73) a scheme where the down payment is actually borrowed or carried as a second mortgage by the seller but never documented in the purchase agreement, escrow instructions, or recorded is known as:

Answers

Answer 1

A scheme where the down payment is actually borrowed or carried as a second mortgage by the seller but never documented in the purchase agreement, is known as  "silent second mortgage" or "straw loan."

The scheme you are referring to is commonly known as a "silent second mortgage" or "straw loan." This type of arrangement is often used to help a buyer who may not have enough money for a down payment, but it can be illegal and unethical.

In a silent second mortgage, the seller provides the buyer with the funds for a down payment, but the loan is not documented in the official purchase agreement, escrow instructions, or recorded with the local government. This means that the loan is not legally binding, and the buyer may not have to repay it.

To know more about second mortage click here:

https://brainly.com/question/29849124#

#SPJ11


Related Questions

The idea of a criminal justice nonsystem, in which different criminal justice agencies focus more on performance measures than on justice, is the basis of the ________ model.
Choose matching definition
1. President Ronald Reagan
2. conflict
3. Los Angeles Police Department
4. statutory law

Answers

Answer:

Los Angeles Police Department.

Explanation:

D. A. 's fail to prosecute criminals.

an investment adviser that has no office in state b would be required to be registered in state b if a representative associated with that firm sells advisory services in state b to: a 6 relatives b an investment advisory firm and 2 individuals c an investment advisory firm and 6 private individuals, of which 3 are officers of an investment advisory firm d 6 investment advisory firms

Answers

IARs (investment advisory representatives) are licenced workers who engage with customers while employed by investment advisory businesses.

An IAR's primary responsibility as a financial adviser or financial planner is to provide investment advice.

To become an IAR, a person must pass the requisite licencing test or examinations and register with the required regulating bodies.

IARs regularly participate in the activities listed below, in greater detail:

Make Recommendations: IARs utilise their expertise and judgement to recommend different securities. After evaluating a research note that incorporates the work that their organisation has done, they could choose to suggest that a consumer purchase.

For such more question on IARs

https://brainly.com/question/30296801

#SPJ4

what document(s) must be in your personal possession or readily accessible in the aircraft while operating as pilot in command of an aircraft?

Answers

As a pilot in command (PIC) of an aircraft, you must have the following document(s) in your personal possession or readily accessible in the aircraft:

Airworthiness certificate: This document certifies that the aircraft is fit for flight and meets safety and performance standards.Registration certificate: This document proves the aircraft is registered and identifies the owner of the aircraft.Radio Station License (for aircraft equipped with a radio): This document is required for aircraft that are equipped with a radio and are operated in U.S. airspace.Pilot's license: This document certifies that the pilot is qualified to operate the aircraft.Current flight manual: This document provides information about the aircraft, its systems, performance, and limitations.

Having these documents readily accessible in the aircraft ensures that the PIC is in compliance with regulations and can provide necessary information in case of an emergency or inspection by aviation authorities.

These documents must be kept current and up-to-date, and the PIC must have the necessary training and qualifications to operate the aircraft safely.

To know more about  pilot in command click on the link below:

https://brainly.com/question/28320631#

#SPJ11

15 year dependent gross income $3850 from wages yes or no

Answers

Answer:

no. Possibly from an inheritance, or small pension.

mistakes in contract law do not result from untrue statements of the other party to the contract true or false

Answers

Answer:

This statement is false. Mistakes in contract law can result from untrue statements made by one party to the other party. This is known as misrepresentation. Misrepresentation can occur when a party makes a false statement or omits important information that induces the other party to enter into the contract. If a party can prove that they entered into the contract as a result of a misrepresentation, they may be able to have the contract set aside.

One of the earliest forms of policing, kin policing, was highly formal and characterized by legally binding rules. The U.S. Secret Service provides security for the federal courts.

Answers

False: One of the earliest forms of policing, kin policing, was highly formal and characterized by legally binding rules.

Kin policing is considered by historians and anthropologists to be the earliest form of law enforcement. In this prehistoric arrangement, clan or tribe members joined forces to punish disobedient individuals by enforcing the laws of the community. Keep in mind that this approach was very informal because there were no courts or established written laws. Hence, the given statement is incorrect.

The fundamental principle of kin policing was that an attack on one individual in the group constituted an attack on the entire group. The common law of England is where the American legal system first emerged. An extensive criminal justice system that grew and changed through time was in charge of upholding those antiquated laws.

To know more about colonial England, refer to the following link:

https://brainly.com/question/9610638

#SPJ4

The authority of public safety officials to control the behavior of people, including journalists, on public property is _______ .

Answers

The authority of public safety officials to control the behavior of people, including journalists, on public property is, option 3: not unlimited but extensive.

The protection of people and property is within the purview of a public safety officer. They might ensure the security of significant assets or assist in keeping individuals out of harm's path. However, a public safety officer's specific job duties can change based on where they work. The authority is extensive, rather than unlimited. As a result, option C is the best one.

Public safety officials are responsible for preventing danger to the general public and ensuring their protection from any factors that may do so. These obligations cover any major harm, danger, or injury to the public at large. A jurisdiction designated as an alerting authority has the power to inform the public of impending natural or man-made disasters, threats, and dangerous or missing persons.

To know more about public safety, refer to the following link:

https://brainly.com/question/29845421

#SPJ4

Complete question is:

The authority of public safety officials to control the behavior of people, including journalists, on public property is _______ .

1) established by clear federal law

2) unlimited

3) not unlimited but extensive

4) absolutely overridden by the First Amendment

Which the Code pertaining to the Va. DCJS regulation governing (USO) Unarmed
Security Officer-compulsory minimum training requirements.
6 VAC 20-174-420
O 6 VAC 20-174-421
6 VAC 20-174-330
O 6 VAC 20-174-425
Next

Answers

According to Code of Virginia 18.2-308.2:2, DCJS is empowered to publish regulations for audits of criminal justice organisations to make sure that their criminal justice information systems adhere to set standards. 9.1-131 of the Virginia Code.

In Virginia, is a security guard license required?

The Department of Criminal Justice Systems has control for security officers in Virginia (DCJS). Unless they are exempted by state law (http://law.lis.virginia.gov/vacode/title9.1/chapter1/section9.1-140/), security professionals must hold credentials.

qualifications to work as a security guard

Additionally, you must be able to pass an identity check and a criminal background check. Once those requirements are satisfied, you must successfully finish a SIA training course. Additionally, you must pay for a licence.

To know more about DCJS, refer:

https://brainly.com/question/29804919

#SPJ1

Utilitarianism does not allow for exception to the rule even if justified by the consequences. True or False?

Answers

Utilitarianism forbids exceptions to the rule, even if they are justified by consequences. True.

A key notion in logic is logical consequence, which defines the link between claims that are true when one claim logically follows through one or more truths. A good logical reasoning is one where the conclusions is implied by the premises since the premises are the result of the premises. The goal of philosophic logic is to offer descriptions of the origins of logical result and logical truth. Logical consequence is required and formal, as demonstrated by examples that explain using formal proof and interpret models. For a particular language, a phrase is considered to be the logical result of a collection of sentences if and only if using solely logic, the sentence has to be true that every sentence.

Learn more about interpret here

https://brainly.com/question/14501040

#SPJ4

As noted in the beginning of the chapter, distinct differences exist between
behaviors that are considered deviant and those considered criminal. Historically,
behaviors such as drug use or prostitution were once legal but considered
deviant.
1. What factors do you believe should be taken into consideration when
deciding whether behavior is illegal?
2. What are some of the unintended/ intended consequences of criminalizing
behavior?

Answers

1. When deciding whether behavior is illegal, some factors that should be considered include:

The impact on society and individualsThe ethical implications of the behaviorThe level of harm or danger posed to othersThe cultural, moral, and social values of the communityThe consistency with existing laws and policies

What are some of the unintended/ intended consequences of criminalizing behavior?

Some unintended consequences of criminalizing behavior include:

Increased poverty and social inequalityOvercrowding of the criminal justice systemDiscriminatory enforcement of lawsCreation of a "criminal class"Increased cost for law enforcement and the criminal justice system.

Intended consequences of criminalizing behavior can include:

Deterring harmful behaviorProtecting the publicPreserving social norms and valuesEncouraging law-abiding behavior.

learn more about illegal behavior: https://brainly.com/question/18471817

#SPJ1

in the context of a business offer, most courts hold that when parties bargain face-to-face, the normal time for acceptance terminates .

Answers

In the context of a business offer, most courts hold that when parties bargain face-to-face, the normal time for acceptance terminates at the conclusion of their conversation.

A business opportunity (or bizopp) is the purchase or lease of any product, service, equipment, or other item that will allow the purchaser-licensee to start a business.

The licensor or seller of a business opportunity often says that it will secure or help the buyer in locating a suitable site, or that it will offer the product to the purchaser-licensee. This is distinct from the sale of an independent business, where the seller is not compelled to maintain a continuing connection.

Learn more about   business offer

https://brainly.com/question/30433167

#SPJ4

EMS providers must report which of these suspected events to law enforcement? Physical and mental abuse.

Answers

Answer is suspected physical and mental abuse must be reported

EMS providers must report physical and mental abuse suspected events to the law enforcement.

What is law enforcement?

Law enforcement is the exertion of some members of government who act in an systematized manner to apply the law by discovering, inhibiting, rehabilitating, or chastising people who violate the rules and morals governing that society. The term encompasses police, courts, and corrections. These three factors may operate singly of each other or inclusively, through the use of record sharing and collective cooperation. The conception of law enforcement dates back to ancient times, and forms of law enforcement and police have was in colorful forms across numerous mortal societies. Although law enforcement may be most concerned with the forestallment and discipline of crimes, associations live to discourage a wide variety ofnon-criminal violations of rules and morals, effected through the duty of less severe consequences similar as exploration.

To learn more about law enforcement, visit:

https://brainly.com/question/29422434

#SPJ4

comment on the following threats of external aggression against our country. a. Ethnic, religious, and cultural conflicts b. Terrorist c. Graft and Corruption

Answers

A threat to national security is anything that endangers the population's physical safety or undermines the institutions or economy of a country.

Threats to national security can be further classified into groups.

1. Hostile Governments – Some challenges to national security originate from hostile foreign governments. These dangers could include overt acts of aggression and war. however they can also be more discrete and difficult to spot. Election meddling and espionage are two examples.

2. Terrorism - Groups that don't formally represent a foreign government but may be supported or allowed by foreign powers also pose a threat to nations. Terrorist organisations may utilise physical violence or, in certain circumstances, cyberattacks to spread mayhem and unrest.

3. Transnational Crimes - A transnational crime is a significant extra national security danger. Transnational crime groups, according to the FBI, are organisations that engage in illicit behaviour regardless of their physical location in order to achieve power, influence, or financial benefit.

learn more about national security threat here:

https://brainly.com/question/29544880

#SPJ4

why didn't congress make subliminal advertising illegal?

Answers

Congress didn't make subliminal advertising illegal because there is little to no evidence that subliminal ads are effective.

Congress has not made subliminal advertising illegal because there is little to no evidence to suggest that subliminal ads are actually effective. Despite the fact that some people believe that subliminal advertising can influence people's behavior, there is no scientific evidence to support this claim.

Furthermore, most advertising companies do not use subliminal messages in their campaigns, as it is seen as unethical and potentially harmful. Therefore, Congress has not made subliminal advertising illegal due to the lack of evidence that it is effective.

To know more about congress, click here.

https://brainly.com/question/4736734

#SPJ4

With the Pendleton Act prohibiting political contributions from many federal workers, politicians increasingly sought money fromA.new immigrants.B.contractors doing business with the federal C.government.D.big corporations.E.foreign contributors.

Answers

With the Pendleton Act prohibiting political contributions from many federal workers, politicians increasingly sought money from, option d: big corporations.

The Pendleton Act established a merit-based system for choosing government employees and managing their work when it was approved on January 16, 1883. Politicians increasingly looked to large firms for funding as a result of the Pendleton Act, which forbade many federal employees from making political contributions. Therefore, option d is the best decision.

According to the Pendleton Act, positions in the federal government must be given to qualified candidates, and candidates must pass competitive exams in order to be chosen. Additionally, it was against the law to terminate or demote personnel who were protected by the statute due to political considerations. The law also prohibited requesting political service or donations from employees.

To know more about Pendleton Act, refer to the following link:

https://brainly.com/question/29544312

#SPJ4

In a criminal trial, society is seen as the victim whereas in a civil trial, there is an individual victim or victims.
TRUE

Answers

FALSE -

In a criminal trial, society is seen as the victim whereas in a civil trial, there is an individual victim or victims. White-collar offenses are punishable only through incarceration or restitution.

In the appeals process, the document submitted by each side arguing the points of law that support its claim that the verdict should ( or should not) be overturned is a(n) _____.

Answers

In the appeals process, the document submitted by each side arguing the points of law that support its claim that the verdict should (or should not) be overturned is called a brief.

A brief is defined as a legal document that is submitted to an appellate court in order to argue the points of law that support a claim that a verdict should be overturned. It typically includes an overview of the case, a summary of the evidence presented at trial, and a discussion of the legal precedents and statutes that support the party's position.

The brief also includes the legal arguments and reasons why the lower court's decision should be overturned or upheld. The brief is an important part of the appeals process as it is the main document that the appellate court will consider when deciding the case. It is prepared by the attorney representing the party that filed the appeal, it is usually a written submission, but in some cases it can be oral.

To learn more about Attorney:

https://brainly.com/question/29211576

what is the mhf 2191 hard?

Answers

Konversation. I'd say that one of the most difficult MH games is MHFU. In addition to the monsters' heavy attacks, the hit boxes occasionally had terrible quality, and the camera and controls were janky.

It produced a generation of extremely capable hunters who could not only hunt successfully but also solve technological challenges.Memory cost dominates the evaluation cost of hash algorithms known as memory-hard functions (MHFs). MHFs cannot be assessed at a considerably reduced cost on specialised hardware like ASICs since memory, unlike computing, costs approximately the same across multiple platforms. Memory-hard functions (MHFs) are a type of hash functions whose quick evaluation necessitates the heavy usage of memory, and whose fast evaluation implies a substantially bigger time penalty for memory-light evaluations. A memory-hard function (MHF) is a function in cryptography that requires a large amount of memory to evaluate. It contrasts from a memory-bound function, which costs money because memory latency slows down processing.

To learn more about MHFU click the link below:

brainly.com/question/23486717

#SPJ4

how to read out sections in law

Answers

Reading out sections in law involves understanding the structure and organization of legal documents, such as statutes or regulations.

To read out a section in law, one must first locate the section, which is often organized by title, chapter, and section number. Next, one must carefully read the text of the section, paying attention to any definitions or explanations of key terms.

It is also important to consider any cross-references to other sections or related laws that may impact the interpretation of the section.

Additionally, it can be helpful to research any relevant case law or legal commentary to gain a deeper understanding of the section and its application in practice. By following these steps, one can effectively read out sections in law and gain a thorough understanding of the legal provisions in question.

To know more about section in law click on the link below:

https://brainly.com/question/14447532#

#SPJ11

which factor is the most indicator of criminal behavior?

Answers

Childhood trauma, Poverty, Mental health issues etc are some of the risk factor for criminal behavior.

It is widely recognized that there is no single factor that can accurately predict criminal behavior. Rather, criminal behavior is the result of a complex interplay of multiple social, economic, psychological, and biological factors. Some of the most commonly cited risk factors for criminal behavior include:

Childhood trauma and abuse

Poverty and socio-economic disadvantage

Substance abuse and addiction

Mental health issues, such as anxiety and depression

Low educational attainment

Family history of criminal behavior

Social and peer influences

It is also important to note that an individual's environment, including the community in which they live and the social norms and values that are present, can play a significant role in shaping their behavior and attitudes towards criminal activity.

To know more about criminal behavior click here:

https://brainly.com/question/29847140#

#SPJ11

A promise not to sue another party is not consideration, because the promise does not convey any legal value to the other party.
True
False

Answers

FALSE.

A promise not to sue another party is a valid consideration, and the promise must have good faith belief in the validity of his/her claim.

Married couple plans to file separately wife age 64 gross income 4600

Answers

Answer:

hold on

Explanation:

so what is the probl3m like that u need help with

Which of the following is TRUE about nonforfeiture values?a)They are required by state law to be included in the policy.b)They are optional provisions

Answers

The assertion regarding nonforfeiture values State law mandates their inclusion in the policy is true.

Nonforfeiture values present the safeguarded right to the cash worth even if the procedure lapses or is surrendered. Upon the death of the safeguarded, the basic heir finds that the insured selected the interest-only conclusion alternative. All states have accomplished nonforfeiture regulations that demand that whole life protection tactics designate the nonforfeiture principles in a schedule in the procedure.

Life protection policyholders can select one of four nonforfeiture benefit alternatives: the cash surrender profit, widespread term protection, loan advantage, and compensated-up insurance. A nonforfeiture article guarantees that a lasting growth security procedure owner will not mislay their increased cash profit. While it's a main monetary safeguard, it demands the policyholder to make intelligent selections when selecting a payout alternative. Sometimes, a policyholder concedes the possibility of not a need the history of insurance inclusion.

To know more about insurance refer to: https://brainly.com/question/29649011

#SPJ4

Which is principally limited by the requirement of due process? a. police power b. eminent domain c. taxation d. all of these

Answers

Out of all the options, Police power is principally limited by the requirement of due process.

According to the police powers concept, when a State uses its inherent ability to regulate to defend the public interest and enacts legitimate, non-discriminatory, and proportionate laws in accordance with due process, it is not breaking the law. To distinguish between compensable expropriation and non-compensable regulatory measures, the police powers doctrine is frequently invoked. The police powers doctrine may be used in place of, or in addition to, the solitary effects doctrine or a stand-alone proportionality analysis in this situation. The "public purpose," "public interest," or "public need" conditions for justifiable expropriations specified in international investment agreements are distinct from the doctrine and should not be confused with them.

learn more about police powers here:

https://brainly.com/question/2863065

#SPJ4

the vodafone data breach in 2008, where a laptop containing sensitive information of 2 million customers was stolen from an employee's car.

Answers

It is true that a laptop holding private data on 2 million customers was stolen from an employee's car during the Vodafone data breach in 2008.

Sensitive information from the Vodafone data leak includes the customer's full name and address, call location, call duration, SMS details, and more. Although it's unclear if it's connected to Vodafone's disclosure today, a hacking organization going by the name of KelvinSecurity claimed responsibility for an attack on the telecom operator on September 3, 2022.

A data breach brought on by the unintentional actions or inactions of users or workers is known as a human error data breach. An employee might unintentionally leave a private file containing personal information on a desk with a view to the public, for instance. Unauthorized individuals could thereby access the data.

Learn more about sensitive information Visit: brainly.com/question/27580453

#SPJ4

Correct Question:

State true or false: the vodafone data breach in 2008, where a laptop containing sensitive information of 2 million customers was stolen from an employee's car.

Select all of the positive features of bureaucracy according to Max Weber.
- impersonality
- formal rules and procedures
- merit-based careers
- specialists for complex tasks
- clear hierarchy

Answers

All of the above mentioned

describe two reasons for which a court may determine legislation to be unconstitutional.

Answers

Two rea-sons for which a court may deter-mine legislation to be unconstitutional are -

1. a level of govern-ment exceeds the powers grant-ed to it by the Constitution Act, 1867

2. the legislation, enacted by any govern-ment, violates a sect-ion of the Charter.

If a statute is facially uncons-titutional, the courts ha-ve stated that it cannot be en-forced and the legislature may cho-ose to repeal an unconsti-tutional statute to avoid confusion or to re-place that statute with a new ver-sion that seeks to reach simi-lar policy go-als.

"Hub-ris is a fit wo-rd for to-day's demol-ition of the V.R.A." (Voting Rig-hts Act). In United States v. Wind-sor, the Supreme Court ruled th-at the 1996 Defense of Marriage Act (DOMA) was uncons-titutional.

To know more about unconstitutional click below:

brainly.com/question/1866606

#SPJ4

what law will be violated when you caught someone pepping in swimming pool

Answers

Children under the age of six who reside in homes with swimming pools are the primary target of Arizona's pool fence rules.

Arizona, Children under the age of six who reside in homes with swimming pools are the primary target of pool fence laws in Arizona. Regardless of whether it is an above-ground pool or an in-ground pool, the law requires that a wall or fence barrier be put in around the pool area. In reaction to the excessive number of kid pool drownings and to avoid the frequent lawsuits that follow an injury or drowning in a pool, swimming pool laws were implemented. Principles and laws from the local, county, state, and federal levels aid in ensuring the security of everyone who enters or is around a pool.

To know more about Regardless refer :

brainly.com/question/30002374

#SPJ4

an agency must have the privacy and confidentiality in mind for both landlords and tenants. what are two things that must be kept confidential for each party?

Answers

Both landlords and tenants are required by law to keep some information private. This contains the tenant's name, address, phone number, financial information, and any other details the landlord may know about the tenant law.

The area of law known as landlord-tenant law is concerned with the obligations and rights of landlords and tenants. Landlord-tenant law contains components of the real property and contract common law in common law legal systems like Irish law. However, it is commonly governed by statute in modern times. The landlord-tenant bonding is exclusively managed by legislation in civil law traditions like German law, which historically stemmed from Roman law and the ius commune. Existence of a leasehold estate establishes the relationship between a landlord and tenant. Although in England and Wales it has been obvious since 1829 that a landlord must give a tenant possession, in the United States historically the landlord's only duty was to grant the tenant the estate.

To know more about tenant law please refer:

https://brainly.com/question/29974975

#SPJ4

Use complete sentences and proper grammar. You must label your responses numerically (1-5).

Minimum of one page if possible

Explain why the South has the highest regional homicide rate.
Describe the nature of the victim-offender relationship for homicide.
Explain why the United States has a higher homicide rate than other industrial nations.
Explain why men commit most homicides and aggravated assaults.
Describe the types of robbers.

Answers

Crime impact from attachment and delinquent peers. Drug dependency may be the primary element separating offenders from people who commit crimes seldom.

What are the main factors that lead to crime?Crime impact from attachment and delinquent peers. Drug dependency may be the primary element separating offenders from people who commit crimes seldom. Family problems may be the primary cause of criminal involvement.The fundamental steps in a crime scene investigation include physical evidence identification, recording, appropriate collection, packing, preservation, and scene reconstruction.But there are significant regional variations in the legal age of criminal culpability. In North Carolina, the minimum age in the United States is just 6 years old, although other states have no minimum age at all (Cipriani, 2009).

To learn more about Crime refer to:

https://brainly.com/question/6203610

#SPJ1

Other Questions
By default, which of the following factors are used by the VMDR Prioritization Report, to prioritize vulnerabilities? Select all that apply.Vulnerability age Real time Threat IndicatorsCompliance Posture Attack Surface what is the intermolecular force of attraction for libr? When planning business analysis activities, the business analyst may break down the project tasks and then estimate the amount of work each task will require. What technique are they using?A. Decision analysisB. Functional decompositionC. Process modellingD. Risk analysis Think about something for which you'd like to save your money. What is it, and why did you choose it? What do you think will be the most challenging part about saving money for it? what volume of air contains 11.9 gg of oxygen gas at 273 kk and 1.00 atmatm ? express your answer using two significant figures. what business are interests you most at the bank of england and why (max. 200 words) Show that a = n, where n is an integer.What is the value of n? where a muscle attaches to a stationary bone parents share that their toddler often needs a snack in between meals. which snack choice is nutritious enough to give the toddler energy but also may help prevent dental caries? select all that apply. Which excerpt from the passage helps demonstrate the struggle between social constraint and personal desire?A."She set the lamp on the table, and he saw that it was carefully laid for supper, with fresh dough-nuts, stewed blueberries and his favourite pickles in a dish of red glass."B."The name threw a chill between them, and they stood a moment looking sideways at each other before Mattie said with a shy laugh. 'I guess it's about time for supper.'"C."At last, after casting about for an effective opening, he took a long gulp of tea, cleared his throat, and said: 'Looks as if there'd be more snow."D."The cat, unnoticed, had crept up on muffled paws from Zeena's seat to the table, and was stealthily elongating its body in the direction of the milk-jug . . ."E."'Well, she'll have to say it to the cat, any way!' he rejoined with a laugh, kneeling down at Mattie's side to scrape up the swimming pickles." body release excess heat via several mechanisms. Discuss the differences on howthese mechanisms contribute to heat release at rest and during exercise. the sample space contains 9 as and 5 bs. what is the probablity that a randomly selected set of 3 will include 1 a and 2 bs? Under normal circumstances which of the following plays a major role in determining membrane potential The membrane permeability to proteins The concentration gradient of sodium The concentration gradient a phosphate ions The membrane permeability to potassium Joe invested $600 in two companies, company A and B. In company B, he invested $40 more than his investment in company A. Fill in the following blanks: (1) If Joe invested x dollars in company A, how much did he invest in company B? Photon a. Having characteristics of both a wave and a particle 7. Spectral lines b. A discrete amount of energy 8. Excited c. The range of different types of electromagnetic radiation (light, x-rays, ultraviolet radiation, and so on) 9. Quantum d. States with higher energy than the ground state 10. Electromagnetic spectrum e. Discrete pattern of narrow bands produced by heated gases 11. Wave-particle duality f. A particle of electromagnetic radiation Some people think that hydroelectric and solar power should be used to supply all of the electricity for the United States. Which of the following would be a flaw in this plan? the method of DNA replication proposed by Watson and Crick is known as semi-conservative replication since each new double helix retains one strand of the original DNA double helix. the evidence for this mechanism was provided by a series of classic experiments carried out by Meselsohn and Stahl in 1958 that proceeded as follows:1) cultures of the bacterium E. Coli, which has a single circular chromosome, were grown for many generations in a medium containing the heavy isotope of nitrogen 15N2) the cells containing the DNA labeled with 15N were then transferred to a culture medium containing the normal isotope of nitrogen 14N3) after periods of time corresponding to generation time for E. Coli (50 min at 3 degrees C), samples were removed and the DNA extracted4) the DNA was then centrifuged at 40,000 times gravity for 20 hours in a solution of CsCltwo other hypotheses were advanced to explain the process of DNA replication: conservative replication and dispersive replicationbased on the above, which of the following represents the appearance of the tubes after the cells had been allowed to grow in the 14N for two generations? recent financial innovation makes the federal reserve's job of conducting monetary policy a. more difficult, since the fed no longer knows what to consider money. b. more difficult, since the fed now knows what to consider money. c. easier, since the fed now knows what to consider money. d. easier, since the fed no longer knows what to consider money. Tourism is extremely important to the economy of Florida. Hotel occupancy is an often-reported measure of visitor volume andvisitor activity (Orlando Sentinel, May 19, 2018). Hotel occupancy data for February in two consecutive years are as follows.Occupied RoomsTotal RoomsCurrent Year Previous Year1,5051,750c. Conduct a hypothesis test. What is the p-value (to 4 decimals)? What is the 95% confidence interval estimate of the change in occupancy for the one year period? To 4 decimals Someone answer these 2 please