Write a function called random10 that accepts no arguments and returns a random integer in the range 1 to 10, inclusive. You may assume that the random module has been imported.

Answers

Answer 1

to your question is to write a function called random10 that returns a random integer in the range 1 to 10, inclusive.

Here is the explanation:

1. Import the random module at the top of your code:
  `import random`

2. Define the function called random10 with no arguments:
  `def random10():`

3. Use the random.randint() function to generate a random integer between 1 and 10:
  `return random.randint(1, 10)`

This function will return a random integer between 1 and 10 when called.

To know more about integer visit:

https://brainly.com/question/11012390

#SPJ11


Related Questions

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.

5 2
5 3
8 2
8 3

Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Line 2
Line 1
Line 3

Answers

The correct input to  the above question are:

Line 1: for numB in [5,8]Line 3: print (numB, numA)Line 2: for numA in [2,3]What do you mean by program?

A program is a set of instructions that a computer uses to carry out a specific task. [Computing] The size of a computer program affects the likelihood of an error occurring.

A computer program is a series of instructions written in a programming language that can be carried out by a computer. Software is made up of both tangible and intangible components, including computer programs as one example.

Looking at the output, it is obvious that the first numbers are repeated twice in a row and the second numbers are repeated in a sequence.

Therefore, note that nested loops are employed. assuming the program's indentation is appropriate. The sequence's code is as written above.

Learn more about program from

https://brainly.com/question/19461804
#SPJ1

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the

how is a LCD screen and view finder similar?

Answers

Answer:

LCD screens have advantages, but so do optical viewfinders. ... Unlike the optical viewfinder, the LCD screen displays the entire frame that the sensors capture. Optical viewfinders, even on a professional level DSLR, only show 90-95% of the image. You lose a small percentage on the edges of the image.

Explanation:

Which statement about the spelling checker is true?
The spelling checker flags misspelled words with a solid, green underline.
The spelling checker ensures that you are using a word in the correct context.
The spelling checker checks grammar as you type.
The spelling checker automatically checks spelling as you type.

Answers

The statement about the spelling checker that is true is option D: The spelling checker automatically checks spelling as you type.

What does a spell checker do?

A spell checker, often known as a spelling checker or spell check, is a function of software that looks for misspellings in text. In software or services like a word processor, email client, electronic dictionary, or search engine, spell-checking features are frequently integrated.

Therefore, Every word that is typed is compared to a database of thousands of correctly spelled words, and then algorithms are used to find the correct spellings. You can add a word (such as a name) to the program's exceptions list if it is spelt correctly to prevent it from being marked as misspelled.

Learn more about spelling checker from

https://brainly.com/question/10810979
#SPJ1

A dns record that's used to redirect traffic from one domain name to another is known as a:_____.

Answers

A DNS record that is used to redirect traffic from one domain name to another is known as a CNAME record.

A CNAME record, which stands for Canonical Name record, is a type of DNS record used to associate an alias or alternative domain name with an existing domain name. It allows you to redirect traffic from one domain name to another by pointing the CNAME record of the first domain to the DNS record of the second domain. When a user enters the first domain name in their browser, the DNS resolver looks up the CNAME record and then resolves the associated canonical domain name, directing the user's traffic to the second domain.

CNAME records are commonly used in scenarios where you want to point multiple domain names to a single website or server. For example, if you have a primary domain name for your website and want to use different aliases or subdomains to access the same content, you can create CNAME records for each alias or subdomain, all pointing to the primary domain. This way, users accessing any of the aliases or subdomains will be redirected to the primary domain, ensuring consistent content delivery.

In summary, a CNAME record is a DNS record used to redirect traffic from one domain name to another by associating an alias or alternative domain name with an existing domain. It is a useful tool for managing multiple domain names and ensuring consistent access to content.

Learn more about DNS record here:

brainly.com/question/31823682

#SPJ11

What is the purpose of the Print Preview tool?

selecting how many sheets of the document to print
selecting how many copies of a document should print
seeing what the document will look like before you print
seeing color options for the print area’s border

Answers

Answer:

c - seeing what the document will look like before you print

Explanation:

i'm on this lesson, edge 2020

The purpose of the Print Preview tool is to see what the document will look like before you print. The correct option is c.

What is a print preview?

Users can view the pages that are about to print using the “Print Preview” feature, which allows users to preview exactly how the pages will appear when printed.

By checking your worksheet's results before printing, you can prevent unpleasant surprises and paper waste. You can see a preview of the data on the printing when you choose one or more sheets and choose File > Print.

Before printing any document, utilize this option to examine the page or make changes. Ink/toner and paper can be saved by using print preview to find any potential problems in the manuscript or correct layout issues before printing.

Therefore, the correct option is c, seeing what the document will look like before you print.

To learn more about print preview, refer to the link:

https://brainly.com/question/7582870

#SPJ2

_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning

Answers

Answer: it’s A, social media

Explanation:

Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.

What is Social Media?

Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.

Social media includes the technologies used to support virtual communities and the sharing of content.

Hence, the correct option is 1.

Learn more about Social Media:

https://brainly.com/question/18958181

#SPJ2

Which of the following signal processors would you use to stop unwanted background noise below a specific level in your file?
(a) compressor
(b) normalizer
(c) gate
(d) graphic EQ

Answers

To stop unwanted background noise below a specific level in your file, you should use: (c) gate


A gate is a signal processor that allows audio signals above a certain threshold to pass through while attenuating or silencing signals below that threshold. This helps eliminate unwanted background noise effectively.

The signal processor that you would use to stop unwanted background noise below a specific level in your file is gate. A gate is a device that allows the signal to pass through only if it is above a certain threshold. Anything below that threshold is muted or attenuated. A gate can be useful for removing low-level noise such as hum or hiss from an audio file. However, a gate cannot remove noise that is present at the same level as the desired signal, such as a siren or a cough during a speech. For that, you would need more advanced signal processors such as noise reduction or noise cancellation algorithms

to learn more about signal processor click here:

brainly.com/question/18687632

#SPJ11

14. Who's in control of carrying sand bags, and light stands onset?
a. Dolly Grip
b. DP
C. Camera Man
d. Grip

Answers

The correct option would be (C) Camera Man.

This is because, given that a dolly grip, DP, and grip all have different jobs such as hauling the big items, or controlling the actual camera itself, C would be the most logical choice.

Given: a variable current_members that refers to a list, and a variable member_id that has been assigned a value. Write some code that assigns True to the variable is_a_member if the value assigned to member_id can be found in the current_members list. Otherwise, assign False to is_a_member. In your code, use only the variables current_members, member_id, and is_a_member.

Answers

Here's the code that assigns True to the variable is_a_member if the value assigned to member_id can be found in the current_members list.

Otherwise, assign False to is_a_member:```pythoncurrent_members = [10, 20, 30, 40, 50]member_id = 30is_a_member = member_id in current_membersprint(is_a_member)```Explanation:This code checks whether a particular member exists in the current_members list or not.

If it exists, then the code sets the value of is_a_member to True, otherwise, it sets it to False.The `in` operator is used to check whether a particular value exists in a list or not. If the value is found in the list, then it returns True; otherwise, it returns False.

To know more about member_id visit :

https://brainly.com/question/18652067

#SPJ11

1. Se citește un număr natural n de la tastatură. Să se afișeze un mesaj corespunzător dacă
numărul este par sau impar.
int main()
{ int n;
cout<<:dati n=”;
cin>>n;
if (n%2==0)
cout<<”numar par”;
else
cout<<”nuar impar”;
} (ma puteti ajuta va rog?)

Answers

Answer:

Directions: Write the word "TRUE” if the statement is true and write "FALSE” if the statement

is false. Write your answer on your answer sheet.

1. Always follow the routine “clean up while in use and clean up before keeping it”.

2. Manufacturer's instructions for operation and maintenance should be followed.

3. Employers have some control over potential hazards.

4. Before the vacuum cleaner becomes overloaded, throw dust bags after each use.

5. For the equipment with wheels, clean and check wheel-driven gears.

6. For proper storage/safekeeping of hand tools and equipment, surfaces of cutting tools

should be displayed for easy used and reach.

7. Only qualified people should carry out the maintenance and they should also keep

records of their inspections.

8. Check-up equipment irregularly to prevent serious breakdown.

9. Place guards on machinery to protect fingers and limbs.

10. Store electrical equipment outdoors.

you are running windows 10 and want to use a virtualization program so you can test out a new distribution of linux and work with other operating systems while still being able to use windows 10. what should you install?

Answers

Virtualization is a method of running multiple operating systems on a single computer. Virtualization software allows you to run one operating system inside another.

If you are running Windows 10 and want to use a virtualization program so you can test out a new distribution of Linux and work with other operating systems while still being able to use Windows 10, then you should install a virtualization software such as Oracle Virtual Box. The operating system running on the actual computer is known as the host operating system, while the operating system running inside the virtualization software is known as the guest operating system. Virtualization software makes it easier to run multiple operating systems on a single computer simultaneously. With virtualization, you can run multiple operating systems, each with its own applications, on a single computer. Virtualization is often used in the IT industry to manage servers and to test software on different operating systems. Oracle Virtual Box is a virtualization program that allows you to run multiple operating systems on a single computer. It is an open-source virtualization software that is available for Windows, Linux, and macOS. Virtual Box allows you to create virtual machines that can run different operating systems, including Linux, Windows, macOS, and others. With VirtualBox, you can install and test new distributions of Linux and work with other operating systems while still being able to use Windows 10.

Learn more about Virtualization here:

https://brainly.com/question/31257788

#SPJ11

Specialized program that allows user to utilize in specific application is classified as

Answers

A specialized program that allows users to utilize a specific application is classified as an Application program.

What is an Application Program?

An application program, often known as a software application or app for short, is a type of computer program that is used by end users and is created to do a particular task that is unrelated to the operation of the computer.

Examples of application programs include those for word processing, spreadsheets, presentations, and database administration. They also include web browsers, email clients, media players, accountancy software, and tools for pronouncing words, translating sentences, and desktop publishing.

What does Word processing mean?

A Software application that enables users to create, save, modify, format, print, and retrieve documents.

An application program is a comprehensive, stand-alone piece of software that carries out a specific task for the user.

Hence, Application Program is utilised in specific applications.

To learn more about Word Processing from the given link

https://brainly.com/question/24043728

#SPJ1

What are the list of 5G networks?

Answers

AT&T. AT&T's consumer network now covers 395 markets across the country, including smaller cities like Erie, Pa.; Kalamazoo, Mich.; and Worth, Ga. ...

Sprint and T-Mobile. Now that they've officially merged, these two carriers are in the process of combining their 5G networks. ...

Verizon.

Aug 4, 2020

describe the component of communication system with the help of diagram

Answers

Answer:

Solution

Communication:

The communication system is a system that describes the information exchange between two points. The process of transmission and reception of information is called communication.

Components of Communication:

The three essential components of a communication system are:

Transmitter:

The transmitter modulates the message signal.

Modulation is the process of converting a signal into a form suitable for transmission.

A transmitter is a telecommunications electrical device that generates radio waves so that data may be transferred or received through an antenna.

The transmitter may generate an alternating current of radio frequency, which is then applied to the antenna, which radiates it as radio waves.

Channel:

A communication channel is a physical transmission channel in telecommunications and computer networking.

A channel is a device that delivers data from one or more senders (or transmitters) to one or more receivers.

Or in other words, the channel is what connects the output of the transmitter to the receiver input.

Receiver:

The receiver does the demodulation. Demodulation is the process of recovering the correct message signal.

The received signal, which is picked up from the broadcast signal at the channel output, is processed by the receiver to reproduce the original message signal in a recognizable form for transmission.

A radio receiver, also known as an FM receiver, is a device that receives radio waves and converts the data carried by them into useable information.

The desired frequency waves are caught using an antenna

describe the component of communication system with the help of diagram

how do I upending friend request? 100 POINTS!!!!

Answers

Answer:

If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.

Explanation:

Have a great day!

#EquestriansLion

testing whether a computer boots up the first time is an example of ____

Answers

"Initial system testing" or "Power-on self-test (POST)" would be an appropriate term for testing whether a computer boots up the first time.

Testing whether a computer boots up the first time is an example of the Power-On Self-Test (POST) process that runs automatically when a computer is powered on. The POST is a built-in diagnostic program that checks the system's hardware components such as the motherboard, processor, memory, storage, and input/output devices to ensure they are functioning correctly. If any issue is found during the POST, the computer will alert the user through a series of beeps, error messages or a black screen. The POST is an essential process to ensure the system is functional before the operating system starts up.

Learn more about Initial system testing here.

https://brainly.com/question/28201596

#SPJ11

Plz plz plz help QUICKLY idk the answer and I really need help

Plz plz plz help QUICKLY idk the answer and I really need help

Answers

Answer:

productivity is the correct answer

Three short term goals?

Answers

eat well

get good sleep

go outside more

Explanation:

its just mine

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN

Answers

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

What is FDE in security?

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

https://brainly.com/question/26512743

#SPJ1

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the following is known about this new system. The driver sprocket is a P24-8MGT-30 and is attached to a Synchronous AC Motor with a nominal RPM of 1750rpm. The driven sprocket should turn about 850RPM and is attached to a Boring Mill that will run about 12 hours per day. The sprocket should have a center distance as close to 20" without going over. a. What sprocket should be used for the driver sprocket 2 b. What is a the number of teeth and pitch diameter of both sprockets What is the RPM of the driven sprocket

Answers

The RPM of the driven sprocket is calculated as 10.4kp. RPM stands for reels per nanosecond and is also shortened rpm. The cycle of the RPM is calculated as 174.9.

The calculations are attached in the image below:

This is a unit which describes how numerous times an object completes a cycle in a nanosecond. This cycle can be anything, the pistons in a internal combustion machine repeating their stir or a wind turbine spinning formerly all the way around.

Utmost wind turbines try to spin at about 15 RPM, and gearing is used to keep it at that speed. Gearing is also used with the crankshaft of a vehicle in order to keep the RPM reading in a range( generally 2000- 3000 RPM). Some racing motorcycles will reach further than 20,000 RPM.

Learn more about RPM cycle here:

https://brainly.com/question/32815240

#SPJ4

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the

_____ is a text-based operating system developed in the late 1960's.

Answers

UNIX is a text-based operating system developed in the late 1960s.

UNIX, developed in the late 1960s, is an operating system renowned for its text-based interface. It was initially designed by a team of researchers at Bell Labs, including Ken Thompson and Dennis Ritchie. Unlike graphical user interfaces (GUIs), which became popular later, UNIX operated primarily through command-line interactions. Users had to type commands and navigate through directories by entering text commands rather than clicking on icons or menus.

One of the key advantages of UNIX was its portability, which allowed it to be adapted to various hardware architectures. This made it highly flexible and widely used in academic and research settings. UNIX also introduced the concept of multi-user functionality, enabling multiple users to simultaneously access and utilize the system resources. This capability proved particularly valuable in time-sharing systems, where several users could interact with the system concurrently.

Learn more about UNIX

brainly.com/question/32072511

#SPJ11

PLS ANSWER NOW QUICKLY!!!!
If the car can recognize and have an understanding or estimation of more information about the people involved should that influence the decision that is made? To clarify with an example: if the car’s software can recognize that a pedestrian is a mother with two children in a stroller or a pregnant woman, should that be factored into the decision that is made by the software? Why or why not?

Answers

Ethical implications of recognizing vulnerable individuals in autonomous vehicle decision-making

The use of additional information in the decision-making process of an autonomous vehicle raises ethical and moral questions. Recognizing and prioritizing the safety of vulnerable individuals at risk of injury in an accident ensures safety.

Using such information could raise concerns about privacy, bias, and discrimination. The technology used to recognize and understand pedestrians may need to be more accurate and could lead to incorrect decisions or unintended consequences.

Relying on this information could perpetuate existing biases and inequalities, such as prioritizing the safety of specific individuals over others based on their perceived vulnerability.

The decision to factor should consider the potential benefits and risks and an ethical framework that prioritizes safety while considering the rights and dignity of individuals.

bob has 2 candy bars he is fat what hapennes

Answers

Answer:

he eats The candy Bar

Explanation:

I think cause As You told he is fat He might like sugary items

Answer:

It is thought that some people are destined to gain weight because they have inherited “fat genes” from their parents. There can be no doubt that people vary in their genetic makeup and some people are inclined, because of genetic reasons, to become tall, or broad-shouldered, or squat, or fat.

Explanation:

it also has to do that your digest system do not digest it fast enough

Create a formula for sheet Inventory that highlights any rows where the Reorder level is below the On Hand level in yellow on excel 2016.

Answers

Answer:

Explanation:

To highlight rows in yellow in the "Inventory" sheet of Excel 2016 where the Reorder level is below the On Hand level, you can use conditional formatting with a formula. Here's the formula you can use:

1. Select the range of cells where you want to apply the conditional formatting. Assuming the Reorder level is in column A and the On Hand level is in column B, select the range from A2 to B (the last row of data in column A and B).

2. Go to the "Home" tab in the Excel ribbon.

3. Click on "Conditional Formatting" in the "Styles" group, and then select "New Rule".

4. In the "New Formatting Rule" dialog box, select "Use a formula to determine which cells to format".

5. In the "Format values where this formula is true" field, enter the following formula:

  `=A2<B2`

  This formula compares the Reorder level in column A with the On Hand level in column B for each row.

6. Click on the "Format" button to specify the formatting for the highlighted rows.

7. In the "Format Cells" dialog box, go to the "Fill" tab.

8. Choose the yellow color or any other desired formatting option, and then click "OK".

9. Click "OK" again in the "New Formatting Rule" dialog box to apply the conditional formatting.

Now, any row where the Reorder level is below the On Hand level will be highlighted in yellow.

Learn more about   formula for sheet Inventory here:

https://brainly.in/question/5387683

#SPJ11

which key Moves the cursor to the previous field data sheet view​

Answers

Answer:  Frequently used shortcuts

To do this Press

Show or hide a property sheet F4

Switch between Edit mode (with insertion point displayed) and Navigation mode in the Datasheet or Design view F2

Switch to Form view from the form Design view F5

Move to the next or previous field in the Datasheet view The Tab key or Shift+Tab

Explanation:  I hope this helps

An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a problem with the extruder. What type of printer will you be working with

Answers

Answer:

3D Printer.

extruders are in 3D printers.

who continued to fight a guerilla war against the british​

Answers

Answer:

tantia tope

Explanation:

tantia tope escaped to the jungle of central India with some peasant leader to fight the war against British

Before downloading a new program, it is a good idea to set up a what?1. restore point2. default browser3. time limit4. default program

Answers

When an attacker decrypts an encoded message using a different key than was used during encryption, it is known as a Cryptographic Key Substitution attack. In this type of attack, the attacker replaces the original encryption key with a different key, and uses it to decrypt the encoded message.

The Cryptographic Key Substitution attack is a type of cryptographic attack that is used to break the confidentiality of encrypted data. It is a form of brute force attack, where the attacker tries multiple keys until they find the correct one that decrypts the messageKey clustering, statistical, analytic, and replay attacks are different types of cryptographic attacks. Key clustering is a type of attack where the attacker exploits the fact that multiple keys used in a cryptographic system are similar or related. Statistical attacks analyze patterns in the ciphertext to try to determine the plaintext, while analytic attacks use mathematical algorithms to break the encryption. Replay attacks involve intercepting and retransmitting messages to gain unauthorized access.In summary, when an attacker decrypts an encoded message using a different key than was used during encryption, it is known as aCryptographic Key Substitution attack.

To learn more about  encryption click on the link below:

brainly.com/question/8455171

#SPJ11

Once you upload information in online,Where it is stored in?​

Answers

Answer:

It depends. It could be in database, in your files, or it could just be thrown away.

Explanation:

When you upload information online, it is stored in data centers spread throughout the world. These data centers have become increasingly important especially in recent years with the world’s population relying on them more and more.

Source :
(1) Your Online Data is Stored in These Amazing Places - Guiding Tech. https://www.guidingtech.com/61832/online-data-stored-amazing-places/.
(2) Where are uploaded files stored? - SharePoint Stack Exchange. https://sharepoint.stackexchange.com/questions/14226/where-are-uploaded-files-stored.
(3) Where is the data saved after a form is submitted?. https://techcommunity.microsoft.com/t5/microsoft-forms/where-is-the-data-saved-after-a-form-is-submitted/td-p/1169617.

Write a short note on attributes in HTML.
If you answer this i will mark you as BRAINLIST

Answers

Answer:

Explanation:

HTML attributes are a modifier of an HTML element type. An attribute either modifies the default functionality of an element type or provides functionality to certain element types unable to function correctly without them. In HTML syntax, an attribute is added to an HTML start tag.

Other Questions
With MBR hard drives, one of the primary partitions is designated the __________, which is the bootable partition that startup BIOS/UEFI look to when searching for an OS Undesirable by-product of tourism A parking garage has 230 cars in it when it opens at 8???????? (???? = 0). On the interval 0 ???? 10, cars enter the parking garage at the rate ???? (????) = 58 cos(0.1635???? 0.642) cars per hour and cars leave the parking garage at the rate ???? (????) = 65 sin(0.281????) + 7.1 cars per hour (a) How many cars enter the parking garage over the interval ???? = 0 to ???? = 10 hours? (b) Find ????(5). Using correct units, explaining the meaning of this value in context of the problem. (c) Find the number of cars in the parking garage at time ???? = 10. Show the work that leads to your answer. (d) Find the time ???? on 0 ???? 10, when the number of cars in the parking garage is a maximum. To the nearest whole number, what is the maximum number of cars in the parking garage? Justify your answer Suppose that on your birthday you checked the balance on your retirement account and you decided to make a $1,000 payment at the end of every month until you retire at the specified age. If you disreagard the inflation (i.e. we adjust payments and interest with the inflation rate) and assume a 2% annual growth rate of your retirement fund, how much money will you have at the time you retire A researcher wants to see if there is a relationship between speeding and states of residence on interstate 75 near findlay, ohio. these data are collected: ohio michigan speeders (66 mph or more) 18 25 nonspeeders (65 mph or less) 27 15 using a significance of 0.05, are speeding and the state of residence independent? what is the critical value for step 2? select one: a. 9.210. b. 3.841. c. 5.991. d. 0.103. If a protein is produced in the liver of two animals, we can predict that they share asequence of their DNA. A cylinder was removed from the inside of another cylinder to form the solid below.Which is the closest to the volume of the solid that remained?2286 cubic inches3266 cubic inches10,864 cubic inches13,062 cubic inches the language of emotional intelligence: the five essential tools for building powerful and effective relationship The presence of the foramen ovale in a fetus allows what to occur?a. Right-to-left blood shuntingb. Left-to-right blood shuntingc. Blood flow from the umbilical cordd. Blood flow to the lungs After his Political Science class, Andre only remembered the parts of his professor's lecture that he agreed with. This is an example of selective While reading a news article, Bethany noticed that the word "senselessness" had a lot of repeating letters. Bethany wondered about the probabilities of randomly drawing certain letters if each letter in "senselessness" were written on an index card and put into a bag. Which letter would have the greatest probability of being selected? What would be the probability of that selection? Which letter would have the least probability of being selected? What would be the probability of that selection? In the disphotic zone, there is some light but not enough to support photosynthesis. However, in the __________ zone, above there is enough light, and in the ____________ zone, below there is no light. In the proportion 5/6 = 10/12, the means areA 5 and 12B 6 and 10C 6 and 12D 5 and 10 Flooding would be devastating to the project; however, it is very unlikely. The project manager is most likely to __________ this risk.1. prepare for2. acknowledge3. distribute4. retain Create an objective or statement about you - be brief, clear and concise ("mission statement"). Write a few sentences on the non-verbal cues that communicate yourmessage goals) with your photo.Write a short paragraph explaining your self-concept Which type of chart shows the hierarchy of levels and positions within a business or group?A. a decision treeB. a flow chartC. an organizational chartD. a pull quote chartE. a text tabulation an iron sphere has a radius of 4.8 cm. calculate the number of iron atoms in the sphere. iron has a density of 7.86 g / cm3, and the volume of a sphere is given by = When a price floor is above the equilibrium price ______________.A quantity demanded will exceed quantity suppliedB quantity supplied will exceed quantity demandedC the market will be in equilibriumD this is a trick question because price floors generally exist below the equilibrium price Because the slopes of DE and CB are both___, DE||CB. DE=___. Because_____ =1/2 ___, DE = 1/2CB Select all the correct answers.Based on this passage, what two plots are likely to develop in parallel?Select to read The Squatter and the Don by Marja Ruiz de Burton (excerpt