a. was the server able to successfully find the document or not? what time was the document reply provided?

Answers

Answer 1

In general, a server will send a response to a document request, which may include an HTTP status code indicating whether the request was successful or not.

The time when the document reply is provided will depend on various factors such as the network latency, server load, and the size of the document. In any case, if you could provide more details about the specific scenario you're referring to, I'd be happy to help you answer your question more accurately. In general, a server will send a response to a document request, which may include an HTTP status code indicating whether the request was successful or not. In any case, if you could provide more details about the specific scenario you're referring to, I'd be happy to help you answer your question more accurately.

Learn more about HTTP :

https://brainly.com/question/13152961

#SPJ4


Related Questions

by recording all transactions across business network among participants, what aspect of blockchain creates the system of record?

Answers

The distributed ledger technology (DLT) used in blockchain creates the system of record by allowing all participants to have a shared and consistent view of the data that is recorded on the blockchain.

What is Blockchain?
Blockchain is an innovative technology that enables secure digital transaction without the need of a third-party. It is a decentralized, distributed digital ledger that records transactions across many computers around the world. It is secure and immutable, meaning that the data stored on the Blockchain cannot be altered or deleted. It is also designed to be open, transparent and auditable, allowing anyone to track the transactions.

To know more about Blockchain
https://brainly.com/question/30142702
#SPJ4

If you needed to create a tag that represent values that are currently stored in an sql database, which tag is ideal to use?

Answers

If you need to create a tag that represents values stored in an SQL database, the ideal tag to use would be the <data> tag.

he <data> tag is a generic tag that can be used to represent any type of data, including data retrieved from a database. The tag can be used to encapsulate the values returned by a database query in a structured format that can be easily processed and manipulated by other software components. By using the <data> tag, you can ensure that the data is well-formed and easily accessible to other components in your application. Additionally, the use of a generic tag like <data> makes your code more modular and easier to maintain in the long run. If you need to create a tag that represents values stored in an SQL database, the ideal tag to use would be the <data> tag.

Learn more about database :

https://brainly.com/question/30634903

#SPJ4

what sas statement used in a data step will make a copy of a dataset? (just give the statement name, no semi-colon or anything else.)

Answers

SET is the SAS statement used in a data step will make a copy of a dataset.

What is a SAS statement?

A SAS statement is a collection of components that could include keywords, SAS names, special characters, and operators. A semicolon marks the conclusion of every SAS statement. A SAS statement either provides data to the system or asks SAS to carry out an operation.

A new SAS data set is started with the DATA statement. The guidelines for creating DATA sets are listed below.

After the DATA statement, a single word denotes the name of the temporary data set. So, at the end of the session, the data set is deleted.

A library name can be prefixed to the data set name to make it a permanent data set. This indicates that the data set is persistent after the session has ended.

Learn more about SAS statement

https://brainly.com/question/29353403

#SPJ4

How to fix the your device is missing important security and quality fixes?

Answers

If you encounter the notice "Your device is missing essential security and quality fixes" on your Windows device, it implies that Windows has determined that some updates.

or patches are missing from your system, which might be critical to its security or performance. Here are some methods you may take to resolve the problem: Keep an eye out for updates: Check the Windows Update settings for any available updates. Install all available updates, including optional ones. Run the Windows Update Troubleshooter: Windows has a troubleshooter that can assist in identifying and resolving difficulties with Windows updates. Search for "troubleshoot" in the Start menu, pick "Troubleshoot settings" and click on "Additional troubleshooters". Choose "Windows Update" to launch the troubleshooter.

learn more about  security  here:

https://brainly.com/question/28070333

#SPJ4

Anyone know 3. 4. 7 Kid's Shapes Toy for tracy the turtle in codehs? I'll give you brainliest!!

Answers

def set_position():

penup()

setposition(-100,75)

pendown()

#make diamond

penup()

setposition(-100,75)

pendown()

begin_fill()

color("red")

circle(60,360,4)

end_fill()

#make circle

penup()

setposition(100,75)

pendown()

begin_fill()

color("blue")

circle(60)

end_fill()

#make pentagon

penup()

setposition(100,-75)

pendown()

begin_fill()

color("green")

circle(60,360,5)

end_fill()

#make half circle

penup()

setposition(-100,-75)

pendown()

begin_fill()

color("yellow")

circle(60,180)

end_fill()


I hope im correct

1. Describe what the global codex is and what is the significance of having a code. Include the law that required employers to implement a code of conduct

Answers

A code of ethics is a set of guiding ideals meant to assist professionals in acting honorably and honestly at work.

A code of ethics statement may cover a variety of subjects, such as an organization's mission and core values, the standards of professionalism to which they are held, the best approach for professionals to manage difficulties, and other subjects. An "ethical code," also called a code of ethics, can address issues like business ethics, professional practice standards, and employee conduct policies. Often times, both businesses and trade associations ask their employees and members to follow by some sort of code of ethics. A transgression of the organization's code of ethics may result in termination or dismissal.

Learn more about code here-

https://brainly.com/question/17293834

#SPJ4

explain a real-life loop you encounter in your daily life which would best be represented using a while loop using pseudocode, write the looping structure of your example explain a real-life loop you encounter in your daily life which would best be represented using a for loop using pseudocode, write the looping structure of your example

Answers

To iterate through the objects in a collection, use an item-based for loop. Applying some operations to an item is helpful.

An index-based for loop is used to repeatedly run certain logic. While loop is also helpful to repeatedly carry out a logic. To iterate through the objects in a collection, use an item-based for loop. Applying some operations to an item is helpful. An index-based for loop is used to repeatedly run certain logic. While loop is also helpful to repeatedly carry out a logic. The sample below in c#.net demonstrates this. system use; empty main () names=new names[20] in a string; counter int = 0; /for loop with an index, for (int i=0;i++;i++;i++) for loop that is item-based. string s in names; foreach console.writeline(s); } whilst loop. while(counter<20) { console.read(names[counter]; console.read(names[i]);counter++; } }counter++; } }

Learn more about Item-based for loop here:

https://brainly.com/question/13099364

#SPJ4

In comparison with a flat file system, _____ in a database.

Answers

In comparison with a flat file system,data organization in a database.

What is the database?

A database is an organized collection of structured data, generally stored and accessed electronically from a computer system. It is the collection of schemas, tables, queries, reports, views, and other objects. Database systems are used to store and manage large amounts of data. They can provide quick and easy access to data for applications, as well as ensuring data integrity and accuracy. Databases are used for a variety of purposes, including data warehousing, e-commerce, online transaction processing, data mining, and more.

To learn more about database

https://brainly.com/question/24027204

#SPJ1

The ____ interfaces is the portion of the application that allows you to control and interact with the program.

Answers

A user interface is the portion of the application that allows the user to control and to interact with the program.

How does a user interact with the application through the interface?

In a device, the point of interaction and communication between humans and computers is the user interface (UI). Display screens, keyboards, a mouse, and the appearance of a desktop are all examples of this. It also refers to how a user interacts with a website or application.

What is the OS's user interface?

The part of an operating system, program, or device that lets a user enter and receive information is known as the user interface (UI). A text-based user interface, as shown in the image to the left, displays text and typically requires keyboard input to execute its commands.

Learn more about user interface:

brainly.com/question/29541505

#SPJ4

what will the following code segment evaluate to? a ← 9 b ← 5 c ← 4 expression = a b * c display(expression)

Answers

The code segment will display the value 180.

The following given code segment will evaluate to the expression 9 * 5 * 4, which equals 180. This is because the variables "a", "b", and "c" are assigned the values 9, 5, and 4, respectively, and the expression is set to the product of these three variables. Therefore, the code segment will display the value 180.
Here is the code segment with the evaluated expression:
a ← 9
b ← 5
c ← 4
expression = a * b * c
display(expression)
The final result of this code segment is 180.

Leran more about code segment here:https://brainly.com/question/25781514

#SPJ11

10. which of the following are valid private ip addresses? (select all valid choices) a) 172.32.1.1 b) 10.255.255.255 c) 168.192.0.255 d) 192.168.0.1

Answers

Option b. 10.255.255.255c

An IP Address (Internet Protocol Address)

is a set of numaricals connected to a computer network and using the internet protocol for communication.

And a  private network in internet networking, is a computer network which uses private IP Address.

These addresses can commonly be used in any local Area networks such as offices, or residential environments.

These private IP Address are not related to any specific organization,  and anyone can use them with te approval of local and regional internet registries.

Learn more about IP Address here

https://brainly.com/question/14306158

#SPJ4

which is the first step to delete a column in a worksheet? question 7 options: select the column to the left of the column you want to delete. change the width of the column to zero. select the column you want to delete. select the column to the right of the column you want to delete.

Answers

The first step to deleting a column in a worksheet is to select the column you want to delete.

So, the correct option from the given choices is "select the column you want to delete."

What is Worksheet?

A worksheet is typically organized into rows and columns, with each intersection of a row and column forming a cell. The cells are used to input and display data, such as numbers, text, formulas, and functions. The cells can be formatted to display the data in various ways, such as font type, font size, color, and alignment.

Worksheets are commonly used for a variety of tasks, such as financial analysis, budgeting, project management, data tracking, and data visualization. They can also be used for simple tasks such as creating a grocery list or address book.

Once you have selected the column, you can then proceed to delete it. In most spreadsheet software, you can do this by right-clicking on the column and selecting "Delete" from the context menu, or by going to the "Edit" menu and selecting "Delete" or "Delete Column." Depending on the software, you may also be able to use keyboard shortcuts to delete the selected column.

Therefore, "choose the column you want to delete" is the appropriate response from the options provided.

To learn more about the worksheet click here

https://brainly.com/question/28737718

#SPJ4

what is dilations and scale factors independent practice worksheet

Answers

A worksheet for students learning about dilations and scale factors in mathematics is probably called "Dilations and Scale Factors Independent Practice Worksheet."

What are scale factors and dilation?

The scale factor is defined as the proportion of the new image's size to that of the previous image. A fixed location in the plane serves as the center of dilatation. The scale factor and the center of dilation are used to determine the dilation transformation. The image stretches if the scaling factor is greater than 1.

The scale factor worksheet is what.

The scale factor worksheets aid in students' understanding of geometrical drawings as well as scale drawings and models. The young minds will learn how to compare two figures and comprehend their scale ratio by solving scale factor puzzles.

to know more about the dilations and scale factors here:

https://brainly.com/question/8765466

#SPJ4

What do you use to separate arguments in a function?

Answers

In order to separate the arguments in a functions we apply the commas function .

How does it work?

A function is a set of instructions that, when called upon, carry out a particular task or set of tasks. It is a kind of routine or procedure that, given a certain input, produces a certain result.

A function can produce multiple outputs from a variety of inputs. Additionally, it is a standalone block of code that can be reused multiple times without having to be written over.

Functions are an essential component of programming and can be utilized to resolve difficult issues. They make it simpler for us to debug a large issue by allowing us to break it down into smaller, more manageable pieces.

Learn more about functions:

brainly.com/question/20476366

#SPJ4

You have a games console in your bedroom and a video streaming device in your lounge. You use both devices to watch movies. The Wireless Access Point is located in the lounge. You have found that you are able to stream movies at a far higher quality in the lounge than in your bedroom. Why is this?

Answers

Answer: Your ping reach time (ETA) is far faster or "lower" the closer you are to your wireless router. I hope this helps!

Explanation:

how do you create a numeric vector named ""scores""

Answers

To create a numeric vector named "scores", you can use the c() function in R. The c() function allows you to combine values into a vector.

You can specify the values you want to include in the vector within the parentheses of the c() function. For example:
scores <- c(90, 85, 92, 88, 95)
This will create a numeric vector named "scores" with the values 90, 85, 92, 88, and 95. You can also use the seq() function to create a numeric vector with a sequence of numbers. For example:
scores <- seq(90, 100, 2)
This will create a numeric vector named "scores" with the values 90, 92, 94, 96, 98, and 100.

Learn more about a numeric vector here:https://brainly.com/question/14584599

#SPJ11

what signal modifier ensures that voip packets arrive in their proper order?

Answers

A signal modifier that ensures that VoIP packets arrive in their proper order is called a "Sequence Number."

This is a unique number assigned to each VoIP packet to keep them in the correct order as they travel through the network. By using sequence numbers, any out-of-order packets can be easily identified and reordered before being delivered to the recipient. This is an important function, as it ensures that the voice data is delivered in the correct order, which is essential for maintaining the quality of the VoIP call.

To mitigate the effects of delay and jitter, VoIP systems also use techniques like jitter buffers, as I mentioned in my previous response. So, while sequence numbers are an important part of the VoIP protocol, they are usually used in combination with other techniques to ensure reliable and high-quality voice communications over the internet.

Learn more about Sequence Number here:https://brainly.com/question/28173254

#SPJ11

Microsoft Windows uses what type of file system to store your documents? - Flat - Accessible - Hierarchical - Relational

Answers

Windows uses the NTFS (New Technology File System) as its default file system for storing and managing files, which supports a range of advanced features such as file encryption, disk quotas, and file compression.

What type of file system is used to store your documents in Microsoft Windows?

Microsoft Windows uses a hierarchical file system to store documents and other files.

The hierarchical file system is often referred to as the File Explorer or Windows Explorer, and it organizes files and folders into a tree-like structure.

In this structure, the root directory is at the top, and all other directories and files are arranged below it in a hierarchical manner.

The hierarchical file system allows users to organize their files and folders in a logical and intuitive way, making it easy to navigate and locate specific documents or files.

Windows uses the NTFS (New Technology File System) as its default file system for storing and managing files, which supports a range of advanced features such as file encryption, disk quotas, and file compression.

However, Windows also supports other file systems such as FAT32 and exFAT for compatibility with other devices and operating systems.

To know more about file system, visit: https://brainly.com/question/29969853

#SPJ4

- write a c program that: a. declares a variable and a pointer and assigns a value to the variable. b. assigns the address of the variable to the pointer. c. prints the address of the pointer and the value stored. d. changes the value of the variable. e. prints the address and the value of the pointer.

Answers

A   c program that declares a variable and a pointer and assigns a value to the variable is mentioned below:

#include <stdio.h>

int main(void) {

  int var = 10; // a. declares a variable and assigns a value to the variable

  int *pointer = &var; // b. assigns the address of the variable to the pointer

  printf("Address of pointer: %p \n", pointer); // c. prints the address of the pointer

  printf("Value of pointer: %d \n", *pointer); // c. prints the value stored in the pointer

*pointer = 20; // d. changes the value of the variable

  printf("Address of pointer: %p \n", pointer); // e. prints the address and the value of the pointer

  printf("Value of pointer: %d \n", *pointer); // e. prints the address and             the value of the pointer

   return 0;

}

Explain the C program in detail.

Low-level access to system memory is provided by the general-purpose and procedural C programming language. To become an executable that can be run on a computer, a C program must be run through a C compiler.

An example of C programming is provided.

Because it can be used for low-level programming (such as driver and kernel programming), the C language is considered a system programming language. Most of the time, it's used to make OS, drivers, kernels, hardware devices, and other things. The Linux kernel, for instance, cannot be used for internet programming like Java,.Net, PHP, etc. because it is written in C.

Learn more about C program:

brainly.com/question/15683939

#SPJ4

g logplanetorbit starmetallicity logstarmass logstarage what is the second most significant predictor? logplane.

Answers

It is impossible to say whether "logplanet" is the second most significant predictor with the facts provided. Just the names of many variables—"g," "logplanetorbit," "starmetallicity," "logstarmass," and "logstarage"—are given in the statement.

Astronomers use the variable "logplanetorbit" to characterise a planet's orbital properties around a star. It is the logarithm of the planet's day-based orbital period, which represents how long it takes the planet to complete one cycle around the star. The distribution of orbital periods, which might range from a few days to several years, is simplified using the logarithmic transformation to make it easier to statistically analyse. In studies of exoplanets, or planets outside of our solar system, "logplanetorbit" is frequently used as a predictor variable to look at the links between the planet's orbital period and other variables like the planet's mass or the features of its host star.

Learn more about "logplanetorbit" here:

https://brainly.com/question/13816891

#SPJ4

Please I need answers

Answers

Enter data is the answer

By recording all transactions across business network among participants. What aspect of blockchain creates the system of record?

Answers

By recording all transactions across the business network among participants. The aspect of blockchain that creates the system of record is its distributed ledger technology.

What Is Blockchain?

Blockchain is a decentralized digital ledger technology that allows multiple parties to securely and transparently record, store and verify transactions without the need for intermediaries, such as banks or other third-party institutions. In a blockchain network, transactions are grouped into blocks and then added to a chain of previous blocks, forming an immutable and transparent record of all transactions on the network.

Each block in a blockchain contains a cryptographic hash of the previous block, which creates a secure and tamper-proof link between all the blocks. This makes it virtually impossible to alter or manipulate any transactions on the network without detection, as any changes to a block would affect all subsequent blocks in the chain, causing the hash values to become invalid.

A distributed ledger is a database that is spread across a network of computers, where each computer on the network has a copy of the entire ledger. This means that every transaction that occurs on the network is recorded on multiple copies of the ledger, making it difficult to alter or tamper with the records.

In a blockchain network, transactions are grouped into blocks and then added to the chain of previous blocks, forming a chronological and immutable record of all transactions on the network. This decentralized and transparent system of record provides a high level of security, privacy, and reliability, and eliminates the need for intermediaries or central authorities to validate transactions.

Therefore,  the combination of the distributed ledger, consensus mechanism, and cryptographic hash functions used to link each block together creates a transparent, secure, and auditable system of record for all transactions on the network.

To learn more about Blockchain click here

https://brainly.com/question/30088493

#SPJ4

The Percent Style button formats selected cells as a percentage with ________.A)one decimal placeB)two decimal placesC)three decimal placesD)zero decimal places

Answers

Answer:

(b) two decimal places

Explanation:

dr. pendelton reviews a status report from his research partner. feedback travels to sender. sender encodes message. message travels over channel. receiver decodes message. sender has an idea.

Answers

Feedback enables the communication's sender to confirm that their message has been received and comprehended. The medium through which a message is transmitted is called a channel.

Is the channel the medium used to transmit a message?

The method used to transmit a communication message is called the channel. The message needs to be delivered, thus the sender uses a channel known as a communication. A communication channel disruption prevents the recipient from correctly deciphering the message.

Is there a message being decoded?

Decoding is the process through which the receiver converts an encoded message into a usable form.

To know more about Decoding visit:-

https://brainly.com/question/14587021

#SPJ1

as the it administrator for a small corporate network, you periodically check the firewall configuration on the corpdata linux server to make sure everything is secure. in this lab, select view lab and type iptables -l at the prompt to answer the following question: which two tcp services have been allowed through the firewall?

Answers

The two TCP services allowed through the firewall are SSH (port 22) and SMTP (port 25).

What is  firewall ?

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Firewalls are typically configured to reject or block all incoming network connections, while allowing all outgoing connections. Firewalls can be implemented both in hardware and software, or a combination of both .A firewall is a security device used to control and manage inbound and outbound network traffic between an organization's internal network and the Internet or other external networks. The main purpose of a firewall is to block unauthorized access to or from a network while allowing authorized traffic. Firewalls can be implemented in many ways. B. As software running on a computer or dedicated hardware device. Typically, data packets are analyzed as they pass through a firewall and decisions are made whether to allow or block the packet based on preconfigured rules and policies

To learn more about firewall visit

brainly.com/question/3221529

#SPJ1

which statement about exception handling is false? group of answer choices none of the above statements in false. the catch block contains the code that handles an exception if one occurs. bounds checking is performed at execution time with vector member function at, and if a subscript is within the bounds of the array, the member function throws an out of bounds exception. call the exception object's what member function to get the error message that's stored in the exception object.

Answers

The statement that is false is "none of the above statements is false." This is because, in fact, the statement "none of the above statements is false" is a statement in itself, and it may or may not be true.

As for the other statements, they are all true. The catch block is used to handle exceptions that occur during the execution of a program. The vector member function at performs bounds checking at execution time and throws an out of bounds exception if the subscript is outside the bounds of the array. And finally, the what member function of the exception object can be called to retrieve the error message stored in the exception object. Exception handling is an important concept in programming because it allows developers to gracefully handle errors and exceptions that may occur during the execution of a program. The statement that is false is "none of the above statements is false." This is because, in fact, the statement "none of the above statements is false" is a statement in itself, and it may or may not be true.

Learn more about array :

https://brainly.com/question/19570024

#SPJ4

suppose a new standard, the iddd-643 standard, is developed for storing numbers in a string of 16 bits. the first bit is used for the sign of the number (0 if positive and 1 if negative). the next five bits store the exponent plus the bias, and the remaining 10 bits store the mantissa. the bias is 15 and no bits are reserved for any special purposes. what is the smallest exponent that can be stored?

Answers

Suppose a new standard, the iddd-643 standard, is developed for storing numbers in a string of 16 bits .The smallest exponent that can be stored is -15

Exponent: What is it?

The number of times a number must be multiplied by itself is the definition of the mathematical concept of the exponent. The character "" stands for it. For instance, if the number 5 has a 2 as its exponent, its representation is 5².

This indicates that 25 must be obtained by multiplying 5 twice by itself. Scientific notation also makes use of exponents to represent extremely large numbers. 4.5 x 10⁶ is, for instance, equivalent to 4,500,000. To make large numbers easier to understand and more concise, exponents are used. Additionally, they are used to represent powers and operations in algebra.

Learn more about exponents:

brainly.com/question/22283047

#SPJ4

what is the minimum amount of available buffer space advertised at the received for the entire trace? does the lack of receiver buffer space ever throttle the sender? g

Answers

The minimum amount of available buffer space advertised at the receiver  Information  for the entire trace is zero. Yes, the lack of receiver buffer space can throttle the sender if the receiver does not have enough buffer space to handle the incoming traffic.

The minimum amount of available buffer space advertised at the receiver for the entire trace is zero. This means that at some point in the trace, the receiver buffer was completely filled, and no more data could be accepted. When the receiver buffer is full, the sender will be throttled and will need to reduce their transmission rate in order to allow the receiver to process the data in their buffer. This can cause a decrease in performance if the sender is sending data faster than the receiver can handle. In the case of buffer overflow, the sender will be forced to decrease the transmission rate until the receiver is able to keep up with the data stream. The lack of receiver buffer space can also cause packet loss if the sender is unable to reduce their transmission rate fast enough to prevent the buffer from overflowing.

Learn more about Information here:

brainly.com/question/12947584

#SPJ4

When you can change the internal model without affecting the conceptual model, you have ________.
a. conceptual separation
b. physical independence
c. structural distinction
d. logical independence

Answers

The correct answer is d. logical independence.

Logical independence
refers to the ability to make changes to the internal model without affecting the conceptual model. This is an important concept in database design, as it allows for flexibility and adaptability in the design and implementation of a database.

In contrast, conceptual separation (a) refers to the separation of different conceptual models within a system, physical independence (b) refers to the ability to make changes to the physical structure of a database without affecting the logical structure, and structural distinction (c) refers to the separation of different structural elements within a system.

Therefore, the correct answer to the question "When you can change the internal model without affecting the conceptual model, you have ________" is d. logical independence.

Learn more about  logical independence, here; https://brainly.com/question/28582120

#SPJ11

what keyboard shortcut clears content for selected cells?

Answers

The Keyboard shortcut  to clear content for selected cells is: Ctrl+Shift+Del.

What is Keyboard?
A keyboard is a device used to input data into a computer or other electronic device. It typically contains keys for each of the letters of the alphabet, numbers, punctuation marks, and other keys for special functions. The keys are arranged in a standard layout, making it easier for users to quickly and accurately type out words and phrases. Keyboards can also be used to control video games and other applications. With the advent of wireless technology, keyboards have become increasingly popular for use with laptops and tablets.

To know more about Keyboards
brainly.com/question/26632484
#SPJ4

Other Questions
Han spent 60 minutes practicing the piano over the weekend. Priya practiced the violin for 75% as much time as Han practiced the piano. How long did she practice? unless the new individualized quality control plan (iqcp) is used, clia'88 requires how many levels of controls and at what time intervals for most methods in the clinical laboratory? a coordinator will select 4 songs from a list of 10 songs to compose an event's musical entertainment lineup. how many different lineups are possible? The Persians developed a or a complex structure of government office A. bazaarB. networkC. bureaucracyD. caravan A rectangular garden has a length of 4z + 17 feet and a width of 6z feet. Which expression represents thearea of the garden in square feet? Rewrite the equation in Ax+By=C formy+2=-4(x-1) Find the sum. Give your answer as asimplified mixed number children who have not been formally identified as having a disability but who may be developing conditions that lead to one are called_____. a defendant was recognized as legally insane by the court and was sent to a psychiatric facility. the forensic nurse is assigned to assess the defendant and to conduct group acitivities. which role of forensic psychiatric nursing does the nurse assume What is TRUE about Newton's third law of motion?O A.OB.O C.O D.It says that moving objects will keep moving if possible.It states that force can be produced by mass and acceleration.It has been widely disproven over centuries of testing.It explains that every action has an equal and opposite reaction. which molecule did carl woese study to produce his tree of life? WHY STUDENT MUST PAY ATTENTION IN CLASS 2. a. b. C. d. Use the world time zone map to work out the time differences When it is 12:00 in Britain (on the Greenwich Meridian), what is the time in South Africa (30E) When it is 12:00 in Britain (on the Greenwich Meridian), what is the time in California on the West coast of America? A football match begins in Sydney (on the east coast of Australia) at 4pm (16:00) on Saturday What time would we watch the game live in South Africa? How many time zones are there in America? How many time zones are there in Africa? Describe a situation in which these two velocity vectors are different. Use complete sentences. What change has Gregor's sister, Grete, undergone since Gregor turned into abug?A. She is rude to her parents and refuses to do what they ask.B. She is often ill and stays in bed all day, crying about the change inGregor.OC. She works outside the home and helps to support the family.O D. She is more helpful around the house and now takes care ofGregor. Eleanor and ParkWhat is a quote, with the page number, showing Richie being manipulative, self-centered, violent, or evil? Pls show your work thank you will mark the Brainliest Your questions to answer:1. Due to the rising costs of eggs due to the Avian (Bird Flu) Flu that is seeing the Chicken's of the USA die due to the disease in large numbers, Bakeries around the nation have seen their cost of production rise by about 25% due to the added expense of the eggs that go into most bakery products like donuts, muffins, cakes, and cookies. What "Determinant" will help you with this question to state the "first shift" that happens?2. More Consumers are buying computers due to the widespread rise nationally of people turning to internet based buying services. What graph shows the immediate impact due to the sale of more computers? (What "Determinant" will help you with this question?)3. The USA Auto industry sees a Ten Percent rise in sales due to the "USA poplulation increases"; as highly skilled workers immigrate to accept high paying jobs in the USA. What graph shows the most immediate impact in the USA? (What "Determinant will help you with this question?) 4. To reduce the National Debt of the USA, Congress passes a bill that raises the income taxes of each taxpayer by 10%. What graph shows the first and immediate impact? (what "Determinant" will help you with this question?) 5. Health officials in each state enact "Safety Measures" that will apply to all businesses to insure USA workers will not be put at risk in their workplaces. What graph shows the most immediate impact on the Supply and Demand graphs? (What "Determinant will help you with this question?) For a given recipe, 16 cups of flour are mixed with 8 cups of sugar. How many cups of flour should be used if 12 cups of sugar are used? In stabilizing selection, what occurs in a population?a. The population shifts toward one of two extreme phenotypes.b. Both extreme phenotypes shift toward the middle.c. The intermediate phenotype becomes more common.d. The intermediate phenotype becomes rare.