Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile

Answers

Answer 1

Answer: Snap-chat

Explanation:

is a social media platform application developed for mainly sharing of photos with the use of some special filters which are able alter how the person looks. examples of such filters are filters that alter the user's face, smoothing and whitening the users skin, changes the eye shape of the user, alters the nose size and jaw profile of the individual using the app. Snap chat has become a photo favorite for many young people today and celebrities alike.


Related Questions

Which tab is used to change the theme of a photo album slide show?
A. Home
B. Design
C. View

Answers

Answer:

b. design. Is your answer

Select all below that are not functions of the operating system of your computer?

a. Allocate memory
b. Direct information flow in the system
c. Format text documents
d. Provide a User interface

Answers

Answer:

c. Format text documents.

Explanation:

An operating system can be defined as a system software application that manages the interactions between the software and hardware resources of a computer, as well as providing essential services to other installed software applications.

The functions of the operating system of any computer is to;

1. Allocate memory.

2. Direct information flow in the system.

3. Provide a User interface.

Some examples of computer operating systems are Microsoft windows, Apple MacOS, Linux, Unix, Chrome OS etc.

The task of formatting text documents is performed by computer software applications such as Microsoft Word, notepad, wordperfect etc. Text formatting includes functions such as cut, paste, copy, bold, italics, font type, font size etc.

A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected.
To protect the laptops while connected to untrusted wireless networks, which of the following would be the best method for reducing the risk of having the laptops compromised?
A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing

Answers

C. OS hardening.

Making an operating system more secure. It often requires numerous actions such as configuring system and network components properly, deleting unused files and applying the latest patches.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer.

what are some consequences of internet addiction​

Answers

Answer:

1. week eyesight

2. weak brain power

3. loss of concentration...

hope it helps u

***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use Destination Styles C. Keep Source Formatting D. Paste Special

Answers

Answer:

Embed is used to insert a new linked Excel worksheet into a PowerPoint presentation

Hope this answer correct :)

External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

When passing a stream to a function, it must always be pass-by-__________.
a) value
b) address
c) reference
d) class
e) function

Answers

Answer:

C) Reference

Explanation:

Stream objects are usually passed to functions as parameters, similar to other kind of objects. When passing a stream parameter, it must always be pass-by-reference.

This means that a reference to the original object is being passed to the function and not the copy of the object. As such, the object can be modified within the function. Also, if the object is large or has a large memory, copying it may be inefficient as regards the memory space and the time.

Therefore, object references point to the same object even when they are passed to functions.

Overload the + operator as indicated. Sample output for the given program:
First vacation: Days: 7, People: 3
Second vacation: Days: 12, People: 3
#include
using namespace std;
class FamilyVacation{
public:
void SetNumDays(int dayCount);
void SetNumPeople(int peopleCount);
void Print() const;
FamilyVacation operator+(int moreDays);
private:
int numDays;
int numPeople;
};
void FamilyVacation::SetNumDays(int dayCount) {
numDays = dayCount;
return;
}
void FamilyVacation::SetNumPeople(int peopleCount) {
numPeople = peopleCount;
return;
}
// FIXME: Overload + operator so can write newVacation = oldVacation + 5,
// which adds 5 to numDays, while just copying numPeople.
/* Your solution goes here */
void FamilyVacation::Print() const {
cout << "Days: " << numDays << ", People: " << numPeople << endl;
return;
}
int main() {
FamilyVacation firstVacation;
FamilyVacation secondVacation;
cout << "First vacation: ";
firstVacation.SetNumDays(7);
firstVacation.SetNumPeople(3);
firstVacation.Print();
cout << "Second vacation: ";
secondVacation = firstVacation + 5;
secondVacation.Print();
return 0;
}

Answers

Answer:

FamilyVacation FamilyVacation::operator+(int moreDays) {

FamilyVacation copy = *this;

copy.numDays += moreDays;

return copy;

}

Explanation:

You create a copy (which is simple because the class contains no pointers), then you modify the copy and return it.

Which of the following components of a computer system defines the ways to use system resources to solve computing problems?
A) application programs
B) operating system
C) computer hardware
D) computer logo

Answers

Answer: A) application programs

Explanation: The problem solving capability of a computer system is made possible through the use of certain programs or group of programs specifically designed to tackle, manage or solve certain problems or task for the end users. Application programs are numerous and the problems at which they are targeted are diverse and usually different. Such that users would have to application programs based on the problem at hand. Application programs often leverage system capability and resources to help the fuction of written programs designed as applications for end users. Application programs includes : Microsoft office suite used to solve business related tasks such as writing, calculation, scheduling and so on., gaming applications and so on.

A) application programs

Which one of these is a good reason for taking care to design a good computer human interface?
A. Not every user is a computer expert
B. Well-designed HCIs allow the software to be sold at a better price.
C. Well-designed HCIs use less computer resources
D. Well-designed HCIs allow the computer to run faster

Answers

A good reason for taking care to design a good computer human interface is that not every user is a computer expert.

What is computer human interface?

Human Computer Interface (HCI)  is known to be a technology that deals with the set up, execution and workings of computer systems and related scenarios for human use.

Note therefore that A good reason for taking care to design a good computer human interface is that not every user is a computer expert and as such it will help all computer users even if they are novice.

Learn more about computer human interface from

https://brainly.com/question/17238363

#SPJ2

Which of the following can be managed using Active Directory Users and Computers snap-in?

a. Domain trusts and domain forest trusts
b. Information in Active Directory
c. Directory data replication
d. Active Directory schema

Answers

Answer:

The answer is "Option b".

Explanation:

The active directory can manage the data with active directory customers but a snap-on machine. It is used in scrolling the list, as the earlier replies demonstrate. It will appear on the screen if there is no other startup software installed on a computer.  

This snap-on desktop is only a component, that allows its simultaneous use of different systems or devices on the very same system. It also turns the objects more or less into the pieces of the whole.

Using Active directory users and computers snap-in, Information in Active Directory can be managed.

Active directory can be used to give access Laptops and applications on windows. This snap-in helps you to with the administration of active directory and also management of object, units and attributes.

In conclusion, information in active directory is managed using the process.

Read more on https://brainly.com/question/14469917?referrer=searchResults

Consider a set A = {a1, . . . , an} and a collection B1, B2, . . . , Bm of subsets of A (i.e., Bi ⊆ A for each i). We say that a set H ⊆ A is a hitting set for the collection B1, B2, . . . , Bm if H contains at least one element from each Bi – that is, if H ∩ Bi is not empty for each i (so H "hits" all the sets of Bi). We define the Hitting Set Problem as follows. We are given a set A = {a1, . . . , an}, a collection B1, B2, . . . , Bm of subsets of A, and an non-negative integer k. We are asked: is there a hitting set H ⊆ A for B1, B2, . . . , Bm so that the size of H is at most k? Prove that the Hitting Set problem is NP-complete

Answers

Answer:

Explanation:

This is actually quite straight forward to solve, first lets be mindful of the explanation so with this basis we can tackle future problems.

The solution may very well may be appeared in the accompanying manner:

This solution needs to display that the set H-one can without much of a stretch confirm in polynomial-time if H is of size k and meets every one of the sets B1.....Bm .

We lessen from Vertex Cover.Consider an example of the Vertex-Cover issue chart G=(V,E) and a positive whole number k.We map it to an occurrence of the hitting set issue as follows.The set An is of vertices V.

Also we know that For each edge e has a place with E we have a set Se Consisting of two end-purposes of e.It is anything but difficult to see that a lot of vertices S is a vertex front of G iff the relating components from a hitting set in the hitting set case.

Following are the illustration to the given question:

The solution must demonstrate that only if H is of size k and overlaps each one of the sets B1.....Bm, can one simply verify it in time complexity.You start with Vertex Cover and decrease from there.Considering the Vertex-Cover issue graph G = (V, E) with a positive integer k as an example.As shown below, we map this to a hitting set issue case V are the vertices of set A.It has the set Se that includes 2 end-points of e for each edge of e belonging to E.A vertex set "S" covers vertex "G" if the matching members from a hitting set were present in the striking setting instance.

Learn more set:

brainly.com/question/2264459

brainly.com/question/8053622

A​ "responsive design" for mobile applications is a design that responds to a​ user's: A. digital device and screen size. B. needs. C. location. D. voice commands. E. gestures .

Answers

Answer:

A. digital device and screen size.

Explanation:

A​ "responsive design" for mobile applications is a design that responds to a​ user's digital device and screen size.

In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.

Hence, an end user's behavior and environment influences the outcome of their content and layout in a responsive design for mobile applications and websites.

This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.

Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is properly read from grades.txt. and the desired output to the screen is as follows: OUTPUT TO SCREEN DATAFILE Adara Starr has a(n) 94 average Adara Starr 94 David Starr has a(n) 91 average David Starr 91 Sophia Starr has a(n) 94 average Sophia Starr 94 Maria Starr has a(n) 91 average Maria Starr 91 Danielle DeFino has a(n) 94 average Danielle DeFino 94 Dominic DeFino has a(n) 98 average Dominic DeFino 98 McKenna DeFino has a(n) 92 average McKenna DeFino 92 Taylor McIntire has a(n) 99 average Taylor McIntire 99 Torrie McIntire has a(n) 91 average Torrie McIntire 91 Emily Garrett has a(n) 97 average Emily Garrett 97 Lauren Garrett has a(n) 92 average Lauren Garrett 92 Marlene Starr has a(n) 83 average Marlene Starr 83 Donald DeFino has a(n) 73 average Donald DeFino 73

Answers

Answer:

Here is the C++ program:

#include <fstream>  //to create, write and read a file

#include <iostream>  // to use input output functions

using namespace std;  //to access objects like cin cout

const int MAXNAME = 20;  //MAXNAME is set to 20 as a constant

int main(){  //start of main() function

ifstream inData;  //creates an object of ifstream class

inData.open("grades.txt");  //uses that object to access and opens the text file using open() method

char name[MAXNAME + 1];   // holds the names

float average;   //stores the average

inData.get(name,MAXNAME+1);  //Extracts names characters from the file and stores them as a c-string until MAXNAME+1 characters have been extracted

while (inData){  //iterates through the file

 inData >> average;  //reads averages from file using the stream extraction operator

 cout << name << " has a(n) " << average << " average." << endl; //prints the names along with their averages

 inData.ignore(50,'\n');  //ignores 50 characters and resumes when  new line character is reached. It is used to clear characters from input buffer

 inData.get(name,MAXNAME+1);}  //keeps extracting names from file

return 0; }

Explanation:  

The program is well explained in the comments added to each line of the code. The program uses fstream object inData to access the grades.txt file. It gets and extracts the contents of the file using get() method, reads and extracts averages from file using the stream extraction operator. Then program displays the names along with their averages from grades.txt on output screen.

The grades.txt file, program and its output is attached.

What is the best platform for a online meeting?

Answers

Answer: at the moment i would pick between zoom and something by google

Explanation: Face time is not very useful as only apple users can use other things like house party and the Instagram face chat thing are not good for a professional setting. Skype has been giving me problems with the vast amount of people on it for work.

Answer: Online  Platforms

Explanation:

Google,Adobe,Skype for Business, Join.me

Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of the base class' printAll() method.
Name: Fluffy, Age: 5, ID: 4444
// ===== Code from file AnimalData.java =====
public class AnimalData {
private int ageYears;
private String fullName;
public void setName(String givenName) {
fullName = givenName;
}
public void setAge(int numYears) {
ageYears = numYears;
}
// Other parts omitted
public void printAll() {
System.out.print("Name: " + fullName);
System.out.print(", Age: " + ageYears);
}
}
// ===== end =====
// ===== Code from file PetData.java =====
public class PetData extends AnimalData {
private int idNum;
public void setID(int petID) {
idNum = petID;
}
// FIXME: Add printAll() member function
/* Your solution goes here */
}
// ===== end =====
// ===== Code from file BasicDerivedOverride.java =====
import java.util.Scanner;
public class BasicDerivedOverride {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
PetData userPet = new PetData();
String userName;
int userAge;
int userID;
userName = scnr.next();
userAge = scnr.nextInt();
userID = scnr.nextInt();
userPet.setName(userName);
userPet.setAge (userAge);
userPet.setID (userID);
userPet.printAll();
System.out.println("");
}
}
// ===== end =====

Answers

Answer:

public void printAll(){  // member function petAll()

   super.printAll();  //  calls printAll() method of the superclass (base class) AnimalData using super keyword

   System.out.print(", ID: " + idNum);} // prints the ID stored in the idNum data member of the PetData class

Explanation:

Here is the complete PetData class:

public class PetData extends AnimalData {  //

private int idNum;

public void setID(int petID) {

idNum = petID;  }

// FIXME: Add printAll() member function

/* Your solution goes here */

public void printAll(){

   super.printAll();

   System.out.print(", ID: " + idNum);}  }

PetData class is a subclass which is inherited from the base class AnimalData.

This class has a private data member which is the variable idNum which is used to store the ID value.

It has a member function setID with parameter petID which is the idNum. This method basically acts as a mutator and sets the user ID.

This class has another method printAll() that uses super keyword to access the method printAll() of the base class which is AnimalData

super basically refers to the base class objects.

Here the super keyword is used with the method name of subclass PetData in order to eliminate the confusion between the method printAll() of AnimalData and PetData since both have the same method name.

In the main() method the use is prompted to enter values for userName, UserAge and UserID. Lets say user enters Fluffy as user name, 5 as user age and 4444 as userID. Then the statement userPet.printAll(); calls printAll() method of PetData class as userPet is the object of PetData class.

When this method is called, this method calls printAll() of AnimalData class which prints the Name and Age and printAll() of PetData class prints the ID. Hence the program gives the following output:

Name: Fluffy, Age: 5, ID: 4444    

The program illustrates the use of methods.

Methods are used to group related codes together, so that they function as one, after being called/invoked

The printAll() method, where comments are used to explain each line is as follows:

//This defines the printAll() method

public void printAll(){  

//This calls the base class of the printAll() method

  super.printAll();  

//This prints the required output

  System.out.print(idNum);

}

Read more about similar programs at:

https://brainly.com/question/14581501

Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stack

Answers

Answer:

Answered below

Explanation:

LAMP is an example of a web service stack. It is used for developing dynamic websites and applications. It's components include;

1) The Linux operating system, which is built on open source and free development and distribution. Types of Linux distributions include: Ubuntu, Fedora and Debian. This operating system is where sites and applications are built on.

2) The Apache HTTP server. Apache server is developed by the Apache software Foundation and is open source. It is the most popular web server on the internet and plays a role in hosting websites.

3) MySQL is a relational database management system that plays a role in the storage of websites data and information.

4) The PHP programming language is a scripting language for web development whose commands are embedded into an HTML source code. It is a popular server-side language used for backend development.

In a working diode, the junction Diode

Answers

A p-n junction diode is a basic semiconductor device that controls the flow of electric current in a circuit. It has a positive (p) side and a negative (n) side created by adding impurities to each side of a silicon semiconductor. The symbol for a p-n junction diode is a triangle pointing to a line. It flows electric current positive and negative

Let A and B be two sets of n positive integers. You get to reorder each set however you like. After reording, let ai be the i-th element of A and bi be the i-th element of B. The goal is to maximize the function n Π (i=1) ai^bi . You will develop a greedy algorithm for this task.

Required:
a. Describe a greedy idea on how to solve this problem, and shortly argue why you think it is correct (not a formal proof).
b. Describe your greedy algorithm in pseudocode. What is its runtime?

Answers

Answer:

Describe your greedy algorithm in pseudocode. What is its runtime?

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring that a system is accessible when needed defining risk associated with a subject accessing an object ensuring that a system is not changed by a subject that is not authorized to do so ensuring that the right information is seen only by subjects that are authorized to see it

Answers

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

John is analyzing an attack against his company in which the attacker found comments embedded in HTML code that provided the clues needed to exploit a software vulnerability. Using the STRIDE model, what type of attack did he uncover?

Answers

Answer:

Information Disclosure

Explanation:

Hello, the fact that the attacker was able to gather information from within the embedded HTML code suggests that the original developer did not properly store information, revealing potential issues or vulnerabilities in his/her design.

The STRIDE model stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

Using the STRIDE model, one would say this would be a simple information disclosure attack, since the attacker used retrieved information to breach the system.

Cheer.

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0

Answers

Answer:

def pyramid_volume(base_length, base_width, pyramid_height):

   base_area = base_length * base_width

   volume = 1 / 3 * base_area * pyramid_height

   return volume

Explanation:

Create a function called pyramid_volume that takes base_length, base_width, pyramid_height as parameters

The formula to calculate the volume of a pyramid is = 1/3Ah, A is the base area, h is the height

Inside the function, calculate the base area, multiply base_length with base_width. Then, calculate the volume using the formula. Return the volume

Given the Query Data Type, which of the following is incorrectly matched with the corresponding Storage Data Type?
a) Text : String
b) TRUE/FALSE: Boolean
c) Date : Date
d) Duration : Time

Answers

Answer:

c) Date : Date

Explanation:

A type of attribute of data is called data type in computer science, data types tells the interpreter how a person wants to use the data. The basic data types are supported by most of the programming languages, the basic data types are Integers, float, characters, strings, point numbers and arrays. The terminology may differ from one language to other.

6. Which of these buttons is used to rotate a selected image?
A
B
C
D

Answers

D is the button used to rotate a selected image.

Which dashboard does the Control Room administrator need to reference to get a graphical representation of Events Distribution by Activity Type?
a) Bots
b) Workload
c) Insights
d) Audit

Answers

I think the answer would be D) Audit, I’m sorry if it comes out wrong

Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.

For example, given the two input lists:
A = [1,2]
B = [3,4]

then the Cartesian product output should be:
AxB = [(1,3),(1,4),(2,3),(2,4)]

Answers

Answer:

The program written in Python is as follows: (See Attachments for source file and output)

def cartesian(AB):

     if not AB:

           yield ()

     else:

           for newlist in AB[0]:

                 for product in cartesian(AB[1:]):

                       yield (newlist,)+product  

A = []

B = []

alist = int(input("Number of items in list A (10 max): "))

while(alist>10):

     alist = int(input("Number of items in list A (10 max): "))

blist = int(input("Number of items in list B (10 max): "))

while(blist>10):

     blist = int(input("Number of items in list B (10 max): "))

print("Input for List A")

for i in range(alist):

     userinput = int(input(": "))

     A.append(userinput)

print("Input for List B")  

for i in range(blist):

     userinput = int(input(": "))

     B.append(userinput)  

print(list(cartesian([A,B])))

Explanation:

The function to print the Cartesian product is defined here

def cartesian(AB):

This following if condition returns the function while without destroying lists A and B

    if not AB:

         yield ()

If otherwise

    else:

The following iteration generates and prints the Cartesian products

         for newlist in AB[0]:

              for product in cartesian(AB[1:]):

                   yield (newlist,)+product

The main method starts here

The next two lines creates two empty lists A and B

A = []

B = []

The next line prompts user for length of list A

alist = int(input("Number of items in list A (10 max): "))

The following iteration ensures that length of list A is no more than 10

while(alist>10):

    alist = int(input("Number of items in list A (10 max): "))

The next line prompts user for length of list B

blist = int(input("Number of items in list B (10 max): "))

The following iteration ensures that length of list B is no more than 10

while(blist>10):

    blist = int(input("Number of items in list B (10 max): "))

The next 4 lines prompts user for input and gets the input for List A

print("Input for List A")

for i in range(alist):

    userinput = int(input(": "))

    A.append(userinput)

The next 4 lines prompts user for input and gets the input for List B

print("Input for List B")  

for i in range(blist):

    userinput = int(input(": "))

    B.append(userinput)

This line calls the function to print the Cartesian product

print(list(cartesian([A,B])))

A permanent storage device inside of a computer is called a

Answers

Answer:

The hard drive or the SSD.

Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?

Answers

Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?

The information security principle that the keylogger most likely designed to disrupt is confidentiality.

Keyloggers are often called keystroke loggers. They are software programs or hardware devices that monitors the activities that is the keys pressed by an individual using a keyboard.

Keyloggers are known to be a form of spyware where computer users are unaware their actions are being tracked.

Conclusively, A keylogger Trojan virus is a program that logs keystrokes. it infects computer by tracking every single keystroke you enter through your keyboard, including passwords and usernames.

Learn more from

https://brainly.com/question/20877093

Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding is fun.) print = Coding is fun.

Answers

Answer:

print(“Coding is fun.”)

Explanation:

The proper format for a print statement is usually you have the print statement followed by the string in quotes in parentheses.

Hope this helped!

Answer:

print(“Coding is fun.”)

Explanation:

As Assembly language code runs on a CPU invoking functions and using the stack, it is clear that CPU registers are

Answers

Answer:

shared resources.

Explanation:

Assembly language is a low-level language that is used commonly in programming operating systems in large systems or in single task algorithms in embedded systems.

Its files are compiled in a CPU, using available resources like registers, buses, etc. All the content of the assembly program are read and compiled before execution.

The functions and statements invoked in the program shares the resources by duplicating the content of the registers  in variables.

Other Questions
Please solve. 6(3 + 8) - 4/5 As an application of cryptography, digital Signatures and MACs can be used for_____________. (1) Authentication (2) Confidentiality (3) Integrity (4) Availability Which type of context clue can be used to determine the meaning of the underlined word? My neighbor, Mr. Jameson, is a irritable, cranky old man Description Example Contrast Restatement (20 points) A statistics practitioner calculated the mean and the standard deviation from a sample of 400. They are x = 98 and s = 20: (a) Compute the p-value in order to test H0 : = 100 against H1 : 6= 100: (b) Compute the p-value in order to test H0 : = 100 against H1 : > 100: A photoelectric-effect experiment finds a stopping potentialof 1.93V when light of 200nm is used to illuminate thecathode. a) From what metal is the cathode made from? b) What is the stopping potential if the intensity of thelight is doubled? Consumers, not businesses, pay taxes to the government. True or false The "age of exploration" began in the 15th century when Portugal and Spain started to expand their commercial interests and trade routes across the oceans. What are two things that may have motivated explorers to navigate the world by sea during this period? Use information from the text to support your answer. Please solve this, will rate 5 stars and mark as STAR! given that is a = 3 , b = -4 and c = -2 evaluate 3a - b / 2c + 3a - c / c - b If anyone is good at chemistry do you mind helping? ('') What are the four responsibilities of citizens of the United States? Explain how those civic duties help make our country a better place. Solve | Why might buying a more expensive product made of recycled materials be a smarter purchase in the long run? (a) A mixed hockey team of 11 must have at least 5 boys and at least 5 girls. There are 7 boys and 8 girls available for selection. How many different teams can be selected? (b) One of the girls, Caitlin, is selected as captain of the team and must play every game. One of the boys, Stephen, is injured and can no longer play. How many teams can be selected now? Pls answer asap A class collects $50 to buy flowers for a classmate who is in the hospital. Roses cost $3 each, and carnations cost $2 each. No other flowers areto be used. How many different bouquets could be purchased for exactly $50? Maps,satellite images, and photographs help geographers study spatial relationships between people and the environment The common stock of the P.U.T.T. Corporation has been trading in a narrow price range for the past month, and you are convinced it is going to break far out of that range in the next three months. You do not know whether it will go up or down, however. The current price of the stock is $100 per share, and the price of a 3-month call option at an exercise price of $100 is $10. a. If the risk-free interest rate is 10% per year, what must be the price of a 3-month put option on P.U.T.T. stock at an exercise price of $100? (The stock pays no dividends.) At midnight,the temperature is at 34 degress Fahrenheit.The temperature decreases 3 degrees each hour until 2:00 am. The temperature then increases 2 degrees each hour until 7:00 am. What is the temperature at 7:00 am Suzie Smith is a real estate sales associate. She is a top producer and likes to maintain her independence. She sets up her office in her home, independent of the broker. She maintains her own telephone, secretary, administrative assistant and cell phone. She communicates with her broker once a week or he comes to see her at her office. Is this a workable situation? What is the value of 36x-8y when x = 3 and y= 6