Which type of list is most approprite for giving instructions on how to build a bird
house?
Bucket List
Numbered List
Bulleted List
Marked check list

Answers

Answer 1

Use a bulleted list for unordered items; use a numbered list for ordered items.

What is bulleted list?A bulleted list is an unordered list of items where every item has a graphical bullet. The bullets may be characters of different fonts, as well as graphical icons.Bulleted lists help the author structure the text in a better way - provide a list of application components, list of usage scenarios, etc. When the order of elements is not important and you don't need to refer to a list element later in the text, it's good to use bulleted lists. They help avoid the perception of the elements order importance.When the order of elements is important (instruction steps, list of itemns ordered by importance), you can use a numbered list instead.

To learn more about bulleted list refer to:

https://brainly.com/question/26707368

#SPJ1


Related Questions

how to fix our systems have detected unusual traffic from your computer network. this page checks to see if it's really you sending the requests, and not a robot.

Answers

Examine your network for any strange behavior, and fix any malware or security flaws you detect.

A network is a collection of two or more devices or systems that are connected to one another wirelessly or through physical channels like cables, radio waves, or microwaves. Through networks, users, computers, and resources may communicate with one another and exchange data. Local area networks, wide area networks, and virtual private networks are different types of networks. Internet, intranets, and extranets are a few of the networks that are frequently utilized. For businesses and organizations to communicate, work together, and quickly access resources, networks are crucial. Networks make it simple for organizations to transmit data, share information, and access resources from any location.

Learn more about A network here:

https://brainly.com/question/30297082

#SPJ4

which of the following was not one of democritus's ideas? which of the following was not one of democritus's ideas? atoms maintain their identity through a chemical reaction matter consists of tiny particles called atoms atoms are indestructible atoms are indivisible

Answers

The law of atom conservation and the idea of chemical combination were both derived from Dalton's' atomic model.

John Dalton presented the atomic theory, which had numerous key components. According to the idea that everything in the universe is made up of small, unbreakable atoms. It also included the mass because only atoms of the same element can share attributes and atoms of other elements have different masses. The law of conservation of mass and the laws of definite and multiple proportions were born out of it. One of the principles states that matter is composed of extremely small units known as atoms. Further research into any of the atomic models and theories has not proven it false. As a result, hypothesis A—that matter is composed of atoms—is not refuted.

Learn more about Dalton's atomic model here:

https://brainly.com/question/18251797

#SPJ4

THIS IS FOR GAME DESIGN PLS HELP ASAP!!

Consider what you've learned about creating a useful help document. In order of importance,
describe the information you believe would be most important for the player to be able to
access through the help system. What types of reminders and help options do you find most
useful in games you've played?

Answers

Basic controls and navigation: This would include information on how to move the character, interact with objects, access menus, and navigate through the game world. This is essential for players to be able to understand how to play the game and move forward in the story.

Game mechanics and objectives: This would include information on how to complete tasks, solve puzzles, and progress through the game. This is important for players to understand the core gameplay and how to achieve their goals.

Character abilities and upgrades: This would include information on the player character's abilities and how to unlock or upgrade them. This is important for players to understand how to make the most of their character's abilities and how to progress through the game.

Tips and tricks: This would include information on how to overcome challenges, find hidden items, and discover secrets. This is important for players to be able to get the most out of the game and have an enjoyable experience.

Glossary of terms: This would include a list of terms used in the game, along with explanations of what they mean. This is important for players to understand the game's vocabulary and be able to understand the story and mechanics.

In-game reminders and help options that I find most useful in games I've played include:

In-game tutorials, which provide step-by-step instructions on how to perform specific actions

Your company plans to deploy a stateful application named App1 to Azure Container Instances. App1 requires two containers that must be deployed to the same container group.

You need to implement a persistent storage solution that is accessible simultaneously from both containers.

What should you use?

Select only one answer.

Azure Blobs

Azure Files

Azure Disk

Azure Table

Answers

Azure Files should be used to implement a persistent storage solution that is accessible simultaneously from both containers. Hence option B is correct.

What is the Azure Files?

Azure Container Instances support the use of Azure Files for persistent storage. Azure Files is a managed file storage service that allows you to create and manage file shares that can be accessed using the Server Message Block (SMB) protocol. This can be useful when you need to share data between containers in the same container group.

Therefore,  Azure Blobs, Azure Disk, and Azure Table are storage solutions provided by Azure but they are not suitable for this scenario as they are not accessible simultaneously from multiple containers. Azure Blobs is used for unstructured data, Azure Disk is used for IOPS-intensive workloads and Azure Table is used for structured NoSQL data.

Learn more about Azure Files from

https://brainly.com/question/29980328

#SPJ1

How to use this program

Answers

Answer:

there is no problem

Explanation:

but i hope i can help one day

Which of the following is an event? Select 4 options.

a sensor detecting the motion of an earthquake detector

moving a mouse

adding three and four in a program


clicking a mouse button


scanning a credit card when you shop

Answers

Answer: rarer

Explanation:

an er T Job done Laying bricks, bonding of walls, pointing and jointing. Uses unplanned wood for making structural roof trusses, timbering, shuttering and form-work. Uses planned wood for making wood doors, window frames built in cupboards.​

Answers

An "er T job" typically refers to a construction job that involves laying bricks, bonding walls, pointing, and jointing.

What is an er T job?

An "er T job" is a type of construction job that involves working with brick, stone, and other masonry materials. This type of job may also involve using unplanned wood for making structural roof trusses, timbering, shuttering, and formwork, as well as using planned wood for making wood doors, window frames, and built-in cupboards.

Some examples of tasks that may be included in an "er T job" are:

Laying bricks: This involves setting bricks in place on a foundation and ensuring they are level and properly aligned.

Bonding of walls: This refers to the process of attaching one layer of bricks or stones to another using mortar.

Pointing and jointing: Pointing is the process of filling the gaps between bricks or stones with mortar to create a smooth, finished surface. Jointing is the process of creating grooves or channels in the mortar to help prevent cracking.

Using unplanned wood for making structural roof trusses: This is when the roof trusses are made on site and not pre-made.

Timbering, shuttering and form-work: Timbering refers to the process of using wooden beams to support the structure. Shuttering is the process of making formwork for poured concrete.

Making wood doors, window frames, and built-in cupboards: These are all examples of carpentry tasks that may be included in an "er T job."

To know more about construction, visit: https://brainly.com/question/14230591

#SPJ1

7.2.5 height in meters
Can someone tell me what’s wrong and the correct code please

Answers

Answer:

72.5 m

Explanation:

7.2.5 is wrong

because every possible number can't have each decimal

A company noticed a recent spike in online posting about one of their products. In response, they increased the amount of paid advertising for that particular product. However, sales of the product dropped by 65% in the next 4 months. Which big data value component was missing from the analysis about the spike?

Answers

Answer:

missing big data value component from the analysis about the spike could be causality

Explanation:

It appears that the missing big data value component from the analysis about the spike could be causality.
The company noticed a spike in online posting about the product, and in response, they increased the amount of paid advertising for that particular product.
However, this increased advertising did not lead to an increase in sales, but instead, sales dropped by 65%.
This suggests that there may be other factors at play beyond just the spike in online posting that the company was not aware of, and that may have contributed to the decrease in sales.
In order to fully understand the situation, the company should conduct further analysis to understand the cause of the spike in online posting and whether or not there is a causal relationship between that spike and the decrease in sales.

Which balance shows the amount of money you can use now

Answers

Kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk is informant to duck

what is the difference between a Supercomputer a mainframe computer Server computer,Workstation computer,Personal computer,Micro-controller,Smartphone?

Answers

Answer:

A supercomputer is a high-performance computer that is typically used for scientific and engineering research, such as weather forecasting, climate modeling, and large-scale simulations. They are the most powerful and most expensive computers.

A mainframe computer is a large, powerful computer that is typically used by large organizations, such as banks and government agencies, for mission-critical applications.

A server computer is a computer that is used to manage and distribute network resources, such as email and file storage.

A workstation computer is a high-performance computer that is typically used for engineering, scientific, and other demanding applications, such as computer-aided design (CAD) and video editing.

A personal computer (PC) is a general-purpose computer that is designed for individual use, such as for word processing, internet browsing, and playing games.

A microcontroller is a small computer on a single integrated circuit that is typically used in embedded systems, such as in appliances, automobiles, and industrial control systems.

A smartphone is a mobile device that combines the features of a computer with those of a cellular telephone. It is typically used for making phone calls, sending text messages, and accessing the internet.

Explanation:

The root joint is always created last in a skeletal structure. True or false

Answers

The statement "The root joint is always created last in a skeletal structure" is false.

What is the skeletal system?

The skeletal system is the central framework of your body. It is made up of bones and connective tissue, such as cartilage, tendons, and ligaments. It is also known as the musculoskeletal system.

A joint root is the region of a welded joint where the members are closest to each other. The “start joint” is also known as the root or head. The “body” in and of itself. And the “end joint” known as the tip or tail.

Therefore, the statement is false.

To learn more about the skeletal system, refer to the link:

https://brainly.com/question/1497712

#SPJ1

Define Hard, Soft and Firm Real Time system. Discuss whether or not the following are hard, soft or firm real-time systems. (a) A police database that provides information on stolen automobiles. (b) The computer system controlling the Panama Canal locks. (c) An automatic teller machine. (d) Anti-lock Brake system

Answers

Almost all applications switch between using the CPU to handle data and waiting for I/O of some kind.

The term "real-time system" refers to any information processing system with hardware and software components that can respond to events within predetermined time frames and execute real-time application operations. A real-time scheduling system is made up of the scheduler, clock, and hardware elements of the processing system. In a real-time system, a process or task can be scheduled; tasks are accepted by a real-time system and completed in accordance with the task deadline depending on the scheduling algorithm's properties. Almost all applications switch between using the CPU to handle data and waiting for I/O of some kind. (Even a simple memory fetch) takes a lot longer than CPU speeds.

Learn more about Real-time system here:

https://brainly.com/question/29833150

#SPJ4

JOB INTERVIEW QUESTIONS: WORK HISTORY


Please do not copy search and your own idea


1.) WHEN WERE YOU EMPLOYED BY THIS COMPANY?



2.) WHAT WERE YOUR STARTING AND FINAL SALARY?



3.) WHAT WERE YOUR RESPONSIBILITIES?



4.) WHY ARE YOU LEAVING YOUR CURRENT JOB?



5.) WHY WERE YOU FIRED?

Answers

Some general information that could be useful in answering these types of questions during a job interview.

When were you employed by this company?

The candidate should provide their specific employment dates for the company in question, including start and end dates.

The candidate should provide their starting and final salary for the position they held at the company in question.

The candidate should provide a clear and concise overview of the job duties and responsibilities they had while employed at the company.

The candidate should provide a professional and honest reason for leaving their current employment, such as seeking new opportunities or growth, or a change in their personal circumstances.

If the candidate was terminated from a previous employment, they should provide a clear and honest explanation of the circumstances surrounding their termination. It is important to take responsibility for any mistakes and to show how the candidate has learned from the experience and grown as a professional.

To learn more about interview refer:

brainly.com/question/8846894

#SPJ1

1 Write the stops to insert a new slide in power point 2 Write the steps to select a layout for a slide 3. What is the use of font box 4. What is the use of paragraph box 5. What is the use of editing box. 6 Write at least four font box member 7. Write three alignment name that is found on paragraph box. S. Write at least three name of ready-made shapes that is found under drawing box. 9 What is insen menu and its use in power point 10 Write the steps to add header and lonter to the selected slide​

Answers

Answer:

1.In the slide thumbnail pane on the left, click the slide that you want your new slide to follow.

On the Home tab, click New Slide.

In the New Slide dialog box, select the layout that you want for your new slide. Learn more about slide layouts.

Select Add Slide.

Reviewing an email you are about to send involves ______. A. choosing a subject line B. adding it to the archive folder C. writing a salutation D. checking your spelling

Answers

Reviewing an email you are about to send involves checking your spelling. Thus, option D is correct.

What is Reviewing?

Reviewing is the process of critically evaluating something, such as a product, service, or piece of art. It involves providing an overall opinion about an item and highlighting its strengths and weaknesses.

Reviews are typically written by individuals who have used or experienced the product or service and provide an honest assessment of what they think about it. Reviews can be helpful for potential customers and can help them make informed decisions before making a purchase. Additionally, reviews can help businesses identify areas of improvement and help them better understand their customer base.

To learn more about Reviewing

brainly.com/question/28430565

#SPJ4

true or false. the zip codes are in a column called zip code. to select all data from the donation form list organized by zip code, you use the order by function. the syntax is:

Answers

Use the SQL phrase "SELECT * FROM Donation Form List ORDER BY zip code" to select all data from the list of donation forms organized by zip code.

Structured Query Language, or SQL, is a query language (pronounced "ess-cue-el") Database communication is done using the SQL programming language. It is the recognized language for relational database management systems, according to ANSI, or the American National Standards Institute. Using SQL commands, databases may be updated and their content can be retrieved. SQL is extensively used by relational database management systems including Oracle, Sybase, Microsoft SQL Server, Access, Ingres, and others. SQL language variants abound despite being an ANSI/ISO standard. To be regarded as ANSI compliant, they must all consistently deliver at least the basic instructions (such as SELECT, UPDATE, DELETE, INSERT, and WHERE).

Learn more about SQL here:

https://brainly.com/question/29449174

#SPJ4

jared makes two copies of an antivirus software package he bought and sold one of the copies to joshua. how would jared's actions be classified in this situation? question 15 options: ethical, but illegal unethical, but legal illegal and unethical legal and ethical

Answers

A confidentiality agreement that commits them to keeping the information private must be signed by every employee of a business that handles it.

The IT manager's conduct must be classified as c. illegal and unethical because he was not allocated and was not permitted to take the company's whole workforce's health records out of the system. The human resources manager and his authorized staff are accountable for this duty. Because the manager is breaking the law by disclosing private information to unauthorized third parties when he extracts and sells this information to pharmaceutical companies as sales leads. A confidentiality agreement that commits them to keeping the information private must be signed by every employee of a business that handles it. The human resources manager and his authorized staff are accountable for this duty.

Learn more about illegal and unethical here:

https://brainly.com/question/30163791

#SPJ4

The ____________________ tool can be used to list the distance between two walls without drawing a dimension.

Answers

Since two water fountains are depicted on a drawing museum scale as being 10 inches apart, their actual separation is 400 feet.

These two exhibitions are actually 125 feet apart. Detailed explanation: Given: On a scale of a drawing museum, two water fountains are separated by 10 inches. They are 400 feet apart in actuality. The separation between two exhibits on the same sketch is 3.125 inches. To Discover: How far apart are these two exhibitions in reality? Since two water fountains are depicted on a drawing museum scale as being 10 inches apart, their actual separation is 400 feet. 400 feet Equals 10 inches So, 1 inch equals 400/10. 1 in equals 40 ft. Since it has been shown that there are 3.125 inches between each display, Therefore, the actual distance between the two exhibitions is measured in feet (1 inch equals 40 feet). = 3.215*40.

Learn more about Exhibitions here:

https://brainly.com/question/2763839

#SPJ4

What is an accurate definition of a background

Answers

Answer:

the collection of things a person has done. a natural ability

Explanation:

write a program to determine whether a number n is equal to the sum of its proper positive divisors excluding the number itself

Answers

PROGRAM

Here is a program in Python that determines whether a number n is equal to the sum of its proper positive divisors (excluding the number itself):

def is_perfect(n):

divisors = []

for i in range(1, n):

if n % i == 0:

divisors.append(i)

if sum(divisors) == n:

return True

else:

return False

n = int(input("Enter a number: "))

if is_perfect(n):

print(n, "is a perfect number.")

else:

print(n, "is not a perfect number.")

The function is_perfect(n) takes an integer n as input, and uses a for loop to find all the positive divisors of n, excluding n itself. It then checks if the sum of these divisors is equal to n. If it is, the function returns True, indicating that n is a perfect number. If the sum of the divisors is not equal to n, the function returns False, indicating that n is not a perfect number.

The program prompts the user to enter a number, then calls the is_perfect(n) function to check if the number is a perfect number. If it is, the program prints that the number is a perfect number, otherwise it prints that the number is not a perfect number.

It's important to note that there are not many perfect numbers, and for larger numbers this algorithm could become inefficient. In case you need to work with large numbers, it is more efficient to use the Sieve of Eratosthenes algorithm to generate the perfect numbers.

Hope This Helps You!

3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.

Answers

Answer:

The summary of given question is summarized in the below segment.

Explanation:

Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.

Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.

Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.

A goal that you want to achieve within the next year is what type of goal? A. A budget goal B. A financial goal C. A short-term goal D. An intermediate goal Please select the best answer from the choices provided A B C D

Answers

C. A short term goal because it is in the near future.

When work is done by a system and no heat is added, the temperature of the system
A) increases
B) decreases
C) remains unchange

Answers

C) remains unchanged

a technician needs to deploy a remote access technology to be able to access desktop computers. when a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. which of the following would be best suited for this task?

Answers

The distant connection's firewall needs to be configured to allow the following protocol and port number combinations in order to establish this link.

One Windows user reported a problem that required the operator to connect to a remote server using Remote Assistance in order to view the user's screen and display a lengthy and confusing error message. The operator's attempts to connect to the remote access almost always result in a notification saying that the connection has been rejected. The distant connection's firewall needs to be configured to allow the following protocol and port number combinations in order to establish this link. The response to this query is Windows Remote Desktop. Because Windows Remote Desktop is a feature of an OS (Operating System) or an application, users can connect their systems to computers that are located in other places by using this capability. Therefore, Windows Remote Desktop is the appropriate response.

Learn more about Windows Remote Desktop here:

https://brainly.com/question/13991120

#SPJ4

A construction engineer is working on a hydroelectric dam project in South America. He travels to the construction site every month from his home in Colorado and uses a portable hard drive to transfer files he needs to work with when he is at the project site.

On his last trip, he had left the portable drive plugged into the desktop computer in the project office while he was out on the site. A severe thunderstorm struck, knocking out power on the site. When he was able to return to the office, he noticed the power indicators on the office computer and the portable drive were on, but he couldn't get anything to appear on the computer monitor.

What is the most likely source of the problem?

A. A power surge from the storm damaged the computer monitor.
B. A power surge from the storm erased the computer's operating system files.
C. A power surge from the storm damaged the power supply on the computer.
D. A power surge from the storm caused the portable hard drive to fail.

Answers

Hydroelectric electricity is the most likely source of the problem. Moving water is  used to generate hydroelectric electricity.

What type of energy transformation occurs in a hydroelectric dam?Potential energy, often referred to as kinetic energy, is converted to mechanical energy by a hydroelectric dam from a water reservoir behind the structure.The larger career area of civil engineers includes jobs such as structural engineers for hydroelectric plants.Moving water is  used to generate hydroelectric electricity.In hydropower plants, water travels through a pipe called a penstock before pushing against and turning the blades of a turbine, which ultimately spins a generator to generate energy.Potential energy, often referred to as kinetic energy, is converted to mechanical energy by a hydroelectric dam from a water reservoir behind the structure.        

To learn more about energy transformation refer to:

https://brainly.com/question/24590200

#SPJ1

You are trying to implement good fundamental security for a small company. Which of the following is the least essential device for protecting your network?

Answers

A load balancer, which essentially spreads workloads over multiple servers for better performance, is the least important piece of hardware for securing a network.

Security fundamentals are the core components of a successful security system that prevent unauthorized access to data and information within an organization. Patch management, access control, network monitoring, virus prevention, authentication and authorization, and encryption are among them. Authentication is the process of confirming a user's identity who is attempting to access a system. Authorization is the process of upholding and allowing access to system resources. To protect its integrity and confidentiality, data is encoded using encryption. Access control refers to the process of limiting and controlling user access to system resources. Patch management is the process of upkeep and hardware and software updates for systems. Network monitoring is the process of keeping an eye out for any potential threats in network activity and traffic.

To know more about Security Fundamentals

brainly.com/question/20709959

#SPJ4

fill in the blank. a(n)___is a lan that uses the same technologies as the internet but is provided to invited users outside the organization who access it over the internet.

Answers

Extranet is a lan that uses the same technologies as the internet but is provided to invited users outside the organization who access it over the internet.

What is LAN?

In order to link devices to internal servers, web servers, and other LANs via wide area networks, a LAN is made up of cables, access points, switches, routers, and other parts.

The development of virtual LANs, which allow network managers to logically organise network nodes and partition their networks without the need for significant infrastructure upgrades, has also been fuelled by the rise of virtualization.

For instance, the computers in each department in an office with numerous departments, such as accounting, IT support, and administration, could be logically connected to the same switch but segmented to operate separately.

The benefits of a LAN are the same as those of any collection of connected devices. Each device has access to a single Internet connection, can exchange files,

Read more about LAN:

https://brainly.com/question/8118353

#SPJ4

What are the two technology improvements that have been the main driving force for computer performance?

Answers

Technological improvements could be often be copied by rivals, leading to a profit-eroding arms race.

What you mean by Technological Improvements?

Technological Improvements means any improvement, enhancement, advancement, update, revision, change, or modification, whether patentable or not.

Technological Improvements such as e-mail, instant messaging, video conferencing, and social media are making it easier and more effective for businesses to communicate and collaborate than ever before.

Therefore, Technological improvements could be often be copied by rivals, leading to a profit-eroding arms race.

Learn more about profit-eroding on:

https://brainly.com/question/29377471

#SPJ1

A technician is working at a tire installation shop and is constantly using an impact gun that produces 100 decibels. What type of protection is recommended to be worn?

Answers

Answer:50

Explanation: saw it in my dreams don't trust but had to put it out there

Other Questions
A sucrose (C12H201) solution that is 45. 0% sucrose by mass has a density of 1. 203 g/mL at 25C. Calculate its (a) molarity. (b) molality (d) normal boiling point. TRUE OR FALSE among human communities, social status is allocated primarily on the basis of If A and B are independent events and P(A)=0.25 and P(B)=0.333, what is the probability P(ANB)? Select one. a. 1.33200 b. 0.75075 c. 0.08325 d. =0.0830 a sample is obtained from a normal population with = 20. if the sample mean has a standard error of 10 points, then the sample size is n = 4. True or False 1. use the following table to answer these queries using oracle SQL:Division (DID, dname, managerID)Employee (empID, name, salary, DID)Project (PID, pname, budget, DID)Workon (PID, EmpID, hours)List the name of the employees (and his/her DID) who work on more projects than his/her divisional colleagues. (hint: co-realated subquery, also use having , compare count() to count, use " having count (pid) >=ALL (select count (pid) ..)List the name of the employee that has the lowest salary in his division and list the total number of projects this employee is work on (use co-related subquery)List the name of employee in Chen's division who works on a project that Chen does NOT work on.List the name of divisions that sponsors project(s) Chen works on . (Namely, if there is a project 'chen' works on, find the name of the division that sponsors that project.)List the name of division (d) that has employee who work on a project (p) not sponsored by this division. (hint in a co-related subquery where d.did p.did)List the name of employee who work with Chen on some project(s).Increase the salary of employees in engineering division by 10% if they work on more than 1 project.Increase the budget of a project by 10% if it has more than two employees working on it. Type the correct answer in each box. Use numerals instead of words. If necessary, use / for the fraction bar(s). Find the inverse of the given function. F -1(x) = x2 - , for x . Determine the [H+] , [OH], and pOH of a solution with a pH of 7.41 at 25 C. [H+]=M[OH]=MpOH= what are the spectator ions when k2s(aq) and cacl2(aq) are combined? if the fisherman caught a total of 80 kilograms of fish, how many more kilograms of bass than pike did he catch? 5. How does Gatsby say he spent his time after his family died? discuss the manner in which java passes parameters to a method. is this technique consistent between primitive types and objects? explain. Learning takes place within the _____ layer of an artificial neural network. a. middle. b. newest. c. output. d. input the potential conflict of interest when a single accounting firm provides both auditing and consulting services is that the firm can The table shows the approximate distance between selected cities and the approximate cost of flights between those cities. Calculate the correlation coefficient between cost and miles. (Round to three decimal places as needed.)CostMiles17194139730932702003884334383019(b) This table shows the same information, except that the distance was converted to kilometers by multiplying the numbers of miles by 1.609 and rounding to the nearest kilometer. What happens to the correlation coefficient when numbers are multiplied by a positive constant? (Round to three decimal places as needed.)CostKilometers171151439749772703223886974304856 calculate the taylor polynomials 2 and 3 centered at =2 for the function ()=47. how many rotational degrees of freedom does a xenon atom have? In reporting discontinued operations, the income statement should show in a special section: gains and losses on the disposal of the discontinued segment. TRUE/FALSE. Abraham Lincoln's plan at the start of the Civil War was to immediately end slavery and to fight a long, defensive war against the Southern states. Which word would best fill the blank?I have ________ read Uncle Tom's Cabin and write an essay for class. to too two Consider the economy of Wiknam. The consumption function is given by C = 250 + 0.6 ( Y T ) . The investment function is I = 100 20 r . The money demand function is ( M P ) d = Y 20 r . Round answers to two places after the decimal where necessary.a. Government purchases and taxes are both 100. In the accompanying diagram, graph the IS curve for r ranging from 0 to 8 by dragging and dropping the end points to the correct locations.b. The money supply M is 2,875 and the price level P is 5. In the accompanying diagram, graph the LM curve for r ranging from 0 to 8 by dragging and dropping the end points to the correct locations.c. Find the equilibrium interest rate, r, and the equilibrium level of income Y.