Which 2 tasks should be completed monthly as part of the month-end review process? quickbooks online
Managing receipts and bills
Reconciling accounts
Completing and filing IRS Forms W-2 and 1099
Filing estimated taxes
Resolving incomplete transactions

Answers

Answer 1

The two tasks that should be completed monthly as part of the month-end review process in QuickBooks Online are reconciling accounts and resolving incomplete transactions.

1) Reconciling accounts: Reconciling accounts involves comparing the transactions in QuickBooks with those on your bank statement and ensuring that they match. This helps you identify any discrepancies and make any necessary adjustments. Here are the steps to reconcile accounts in QuickBooks Online:

a. Go to the Accounting tab and select "Reconcile."

b. Choose the account you want to reconcile.

c. Enter the ending balance and ending date from your bank statement.

d. Match the transactions in QuickBooks with those on your bank statement.

e. Click "Finish" when the difference is zero.

2) Resolving incomplete transactions: Incomplete transactions are those that have been entered into QuickBooks but have not been fully processed or recorded. These transactions can cause discrepancies in your financial records if not resolved. Here are the steps to resolve incomplete transactions in QuickBooks Online:

a. Go to the Banking tab and select "For Review."

b. Identify any incomplete transactions.

c. Choose the appropriate action for each transaction (e.g., add, match, exclude).

d. Click "Batch actions" and select "Accept" to process the selected transactions.

By completing these two tasks each month, you can maintain accurate financial records and ensure that your financial information is up-to-date and reliable.

Learn more about QuickBooks Online:

https://brainly.com/question/20734390

#SPJ11


Related Questions

Having detailed logging serves which of the following purposes? Check all that apply.
• Event reconstruction
• Data protection
• Vulnerability detection
• Auditing

Answers

Detailed logging serves multiple purposes, and auditing is one of them.

When a system or application is equipped with detailed logging capabilities, it can record various events and activities, such as user actions, system events, and error messages. These logs can be used to investigate security incidents, troubleshoot issues, and verify compliance with regulatory requirements.

Auditing is one of the primary purposes of detailed logging. It allows organizations to monitor and analyze user activity, detect unauthorized access attempts, and identify potential security threats. Auditing also helps organizations ensure that their systems and applications are being used appropriately and in compliance with internal policies and external regulations.

In addition to auditing, detailed logging can also serve other purposes, such as performance monitoring, capacity planning, and system troubleshooting. By analyzing log data, organizations can identify bottlenecks, diagnose performance issues, and optimize system configurations.

For more such questions on auditing:

https://brainly.com/question/29979411

#SPJ11

Which resource allows you to collaborate about design plans without packaging your project's design assets?

Answers

A resource that allows you to collaborate on design plans without packaging your project's design assets is a cloud-based design platform, such as Figma or Adobe XD.

These tools provide a centralized workspace where team members can work together on designs in real-time, streamlining the collaboration process. Figma and Adobe XD offer features such as version control, commenting, and prototyping, which facilitate communication among team members and help track design changes. They eliminate the need to package and send design assets, as all resources are accessible within the platform. Additionally, these platforms support integrations with other tools such as Slack and Trello, further enhancing team communication and project management. By using a cloud-based design platform, design teams can efficiently collaborate, iterate, and bring their ideas to life, all without the hassle of packaging and sharing design assets.

Learn more about Adobe XD here-

https://brainly.com/question/30780488

#SPJ11

​ Many organizations and institutions are moving toward using Social Security numbers as primary keys because of privacy issues. T/F

Answers

This is true.

i would explain, but i keep receiving an error message for my explanation and im not sure why.

Consider the following page reference string: 7, 2, 3, 1, 2, 5, 3, 4, 6, 7, 7, 1, 0, 5, 4, 6, 2, 3, 0 , 1. Assuming demand paging with three frames, how many page faults would occur for the following replacement algorithms

Answers

The number of page faults for the given page reference string and three frames would be: LRU: 9 page faults FIFO: 9 page faults Optimal: 7 page faults

LRU (Least Recently Used) algorithm replaces the page which has not been used for the longest time. In this case, LRU algorithm would result in 9 page faults.

FIFO (First In First Out) algorithm replaces the page which has been in memory for the longest time. In this case, FIFO algorithm would also result in 9 page faults.

Optimal algorithm replaces the page that will not be used for the longest time in the future. In this case, Optimal algorithm would result in the least number of page faults, which is 7.

learn more about reference here:

https://brainly.com/question/29856092

#SPJ11

Which of the following are characteristics of a rootkit? (Select two.)
(a) Monitors user actions and opens pop-ups based on user preferences.
(b) Uses cookies saved on the hard drive to track user preferences.
(c) Requires administrator-level privileges for installation.
(d) Resides below regular antivirus software detection.
(e) Collects various types of personal information.

Answers

The characteristics of a rootkit are requires administrator-level privileges for installation and resides below regular antivirus software detection. Option C and D is correct.

A rootkit is a type of malicious software that is designed to gain unauthorized access to a computer or network, and to conceal its presence from detection by antivirus or other security software. Rootkits typically require administrator-level privileges to install, and once installed, they can hide their presence from system administrators and security software.

Rootkits are often used to gain access to sensitive data, such as login credentials or financial information, and to control the infected system remotely. They can be difficult to detect and remove, as they are designed to remain hidden from both the user and the operating system.

Therefore, option C and D is correct.

Learn more about rootkit https://brainly.com/question/13068606

#SPJ11

Final answer:

A rootkit is a form of malicious software that needs administrator-level privileges for installation. It is able to reside undetected under regular antivirus software, operating at a more fundamental system level.

Explanation:

A rootkit is a type of malicious software (malware) that provides privileged access to a computer. It camouflages itself to evade detection from antivirus software and takes advantage of this stealth to give hackers control over your system.

From the options provided, the characteristics of a rootkit are:

Requires administrator-level privileges for installation - Rootkits typically need administrator-level access to install themselves to a system. This is because they operate at a very fundamental level of the system, right down to the operating system itself. Resides below regular antivirus software detection - A defining characteristic of a rootkit is its stealth. It operates beneath the level at which antivirus programs usually detect malware, which allows it to remain hidden on a system for a long time.

Learn more about Rootkit here:

https://brainly.com/question/32158000

Question 17.
What is the capacity of a single-sided, dual-layer DVD?
A) 4.7 GB B) 8.5 GB C) 9.4 GB D) 17.1 GB

Answers

The capacity of a single-sided, dual-layer DVD is 8.5 GB. So, the correct answer is B) 8.5 GB. Dual-layer DVD is a type of optical disc format that can store up to 8.5 gigabytes (GB) of digital data on a single disc by using two layers of data storage instead of one.

Dual-layer DVDs have a standard size and shape that is similar to a regular single-layer DVD, but with an additional layer of data storage.

The two layers in a dual-layer DVD are separated by a semi-reflective layer, which allows the DVD player's laser to read data from both layers. The first layer is located closer to the surface of the disc, and the second layer is located underneath it, closer to the center of the disc.

Dual-layer DVDs are commonly used for storing high-definition movies and other large files, as they can hold more data than a single-layer DVD. They are compatible with most DVD players and can be played on any device that supports DVD playback.

To learn more about DVD Here:

https://brainly.com/question/30526632

#SPJ11

The GRANT command to indicate that a user has all privileges includes the FULL privilege.​ T/F

Answers

True. The GRANT command is used to give specific privileges to a user in a database.

When granting all privileges to a user, the FULL privilege is included. This means that the user will have complete access and control over the database, including the ability to create and modify tables, manipulate data, and grant privileges to other users. It is important to use the GRANT command carefully and only give privileges to trusted users who need them. Giving too many privileges to too many users can increase the risk of unauthorized access, data breaches, and other security issues. Therefore, it is essential to understand the different types of privileges available and use them judiciously to ensure the security and integrity of the database. In summary, the GRANT command is a powerful tool that can be used to give users the necessary privileges to perform their tasks, but it should be used with caution to avoid potential security risks.

Learn more about database here: https://brainly.com/question/29774533

#SPJ11

In C++, ____ is called the scope resolution operator.
Answers:
a. ::
b.?
c.:
d..

Answers

In C++, _(::)_ is called the scope resolution operator.

Hence, the correct option is A.

This operator is used to identify the scope of a specific variable, function, or other identifiers within a program.

It allows you to access global variables, class members, or namespace elements when there is ambiguity or the need to distinguish between different scopes.

The scope resolution operator is particularly useful in situations where local and global variables share the same name, or when accessing static class members and base class functions in derived classes.

So, the correct answer to your question is (a) ::.

Learn more about scope resolution operator at

https://brainly.com/question/17102008

#SPJ11

True or False: If the Transmission Event from the message's Transmission Data shows Email Received via Auto Allow list, this means Auto Allow was applied correctly.

Answers

True, If the Transmission Event indicates that the email was received via the Auto Allow list, it means that the Auto Allow feature was applied correctly and the email was allowed through based on the list.

An auto allow entry is automatically deleted if no emails are sent to the address for 120 days. By default email addresses are not added to the trusted database if: Auto-responses are sent (e.g. Out of Office messages). Suspected spam related emails are released and the recipient subsequently replies to the sender.

Learn more about cyber security: https://brainly.com/question/24856293

#SPJ11

With RL implemented as a priority list, the range of priorities is [n1:n2], where n1 and n2 can be:
T or F?
n1 = 0, n2 = 0

Answers

If the range of priorities in a reinforcement learning (RL) implementation is specified as [n1:n2], where n1 = 0 and n2 = 0, this means that there is only one priority level, which is 0. This is the lowest priority level and indicates that the corresponding task or action has the least importance or urgency.

In an RL implementation based on a priority list, tasks or actions are assigned priorities based on their relative importance or urgency. The priority levels usually range from the lowest (e.g., 0) to the highest (e.g., n). By setting both n1 and n2 to 0, the priority range is limited to only one priority level, which can simplify the implementation and reduce the computational complexity. However, using a single priority level may not be sufficient to capture the complexity of some RL problems, which may require a wider range of priorities to achieve optimal performance. Therefore, the choice of priority range depends on the specific requirements of the RL problem at hand.

To learn more about reinforcement  click on the link below:

brainly.com/question/30115326

#SPJ11

How can you check if a log file has been initialized?

Answers

To check if a log file has been initialized, you can look for the file in the specified directory or location.


To check if a log file has been initialized, follow these steps:

1. Locate the log file: Identify the location of the log file on your system. This can be in a default directory or a custom location specified by the application or system.

2. Access the log file: Open the log file using a text editor or log viewer tool. This could be Notepad, Notepad++, or any other similar application.

3. Inspect the log file content: Look for entries within the log file that indicate initialization or startup messages. These messages may contain terms like "Initialization", "Startup", "Log started", or similar phrases, depending on the application or system generating the log.

By following these steps, you can check if a log file has been initialized.

To learn more about log file visit : https://brainly.com/question/29427846

#SPJ11

28. What is a NAT firewall and how does it work?

Answers

A NAT (Network Address Translation) firewall is a type of firewall that is used to protect a private network from external threats. It works by hiding the IP addresses of the devices on the private network and presenting a single IP address to the public network.

This makes it difficult for hackers to identify individual devices on the private network and launch attacks against them.
NAT firewall also allows multiple devices to share a single public IP address, which conserves IP addresses and makes it more difficult for attackers to find a way into the network. NAT firewall can be implemented using software or hardware, and it is commonly used in small to medium-sized businesses and home networks.
Overall, a NAT firewall is an essential security measure that helps to protect private networks from external threats and keeps sensitive data safe from unauthorized access.

learn more about NAT (Network Address Translation) here:

https://brainly.com/question/13105976

#SPJ11

Given a single word in a sentence, how do we predict the words in a context around it?

Answers

To determine the corresponding word given the selected target word, skip-gram is employed. Here, the subject word is input, and the output is the context words.

To determine the context language for a given target spoken word, skip-gram is employed. It is the CBOW algorithm inverted. Here, the target word is entered and the surrounding words are produced.  

Take into consideration the previous phrase, The phrase is broken down into word pairs by the model. Thsi will be helping in building the situation to a great extent, As the words will be predicted easily.

Learn more about target, here:

https://brainly.com/question/28192371

#SPJ4

65) An acceptable use policy defines the acceptable level of access to information assets for different users.
A) TRUE
B) FALSE

Answers

The given statement is false.

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment including desktop.

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.

Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.

Hence the given statement is false.

Learn more about acceptable use policy click;

https://brainly.com/question/2625500

#SPJ4

An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ___

Answers

An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem's root cause.

When troubleshooting network problems, it is crucial for administrators to ask specific questions that help uncover the underlying cause of the issue. By asking targeted and precise questions, administrators can gather relevant information about the problem, analyze the symptoms, and narrow down the potential causes. These questions aim to identify the root cause of the problem, which could be related to network configuration, hardware failure, software issues, connectivity problems, or other factors.

By understanding the underlying cause, administrators can effectively address the problem, implement appropriate solutions, and prevent similar issues from recurring in the future. Asking specific questions during the troubleshooting process enables a systematic approach and increases the chances of accurate diagnosis and resolution.

You can learn more about troubleshooting network problems at

https://brainly.com/question/30000248

#SPJ11

Which two must be identified when developing a Photoshop Project plan?

Answers

When developing a Photoshop project plan, there are several key factors that must be identified to ensure the success of the project. Two of the most important factors that need to be identified are the project objectives and the target audience.

Project objectives are the goals that the project aims to achieve. These objectives must be clearly defined and agreed upon by all stakeholders involved in the project. They should also be specific, measurable, achievable, relevant, and time-bound. This helps to ensure that everyone is working towards the same goals and that progress can be tracked and evaluated throughout the project. Identifying the target audience is also essential when developing a Photoshop project plan. This involves understanding who the project is intended for, what their needs and preferences are, and what they are looking to achieve from the project. This information can help to guide decisions around the design, content, and delivery of the project to ensure that it is engaging, relevant, and effective.

Other important factors that need to be identified when developing a Photoshop project plan include the scope of the project, the budget and timeline, the resources required, and the risks and challenges that may need to be addressed. By carefully considering all of these factors, you can create a robust and effective project plan that will help you to achieve your objectives and deliver a successful outcome.

Learn more about Photoshop project plan here-

https://brainly.com/question/30793724

#SPJ11

The various ways in which a message can be sent, ranging from one-on-one in-person meetings to Internet message boards, are called _____.

Answers

The various ways in which a message can be sent, ranging from one-on-one in-person meetings to Internet message boards, are called communication.

The various ways in which a message can be sent are collectively referred to as communication channels. These channels range from traditional methods such as face-to-face conversations, phone calls, and written correspondence to modern methods like email, social media, and instant messaging.

The choice of communication channel depends on the context and purpose of the message being communicated. For instance, in-person meetings may be preferred for sensitive or confidential conversations while email may be better for non-urgent messages that require documentation.

Internet message boards are suitable for public discussions and sharing information with a large audience. In today's digital age, there is a plethora of communication channels available, making it easier than ever to connect and interact with others across the globe.

To learn more about : communication

https://brainly.com/question/28153246

#SPJ11

(t/f) roman numerals are usually changed words

Answers

The given statement "Roman numerals are usually changed words" is false because Roman numerals are a system of numeric notation that uses a combination of letters from the Latin alphabet to represent numbers.

The Roman numeral system has been in use since ancient Rome and has been adopted in many different contexts throughout history, such as in the numbering of monarchs, popes, and wars. The symbols used in Roman numerals are not changed words, but rather specific letters that represent certain values.

For example, "I" represents the number 1, "V" represents 5, and "X" represents 10. Therefore, Roman numerals are a standardized system of notation, not a set of modified words.

For more questions like Roman click the link below:

https://brainly.com/question/16960010

#SPJ11

TRUE or FALSE:
C++ is a procedural language that is widely used by today's programmers.

Answers

The statement is false because it over-generalizes C++ as solely a procedural language and may not accurately reflect the current popularity of the language.

C++ is not solely a procedural language, but rather a multi-paradigm language that supports procedural, object-oriented, and generic programming paradigms. While procedural programming can be used in C++, the language also allows for other programming styles, including object-oriented programming and generic programming.

Additionally, while C++ has been widely used by programmers in the past, its popularity has been decreasing in recent years in favor of other languages such as Python, Java, and JavaScript. However, C++ is still used in certain fields such as gaming, high-performance computing, and embedded systems.

Learn more about procedural language https://brainly.com/question/8586987

#SPJ11

15. What are some future technologies that might change how we access the Internet?

Answers

5G Wireless Networks: The rollout of 5G wireless networks will allow for faster and more reliable internet connections, which could revolutionize the way we access the internet on our mobile devices.

Quantum Computing: Quantum computers have the potential to solve complex problems much faster than classical computers, which could lead to advances in areas such as cryptography and artificial intelligence.Augmented Reality (AR) and Virtual Reality (VR): As AR and VR technologies continue to develop, they could change the way we interact with the internet by creating immersive experiences that blend the physical and digital worlds.Internet of Things (IoT): The proliferation of connected devices that make up the IoT will create new ways of accessing and interacting with the internet. This could lead to new services and applications that are tailored to specific devices or environments.

To learn more about networks click the link below:

brainly.com/question/14042787

#SPJ11

When concurrently processing instructions, a shared memory computer works well with a common data set in a _____ memory space.

Answers

Centralized

When concurrently processing instructions, a shared memory computer works well with a common data set in a centralized memory space. This allows for efficient communication and synchronization between the different processing units accessing the shared data.

Centralized memory space is a computer architecture where all memory is accessed through a single controller or address space. It simplifies memory management and communication, but can limit scalability and create performance issues.

To know more processing units about visit:

brainly.com/question/28704704

#SPJ11

XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.
a. true
b. false

Answers

The statement "XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data" is false.

While it is true that XML is primarily used for describing and structuring data, it can be used for various purposes beyond just presenting data on web pages. For instance, XML can be used for storing and exchanging data across different systems and applications. On the other hand, while HTML is primarily used for presenting data on web pages, it can also be used for communication and storage of data. However, HTML is not designed for this purpose and is not as effective as other programming languages or data storage technologies. So, both XML and HTML have their unique capabilities and limitations, and they are often used in conjunction with each other to achieve specific goals.

learn more about statement "XML  here:

https://brainly.com/question/30401297

#SPJ11

"Safe languages" and "safe libraries" are so-called because:
a. They automatically detect some forms of input attacks
b. They automatically detect parameter tampering
c. They automatically detect script injection
d. They automatically detect malware attacks

Answers

Safe languages and safe libraries are referred to as such because they have built-in features that automatically detect some forms of input attacks.

These attacks may include parameter tampering, script injection, and malware attacks. Safe languages and libraries have been designed to prevent such attacks from happening in the first place. For instance, a safe language may have a feature that checks the input data for any malicious scripts or commands before executing it. Similarly, a safe library may have functions that automatically check the parameters passed to it, ensuring that they are within safe limits. In this way, safe languages and libraries provide an additional layer of security to software applications.

It is important to note that while safe languages and libraries are beneficial, they do not offer complete protection against all types of attacks. It is still important to follow best practices when writing and deploying software applications, such as sanitizing user inputs and regularly updating software to address vulnerabilities. In summary, safe languages and libraries are called so because they can automatically detect some forms of input attacks, adding an extra layer of security to software applications. However, they are not foolproof and should be used in conjunction with other security measures.

Learn more about software here : https://brainly.com/question/985406

#SPJ11

29. What is a security hole and how do you fix it?

Answers

A security hole is a vulnerability or weakness in a system that can be exploited by hackers to gain unauthorized access or steal data.

Security holes can occur due to outdated software, weak passwords, unsecured networks, or lack of security patches. To fix a security hole, you should first identify the root cause of the problem and assess the risk. Then, you should implement security measures such as installing security patches, updating software, enforcing strong passwords, encrypting data, and securing the network. Regular vulnerability scans and security audits can also help to detect and fix security holes before they are exploited. It is important to regularly monitor and maintain security measures to ensure that the system remains secure.

learn more about security hole here:

https://brainly.com/question/28649449

#SPJ11

the standard paper speed for electronic fetal monitor tracings in the united states is:

Answers

The standard paper speed for electronic fetal monitor tracings in the United States is 3 centimeters per minute.

Electronic fetal monitors are used to track the baby's heart rate and the mother's contractions during labor. This helps medical professionals monitor the baby's well-being and make necessary decisions during the birthing process.

The standard paper speed for electronic fetal monitor tracings in the United States is 3 centimeters per minute, meaning that the machine prints out a strip of paper that moves at a rate of 3 centimeters per minute. This strip of paper records the fetal heart rate and uterine contractions during labor and delivery. The slower speed allows for a more detailed record of these events, making it easier for healthcare providers to monitor the progress of labor and identify any potential issues that may arise.

To know more about monitor tracings visit: https://brainly.com/question/31359727

#SPJ11

Check all of the clues that would help someone identify this key term. the title or section heading the first or last sentence a repeated word or phrase a signal word or phrase

Answers

The clues that could help a person identify the key term "Revolution" are The first or last sentence; and a repeated word or phrase. The correct options are b and c.

A revolution is a fundamental and relatively sudden change in political power and political organization which occurs when the population revolts against the government, typically due to perceived oppression or political incompetence.

The word revolutions have occurred throughout human history and vary widely in terms of methods, duration, and motivating ideology. Their results include major changes in culture, economy, and socio-political institutions, usually in response to perceived overwhelming autocracy or plutocracy.

Learn more about revolution, here:

https://brainly.com/question/1291142

#SPJ4

In Microsoft Access, the ____ function displays a value in uppercase letters.
a.​ UCASE
b.​ LARGE
c.​ UPPER
d.​CAPITAL

Answers

In Microsoft Access, the UCASE function displays a value in uppercase letters. So, the correct answer is: a. UCASE Microsoft Access is a relational database management system (RDBMS) developed by Microsoft Corporation. It is a member of the Microsoft Office suite of applications and is used to create, manage, and manipulate databases.

Access provides an easy-to-use graphical interface that allows users to create and manipulate database objects, such as tables, queries, forms, and reports.

Access databases can store and manage large amounts of data, making it a powerful tool for businesses and individuals to organize, analyze, and report on their data. The database structure is based on the relational model, which means that data is stored in tables that are related to each other by common fields.

Access uses a variant of the Structured Query Language (SQL) called Jet SQL to query and manipulate data. Users can create queries to retrieve and filter data, and also create forms to enter and edit data in a user-friendly way. Reports can be generated to summarize and present data in a professional manner.

To learn more about Access Here:

https://brainly.com/question/31237339

#SPJ11

FILL IN THE BLANK 83) Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM

Answers

Answer:

E) UTM (Unified Threat Management) systems are comprehensive security management products that provide tools for firewalls, VPNs, intrusion detection systems, and more.

Explanation:

standard i/o functions and interactions with sockets

Answers

Standard (input/output) I/O functions are used to read or write data to and from the standard input/output streams of a program.

These functions are generally used to read user input from the console or to write output to the console. Interactions with sockets involve reading or writing data to or from a network socket. A socket is an endpoint of a two-way communication link between two programs running over a network. Sockets are used to establish a connection between two computers so that they can exchange data. When a program interacts with a socket, it can use standard I/O functions to read or write data to and from the socket.

To learn more about console click here https://brainly.com/question/28702732

#SPJ11

The presence of the try-catch block imposes overhead when no exception occurs.
true/false

Answers

True, the presence of a try-catch block imposes overhead even when no exception occurs.

When a try-catch block is executed, the Java Virtual Machine (JVM) has to create and maintain a new exception object, which requires additional memory allocation and garbage collection. Even when an exception is not thrown, this overhead is still incurred.

However, the overhead is typically minimal, and the benefits of exception handling, such as improved program robustness and maintainability, usually outweigh the cost of the try-catch blocks.

Learn more about block here:

https://brainly.com/question/30332935

#SPJ11

Other Questions
What would be the indication on the VSI during entry into a 500 FPM actual descent from level flight if the static ports were iced over?A. The indication would be in reverse of the actualrate of descent (500 FPM climb)B. The initial indication would be a climb, then descent at a rate in excess of 500 FPMC. The VSI pointer would remain at zero regardless of the actual rate of descent. smb help me which 3 sides lengths BEST describes the triangle in the diagram If you wanted to attend a meeting of the city council or see minutes of a meeting, you would be able to do so as a result of the __________. Jane and her husband Greg are both heterozygous for an autosomal recessive disease called cystic fibrosis. They have decided to have their first child. What is the probability that they have a child affected by the disease In the North, the panic of 1857 created calls for ___ TRUE OR FALSE 84) Organizations can use existing network security software to secure mobile devices. A) TRUEB) FALSE according to researchers, which group is most likely to describe their father as distant and rejecting 761. As the new continental market economy grew, A) individual households became increasingly self-sufficient. B) the home came to be viewed as a refuge from the workday world. C) traditional women's work became more highly valued and increasingly important. D) respect for women as homemakers declined. E) the home lost most of its importance for family life. Who developed both the two-point threshold and the concept of the just noticeable difference?a. Weber b. Helmholtz c. Fechner d. Wundt e. Cajal. ______ analysis is a technique for strategic review focusing on assessment of propensity for different e-commerce services. Mesocyclones rotate vertically within a supercell cloud and can reach a height of thousands of meters.TrueFalse Capital Budgeting in Not-for-Profit Entities. Are the capital budgeting criteria we discussed applicable to not-for-profit corporations? How should such entities make capital budgeting decisions? What about the U.S. Government? Should it evaluate spending proposals using these techniques? Evaluate how community respond to women and children in light of the following aspects,Bill of rights,discrimination and human rights violations What results from the federal system of government in the United States?O A. Citizens vote on some issues directly rather than throughrepresentatives.OB. State governments have some powers that the federalgovernment does not have.OC. Only powers specifically given to the government are legal.OD. The powers of the national government are limited by law. PLS HELP QUICK!!!!!! Jan wants to tell her mom that she had to stop working in the garden early.Which idiom should she use?ResponsesYou and I saw eye to eye.I had to call it a day.I was in hot water.You have to hold your horses. Like Corey, 1 in every 5 American man lives in a high demand, low control jobThese people are more likely to experience... Are the following equivalent why or why notchar name[] = "Mary";char *name = "Mary"; Now write the balanced net-ionic equation for the reaction you just wrote.Zn(s)+2HCl(aq)ZnCl2(aq)+H2(g) 3. A publisher wants to estimate the mean length of time (in minutes) all adults spend reading newspapers. Todetermine this estimate, the publisher takes a random sample of 15 people and obtains the following results:11, 9, 8, 10, 10, 9, 7, 11, 11, 7, 6, 9, 10, 8, 11Assume that the population of times is normally distributed. Find the mean and standard deviation and use it toconstruct the 95% confidence interval. If Thomas spends 10.5 minutes reading, using the results you found-would yousay this is unusual?