support a more pleasant experience for its users.

Answers

There are different kinds of software. Requirement Gathering and also designing is another stage where it would be useful to follow the software development life cycle.

Why is important to know the software development life cycle?

The software development life cycle is said to be one that increase the value to software development as it helps to give an efficient structure and method to create software applications.

Windows operating systems is the one I would recommend to them as it is much easier to operate than other types.

The three different software applications that you have used mostly are  Electronic Health Record (EHR) Software, Medical database software and Medical imaging software. They are often used in the healthcare system on daily basis.

Event-driven programming software is the often used in graphical user interfaces and other kinds of system applications such as JavaScript web applications. They are based on carrying out some task in response to user input.

Companies can make customer support a more better by actively to them especially their complains and make sure it is handled immediate. They should also list out the cases of high priority and work on them.

Learn more about Developing software from

https://brainly.com/question/22654163

Note : Each question carry three parts (A), (B), (C) out of
which attempt any two parts. All questions carry
equal marks.
1. (A) What do you mean by computer? Discuss the use of
computer in daily life.
(B) Differentiate between computer hardware & Software.
(C) Describe about the different types of computer
peripherals and memory devices.
2. (A) What is a printer? Explain different types of printer.
(B) What are scanning devices? Explain any four scan-
ning devices.
(C) What is CPU? Discuss components of CPU.

Answers

Answer:

1)a)the electronic device that helps us to read write listen music entertainment play games etc.Use of computer in our life is incredibly necessary. ... Computers have taken industries and businesses to a worldwide level. They are used at home for online education, entertainment, in offices, hospitals, private firms, NGOs, Software house, Government Sector Etc.

b)Hardware is a physical parts computer that cause processing of data. Software is a set of instruction that tells a computer exactly what to do. ... Hardware can not perform any task without software. software can not be executed without hardware.

c)Personal Computer (PC)

2 Workstation

3 Minicomputer

4 Main Frame

2)a)Printers are one of the common computer peripheral devices that can be classified into two categories that are 2D and 3D printers.Laser Printers.

Solid Ink Printers.

LED Printers.

Business Inkjet Printers.

Home Inkjet Printers.

Multifunction Printers.

Dot Matrix Printers.

3D Printers.

b)an electronic device which scans artwork and illustrations and converts the images to digital form for manipulation, and incorporation into printed

c)A central processing unit, also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program.

An array of integers can be assigned to a memory address in the ...
An array of integers can be assigned to a memory address in the .datanumbers
section of a MIPS assembly language program as show below. Here the length of the array is stored first, and then the elements of the array next.

Implement a MIPS assembly language program to perform the functionality of the following C program and print the updated array content, by listing each integer in it.

It should ask a user to enter three integers, a starting index, an ending index, and an integer to use for a comparison. It should examine only the elements in the array located from the entered starting index, to the entered ending index to check if each of them is greater the last entered integer, then if it is, subtract 3*the last entered integer to each such element in the array.

For instance, if a user enters 2, enters 9, then enters 3, then the output will be the following:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19





i.e., the numbers that are located between the index 2 and 9 are examined to see if each of them is greater than the last entered number (3 in this case),

then each of such element is subtracted with 3 times that number (3 in this case) if it is.

If the entered ending index is larger than 11, then the program should exam elements in the array until the end, and if the entered starting index is less than 0, then it should start examining elements from the first one in the array.

.data

numbers_len: .word 12

numbers: .word 45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19}





The following shows how it looks like in a C program:


int numbers[12] = {45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19};

int startIndex, endIndex, num1;
int j;

printf("Enter a starting index:n");

//read an integer from a user input and store it in startIndex
scanf("%d", &startIndex);


printf("Enter an ending index:n");

//read an integer from a user input and store it in endIndex
scanf("%d", &endIndex);

printf("Enter an integer:n");

//read an integer from a user input and store it in num1
scanf("%d", &num1);

if (startIndex < 0)
startIndex = 0;


for (j = startIndex; j <= endIndex && j < 12; j = j+1)
{
if (numbers[j] > num1)
{
numbers[j] = numbers[j] - (3 * num1);
}
}


printf("Result Array Content:n");
for (j = 0; j < 12; j = j+1)
{
printf("%dn", numbers[j]);
}




The following is a sample output (user input is in bold):

Enter a starting index:

2

Enter an ending index:

9

Enter an integer:

3

Result Array Content:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19

Please make sure it can output like the sample above

Answers

Answer:

A :)

Explanation:


In your guessing game, you randomly chose a word from your word list. Complete the code to randomly choose an index found in the list.

import random
count = len(words)
wordIndex =

A. random.random(0,count)
B. random.random(0,count - 1)
C. random.randint(0,count)
D. random.randint(0,count - 1)

Answers

Answer:

the answer is D random.randint(0,count -1)

Explanation:

I took the assignment

Answer: random.randint(0,count - 1)

Explanation: Not necessarily answer D because Edge switches the order of the questions for everyone. Just know its  random.randint(0,count - 1)

Although there are three well-known operating systems, the most common are Microsoft Windows and Mac OS. Discuss the similarities and differences between these two systems.

Answers

Answer:

There are very few similarities beyond some convergent features of their respective user interfaces. Their internal architecture is very different, differing from kernel models to shell integration to executable formats. A comprehensive list of similarities is neither possible nor useful, because it would consist mostly of obvious statements like "They are both operating systems" or "They both have graphical user interfaces, "They both include

Explanation:

How's that?

importance of ethical rules in new technologies?

Answers

Answer:

Ethical rules in the sphere of all technologies are imperative.

Explanation:

Ethical rules for technologies limit the information gathered, what can be done with the gathered data, the disclosure of what is collected and used/sold, and the restriction of technology that is dangerous to humans (bio-technologies).

What is introduction to total quality management?

Evaluation of the concepts of quality.

Answers

Answer:

Total Quality Management, TQM, is a method by which management and employees can become involved in the continuous improvement of the production of goods and services. It is a combination of quality and management tools aimed at increasing business and reducing losses due to wasteful practices.

Explanation:

Each Internet location has a unique______address.
Choose the answer.
TCP
RAM
OSI
IP​

Answers

Answer:

IP

Explanation:

Whenever you are connected to the Internet always you have two ip addresses. Your public ip and your private ip. Your ip address has to be unique for you to access the Internet. For example, if you have multiple computers within your home, they most likely each have their own private IP address.

The answer would be IP address

A packet contains three parts: header, payload, and trailer.
Choose the answer.
True
False

Answers

Answer:

True

Explanation:

I took the quiz

In statistics, when a set of values is sorted in ascending or descending order, its median is the middle value. If the set contains an even number of values, the median is the mean, or average, of the two middle values. Write a function that accepts as arguments the following:

a. An array of integers
b. An integer that indicates the number of elements in the array

The function should determine the median of the array. This value should be returned as a double. (Assume the values in the array are already sorted.) You’ll create two arrays: one with three elements (e.g. 1, 3, 7) and one with four elements (e.g. 2, 4, 5, 9).

Answers

The program is an illustration of methods

What are function?

Function are collections of named code blocks, that are executed when called or evoked.

The median function

The median function written in Python, where comments are used to explain each line is as follows:

#This defines the function

def medianValue(myList, n):

   #This determine the median element for odd list elements

   if n%2 == 1:

       medianElement = float(myList[int((n - 1)/2)])

   #This determine the median element for even list elements

   else:

       medianElement = (float(myList[int(n/2)]) + float(myList[int(n/2) - 1]))/2

   #This returns the median element

   return medianElement

Read more about functions at:

https://brainly.com/question/26180959

Other Questions
Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors per track, which are stored in linear order from sector 0 through sector 31. The head sees the sectors in ascending order. Assume the read/write head is positioned at the start of sector 1 on track 8. There is a main memory buffer large enough to hold an entire track. Data is transferred between disk locations by reading from the source track into the main memory buffer and then writing the data from the buffer to the target track. A. How long will it take to transfer sector 1 on track 8 to sector 1 on track 9? b. How long will it take to transfer all the sectors of track 8 to the corresponding sectors of track 9?. what is 6 20/97 as a improper fraction? Which numbers are factors of 12? Check all that apply2561224 write 7 7/8 as a improper fracton The condition that is most likely causing MKennas symptoms is A low-cost provider strategy becomes increasingly appealing and competitively powerful when. What are the characteristics of preganglionic and postganglionic neurons in the autonomic nervous system What would be the dimensions of a Punnett Square depicting a dihybrid cross? Identify whether the following changes would increase or decrease the rate constant. (1 point) Increasing Ea (0.5 point): Increasing T (0.5 point): Which of the following is controlled by thegovernments of nations located in North Africa?A. farmingB. tourismC. communication The action of napoleons that caused the greatest human losses was Answer the following question in 3-4 complete sentences. A pile of rocks. The rocks are positioned to fade from white in the center to dark gray on the outside. Describe the sculpture above, including the technique used to create it? How does it interact with its natural environment?. please help the answer is in the screenshot which nation stayed the biggest after the soviet union Anne was upset with Julian, her baby brother. He kept following her around the house. When she did her homework, he would sit next to her and play with her pens and pencils, or open her books and laugh at the colored pictures in them. When she played with her friends in the backyard, he would follow her there too. When she returned from school, he would run to her shouting with joy. But Anne did not enjoy Julian's "cute" antics as much as he did. And she decided to speak to her parents about it. The next day when she returned from school, she was pleasantly surprised to see Julian asleep. She felt relieved that he hadn't come running to her. She decided to call her next-door friend over to spend a couple of hours playing in the backyard. But first she did her homework. Until then, Julian had not disturbed her. Well, he must be really tired, Anne thought to herself. She felt like going to his room but she remembered her plans with her friend. What if he wakes up and starts chasing me again? I'll let him sleep, she said to herself. Soon, Anne's friend joined her and the two rushed to the backyard. Sometime later, Anne wondered why Julian hadn't come to the backyard yet. She was distracted and kept looking at the gate. "Mom, why is Julian sleeping so much today?" she called out as she entered the house after playing with her friend. "He is unwell, Anne" replied her mom. Anne's face fell. Before her mother could even complete her sentence, she rushed to Julian's room.Question: Which of these can be inferred from the last sentence in the passage? aAnne was upset with her Mom for leaving Julian alone in the room, so she hurried to keep him company. bAnne's mom was sad that Anne spent the evening playing with her friend. cAlthough Anne didnt like being bothered by Julian, she loved him and was concerned about him. dAlthough Mom said Julian was sleeping in his room, Anne decided to check on him. Solve the equation.-5/7 -21/55 Your ecology club has decided to write a letter to the editor of a local newspaper about protecting the biodiversity around this new highway project. As citizen- scientists, what factors would you include in your letter to help educate people, including other citizen-scientists, about the importance of preserving biodiversity? thank you for whoever answers!! Greig cephalopolysyndactyly, a developmental disorder determined by a dominant allele, can affect the hands, feet, head and/or face. In one family, the mother had fused fingers on both hands while her daughter not only had fused fingers but also developed malformations in her toes and skull. This outcome is explained by ______. The beach is located ________, which is close to my house.Select the prepositional phrase that best completes the sentence. abetween 5th Avenue and Highway 6 bin the deep and rainy forest cnear the middle of nowhere dunder the concrete parking lot The sixth grade held a bake sale to raise money for their end of the year party. Twenty moms each baked two dozen cookies. 85% of the cookies were sold at the bake sale. The principal took the left over cookies to a nearby retirement home. How many cookies did the principal take to the retirement home?