1)Write a software application that will notify the user when
the toner level of a printer is below 10%. Write down in Java
file.
- The fields found in the CSV are: DeviceName, IPv4Address, LastCommunicationTime, SerialNumber, PageCount, BlackCartridge, ColorCartridge

Answers

Answer 1

Logic : try (BufferedReader br = new BufferedReader(new FileReader(csvFile))) { while ((line = br.readLine()) != null) { String[] printerInfo = line.split(csvSeparator);

```java

import java.io.BufferedReader;

import java.io.FileReader;

import java.io.IOException;

public class TonerLevelNotifier {

   public static void main(String[] args) {

       String csvFile = "printers.csv";

       String line;

       String csvSeparator = ",";

       try (BufferedReader br = new BufferedReader(new FileReader(csvFile))) {

           while ((line = br.readLine()) != null) {

               String[] printerInfo = line.split(csvSeparator);

               String deviceName = printerInfo[0];

               int blackCartridgeLevel = Integer.parseInt(printerInfo[5]);

               int colorCartridgeLevel = Integer.parseInt(printerInfo[6]);

               if (blackCartridgeLevel < 10 || colorCartridgeLevel < 10) {

                   System.out.println("Printer: " + deviceName + " - Toner level is below 10%");

                   // Add code here to send notification to the user (e.g., email, SMS)

               }

           }

       } catch (IOException e) {

           e.printStackTrace();

       }

   }

}

```

In this Java program, we read a CSV file named "printers.csv" that contains printer information. Each line in the file represents a printer, and the values are separated by commas (`,`).

We split each line into an array of strings using the `split()` method and access the relevant printer information. In this case, we retrieve the device name (`printerInfo[0]`), black cartridge level (`printerInfo[5]`), and color cartridge level (`printerInfo[6]`).

We then check if either the black cartridge level or color cartridge level is below 10%. If so, we notify the user by printing a message. You can modify this code to send a notification through email, SMS, or any other preferred method.

Remember to update the `csvFile` variable with the correct file path of your CSV file before running the program.

Learn more about CSV file here: https://brainly.com/question/30396376

#SPJ11


Related Questions

give at lest 10 devices that doen't requires devices driver

Answers

Note that 10 devices that doesn't requires devices driver are:

USB Flash DrivesComputer KeyboardsComputer MiceMonitors (Plug and Play)External Hard Drives (Plug and Play)HDMI CablesSpeakers (Plug and Play)Printers with built-in printer drivers (e.g., AirPrint-enabled printers)USB HubsWeb cameras (Plug and Play)

What is a device driver?

A device driver is a computer software that operates or controls a certain type of device attached to a computer or automaton.

A driver, also known as a device driver, is a collection of files that instructs a piece of hardware on how to operate by connecting with a computer's operating system.

Every piece of hardware, from internal computer components like your graphics card to external peripherals like a printer, need a driver.

Learn more about devices driver at:

https://brainly.com/question/30518363

#SPJ1



A list of 10 devices that typically do not require device drivers:

USB Flash DrivesKeyboardsMiceMonitorsPrintersExternal Hard DrivesSpeakersHeadphonesWeb camsGame Controllers

Why do these devices not have a need for device drivers?

In general, device drivers are not needed for USB flash drives, keyboards, mice, monitors, printers, external hard drives, speakers, headphones, web cams, and game controllers.

The purpose of these gadgets is to offer a plug-and-play experience through the use of internal drivers or standardized interfaces, avoiding the requirement for additional software installations or specific drivers.

Read more about device drivers here:

https://brainly.com/question/30489594

#SPJ1

Which statement about assembly-line design is false? Choose all that apply. - Assembly line products have low variety. - Assembly line services have high variety. - Assembly lines have low volumes of output. - The goal of an assembly line layout is to arrange workers in the sequence that operations need. Which statement regarding assembly-line balancing is true? Choose all that apply. - Assembly-line balancing is not a strategic decision. - Assembly-line balancing requires information about assembly tasks and task times. - Assembly-line balancing requires information about precedence relationships among assembly tasks. - Assembly-line balancing cannot be used to redesign assembly lines.

Answers

Assembly line design is a strategy used to streamline manufacturing processes by breaking down tasks into simple and repeatable steps performed by employees. The objective of assembly line design is to establish an efficient flow of work that promotes productivity, reduces waste, and maximizes profits.

Below are the false statements about assembly-line design:

Assembly line products have low variety.Assembly line services have high variety.Assembly lines have low volumes of output. (False)

The goal of an assembly line layout is to arrange workers in the sequence that operations need.Here are the true statements regarding assembly-line balancing:

Assembly-line balancing requires information about assembly tasks and task times.Assembly-line balancing requires information about precedence relationships among assembly tasks.Assembly-line balancing cannot be used to redesign assembly lines. (False)

Assembly-line balancing is a strategic decision that entails dividing the assembly process into smaller units, assigning specific tasks to individual workers, and ensuring that each employee's tasks are consistent with their abilities and skills.

Task times and task relationships are crucial in assembly-line balancing, as the objective is to optimize production while minimizing downtime, labor, and equipment usage.

Learn more about streamline at

https://brainly.com/question/32658458

#SPJ11

which of the following statements about web 2.0 is true? a. peer production is leveraged to create much of the open source software that supports many of the web 2.0 efforts. b. social media turned wikipedia into one of the most profitable sites on the internet. c. it is significant how quickly the web 2.0 revolution started and failed in a short span of time. d. it is important to joust over the precise definition of web 2.0.

Answers

The true statements about web 2.0 is  A. peer production is leveraged to create much of the open source software that supports many of the web 2.0 efforts.

What is web 2.0?

Web 2.0 is websites and applications that use user-generated content for end users. Web 2.0 is characterized by greater user interactivity and collaboration, greater network connectivity, and greater communication channels. Web 2.0 and Web 3.0 are similar technologies with similar backgrounds, but different approaches to the challenges. The fundamental difference is that Web 2.0 focuses on reading and writing content, while Web 3.0 focuses on content creation (the Semantic Web).

Learn more about web 2.0: https://brainly.com/question/12105870

#SPJ4

AP CSP - Write a program that takes 10 random numbers from 1 to 12 inclusively and averages them together.

Here is the code I wrote: (Python)

print(random() * 12 + 1)

1. What is the code supposed to be?

2. What is wrong with my code?

Answers

Answer:

follows are the correct python code to this question:

import random as r#import random package as r

import statistics as s #import statistics package as s

l= r.sample(range(0,12),10)#defining l variable that use random function to store 10 random numbers

avg= s.mean(l)#defining avg variable for calculate average of l

print('List of random number are: ', l)#print list of random numbers

print("The random number Average is: ", avg)#print average value

Output:

List of random number are:  [4, 10, 6, 0, 3, 5, 1, 7, 11, 2]

The random number Average is:   4.9

Explanation:

In question 1:

In the given code, two packages are imported, which are "random and statistics", in which "random" is used to generate a random number, and "statistics" is used to calculate the average value.

In the code, the "l" variable is used, which uses a random function and store 10 random numbers, and an "avg" variable is defined that calculates the average value. In the last step, the print method is used that print number and its average value.

In question 2:

The given code is wrong because it only calls the "random" method, which is not defined.

The program illustrates the use of random module.

Your program is wrong in the following ways

You didn't import the random moduleWrong usage of randomThe required mean is neither calculated , nor printed

The correction program in Python where comments are used for explanation is as follows:

#This imports the random module

import random

#This initializes an empty list

myList = []

#This initializes total (i.e. sum) to 0

total = 0

#This iterates through the list

for i in range(0,10):

   #This generates a random number

   num = random.randint(0,12)

   #The number is then appended to the list

   myList.append(num)

   #This calculates the sum of all random numbers

   total += num

#This calculates and prints the average

print("The random number Average is: ", total/12.0)

At the end of the program, the mean of all random numbers is. calculated and printed

See attachment for complete program and sample run

Read more about Python programs at:

https://brainly.com/question/22841107

AP CSP - Write a program that takes 10 random numbers from 1 to 12 inclusively and averages them together.Here

what is it important to test cabless?​

Answers

Answer:

to avoid larger problems ovr time like having to replace a whole line after it has been installed in case it happens that there may be faults you may know whether it was caused by a manufacturer error or installation error

1 point
4. Part of a computer that allows
a user to put information into the
computer ?
O Output Device
O Operating System
O Input Device
O Software​

Answers

Answer:

adwawdasdw

Explanation:

Answer:

I'm so sorry about the comment of that person down there

anyways I think its Number 2.

WHICH OF THE FOLLOWING IS NOT AN EXAMPLE OF PII
1EDUCATION AND EMPLOYMENT HISTORY
2.YOUR BROWSING HISTORY FOR A HOTEL LOBBY COMPUTER WHICH DOESNT VERIFY YOUR IDENTITY ORROOM NUMBER
3WEBSITES COOKIES PLACED ON YOUR LAPTOP
4. GOVT IDENTIFIER SUCH AS TAX ID

Answers

The following is not an example of PII:2. Your browsing history for a hotel lobby computer which doesn't verify your identity or room number

The answer is option 2.

PII stands for Personal Identifiable Information. This type of data refers to information that can be used to distinguish or trace a person's identity, either alone or in conjunction with other data.

The following is an example of PII:

Education and employment history, websites cookies placed on your laptop, Govt identifier such as tax ID.

A browsing history for a hotel lobby computer that doesn't verify your identity or room number is not an example of PII because there is no information that identifies the person who used the computer. Therefore, it is not Personal Identifiable Information.

Hence, the answer is Option 2.

Learn more about example of PII at;

https://brainly.com/question/32729456

#SPJ11

what is the name of the attack where all the tcp flags are turned on? question 12 options: session hijack flooding attack christmas tree attack reset attack

Answers

The attack where all TCP flags are turned on is called a "Christmas tree attack."

In this type of attack, the attacker sets all the flags in the TCP header to their "on" state, creating a TCP packet that appears like a decorated Christmas tree with all the lights turned on. This abnormal packet can confuse or overwhelm network devices and applications, potentially leading to system crashes or unauthorized access.A Christmas tree attack is a type of network reconnaissance or vulnerability scanning technique that aims to exploit weaknesses in network security. By sending these specially crafted TCP packets, the attacker attempts to elicit responses from the targeted system and gain information about its vulnerabilities or exploit them
a Christmas tree attack is a type of network attack where all TCP flags are turned on in a packet to exploit vulnerabilities in network security. Implementing appropriate security measures can help protect against such attacks and safeguard network systems.

To know more about TCP, Visit:

https://brainly.com/question/27975075

#SPJ11

Which of the keyword is used to display a customized error message to the user in python?

Answers

Answer:

By using try: & except: method.

Explanation:

Which of the keyword is used to display a customized error message to the user in python?

What device is specialized to provide information on the condition of the wearer’s health

Answers

A specialized device that provides information on the condition of the wearer's health is called a health monitoring device or a health tracker.

It typically collects data such as heart rate, sleep patterns, activity levels, and sometimes even blood pressure and oxygen saturation. This information is then analyzed and presented to the wearer through a mobile app or a connected device, allowing them to track and monitor their health over time. Health monitoring devices can range from smartwatches and fitness trackers to more advanced medical devices used in clinical settings, providing valuable insights and empowering individuals to make informed decisions about their well-being.

Learn more about specialized device here:

https://brainly.com/question/32375482

#SPJ11

Which statement describes a disadvantage of e-government?

Answers

Answer:

Setting up and maintaining the online systems can be expensive

Explanation:

Answer:

It can be expensive to set up and maintain the online systems

Explanation:

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

What is wrong with the following code? correct the bugs to produce the following expected output: first = [3, 7] second = [3, 7] they contain the same elements.

Answers

public class ArrayError {    

public static void main(String[] args) {      

int[] first = new int[2];        

first[0] = 3;        

first[1] = 7;        

int[] second = new int[2];

What is the bug in computer?

In computer technology, a bug is a coding error in a computer program. We consider a program to also include the microcode that is manufactured into a microprocessor.) The process of finding bugs -- before users do -- is called debugging.

first = [ 3,7 ]

second = [ 3 , 7]

They contains the same elements.

Process finished with exit code 0.

Learn more about bug

brainly.com/question/24124347

#SPJ4

The complete question is -

What is wrong with the following code? Correct the bugs to produce the following expected output: first = [3, 7] second = [3, 7] They contain the same elements. lype your solution here: 1 int[] first new int [2]; 2 first [0] 3; 3 first [1] 7; 4 int [ ] second = new int [2]; 5 second [0] = 3; 6 second [1] = 7; 8// print the array elements 9 System.out.println("first" first); 10 System.out.println("second"second); 12 // see if the elements are the same 13 if (first - second) I 14 System.out.println("They contain the same elements."); 15 else 16 System.out.println("The elements are different."); 17 h

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

Use the given information to find the number of degrees of freedom, the critical values χ2L and χ2R, and the confidence interval estimate of σ. It is reasonable to assume that a simple random sample has been selected from a population with a normal distribution. Nicotine in menthol cigarettes 90% confidence; n=26, s=0.27 mg. df= (Type a whole number.) χ2L= (Round to three decimal places as needed.)

Answers

The number of degrees of freedom is df = n - 1 = 26 - 1 = 25. The critical values χ2L and χ2R depend on the confidence level desired and the degrees of freedom. Since a 90% confidence interval is required, we need to find the critical values corresponding to α = 0.1 (10% significance level) on both sides of the chi-square distribution with 25 degrees of freedom. The critical values χ2L and χ2R are found using a chi-square table or a statistical software.

What are the critical values χ2L and χ2R for a 90% confidence interval with 25 degrees of freedom?

To find the critical values, we can use a chi-square table or a statistical software. From the chi-square table, the critical values for a 90% confidence interval with 25 degrees of freedom are χ2L = 12.401 and χ2R = 38.885 (rounded to three decimal places).

Learn more about confidence

brainly.com/question/29048041

#SPJ11

Click this link to view O*NET’s Work Context section for Glass Blowers, Molders, Benders, and Finishers. Note that common contexts are listed toward the top, and less common contexts are listed toward the bottom. According to O*NET, what are common work contexts for Glass Blowers, Molders, Benders, and Finishers? Check all that apply.



face-to-face discussions

importance of being exact or accurate

wear common protective or safety equipment

in an open vehicle or equipment

spend time keeping or regaining balance

very hot or cold temperatures

Click this link to view O*NETs Work Context section for Glass Blowers, Molders, Benders, and Finishers.

Answers

Therefore, the correct options to check are:

   Importance of Being Exact or Accurate    Wear Common Protective or Safety Equipment    Face-to-Face Discussions

What is the  O*NET’s Work Context?

O*NET is a database that provides information on different occupations, including their work context. Work context refers to the physical, social, and environmental conditions under which a job is performed.

According to the Work Context section for Glass Blowers, Molders, Benders, and Finishers on O*NET, the most common work contexts for this occupation are Importance of Being Exact or Accurate, Wear Common Protective or Safety Equipment, and Face-to-Face Discussions.

Based on O*NET's Work Context section for Glass Blowers, Molders, Benders, and Finishers, the common work contexts for this occupation are:

   Importance of Being Exact or Accurate    Wear Common Protective or Safety Equipment    Face-to-Face Discussions

Read more about  O*NET’s Work Context  here:

https://brainly.com/question/30736336

#SPJ1

Answer: A,B,C,F

Explanation: on edge

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options. Responses higher speeds higher speeds provides access to more networks provides access to more networks lower cost lower cost greater geographic reach greater geographic reach more secure more secure

Answers

The advantages of a local area network (LAN) over a wide area network (WAN) include higher speeds, lower cost, and greater security.

Advantages of a local area network (LAN) over a wide area network (WAN) can be summarized as follows:

Higher speeds: LANs typically offer faster data transfer rates compared to WANs. Since LANs cover a smaller geographical area, they can utilize high-speed technologies like Ethernet, resulting in quicker communication between devices.Lower cost: LAN infrastructure is generally less expensive to set up and maintain compared to WANs. LANs require fewer networking devices and cables, and the equipment used is often more affordable. Additionally, WANs involve costs associated with long-distance communication lines and leased connections.More secure: LANs tend to provide a higher level of security compared to WANs. Since LANs are confined to a limited area, it is easier to implement security measures such as firewalls, access controls, and encryption protocols to protect the network from unauthorized access and external threats.

To summarize, the advantages of a LAN over a WAN are higher speeds, lower cost, and enhanced security.

For more such question on local area network

https://brainly.com/question/24260900

#SPJ8

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Boost-Sector Viruses

Explanation:

The viruses of such types are known as boot sector viruses.

What is computer virus?

A computer virus is a form of malware that accompanies another program (such as a document) and has the ability to multiply and propagate once it has been run on a machine.

When the drive's VBR is read, an infected floppy disk or USB drive connected to a computer will transfer, modify, or replace the preexisting boot code. The virus will load and start right away as part of the master boot record the following time a user attempts to boot their desktop.

Hence, the virus that can be loaded when computer is turned on is boot sector virus.

To know more about computer virus click on,

https://brainly.com/question/29446269

#SPJ12

Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format

When can a validation rule be used to prevent invalid data
a. When records are edited by a user
b. When records are deleted by a user
c. When records are submitted using web-to-lead
d. When records are imported
e. When records are updated by a workflow rule

Answers

A validation rule can be used to prevent invalid data when records are edited by a user, when records are submitted using web-to-lead, and when records are updated by a workflow rule. Therefore, options a, c and e are the correct answers.

In Salesforce, a validation rule is utilized to validate data entered by a user based on the criteria. If the criteria are not met, an error message is displayed, and data is not saved into Salesforce. The data entered in Salesforce must pass the validation rule criteria.

The validation rule assures that the data entered is correct and reliable. By limiting data entry into Salesforce, Validation Rules play an important role in keeping the data in Salesforce clean.

If the information entered in Salesforce is incorrect, it may result in inaccurate reporting, which may cause the company to make poor business choices. Thus, the use of validation rules in Salesforce is critical for accurate and reliable information entry.

So, the correct options are a, c and e.

To learn more about validation rule: https://brainly.com/question/32351976

#SPJ11

in this clip, the filmmakers connect each shot using a technique called – . these editing choices are intended to maintain cinematic – and hide the edit.

Answers

The filmmakers connect each shot using a technique called Cutting on action.

These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

What is meant by cutting on action?

Cutting on Action is known to be a term that is said to be used by editor and it is one that implies the  cuts in the middle of a given action to another shot that tends to matches the first shot's  said action.

Note that it is seen as a common editing method that tends to hides the shift from one shot angle  to another shot angle and this is often done  by stopping the first shot in the middle of another continuing action and then beginning the next shot at some distance along in the similar action.

Therefore,  The filmmakers connect each shot using a technique called Cutting on action. These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

Learn more about filmmakers from

https://brainly.com/question/28110104
#SPJ1

et p denote the number of producers, c the number of consumers, and n the buffer size in units of items. for each of the following scenarios, indicate whether the mutex semaphore in sbuf insert and sbuf remove is necessary or not. [15 points]

Answers

I have answered this question with the following scenario below:

A. p=1, c=1,2, n> 1

B. p=1, c=1, n=1

C. p>1, c>1, n=1

Answer

for A.p=1,c=1,n>1 : YES,the mutex semaphore is necessary as both the consumers and producers can concurrently access the buffer

for B. p=1,c=1,n=1 : NO,the mutex semaphore is not necessary .When a buffer contains an item the producer is blocked when the buffer is empty the consumer is blocked.So,only a single one can access the buffer at a time,so there is mutual exclusion which means mutex semaphore is not necessary.

for C. p>1,c>1,n=1 : No, here also mutex semaphore is not necessary as only a single one can access the buffer at a time in the same way as scenario B.so,due to mutual exclusion is already there there is no need for mutex semaphore.

Learn moer about Mutex semaphore at brainly: https://brainly.com/question/28145328

#SPJ4

AWS Shield Standard is activated for all AWS customers, by default. For higher levels of protection against attacks, you can subscribe to AWS Shield Advanced. With Shield Advanced, you also have exclusive access to advanced, real-time metrics and reports for extensive visibility into attacks on your AWS resources. With the assistance of the DRT (DDoS response team), AWS Shield Advanced includes intelligent DDoS attack detection and mitigation for not only for network layer (layer 3) and transport layer (layer 4) attacks but also for application layer (layer 7) attacks.
AWS Shield Advanced provides expanded DDoS attack protection for web applications running on the following resources: Amazon Elastic Compute Cloud, Elastic Load Balancing (ELB), Amazon CloudFront, Amazon Route 53, AWS Global Accelerator.

Answers

Yes, AWS Shield Standard is activated for all AWS customers by default.

Let's dive deeper into the details below.

AWS Shield Advanced provides an expanded level of protection against DDoS attacks, including intelligent DDoS attack detection and mitigation for network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7) attacks. It also provides real-time metrics and reports to provide visibility into attacks on your AWS resources, as well as access to the DRT (DDoS Response Team). AWS Shield Advanced provides advance DDoS attack protection for web applications running in:

Amazon Elastic Compute Cloud

Elastic Load Balancing (ELB)

Amazon CloudFront, Amazon Route 53

AWS Global Accelerator.

Learn more about AWS Shield Standard.

brainly.com/question/30176139

#SPJ11

Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.

Answers

Answer:

When is this due?

Explanation:

I will write it

A radio and communications security repairer is responsible for both radio and satellite communication systems.

True
False

Answers

i'm almost certain the answer is true

Answer:

The answer is true

Explanation:

I got it correct on the quiz

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

Which group often works as part of a team to secure an organization's computers and networks?

Answers

Network administrators are group often works as part of a team to secure an organization's computers and networks.

What is a network administrator do?

Network and computer systems administrators are known to be people that are said to be responsible for the daily  running of the  operation of these networks.

Hence, Network administrators are group often works as part of a team to secure an organization's computers and networks.

Learn more about Network administrators from

https://brainly.com/question/5860806

#SPJ1

what is the confirmation or validation of an event or object? multiple choice question.
a. fact b. machine-to-machine
c. information age
d. internet of things

Answers

Confirmation or validation of an event or object is primarily achieved through a. Fact. Factual Information ensures accuracy and reliability in verifying the occurrence or existence of something.

Confirmation or validation of an event or object is commonly established through the use of facts. Facts are objective pieces of information that are based on evidence and can be proven or verified. When we have concrete facts supporting an event or object, we can confirm or validate its existence or occurrence.

Facts serve as the foundation for determining the truthfulness or accuracy of a claim. They provide evidence that can be examined, analyzed, and cross-referenced to establish the validity of an event or object. Facts are typically based on observable data, logical reasoning, scientific research, or historical records.

Learn more about fact

brainly.com/question/27635493

#SPJ11

List two building techniques or materials that should be considered if you are building in Tornado Alley.

Answers

Have a strong foundation and a tornado shelter.

8 9. McWhorter argues that being able to understand in textspeak has many of the same benefits as being able to speak two languages. Can this same argument be applied to emojis? Why or why not?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER ​

Answers

Answer:

yes because i could use ️ to say im eating a chicken leg and or talking with my mouth full and got slapped so yes i believe so  

Explanation:

Answer: Yes because if you speak in "emoji" you technically can talk in any language you want because whoever you are sending it to could knows what you're implying by them

Explanation:

Other Questions
The function rule for the input/output table is to multiply by 6. What number completes the table?x y-5 -30 0 07 67494842 Can you file federal taxes in person? what is -21/30 as a decimal Divide 7 divided by 3/5Express your answer in simplest form. what is 3x+3=8(5x+5) forx explain how you got your answer. Can someone help me please Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using the AVERAGE function to find the average number of regular hours her employees work in a week (B7:B10). Due now pls helpThe following is an excerpt from a speech Frederick Douglass delivered to the International Council of Women in Washington, D. C. , April 1888. In the excerpt, is Douglass's use of Theodore Parker's grades relevant?Select one:Yes, because he uses them as the basis for explaining the greatness of the movementNo, because Theodore Parker was not a member of the movement for women's equalityNo, because he does not prove that Theodore Parker had sufficient expertise to evaluate greatnessYes, because he uses the women as an example of Theodore Parker's importance Redacte cinco normas de convivencia que la agradeca que se pusieran en prctica en su aula para favorecer la PLS HELP What is the diameter of a plate with circumference of 25 cm.? a 240 turn solenoid having a length of 29 cm and a diameter of 10 cm carries a current of 0.32 a. calculate the magnitude of the magnetic field b with arrow inside the solenoid. Amelia is deciding between two landscaping companies for her place of business.Company A charges $35 per hour and a $250 equipment fee. Company B charges $25per hour and a $300 equipment fee. Let A represent the amount Company A wouldcharge for t hours of landscaping, and let B represent the amount Company B wouldcharge for t hours of landscaping. Write an equation for each situation, in terms oft,and determine which company would be cheaper if Amelia needs 7 hours oflandscaping. which of the following consists of high capacity data storage devices in a distinctly defined network segment?a. WLANb. PANc. SANd. MAN The German soldier is whispering, "Join with Germany and you get a bit of United States." Based on your knowledge of social studies, what is this cartoon referring to?A.the Zimmermann Telegram and US involvement in World War IB.the bombing of Pearl Harbor and US involvement in World War IIC.the sinking of the USS Maine and the start of the Spanish-American WarD.the Treaty of Guadalupe Hidalgo and the start of the Mexican-American War question 15 of 3 in the current cell, use the average function to calculate the average quarterly revenue for the fiscal year help simple question pls help me If a composer instructs one instrument to play softly while the other plays loudly, he is using repetition contrast variation visioning A fully-funded pension plan can invest surplus assets in equities provided it reduces the proportion in equities when the value of the fund drops near the accumulated benefit obligation. This strategy is referred to as Here is fs fs da last graph I need help so someone plz help me Find the common difference of the arithmetic sequence 20, 18, 16, ... Please help fast Here is a new container without a top lid. How much popcorn