A user reports that an application crashed. The technician tries a few other applications on the PC and finds that none of them start normally or that they crash soon after being launched. What is a possible cause of the problem?

Answers

Answer 1

The possible cause of the problem on application keep on crashing in user's PC lies on the computer's operating system.  

The computer's operating system performs automatic updates (sometimes being set into manual updates). Either way, updates can cause applications to crash if it is being installed wrongly. Sometimes due to slow internet connection, updates get paused and will cause problems in your computer. You can apply the following steps to fix applications that keep on crashing:

Make sure the operating system updates are installed correctly. You can take a look at your system configuration, (in Windows 10, you can see it at system settings > Windows Update Settings), there are updates list that you can see and you can choose either you will stop, reinstall and continue the updates.  You need to execute a clean boot. You will need a third party tool to try this method.  You need to back up your data and perform system restore to the last OS version installed in your computer that functions well. You can select this method if you want to undo the system update and would just like to use your computer in it's last best state.
Answer 2

A virus infection on the computer could be the source of the problem.

Some computer viruses are designed to damage your computer by destroying files, corrupting applications, or reformatting the hard drive. Others just clone malware or flood a system with traffic, rendering all internet activity impossible.

There are various ways for a computer to become infected with a virus, the majority of which involve downloading malicious files, either purposefully or unwittingly. Pirated music or movies, photographs, free games, and toolbars, as well as malware emails with files, are all prominent offenders.

Learn more:

https://brainly.com/question/24382507?referrer=searchResults


Related Questions

help me please and thanks

Answers

Answer:

Inverter

Explanation:

Answer:

Inverter

Explanation:

In Laptop computer a battery is charged at DC voltage with the help of DC Adapter. The battery provides DC supply to all the components of the laptop. LCD requires AC voltage to continuously Switch ON and OFF the Fluorescent Bulb. These Lights will control the Pixels with the help of Liquid crystal inside the LCD.

To convert DC supply into AC Inverter is used. Inverter is an electronic circuit that is is used to convert DC voltage into AC voltage. It is placed behind the LCD of Laptop to provide a required current to the LCD.

A slide in your presentation has three identical objects. To evenly space the three objects horizontally, you select the objects and then apply the ____ command.

Answers

Answer:

Distribute horizontally

Explanation:

Align Objects in Power Point Presentation:

Step 1: Select the desired objects in the slide (Keep CTRL key pressed while selecting objects)

Step 2: Go to the ‘format’ tab and click align  

Step 3: From the options, select ‘distribute horizontally’

Step 4: You are done!

Answer:

The correct answer will be "Distribute horizontally".

Explanation:

In PowerPoint, we might vertically or horizontally spread the items as well as structures or shapes. This function is already in Format-> Align menu, which is quite useful for conveniently distributing items into your presentations or slides.

Rather than just shifting the shapes or objects manually to either the target destination, you could conveniently coordinate and allocate the items to maintain a certain distance between forms.We pick the subjects and instead implement the above command  to position the various objects equally.

The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM technologies. The act also establishes that copies of commercial programs may not be legally resold or given away. It further makes it a crime to sell or to use programs or devices that are used to illegally copy software.

Answers

Answer:

Digital Millennium Copyright Act

Explanation:

Digital Millennium Copyright Act (DMCA) is a protection placed on creative works online and gave content owners the authority to have their contents removed from websites who use it without permission, the act prohibits the reselling and giving away of commercial programs, contents or devices, violating the act is criminal

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
A. The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.
B. Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.
C. A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
D. A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

Answers

Answer:

Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer

Explanation:

Browsing ananymously implemented as In-private browsing by some web browsers allows you to browse without leaving histories and cookies, however your activities can still be monitored by an admin and you are not protected from malware because of in-private browsing.  Because browsing histories are not saved, any data from a web store such as future purchase intention will also not be saved

Q. Which protocol would best serve to authorize users to access directory services?

Answers

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

In a natural-language processing (NLP) system, the__________activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content.

Answers

Final answer:

In a natural-language processing (NLP) system, the synthesis activity involves using the computer to read and understand large amounts of text, summarize important points, and store information to respond to inquiries about the content.

Explanation:

In a natural-language processing (NLP) system, the synthesis activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content.

This process requires complex reading and thinking skills, and it involves interpreting key points, making connections between texts, and combining pieces of information from different sources. It is similar to summarizing a text in your own words, but it goes beyond just condensing the main points and involves the creation of new meaning.

For example, a NLP system may read a news article and extract important details about an event or topic discussed in the article. It will then store this information in a way that allows the system to provide relevant responses when asked questions about the content of the article.

What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?

Answers

Answer:

The correct answer to the following answer will be iOS.

Explanation:

The iOS formerly stands for iPhone Operating System, basically is a mobile operating system developed by Apple Inc. This edition mainly supports Apple devices such as iPhone, iPod touch, iPad, etc.

Just because of this iOS gives the improvement to the entire application and is one of the operating systems which requires all that applications to be approved before showing availability in the App stores.

So, iOS is the right answer.

Identify a text-level element used to mark generic run of text within the document.

Answers

Answer:

span label

Explanation:

The span label, we can use it to group text elements, this label doesn't generate a visual change, but we can organize changes in a text group.

This element works in a text level, if we use a CSS code, we can apply the change only in some text groups.

For example:

In this example with a paragraph, and we can stand out that text with the label span in color blue.

<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vel condimentum erat. Cras ac pharetra risus, nec lobortis ante. Ut at turpis eu diam egestas malesuada. sit amet varius mi euismod ac. <span style="color:blue">Aenean facilisis ante sem, </span>Donec maximus orci ac diam hendrerit sollicitudin. Proin eu ipsum maximus, tempus tortor nec, iaculis odio.</p>

What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify files, but not to be able to delete subfolders and their file contents, change permissions, or take ownership?

Answers

Answer:

Modify is the correct answer to the following question.

Explanation:

If any person or user wants to read, delete, modify and execute the files then they have required the Modify permission. In other words, Modify permission provides the user to modify and delete the following files but they unable to delete subfolders because of the following permission.  

If they want then they have to change the permission by click right button from the mouse on the file or the folders which they want to change and then click on the properties from there they can change the permission.

Each Google My Business location has a unique ID that applies changes to the right listing.
What’s the name of this unique ID?

a. Store Number
b. Store Category​
c. Store Code
d. Store Identifier

Answers

Answer:

The correct answer to the following question will be option c. Store Code.

Explanation:

A store code will be the unique ID which can uniquely identify any location of that store.

Any random number or name can be the store code. A store code in each Google My Business (GMB) will only be viewable to the person who is managing that locations arround the store.Any costumer doesn't have possibility to see it.

Hence, Option C is the right answer.

A favorable variance indicates that​ ________. A. actual operating income is less than the budgeted amount B. budgeted contribution margin is more than the actual amount C. actual revenues exceed budgeted revenues D. budgeted costs are less than actual costs.

Answers

Answer:

The answer is "Option C".

Explanation:

An undesirable change occurs when an actual net profit is below or below the level of performance predicted. It exists when total net profit is above what we expected or when income is below our average. In the given question the other options are not correct that can be described as follows:

In option A, Actual income shall not be less than the target In option B, The estimated margin must not be greater than the current amount. In option D, The expense estimate is lower than the actual cost.

A wiki is best defined as:

A. a web site that typically acts as brokers for advertisers and web sites.
B. a smaller version of the banner that often look like an icon and usually provide a link to an advertiser's landing page.
C. a reverse chronological journaling site. a user-collaborated content site, typically text in nature.
D. a little billboard that spreads across the top or bottom of the web page.

Answers

Answer:

a reverse chronological journaling site. a user-collaborated content site, typically text in nature

Explanation:

It is the website that is based on knowledge. It is the text based site that is also called structure content.

The most common example of Wiki is Wikipedia.

Users of a banking application may try to withdraw funds that don't exist from their account. Developers are aware of this threat and implemented code to protect against it. What type of software testing would most likely catch this type of vulnerability if the developers have not already remediated it?

Answers

Secret questions are prompted or answer to validate the fund transfer would most likely catch this type of vulnerability if the developers have not already remediated it.

Explanation:

During developing bank application End user has to check all kind of threats such as validation password and account details and encrypt technology. If unwanted user accessing and try to access fund to do validation secret password and OTP validation is be checked and password to be encryption.

During password entering end user has to enter password within time limit and method of entering is also validated. End User is provided keyboard onscreen to enter the password and physical keyboard to be locked. During the entering the password each character is monitor with time limit.

Alex, a web designer, is assigned the task of creating a mobile-device-friendly website for a leading fashion outlet called AllStyles. A desktop version of AllStyles's website already exists. Alex can refer to this desktop version of the website to create the mobile website design.
For the AllStyles's main web page, Alex creates a navigation bar that includes topical areas named Clothing, Accessories, and About Us. Alex wants to create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. In order to do so, Alex must _____ while writing the HTML code.​
A. ​Set the width of the layout viewport to the width of the nested lists
B. ​Put each of the nested lists within a class
C. ​Insert the structure of the nested list within a specific style sheet structure
D. ​Use theonlykeyword to hide the list items

Answers

In order to do so, Alex must set the width of the layout viewport to the width of the nested lists while writing the HTML code.​

A. ​Set the width of the layout viewport to the width of the nested lists

Explanation:

In mobile technology, a web browser displaying web pages has a mobile mode or desktop mode. While the end-user selects mobile mode it web pages displayed in compression mode and limit information depends on the web pages designer.

While select the desktop mode by the end-user web pages is displayed as the normal desktop version.

While the designer has to set the styles to all the web pages and it should be mapped properly so the web page display in both mode in the mobile technology.

Final answer:

Alex must use class or ID tags for the elements in the HTML code and style them with CSS, utilizing descendant selectors for nested lists to create a functional and styled navigation bar.

Explanation:

Alex, in creating nested lists for the navigation bar on the AllStyles mobile website, must ensure that the HTML and CSS code is written in a way that supports the hierarchical organization of menu items. One effective way to accomplish this is to assign class or ID tags to elements such as lists, which can then be styled using CSS. For instance, if Alex wants nested lists within the Clothing, Accessories, and About Us sections of the navigation bar, these lists can be organized by using <ul> tags for the main items and <li> tags for the nested items. Additionally, by making use of CSS descendant selectors, specific styles can be applied to lists within certain classes, aiding in the creation of a visually appealing and functional dropdown menu.

What individual is responsible for collecting all available facts concerning a potential Uniform Code of Military Justice offense?

Answers

Answer:

The correct answer to the following question will be a Preliminary Inquiry Officer (PIO).

Explanation:

Purpose of PIO are as follows:

Appoint those assistants who conduct a preliminary inquiry.Collects all the perseverance poofs and conduct an investigation on it.Investigation the claims in a format.Takes proper action on the claims.

and the most important responsibility of PIO it that, it will responsible for collecting and concerning potentially the fact of the Uniform Code of Military Justice Offence.

Tracert uses the ___ value and _____ message to provide access times on each segment of the network.

Answers

Tracert uses the "TTL" field value and uses the "INTERNET CONTROL MESSAGE" to provide access times on each segment of the network.

Explanation:

TTL is known as "time to live" and these field values are increased to find the path taken to that destination address."Internet control message protocol" also known as ICMP request messages to the destination.Tracert is mainly used as a command-line tool to trace the internet protocol address's path that  the source takes it to the destination.The network consists of two routers and two sites of the system whereas one site is composed of several servers.

Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change. However, the project she started years ago is now much larger and there are two other developers who also work on the program with her. She would like a way to better manage the code so that she can revert to previous states if necessary and track changes made by each person. Which technology would you suggest?

1. Continuous integration application
2. Code repository
3. Workflow automation
4. Chargebacks for each developer

Answers

Answer: (2) Code repository

Explanation:

The code repository is basically used for organizing the code branch by keeping the code consistent even the different types of teams are working in the similar specific place.

The code repository is basically providing the web hosting facilities to the web pages, code for the software and the various types of accessible documentation. The developers published code and can easily synchronized the local code copy to the repository.  

Therefore, Option (2) is correct.

Fill in the code to complete the following method for sorting a list.

public static void sort(double[] list) {
________;
}

public static void sort(double[] list, int high) {
if (high > 1) {
// Find the largest number and its index
int indexOfMax = 0;
double max = list[0];
for (int i = 1; i <= high; i++) {
if (list[i]> max) {
max = list[i];indexOfMax = i;
}
}

// Swap the largest with the last number in the list
list[indexOfMax] = list[high];
list[high] = max;

// Sort the remaining list
sort(list, high - 1);
}
}

Answers

Answer:

sort(list,list.length-1);

Explanation:

The appropriate code to implement to sort the list in the given program is sort(list, list.length-1)

This is used for sorting every member of the list since indexing at Java starts from 0, hence the last member of the list will have the (n-1) position in sorting where n signifies the number pf members or list length in this instance.

Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppliers, and distributors. It uses this data along with internal data to develop different games for different consumer demographics, and it targets the most profitable segments. Which of the following is illustrated in this scenario?

A) customer relationship management systems
B) business intelligence
C) inventory management
D) virtual collaboration

Answers

Answer:

Option B

Explanation:

It is the perfect example of BI(Business Intelligence).

For two devices to communicate with each other using NFC, they need to be within which distance?
10 centimeters
10 inches
10 meters
10 millimeters

Answers

For two devices to communicate with each other using NFC, they need to be within which distance? 10 meters

Answer:

10 centimeters

10 inches

10 meters

10 millimeters

Explanation:

To increase Internet transmission speeds and decrease latency (delays), intermediate Internet servers are placed between users and the cloud servers. Portions of the cloud service are downloaded onto the intermediate servers. This is known as ___ computing.

Answers

Answer:

Edge computing

Explanation:

Edge computing -

It is a pattern by which computation and data storage are merged , where they are required which helps to save bandwidth and improve the response times, is referred to as edge computing.

It basically helps to increase the speed of internet transmission and reduces any latency.

This type of computing is used in the 5G wireless networking to increase the speed.

Hence, from the question,

The correct term for the given information of the question, is Edge computing.

Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2), and instead can only use EAP-MSCHAPv2 or a certificate for authentication?

Answers

Answer:

Internet Key Exchange, Version 2 ( IKE v 2 )

Explanation:

Internet Key Exchange, Version 2 is a request/response encryption tool it provides security and manages security association (SA) properties, it uses only EAP-MSCHAPv2 (another authentication mechanism) or a certificate for authentication.

What manipulation technique should be reported when an FIE resolves a legal or travel problem for an insider?

Answers

Answer:

Sympathizer

Explanation:

Since, this issue is solved internally no one is going to blame anybody since its legal issue as well apart from being a travel problem.And no one wants to fight legal issues if it can be avoided. Hence, the FIE will show sympathy with the individual or officials who had suffered due to the issue as they have lost the time definitely, and FIE cannot bring back the time for them.

Final answer:

Reporting an FIE's involvement in resolving an insider's legal or travel issue is necessary due to potential manipulation. Including a detailed account of personal involvement in the situation ensures transparency. Bringing in outside consultants can provide an objective resolution to complex situations.

Explanation:

When an FIE (Foreign Intelligence Entity) resolves a legal or travel problem for an insider, it might be indicative of manipulation techniques or undue influence. Such actions could potentially raise national security concerns, particularly if the insider has access to sensitive information. Reporting this behavior is crucial as it may be a sign of an insider being compromised or coerced. In the context of national security or corporate environments, this could lead to espionage, insider threats, and other forms of manipulation.

One should include an accurate description of their own role in the course of what occurred, reporting any incidents thoroughly and honestly. If physical force was used to detain someone involved, it's important to report how you handled the situation and its aftermath. This ensures transparency and allows for a proper assessment of the situation.

In cases where internal resolution proves difficult, it may be beneficial to bring in outside practitioners or consultants to speak more directly to the issues from a neutral or outsider vantage point. This can help facilitate a more objective resolution to the problem, ensuring an impartial approach to the situation.

When reading data across the network (i.e. from a URL) in Python 3, what method must be used to convert it to the internal format used by strings

Answers

Answer:

The answer is "String decode( ) method".

Explanation:

In python programming, the Decode() function is used to convert or decodes the string by using the encoding codec. It is also used to convert the string parameters into the desired encoding scheme from the encoding system.

The encoding system is worked against this feature. The decode method converts data into UTF-8 format.This method works as a decoder that encodes the string values and returns its original value.

A label control's __________ property determines whether the control automatically sizes to fit its current contents.
a. Fitb. TextAlignc. MiddleCenterd. AutoSize

Answers

Answer:

Option d (Auto Size) is the correct answer.

Explanation:

In a C# programming language, when a user needs to create a Windows Forms Label, then he needs to specify the property of label that how the label will look like and where the label fits and what is the size of that label. Following are the property which has a different meaning and a user need to specify when he creates a label--

Fit states that the label to fix in the size.Text align states that the item of the toolbar is fixed in the center.The Middle center states that the item is fixed in the middle.Auto Size helps that the size of the control can be automatically resized.

The above question asked about that property which is used to automatically resize the control. So the answer is Auto size which is described above. Hence Option d is the correct answer while the other is not because--

Option a state about 'Fit' property which is used to fix the label size.Option b states about 'Text align' property which is used to fix items of the toolbar in the center.Option c states about 'Middle center' property which is used to fix the item in the middle.
Final answer:

The label control's AutoSize property is responsible for determining if the control will automatically adjust its size to fit the text within. Other options such as Fit, TextAlign, or MiddleCenter do not control this aspect. The correct answer is 'd. AutoSize'.

Explanation:

A label control's AutoSize property determines whether the control automatically sizes to fit its current contents. When the AutoSize property is set to true, the label will expand or shrink to accommodate the text it contains. However, if the property is set to false, the label will maintain a fixed size, regardless of its content. Neither Fit, TextAlign, nor MiddleCenter are properties that control this behavior, thus the correct answer to the question is d. AutoSize.

Which is not a key factor a programmer uses in selecting the language for a project?

Answers

Answer:

Number of Inputs needed by a project

Explanation:

There are various factors to be kept in mind while choosing a language to code a project like -

The resources available are compatible with the language or not.Lines of codeResponse time requirement of projectPortability of languageWeb integration of project ,etc.

But the thing which does not affect the selection of a language is how many inputs are needed by the project as almost every language can accept numerous inputs where type of input can affect selection but the number cannot.

Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016; she’s concerned about file system security. Which Microsoft feature would be most helpful to implement security to the file systems?

Answers

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.

True
False

Answers

Answer:

False

Explanation:

Keyword stuffing is a practice to insert an unusual large number of tag in a website to increase the page ranking in search results. This is considered an unethical Search Engine Optimization (SEO).

Google consider Keyword stuffing as unethical and it doesn't help to boost the rank of a website. More advanced algorithms are being used to filter those of the meta tags which are irrelevant or excessively out of context in a website.

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Answers

Answer:

Regularly test restoration procedures  is the correct answer.

Explanation:

The following answer is correct because if the user perform the regular test of the system and also perform the restoration procedures of the regular backup then, their data, information and the important files will be protected from loss, by the daily backup we can protect our data against data loss and it is one of a good way to protect the data.

To protect against data loss, keep multiple backups of files, store them in various locations such as flash drives and cloud storage, back up data promptly, and use backup software. Be proactive in planning for data recovery.

Even if you perform regular backups, to ensure that you are protected against data loss, it is important to follow these guidelines:

Keep multiple backups of each of your files.Store backups in different locations, such as a personal laptop, a flash drive, and cloud storage.Back up your data as soon as possible, and never rely on a single copy for too long.Use backup software instead of manual copying methods to avoid user error.Be proactive in considering how to recover data, with questions about data degradation and reliable restoration methods.

By implementing these strategies, you can ensure that your work remains safe even in case of hardware failure, accidental deletion, or other unforeseen problems.

A modern information-processing model that views memories as emerging from particular activation patterns within neural networks is known as

Answers

Answer:

Connectionist Model

Explanation:

Connectionist model is the modern information processing model that views memories as emerging from particular activation patterns with in neural networks.

Other Questions
Dylan uses the expressions (x^2 -2x+8) and (2x^2 + 5x - 7) to represent the length and width of his bedroom. Which expression represents the area (lw) of Dylans room ? The free cash flow hypothesis states: a. that firms with higher levels of free cash flow should reward their managers with bonuses. b. that firms with greater free cash flow will pay more in dividends thereby reducing the risk of financial distress. c. that issuing debt requires interest and principal payments to be paid thereby reducing the potential of management to waste resources. d. that firms will higher levels of free cash flow should reduce their debt levels. e. that firms with greater free cash flow should issue new equity to help minimize the wasting of resources by managers. The table below gives the number of hours ten randomly selected students spent studying and their corresponding midterm exam grades. Using this data, consider the equation of the regression line, y = bo + b1x, for predicting the midterm exam grade that a student will earn based the number of hours spent studying. Keep in mind, the correlation coefficient may or may not be statistically significant for the data given. Remember, in practice, it would not be appropriate to use the regression line to make a prediction if the correlation coefficient is not statistically significant. Hours Studying 0 1 1.5 2 2.5 3 4.5 5 5.5 6 Midterm Grades 65 70 77 79 83 91 92 94 95 98a. Find the estimated slope. Round your answer to three decimal places.b. Find the estimated y-intercept. Round your answer to three decimal places.c. Find the estimated value of y when x=5. Round your answer to three decimal places.d. Find the error prediction when x=2. Round your answer to three decimal places. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address? a. static IP addressing with incomplete information b. interference from surrounding devices c. reduced computer power supply output d. unreachable DHCP server You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short period of time.What type of account will you give this person? Evaluate 2(4 1)^2plz hurry ill give best if right 11. If line a is parallel to line b, solve for x:(7x + 11)(10x - 43) In operant conditioning, _____ is associated with a voluntary response.a. reflexive response; consequence of that responseb. nonreflexive response; consequence of that responsec. environmental event; reflexive responsed. environmental event; consequence of that event explain why computers and computation wouldn't be practical without data abstraction Calculate rG at 298 K for the following reactions.CO(g)+H2O(g)H2(g)+CO2(g)2-Predict the effect on rG of lowering the temperature for the reaction above.rG will decrease with decreasing temperature.rG will increase with decreasing temperature.rG will change slightly with decreasing temperature. BE QUICK I DONT HAVE TIME MY TEACHERS HERE !!!What helped provide support for the Plate Tectonic theory in the 1960s?A)Shape of the continental coastlines matching up togetherB)Mineral and fossil matches from tests done on different continents A certain piece of metal (density 9.45 grams per cubic centimeter) has the shape of a hockey puck with a diameter of 13 cm and a height of 2.8 cm. If this puck is placed into a bowl of mercury (density 13.6 grams per cubic centimeter), it floats. How deep below the surface of the mercury is the bottom of the metal puck? As in problem 80, an 76-kg man plans to tow a 128000-kg airplane along a runway by pulling horizontally on a cable attached to it. Suppose that he instead attempts the feat by pulling the cable at an angle of 6.7 above the horizontal. The coefficient of static friction between his shoes and the runway is 0.87. What is the greatest acceleration the man can give the airplane? Assume that the airplane is on wheels that turn without any frictional resistance. A construction worker needs to put in a rectangular window in the side of a building. He knows from measuring that the top and bottom of the window has a width of 5ft and the sides have a length of 12ft. He also measured a diagonal of 13 ft. What is the length of the other diagonal? A ladder whose length L is 12 m and mass m is 45 kg rests against a wall. Its upper end is a distance h of 9.3 m above the ground. The center of mass of the ladder is one-third of the way up the ladder. A fire fighter whose mass M is 72 kg climbs the ladder until his center of mass is halfway up. Assume the wall but not the ground is frictionless. What forces are exerted on the ladder by the wall and by the ground? Provide both the magnitude and direction of the ground force. In the context of fluid dynamics, interference refers toOA. the results of two waves meetingOB. anything that changes the course of a waveC. the consequences of waves hitting the shoreOD. the effect of different mediums of waves interacting Which technology category would NOT likely be the subject of a standard published by the International Electrotechnical Commission (IEC)?A. SemiconductorsB. Solar energyC. EncryptionD. Consumer appliances When is it appropriate to use acronyms and emoticons in business communication?1.when the receiver of the message knows what is meant2.when the receiver of the message will not have much time to read the message3.when the sender of the message is running short on time4.when the sender of the message wants to show knowledge of the business lingo There are 100 freshman students at a school. The probability that a freshman plays a sport is 0.55. The probability that a freshman plays a musical instrument is 0.34. The probability that a freshman plays both a sport and a musical instrument is 0.15. What is the probability that a freshman student at this school plays either a sport or a musical instrument? List three types of licenses issued by the government. Steam Workshop Downloader