Andrea purchased an Apple iPad and an extended warranty. She also purchased a gaming application specially developed for Apple iPad. The application purchased by Andrea, is an example of a(n) _____ product.

Answers

Answer 1

The application purchased by Andrea, is an example of an augmented product.

What are "augmented" and "real" products?

When clients buy a real product, they also get additional services or benefits, which is known as an augmented product. An actual product is anything that a business sells, and it comprises branding, packaging, and product design.

Why would one utilise augment?

Although the word "augmentation" is frequently used to describe an increase in size or quantity, it can also apply to other sorts of modifications, such improvements in quality. It usually suggests that whatever is being added to something will make it better. The word "augmentation" is normally employed in a neutral or positive context.

To know more about augmented product visit

brainly.com/question/30117927

#SPJ4


Related Questions

Knowing that the central portion of link bd has a uniform cross sectional area of 800 mm2 , determine the magnitude of the load p for which the normal stress in link bd is 50 mpa. (hint: link bd is a two-force member. ) ans: p = 62. 7 kn

Answers

The magnitude of the load p is 62.7kn. The x, y, and z directions are all possible for load magnitude.

How do you determine the size of a load?

5.3 The load's size and composition, The result of multiplying the weight to be transported by the equipment weight (tare) is the value [N], which indicates the size of the load. Q represents each wheel's load capacity Pu stands for pounds to move. P = tare of the equipment n is the number of wheels making contact with the surface.

The x, y, and z directions are all possible for load magnitude. The current work plane's coordinate system is the same. The direction of the load is indicated by positive coordinates. Shifting the work plane, for instance, enables you to precisely apply loads when you create loads perpendicular to sloped portions.

The magnitude of a two-dimensional vector, a=(a1,a2), can be calculated using the formula a=a21+a22.

Explanation: p = 800 mm2+50mpa = 62.7kn.

To learn more about magnitude refer to:

brainly.com/question/24256733

#SPJ4

You must ensure that cloud storage is available in the event of a regional disruption. What should you configure

Answers

Data redundancy is made possible in the event of a disruption in one region by replicating data stored in the cloud to additional physical locations, or geographic zones.

Which cloud computing paradigm puts the onus of patching virtual machine operating systems on the cloud provider?

In the IaaS model, the cloud service provider controls IT infrastructures including storage, server, and networking resources and offers them to subscriber companies via virtual machines accessible over the internet.

Which common port is utilized to connect to a Radius server?

UDP packets are used by the RADIUS protocol. For RADIUS authentication packets, two UDP ports are utilized as the destination port (ports 1645 and 1812). For authentication packets, it should be noted that port 1812 is used more frequently than port 1645.

To know more about Data redundancy visit :-

https://brainly.com/question/11711681

#SPJ4

Which of the following will configure all the span elements with red (#FF0000) text color? a. span { color: #FF0000;} b. #span { color: #FF0000; } C. span { color:#FF0000; } d.

Answers

All the span elements will be configured with red (#FF0000) text color if you use the following syntax: span color: #FF0000;.

The text color is set by which CSS property?

The text color is set by which CSS property? On a web page, the font color can be changed using the declaration property bgcolor.

Which CSS syntax for body color is appropriate?

The right CSS syntax is pcolor:black; out of everything provided (Option 2). CSS selectors are used to "find" (or pick) the HTML components that need styling. The HTML element you want to style is designated by the selector p in CSS, which is p>. The value of a color's property, which is black, is a property.

To know more about span elements visit :-

https://brainly.com/question/26102029

#SPJ4

an array is a(n) ____ of values in computer memory.

Answers

In a computer's memory, an array is a list of values. Each element (value or variable) in an array is identified by at least one array index or key. An array is a type of data structure.

when using subscript 6 when you have a 5 element array?

It is argued that your subscript is out of limits if you have a five element array and use subscript 6. The loop control variable has two possible values: increase and decrease. By exiting a loop as soon as a match is discovered in the array, you can increase a program's efficiency.

In a data structure, what exactly is an array?

A continuous stream of memory locations is used to hold elements of the same data type in arrays.

To know more about array visit :-

https://brainly.com/question/13261246

#SPJ4

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Hurry! Please

Answers

Answer:

primary source

Explanation:

The data type string has a named constant, ____, associated with it.
a. string::size b. string::pos c. string::size_type d. string::npos

Answers

String::npos

What exactly does string:: NPOS means?

Npos: It is a constant static member value with the maximum allowable value for a size t element. It literally means till the string is finished. It is utilized in the string’s member functions as the value for a length parameter. It is typically used as a return value to indicate that there are no matches.

A nonprofit organization (NPO) is one that is not motivated by profit but by a commitment to a certain cause that receives all money over and beyond what is required to run the organization. As a result, NPOs are granted tax-exempt status by the federal government, which means they do not have to pay income tax.

To learn more about string:: NPOS to refer:

https://brainly.com/question/23111640

#SPJ4

An Information Technology department is looking for a new inventory management system. Which of the following would be the most accurate choice: A) Schematic
B) Spreadsheet
C) Network Diagram
D) Radio Frequency Identification (RFID) database system

Answers

The D: "Radio Frequency Identification (RFID) database system" is an Information Technology department looking for a new inventory management system.

Radio Frequency Identification (RFID) technology has been designed to keep track of individual elements in inventory, even if these items are not visible or are moving around quite a bit, Radio Frequency Identification (RFID) database system is a perfect tool for practicing airtight inventory control. After all, this technology can sense when an element leaves a warehouse or store, provided the RFID tag remains in place.

Thus, Radio Frequency Identification (RFID) database system offers an optimal inventory control.

You can learn more about Radio Frequency Identification (RFID) at

https://brainly.com/question/1933883

#SPJ

You need to deploy a small piece of software using a script file. You have a variety of options available to you based on what method you use in writing the script. Which of the following would NOT be an option for file scripting?
A) .bat
B) .ini
C) .sh
D) .py

Answers

A script file must be used to deploy a little piece of software. Depending on the approach you take when composing the script, you have a range of alternatives. Choice (B). Ini is accurate.

Software definition and examples :

In this application, "software" refers to the running scripts, programs, and apps on a device. It can be compared to the variable portion of a computer, whereas the invariable portion is the hardware.

A software device is what?

Software Device refers to any apparatus on or through which software applications and its accompanying visual representations, either with sounds, may be embodied / recorded for use in the Game and later operation, manipulation, or communication to users.

To know more about Software visit :

https://brainly.com/question/1022352

#SPJ4

How to fix microsoft has blocked macros from running because the source of this file is untrusted

Answers

Removing Mark of something like the Web is the quickest way to unlock macros. To delete, perform an appropriate on the file, select Properties, and then click the General tab's Unblock checkbox.

Who currently owns Microsoft?

250 million Microsoft shares, or 103 million shareholder votes, are owned by Bill Gates. As of December 2021, the selling price of Bill Gates' ownership in Windows was $35 billion. William H. "Bill" Gates

How can I contact Microsoft customer support?

To get support phone numbers. If a post was useful to you, kindly advise it as such and give it a rating. This will make it easier for other people to discover solutions to similar queries.

To know more about Microsoft visit :

https://brainly.com/question/26695071

#SPJ4

What do you do if fedex tracking says "unfortunately we are unable to retrieve your tracking results at this time. please try again later?"

Answers

Real-time processing virtually instantaneously processes data. There is no waiting or pause involved in this process.

How can I use a tracking number to find a package?

Once you receive your tracking number, tracking your delivery is simple. The USPS Tracking page just requires the tracking number to be entered. Along with additional tracking details, such as delivery and/or attempted delivery information, you'll receive the item's current status.

How can I find out a package's precise location?

If you have your USPS shipment tracking number, you can use Circuit to see where your package is in real time. After a few days have passed after your box was dispatched, you can get in touch with a USPS customer care agent if it is still missing.

To know more about tracking visit:

https://brainly.com/question/28234708

#SPJ4

Which type of firewall policy calls for a firewall to deny all traffic by default?
a. restrictive policy
b. demilitarized policy
c. perimeter policy
d. permissive policy

Answers

The restrictive firewall policy requires a firewall to block all traffic by default.

What kind of attack brings down the operating system?

Ping of Death, also known as PoD, is a sort of Denial of Service (DoS) assault in which the attacker uses the straightforward ping command to launch numerous or corrupted packets at the targeted computer or service in an effort to crash, destabilize, or freeze it.

Which firewall safeguards the whole network?

Hardware-based firewalls are very practical for securing a number of machines and managing network traffic that attempts to get through them. Hardware-based firewalls have the benefit of adding another line of defense against attacks that target desktop computing systems.

To know more about firewall visit:-

https://brainly.com/question/13098598

#SPJ4

the module definition comprises the module header and the module ________.

Answers

The module definition comprises the module header and the module body.

What constitutes a module definition?

A self-contained item or unit that can be connected to other items of its kind to create a larger system. Examples include an assembly of electrical parts and related wiring or a section of computer software.

Can there be more than one variable with the same name in a module?

Due to the fact that they are in the same scope, a module may include two variables with the same name. There must be compatibility between the data types of the arguments used in a module call and the parameters stated in the module header.

                       The program as a whole and each statement inside are both within the scope of the parameter variables.

Learn more about module

brainly.com/question/14527306

#SPJ4

You are creating a DRP for a small, independent car dealership. There are four employees who each use a desktop computer; there are no servers. All company data is stored on the four computers. A single high-speed DSL link is shared by all users. What are the best DRP solutions

Answers

The risks that will have the greatest influence on business operations are identified via a business impact study. In figuring out how to recover from a calamity, this is helpful.

What kind of disaster recovery strategy focuses on minimising the impact of a disaster on IT systems, staff, and customers?

A disaster recovery plan gives companies the ability to react swiftly to a crisis, take immediate action to lessen damage, and restart operations as soon as feasible. Typically found in a disaster recovery strategy are Staff members can use emergency measures in the event of a calamity.

What actions should you take when keeping backup server tapes offsite?

Maintain all of your backup tapes and other media in a safe, comfortable, and, most importantly, fireproof environment. No matter if you backup a single file or a whole system.

To know more about business impact study visit :-

https://brainly.com/question/18645299

#SPJ4

An operating system can ensure that applications continue to run when hardware upgrades and updates occur. Group of answer choices True False

Answers

It is true that an operating system can ensure that applications continue to run when hardware upgrades and updates occur.

How do operating systems manage software and hardware?

The relationship between software and hardware is controlled by the operating system. The operating system installs a device driver for each piece of hardware in order to access and communicate with it. The hardware manufacturer creates a little program known as a device driver, which is included with the hardware component.

How are hardware resources managed by an operating system?

Keyboards, displays, printers, scanners, and cameras are just a few examples of peripheral input and output devices that the operating system controls. It regulates the transmission and reception of data. An application known as a device driver is used by the operating system to accomplish this. Device control manuals are found in device drivers.

To know more about operating system visit

brainly.com/question/24760752

#SPJ4

Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

The user of this application program is prompted to enter the starting pay, the number of years, and the percentage of wage growth per year.

The range function in the for loop is used to specify how many times the wages will be calculated for the specified number of years. It begins at 1 and finishes after Years+1, which implies that when the user enters 10 days, 10 will also be displayed in addition to the year.

The Python code is as follows:

Input: StartingSal = int("Enter the starting salary: ");

AnnualIncrease is equal to (int (input("Enter the annual% increase:")) / 100)

Years = int("Enter the number of years: "); input;

Count in the range (1, Years + 1):

print("Year," count, "Salary:," StartingSal*((1+AnnualIncrease)**(count-1)"))

To know more about program  visit:-

https://brainly.com/question/11023419

#SPJ4

When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across the ___________.

Answers

When using for loops and two-dimensional arrays, the outside loop moves across the rows and the inside loop moves across the columns.

In a two-dimensional array, how should each loop be used?

Improved for each loops or layered for loops can be used to iterate across 2D arrays. A 2D array's outer loop typically traverses the rows, whereas the inner loop often covers the columns in a single row. The length of a 2D array indicates the number of rows. length array for a row

Why do we use two for loops with two-dimensional arrays?

To better understand an array's contents, think of a two-dimensional array as a matrix with rows and columns. A 2D array can be looped over by first iterating through each row, followed by iterating through each column in each row. We require two loops that are nested inside of one another because of this.

To know more about array visit

brainly.com/question/14291092

#SPJ4

Which layer of the OSI model should you check first if a computer can't connect to the company network

Answers

Answer:

In any network, most of the problems occur at the physical, data-link, and network layers. Therefore, it is always advisable to start troubleshooting from the physical layer and gradually proceed to the application layer.

Explanation:

The protocol data unit for the Physical layer of the OSI model is payload, or data.​
True
False

Answers

It is accurate to say that payload, or data, is the protocol data unit for the Physical layer of the OSI model. ​

What does the OSI physical layer's data unit go by?

A protocol data unit (PDU), an open-system interconnection (OSI) term used in communications, is a unit of data added or removed by a layer of the OSI model.

What does network layer protocol data unit mean?

A protocol data unit (PDU) is the fundamental unit of exchange in networking between entities that talk to one another utilizing a particular networking protocol. When addressing protocol interactions when working with a multilayer protocol stack, such as the TCP/IP networking suite, it is crucial to utilize the right PDU.

To know more about protocol data visit:-

https://brainly.com/question/14635177

#SPJ4

1. When your computer is not in use, the screen should go blank after a moment, and you should be required to log in again when you return. T/F

Answers

Answer:

Explanation:

This statement is generally true. Having the screen go blank after a moment of inactivity, and requiring a login to return to the computer, is a common security feature known as screen locking. When a computer is locked, it prevents unauthorized access by requiring a password or other form of authentication before the user can regain access to the computer.

This is a useful feature as it helps to prevent sensitive data from being accessed if the computer is left unattended for an extended period of time. The lock time out can be configured in the settings by the administrator and it can depend on the specific operating system you are using.

On Windows, you can set the lock time out by going to the Power & Sleep settings and then selecting Additional power settings. On MacOS, you can set lock time out by going to System Preferences, Security & Privacy, then General and adjust the setting for "require password" after sleep or screen saver begins

It's important to remember that screen locking does not guarantee total security, but it's an important step towards making sure your computer is secure and you should enable this feature if it's available on your operating system.

How can perfection be attained on sync?​

Answers

Perfection can be attained by practicing anything. Perfection on sync can be attained by using and knowing its every function.

What is sync?

In computers, synchronization (or syncing, sync) is the process of constantly guaranteeing that data in one location is an identical clone of data in another location.

When you press the "sync" button, the device transfers data from your phone to the service's servers. If you swap phones and your new phone has Syncing capabilities, you can restore your contacts and documents to the phone.

Therefore, anything can be practiced to achieve perfection. Perfection on sync can be obtained by using and understanding all of its functions.

To learn more about sync, refer to the link:

https://brainly.com/question/19501147

#SPJ1

Which Windows 10 power-saving mode uses an ACPI (Advanced Configuration and Power Interface) S0 low-power idle mode to maintain a network connection while saving energy

Answers

In Windows 10, Modern Standby is a power-saving mode (ACPI S0) that functions similarly to standby mode while additionally supplying power to the network interface to keep connectivity.

Which tool should you use to set the devices and services that Windows starts when it boots?

Changes to configuration settings, such as which programmes Windows launches, can be made using the Microsoft System Configuration (msconfig) tool, a piece of Microsoft software. It has various helpful tabs, including: Tools, Services, Startup, and General.

What does Windows 10's ACPI mean?

A part of the Windows operating system's inbox is the Windows ACPI driver, sometimes known as Acpi. sys. Support for power management and Plug and Play (PnP) device enumeration are among Acpi. sys' duties. The HAL causes issues on hardware platforms with an ACPI BIOS.

To know more about ACPI visit:-

https://brainly.com/question/29853140

#SPJ4

A busy clustered web site regularly experiences congested network traffic. You must improve the web site response time. What should you implement

Answers

Network load balancing should be implemented.

The operation of network load balancing is what?

The Network Load Balancing (NLB) capability uses the TCP/IP networking protocol to divide traffic among different servers. NLB gives web servers and other mission-critical servers stability and performance by joining two or more machines that are executing programmes into a single virtual cluster.

What makes network load balancing crucial?

By equally distributing network traffic, load balancing enables you to avoid failure brought on by overtaxing a certain resource. Applications, websites, databases, and other computing resources operate more efficiently and are more readily available as a result of this method. Additionally, it makes it easier to process consumer requests accurately and efficiently.

To know more about Network load balancing visit

brainly.com/question/13088926

#SPJ4

What logical security concept ensures that all computers in a Windows Server environment adhere to the same policies

Answers

Portable electronics like laptops should be properly secured with a lock because they are particularly susceptible to theft, loss, and resale. A cable lock can be used to connect to the majority of laptops and desktop computers' built-in slots.

present in order for this to succeed?

A Windows operating system is often deployed using an unattended installation. Unattend. xml is the answer file used by unattended instals, and it stores user input for the different GUI dialogue boxes that pop up during the installation process.

What aspect of security is host- or network-based?

IDS may be host-based or network-based. In order to detect suspicious behaviour, a network-based IDS monitors network traffic for specific network segments or devices and analyses network, transport, and application protocols.

To know more about IDS visit:-

https://brainly.com/question/29038449

#SPJ4

To analzye various alternative scenarios, a manager would use _______.
a. the spreadsheet's 'what-if' capability
b. the graphing features of spreadsheet software
c. the reporting feature of a BI tool
d. a data visualization tool

Answers

The 'what-if' feature of the spreadsheet would be used by the management to assess numerous potential scenarios.

used to search through enormous amounts of data for hidden patterns that can be utilized to forecast future trends?

Large data sets are sorted through using a technique called data mining to find patterns and relationships that may be used to analyze data and find answers to business challenges. Businesses can foresee future trends and make more educated business decisions thanks to data mining techniques and tools.

Which of the following will be a fact measure in a data cube utilized at a chain retail establishment?

The revenue for a chain retail business is typically the fact measure in a data cube (example: Indiana's second-quarter revenue of $900 from sales of pants).

To know more about spreadsheet visit :-

https://brainly.com/question/8284022

#SPJ4

Technician A says oily residue on hoses, components, or fittings indicates an area where refrigerant may be leaking. Technician B says that low coolant level will result in the water pump only heating the engine, not the inside of the car. Who is correct?

Answers

Technician A is correct. Technician A says oily residue on hoses, components, or fittings indicates an area where refrigerant may be leaking.

What are the many forms of refrigerant?

It typically comprises of pentafluoroethane and difluoromethane, two hydrofluorocarbon refrigerants. The refrigerant R-410A is regarded as non-ozone depleting. This refrigerant offers greater energy efficiency as compared to R-22 and R-407C. It is far more advantageous than R-22 and doesn't include chlorine.

What is the Meaning of refrigerant level?

Simply explained, the refrigerant is also known as the life force or blood of your air conditioning system. Low concentrations of the same cause the system to wear down more quickly, requiring more energy to run and keep your home cool. This is because each cooling cycle needs enough refrigerant to absorb and transferring absorbing and transferring heat outside.

To know more about Technician A visit:

https://brainly.com/question/16546681

#SPJ4

Microsoft Excel Data Model features have several benefits including the ability to _____ and _____ formulas for time efficiency.

Answers

M!crosoft Excel Data Model features have several benefits including the ability to "link" and "consolidate" formulas for time efficiency. Linking refers to the ability to create relationships between tables in the data model, allowing data from multiple tables to be combined and analyzed in a single pivot table or pivot chart.

Consolidating refers to the ability to combine data from multiple ranges into a single range, which can then be used in a pivot table or chart. This allows for more efficient data analysis and eliminates the need to manually combine data from multiple sources, saving time and reducing the potential for errors.

Learn more about the excel here https://brainly.com/question/30087354

#SPJ4

What is the name of the service that can be used to run applications written for use on older versions of Windows to run under the Windows 7 operating system?

Answers

I choose Linux for everyday home use. My current favorite is the Arch. It wouldn't be a good place to start learning Linux, in my opinion. Many distributions, like Ubuntu, Linux Mint, and others, are more user-friendly for beginners.

Windows 7 is a particular operating system?

Built on the Windows Vista kernel, Windows 7 was created as an update to the Vista operating system. The Aero user interface (UI) from Windows Vista is still in use.

The finest operating system: Why is Windows 7 the best?

The advantages of Windows 7 are numerous, and they include improved performance and user experience, application compatibility, and an easy-to-use interface resembling earlier Windows versions.

To know more about Linux visit :-

https://brainly.com/question/15122141

#SPJ4

What security measure is used to slow the movement of personnel when entering or leaving a secure area

Answers

When entering or exiting a secure area, mantrap security measures are utilized to slow down personnel movement.

What kind of physical security precautions are used to make portable gadgets more improbable to be stolen?

In order to prevent theft, loss, and resale, portable equipment like laptops should be properly secured with a lock. The majority of desktop and laptop computers feature built-in slots that can be connected using a cable lock. Most computer stores carry these locks in their inventory.

Which security element is host- or network-based?

Network-based or host-based IDS are both options. Network-based IDSs examine network, transport, and application protocols while keeping track of network traffic for specific network segments or devices in order to spot suspicious activities.

To know more about mantrap security visit :-

https://brainly.com/question/29744068

#SPJ4

To implement the circular nature of the bounded-buffer problem, the producer fills the slot buffer[next_in] and then increments next_in by 1 mod n. Similarly, the consumer empties the slot buffer[next_out] and then increments next_out by 1 mod n. (a) What problem would occur if multiple producers or multiple consumers executed the bounded buffer code

Answers

Introduction to bounded buffer The following are crucial portions for the bounded-buffer problems (also known as the: A producer updating next in while writing to a buffer slot.

Which two processes are connected to the bounded buffer issue, and what are their names?

Producer-consumer problem is another name for the bounded buffer problem. The Producer-Consumer problem is used to generalize this issue. The solution to this issue is the creation of two counting semaphores, "full" and "empty," which count the number of full and empty buffers currently present.

How can processes share memory using a bounded buffer?

A fixed buffer size is what is implied by the term "bounded buffer." Consumers and producers both wait for new items while the buffer is filled. The Producer and the Consumer must coordinate. The bounded-buffer problem's shared memory solution permits up to (n-1) items in the at most (n-1) items can be present at once buffer.

To know more about consumer empties visit:-

brainly.com/question/28990014

#SPJ4

In Bash, if you need a little help with how a command like ls works, which of the commands can you use to get more information

Answers

ls --help or man ls it is the commands can you use to get more information.

What is the ls command in bash?

The current directory's files are listed by the ls command (ls is short for "list"). The ls command will by default just print the names of all the files and folders. Use the flag "-l" to receive the extra details and a cleaner view. The following information about each file is displayed by ls in long list format.

The 'ls' command can be used to list files and directories. If you use the "ls" command without any other options, the contents of your current working directory, which is just another way of saying the directory that your terminal is currently in, will be listed.

To learn more about command refer to :

https://brainly.com/question/25808182

#SPJ4

Other Questions
which of the following surfaces would soil erosion most likely take place? Weaknesses of the Articles of Confederation 4- How does the baking experience contribute to the growth of the son? B-Literary analysis questions (30 points- 5 points each); 1- Compare and Contrast the father's outside chores to that of inside the house. 2- Describe the setting and analyze its effect on the mood. 3- Infer the tone employed in paragraphs 1 and 2. 4- Refer to paragraph 5, infer the contradictory feeling the narrator had, and specify the action that caused them. 5- The passage employs a stated theme (message), pick out the sentences that convey the message and explain 6- Read the following sentences, identify the type of the figure of speech of each, and explain its meaning: Copy the chart on your answer sheet. Sentence/expression Figure of speech (type) 1- A haze of flour dust began to hover in the air like fog. 2- Silence is a blank space that begs to be filled C-Vocabulary :(12 points 2 point each) - Refer to the passage, read the sentences that contain each of the following words, and choose the word that has nearly the same meaning: Enormous: a. Several b. shredded Meaning/ explanation ouaned c. huge a minad d. swollen d hmahad Can someone help me with this question? The local craft store has offered to help sponsor Maggies upcoming art show by matting and framing 30 of her prints for free. What can Maggie do in return to benefit the craft stores business?Group of answer choices:A. offer them free tickets to attend the art showB. give them a free print to hang as decoration in the storeC. sign a contract to never mount or frame her images at any other storeD. allow the craft store to display business cards at her art show What extra jobs could women take on in 1942? by studying the suffix the reader can determine that impetuous most likely means what In order for a triangle to shrink in size but stay proportional to its original size, the scale factor, K, must be betweenzero and what? David is growing algae in a closed bottle for an experiment. The bottle is half full of water and half full of air. David floats the bottle in a pond for three weeks. At the end of the three weeks, David notices that lots of algae grew, but the bottle did not sink lower in the pond. Why didn't the bottle of algae grow heavier `y=7/(1,000)-(9x)/8` whats the y incercept assasa Secondary School 1" Semester English Mid-Exam for Grade 11 in 2015. 1. Choose the word that best completes the sentences from the given alternatives (A,B,C,D) all the work when you arrived have already finished B had finished C were already finished D already finished 2.Our house ten years ago was built B. would be built C. had been built DA The test we had yesterday was difficult, but the other we had last year were most difficult B.the more difficult C. difficult We will catch the bus more difficult we leave now. A if Bif not C unless D. when Height have failed the exam if he A. Hasn't studied The man BA B. hadn't studied C didn't study D. wouldn't study wife is our school director was assigned to be the mayor of our town. C. which D whose B This book BA If she D9 4 Although B. However INObaven't seen him who written by Nelson Mandela in 1980.A. had B. have C was D. may excrcises, she wouldn't be so far. A took B had taken C is taking D takes the fact that she had a bad cold, Amina played well in the net ball match C. Whic D In spite of a long time.A from B since Cin D for a decision next week about whether or not to buy a ring. 13. be done C make D do -^ A Be mude everything I can to you happy make/do D. made/do A dwarf, red snapdragon is crossed with a plant homozygous for tallness and white flowers. What are the genotype and phenotype of the F1 individuals Directions: Circle the main verb in each sentence. Underline the helping verb.I only need number 5, it's really confusing. What does =] mean in text? Sporting events in America are a multi-million dollar industry. Fans pay for tickets to the game, jerseys, jackets, hats, posters, and all sorts of other sporting ware. Some fans follow their teams across the nation and sit through rain, sleet, and snow to attend a game.Why do you think fans become so attached to their teams?Do you think it is a good thing or a bad thing to be a sports fan? Explain your answers. How is the production possibilities frontier related to opportunity cost what other concepts does it illustrate? [Please help me on this- I will give you brainlist!!]Write the terms in standard form. Then state the degree of the polynomial and the leading coefficient (LC). if you shift the linear parent function, f(x)=x, left 14 units, what is the equation of the new function on the main floor of the Kodak halll at the easement they're the number of seats per row increase at a constant rate Steven counts 31 Seaton Rd. three and 37 Seaton Rd. six how many seats are there in a row 20 What of the Modern period wrote the play, Man and Superman, which became aforum about society's values.