Categories

## The library drawer-upon-drawer file that contains information about every book in the library is called the _____. A.reference B. Reader's Guide C. card catalog D. Dewey Decimal System

The library drawer-upon-drawer file that contains information about every book in the library is called the _____. A.reference B. Reader’s Guide C. card catalog D. Dewey Decimal System

Categories

## Identify both the x- and y-intercepts of the linear equation graphed on the coordinate plane above. Use the intercepts to write an equation of the line in point-slope form, slope-intercept form, and general form of a linear equation.Complete your work in the space provided or upload a file that can display math symbols if your work requires it. In your work, be sure to include the coordinates for both intercepts and the equations of the line in all three formats.

The x int (where the line crosses the x axis) is (-2,0)
the y int (where the line crosses the y axis) is (0,-2)

(-2,0)(0,-2)
slope = (-2 – 0) / (0 – (-2) = -2/2 = -1

y = mx + b
slope(m) = -1
use either of ur points (-2,0)…x = -2 and y = 0
sub and find b
0 = -1(-2) + b
0 = 2 + b
-2 = b

so ur equation in slope intercept form is : y = -x – 2

y = -x – 2
x + y = -2
x + y + 2 = 0 <== general form

there can be 2 answer for point slope form…
y – y1 = m(x – x1)
slope(m) = -1
(-2,0)…x1 = -2 and y1 = 0
sub
y – 0 = – (x – (-2)
y – 0 = -(x + 2) <=== point slope form

y – y1 = m(x – x1)
slope(m) = -1
(0,-2)…x1 = 0 and y1 = -2
sub
y – (-2) = – (x – 0)
y + 2 = – (x – 0) <== point slope form

Categories

Categories

## A vessel operator is involved in an accident where someone requires medical attention beyond simple first aid. how long does the operator have to file a written report?

If the vessel operator is knowingly aware of the situation and decided not to file a written report for the victim, the vessel operator will be exposed to several risk of crime if the wound managed to took the victim’s life because the court will seem him/her as responsible in the death

Categories

## ,,,Help Please.. Question in the file.

,,,Help Please.. Question in the file.

Categories

## ________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize.

Auto formatting is a computer software feature that automatically change the appearance of texts. Uses of auto formatting include the following:
it can be used to quickly apply or change automatic formatting.
It can be used to give a professional look to a document with minimal efforts.
the internet and network hyperlink option can be used to format email addresses and URL as clickable hyper link fields.
The border line option can be used to apply paragraphs border styles to one’s documents.
The table option can be used to create a table.

Categories

## A household consists of a married couple, their two-year-old daughter, and their six-year-old son. The couple's children had no income and lived with their parents all of last year. How many exemptions can the couple claim on last year's tax return if they file with the "Married filing jointly" status? A. 4 B.3 C.2 D.5

A household consists of a married couple, their two-year-old daughter, and their six-year-old son. The couple’s children had no income and lived with their parents all of last year. How many exemptions can the couple claim on last year’s tax return if they file with the “Married filing jointly” status? A. 4 B.3 C.2 D.5

Categories

Categories

## Why is a specific naming convention important in regards to my file?

When making an email for professional purposes, it is important to make one that uses your full name as a username, if possible. However, common names might face difficulties since other people might have already taken the username. In this case, you can abbreviate your name, or include numbers behind it.

The best answer, thus, based on this, would be (D) alison.s-yahoo.com.

Categories

## The new york times prints an article accusing new jersey governor chris christie of taking campaign contributions from wealthy citizens with ties to organized crime. christies public relations staff argues that these claims are completely unfounded. therefore, they might file a complaint of ____________ against the newspaper in order to get the story retracted.?

The correct answer is “it includes commentary on several rights issues, including slavery and women’s suffrage.”

The statement that best describes “How ain’t a Woman” is “it includes commentary on several rights issues, including slavery and women’s suffrage.”

Isabella Baumfree was an African American woman that was born in 1797. She changed her name to Sojourner Truth in 1843. Her tenacity on the civil rights for women made her a supporter of human rights followed by many African Americans. She was also famous for her speech delivered in 1851 in the Women’s Rights Convention, in Akron, Ohio. The title of the speech is “How ain’t a Woman.” In the speech, she includes commentary on several rights issues, including slavery and women’s suffrage.

Categories

## "the balcony seats at the opera house have an angle of depression of 55° to center stage. if the horizontal (ground) distance to the center of the stage is 50 feet, how far are the patrons in the balcony to the singer at center stage? " (young 59) young, cynthia y. trigonometry, 3rd edition. wiley, 09/2011. vitalbook file.

“the balcony seats at the opera house have an angle of depression of 55° to center stage. if the horizontal (ground) distance to the center of the stage is 50 feet, how far are the patrons in the balcony to the singer at center stage? ” (young 59) young, cynthia y. trigonometry, 3rd edition. wiley, 09/2011. vitalbook file.

Categories

## How to change a word document to an .html file?

Most managers see inappropriate dressing every day. Some are left angered while some are confused as to what is the right way to approach such situations. What follows next needs to be professional oriented. Being the manager, I would start by finding out what the appropriate dressing policies are. Some companies might have dress code policies while others might not. Assuming that this company has, I would read these policies carefully. The next thing that is required from me is to have a small conversation with the employee discretely. As professional as I can be, I will mention how I feel his or her dress code is inappropriate and try to summon the employee by asking him or her whether they are fully aware of the appropriate dress code. I will try to agree with the employee on what is appropriate and what is not. If we agree, requesting the employee to home and change clothes is unnecessary, but if the need to do that arises, I would consider that to be an option.

Categories

## To specify AutoCorrect rules and exceptions to the rules, tap or click FILE to open the Backstage view, tap or click ____ , and then tap or click Proofing in the dialog box that displays.

Hey there! Hello!

So, I’m assuming you’re referring to Microsoft Office on Microsoft Windows for this question. I’m on a Mac, so the process is entirely different, since you go to the “Word” tab (to the right of the apple), click Preferences, then click on “AutoCorrect.” No File tab needed.

But, the blank (in the case of Windows) should have “Options” in it. The process involves clicking open the File tab, then clicking Options, then Proofing, then “AutoCorrect Options.”

Hope this helped you out! Feel free to ask me any additional questions if you have any. 🙂

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

#### Literature

Have no time for reading? Now it’s possible to write a book review or a literature essay without reading a book. Order a custom-written paper from expert writers on our website.

#### Finance

If finance is not your cup of tea, there is no need to torture yourself. You can pay for essay and get completely original work from people who are fluent in this field of science at StudyHawks.

#### Computer science

Our computer science experts can deal with any type of academic paper. We will meet all the requirements and deadlines. Stop struggling and place an order with our paper writing service.

#### Psychology

While psychology may be an interesting subject, written assignments may have you puzzled. Don’t despair! Increase your chances to get better marks.

#### Law

Writing a law essay may be difficult, especially when you need to know the peculiarities of the legislative framework. Get essay from our law experts and stay satisfied.

#### Nursing

In the nursing course, you may have troubles with critical essays, annotated bibliographies, literature reviews, and other assignments. Here you can ask an essay helper to assist you with any nursing paper.

#### Sociology

We know that writing sociology papers can be quite exhausting. Forget about sleepless nights and get fast assistance with your essays here on this website.

A good business essay or research paper should be written by an expert paper writer. Our website collaborates with qualified writers only. Put your assignment in our reliable hands.

## Use our writing service to score better and meet your deadlines

No matter what kind of academic paper you need, it is simple and secure to hire a writer for a price you can afford at StudyHawks. Save more time for yourself.

Categories

## The file descriptor stderr is represented by the number ____.

ANSWER: To store files in an organized way

-Don’t trust me completely on this, but compared to the other answer choices, this seems most logical.
-I might not know how this question relates to the subject so I might be wrong, but commonly, folders are used for organizing, especially in file structures.

REASONS WHY OTHER ANSWERS ARE WRONG:
“To store 256 files in one location” is not exactly organized if they are not split in groups.
“To allow Windows naming to be applied” is not the exact purpose for creating folders
“To secure files” is not entirely true, creating folders in a file structure does not make them secure, they are still access-able.

Hope this Helps!

Categories

## “Simile” by N. Scott Momaday What did we say to each other that now we are as the deer who walk in single file with heads high with ears forward with eyes watchful with hooves always placed on firm ground in whose limbs there is latent flight Source: Momaday, N. Scott. “Simile.” The Language of Literature. New York: McDougal Littell, 2006. 265. Print. Which of the following techniques does this poem use? I. simile II. sensory imagery III. allusion I and II I and III II and III I only[i and ii ] is the answer just doing this so people know that answer when they are looked up

|Q| Why did people trust Bernie Madoff? |A| Our research suggests that Madoff may have deliberately or inadvertently taken advantage of the automatic trust process regardless of whether his family members and business associates were victims or confederates. Even if he didn’t seem trustworthy, the fact that his closest relatives and associates invested with him could have provided a subtle, non-conscious signal that he was actually trustworthy. After all, foxes never prey near their dens, and thieves only steal far from their homes. Additionally, the constant associations of Madoff’s name with all sorts of philanthropic works, and other subtle cues, may also have encouraged people to trust when they shouldn’t have.

To explore trust, we did an experiment that used common cues naturally associated with people’s previous trusting or distrusting relationships–the names of their friends. We used the names of our research participants’ friends (or enemies) to subliminally prime them before they had a chance to trust or not trust someone they had never met.

In our simulation, the participants saw their friends’ names repeatedly, for fractions of a second, so briefly that they could not recognize them, before they played the classic Trust Game. In the game, they each started with \$5 and could send any part of it, from nothing to all \$5, to another participant whom they would never meet. The ”receiver” (who didn’t actually exist) would have full knowledge of the sender’s endowment and the amount the sender had sent.

The participants understood that the receiver would be getting three times the amount they sent and would then freely choose how much of the tripled amount to return to the senders. The receiver could send back anything from nothing to the entire tripled amount. In this boiled-down interaction, sending money was risky but increased joint gain; this accorded with the common definition of trusting behavior–a willingness to accept vulnerability based on positive expectations of another’s intention or behavior that is not under one’s control.

The results were stunning. After seeing subliminal presentations of names of people they liked or people they trusted, our participants trusted anonymous strangers by sending them an average of nearly 50% more than people who saw similar presentations of names of people they didn’t like.

In addition, nearly 50% of the participants who saw–albeit unconsciously–names they liked or trusted sent their entire endowments to strangers, compared with 15% of the participants who were subliminally primed with names of people they distrusted. These subliminal cues also increased their expectations that the stranger would reciprocate their trust by responding in ways that would best serve their interest.

The automatic trust process that this reveals has important implications for investors, consumers and business executives. Business relationships form at an increasingly rapid pace, and trust-related choices, such as financial investment decisions, can be made with the click of a mouse. People who can gain financially from others’ trust can deliberately or inadvertently take advantage of this process.

This same process can also increase expectations of reciprocity. People in our studies who were subliminally primed by trust-related cues also expected that their interaction partners would be more trusting in return. Thus if you take advantage of the automatic trust process, you may be penalized in the future if you don’t meet the higher, subliminally induced expectations of those who trust you. It seems clear, even without addressing the potential moral issues that arise, that people who try to stimulate automatic trust for their own benefit should ensure that they have the means and the desire to reciprocate if they want to enjoy long-term success.In some situations, everyone can benefit from an automatic trust. When subliminally activated trust is not intentionally exploited, it can lead to an increase in the likelihood of mutually beneficial trust, much like a self-fulfilling prophecy. In a classic 1977 experiment conducted by the social psychologist Mark Snyder and his colleagues, participants behaved in a more friendly and trustworthy manner after they interacted with others who had been led to believe that they were friendly and trustworthy. Thus, the subliminally activated trust may help boost the mutual trust development process and lead to mutual benefits that wouldn’t be attained without it. Put simply, our findings suggest that trust may not always develop via an incremental, evaluative process. Social and relational cues may have a strong but subtle impact on people’s important financial and management choices. Understanding the non-conscious nature of this process can help you take advantage of its benefits while avoiding its downsides–and avoiding the next Bernie Madoff, too.

Categories

there will be one solution because the lines intersect at exactly one set of points.

(0,6)(6,3)
slope(m) = (3-6) / (6-0) = -3/6 = -1/2

y = mx + b
6 = -1/2(0) + b
6 = b
y = -1/2x + 6

(0,0)(6,6)
slope(m) = (6-0) / (6-0) = 6/6 = 1

y = mx + b
6 = 1(6) + b
6 = 6 + b
6 – 6 = b
0 = b

y = x + 0

x = -1/2x + 6
1/2x + x = 6
1/2x + 2/2x = 6
3/2x = 6
x = 6/(3/2)
x = 6 * 2/3
x = 12/3 = 4

solution is : (4,4)