what does PR stand for ?

Answers

Answer 1

Answer:

Public Relations or Pull Request (computer programming)

Explanation:

Hope this helps


Related Questions

Use the tables below to show the difference between the results of a natural join, an equijoin (with PROF_CODE = 2) and a full outer join. Provide the resulting table of each join

Answers

Answer:

Code:

CREATE TABLE student (

stu_code INTEGER PRIMARY KEY,

prof_code INTEGER

);

INSERT INTO student VALUES (100278,null);

INSERT INTO student VALUES (128569,2);

INSERT INTO student VALUES (512272,4);

INSERT INTO student VALUES (531235,2);

INSERT INTO student VALUES (531268,null);

INSERT INTO student VALUES (553427,1);

CREATE TABLE professor (

prof_code INTEGER PRIMARY KEY,

dept_code INTEGER

);

INSERT INTO professor VALUES (1,2);

INSERT INTO professor VALUES (2,6);

INSERT INTO professor VALUES (3,6);

INSERT INTO professor VALUES (4,4);

The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with the same name of associated tables will appear once only. In our Example, Prof_code will appear only once and it will be matched in both the table;  

SELECT * FROM Student natural join Professor on student.prof_code=Professor.prof_code ;  

Stud_code   Prof_code  Dept_code

128569        2           6

512272        4           4

531235        2           6

553427        1           2

EQUI JOIN performs a JOIN against equality or matching column(s) values of the associated tables and an equal sign (=) is used as a comparison operator in the where clause to refer to equality. In our example, it will only show the result with prof_code=2 from the natural join result.

SELECT * FROM Student join Professor on student.prof_code=Professor.prof_code where student.prof_code=2;

Stud_code Prof_code Prof_code Dept_code

128569     2         2         6

531235     2         2         6

In SQL the FULL OUTER JOIN combines the results of both left and right outer joins and returns all (matched or unmatched) rows from the tables on both sides of the join clause.

SELECT * FROM professor full outer join student on professor.prof_code=student.prof_code ;

Stud_code Prof_code Prof_code Dept_code

100278                

128569    2          2         6

512272    4          4         4

531235    2          2         6

531268    

                    3         6

553427    1          1         2

Peter is a new business owner. Because Peter is on a strict budget, he uses an older Novell NetWare server. The NetWare server still relies on the legacy IPX/SPX network protocol suite. Peter needs to connect his server to the Internet. He decides to use a gateway instead of a router. What is the likely motive behind Peter's decision

Answers

The most likely motive of Peter's decision to use a gateway for connecting his serve to the internet is to get a wireless connection for the internet.

A gateway server is used to communicate to the internet service provider. It is used to receives the data. It helps to sends the data to the router in order to translate as well as distribute the wireless devices.

In the context, Peter who is on a strict budget uses gateway system to connect to the internet and he uses the older version of Novell NetWare server.

Learn More :

https://brainly.in/question/35731153

Why is it useful for students to practice the MLA and APA citation methods?

Answers

Answer:

Citing or documenting the sources used in your research serves three purposes:

It gives proper credit to the authors of the words or ideas that you incorporated into your paper.

It allows those who are reading your work to locate your sources, in order to learn more about the ideas that you include in your paper.

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it

Answers

Answer:

Managed devices

Explanation:

hope it helps u

Convert the following denary numbers into
binary (using both methods):
a 41
b 67
C 86
d 100
e 111
f 127
g 144
h 189
i 200
j 255

Answers

Answer:

101001

1000011

1010110

1100100

1101111

1111111

10010000

10111101

11001000

11111111

Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named gallons with 5 elements? a. double gallons[size] = { 12.75, 14.87, 9.74, 6.99, 15.48 }; b. double gallons[size] { 12.75, 14.87, 9.74, 6.99, 15.48 }; c. double gallons[] { 12.75, 14.87, 9.74, 6.99, 15.48 }; d. all of the above e. a and b only

Answers

Answer:

all of the above

Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);

Answers

Answer:

ae

Explanation:

The pseudo-code that corresponds to the given assembly code is:

b) if (c < 0)

print (yes);

else

print (maybe);

What is the pseudo-code

In assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.

Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"

Read more about   pseudo-code here:

https://brainly.com/question/24953880

#SPJ2

What is meant by usability and what characteristics of an interface are used to assess a system’s usability?

Answers

Answer:

The answer is below

Explanation:

Usability is a term that describes the assessment of the performance of a system in assisting the task of the user, or how effective a certain product system or design supports the task of a user in accomplishing a set out objective as desired.

The characteristics of an interface that are used to assess a system’s usability are:

1. Effectiveness

2. Efficiency

3. Error Tolerance

4. Engagement

5. Ease of Learning and Navigation

how many dog breed are there

Answers

Answer:

360 officially recognized breeds (would appreciate if given brainliest) <3

The usa recognizes 160 breeds while 360 are recognized worldwide

3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickle, and 2 pennies. That is 27=1*25+0*5+2*1.

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents -qtr * 25

nkl = int(cents/5)

pny = cents -nkl * 5

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

Explanation:

This gets input for cents

cents = int(input("Cents: "))

This calculates the quarters in cents

qtr = int(cents/25)

This gets the remaining cents

cents = cents -qtr * 25

This calculates the nickel in remaining cents

nkl = int(cents/5)

This calculates the pennies in remaining cents

pny = cents -nkl * 5

This prints the required output

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

DESCRIBE THE GENERAL STRATEGY BEHIND DEALOCK PREVENTION AND GIVE A PRATICAL EXAMPLE

Answers

Answer:

........

Explanation:..........

encode the original string by finding sequences in the string * where the same character repeats. replace each such sequence * by a token consisting of: the number of characters in the sequence * followed by the repeating character. * return the encoded string.

Answers

Im gonna use python3 for this example

def encode(string):

if not string:

return string

new_string = []

last_char = ""

count = 1

for char in string:

if char == last_char:

new_string.pop(len(new_string)-1)

count += 1

elif char != last_char and count > 1:

new_string.append(str(count)+last_char)

count = 1

new_string.append(char)

last_char = char

else:

last_char = char

new_string.append(char)

return "".join(new_string)

print(encode("Hello There"))

__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer:

d.) The operating system, the application software

give one advantage of saving file in the same folder

Answers

Answer:

it's easier to find

Explanation:

things are much more organized

So you don’t have to go through many files

To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure

Answers

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

The internet's data pathways rely on what kind of hardware device to route data to its destination?
servers

routers

IP addresses

ISPs

Answers

Answer:

Routers

Explanation:

Essentially a router is a device used in networking that route packets of data from one computer network to another.

Answer:

routers

Explanation:

Routers are hardware devices that route the data from place to place. Data "hops" from one router to another until it reaches its destination. ISPs and IP addresses are not hardware devices. Servers are hardware devices but do not route data.

-Edge 2022

When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choices begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.

Answers

Answer:

explain all background information first.

Explanation:

Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.

It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly Scalable Multiplayer Gaming OC. Distributed Analytics O D. Scientific Modelling O E. All of the listed ​

Answers

Answer:

E. All of the listed ​

Explanation:

For compute-optimized cloud offerings like AWS, suitable use cases are - gaming, distributed analytics, and scientific modeling. Since all these are suitable, the correct answer is E.

Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.

Answers

Answer:

The program is as follows:

def get_price(fruits):

   AllPrice = fruits.values()

   value_iterator = iter(AllPrice)

   mostExpensive = next(value_iterator)  

   for item in fruits:

       if fruits[item]>=mostExpensive:

           mostExpensive = fruits[item]

           fruitName = item

   print(fruitName)

fruits = {}

n = int(input("Number of Fruits: "))

for i in range(n):

   name = input("Fruit name: ")

   price = int(input("Fruit price: "))

   fruits[name] = price

get_price(fruits)

Explanation:

This defines the get_price function

def get_price(fruits):

This gets all price in the dictionary fruit

   AllPrice = fruits.values()

This passes the values to a value iterator

   value_iterator = iter(AllPrice)

This initializes mostExpensive to the first price in the dictionary

   mostExpensive = next(value_iterator)

This iterates through the elements of the dictionary  

   for item in fruits:

If current element is greater than or equals most expensive

       if fruits[item]>=mostExpensive:

Set most expensive to the current element

           mostExpensive = fruits[item]

Get the corresponding fruit name

           fruitName = item

Print fruit name

   print(fruitName)

The main begins here

This initializes the fruit dictionary

fruits = {}

This gets input for the number of fruits

n = int(input("Number of Fruits: "))

This is repeated for every inputs

for i in range(n):

Get fruit name

   name = input("Fruit name: ")

Get fruit price

   price = int(input("Fruit price: "))

Append name and price to dictionary

   fruits[name] = price

Call the get_price function

get_price(fruits)

please give me correct answer

please give me very short answer​

Answers

Answer:

1.A table is a range of data that is defined and named in a particular way.

2.Table tools and layout

3.In insert tab Select the table and select the number of rows and colums

4.Split cell is use to split the data of a cell.Merge cell is used to combine a row or column of cells.

5.Select the cell and click down arrow next to the border button.

Microsoft created Adobe Photoshop? TRUE FALSE​

Answers

Answer:

false the creator of adobe photoshop was microsoft adobe photoshop is a popular photo editing software which was developed by a company named as adobe inc.

Answer:

Photoshop is created by Adobe, and Adobe is an independent company started by Jhon Warnockand.

12) The Windows utility returns your computer to the state it was in when it came from the factory. Erase Refresh Reset Backup Next Question​

Answers

Answer:

Reset

Explanation:

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

Write a program which will create an array of size 10. Fill the array with random numbers from 0 - 100. (use a loop and random number generator rand) Once you are done with this, you will then write a loop which will go through each element of the array, display the contents of that element and tell if that element is an even number or odd number. Go through all the elements again and this time tell me how many are even and odd.

Answers

Answer:

Explanation:

The following code is written in Java. It randomly generates 10 integers and adds them to an integer array called myArr. Then it loops through the array calculating if each number is even or odd. If it is even it adds 1 to the evenCount variable and prints out the number saying that it is even. Otherwise it adds 1 to the oddCount variable and prints the number saying that it is odd. The program was tested and the output can be seen in the attached image below.

import java.util.*;

class Brainly {

   // Main Method

   public static void main(String[] args) {

       Random rand = new Random();

       int[] myArr = new int[10];

       for (int i = 0; i<10; i++) {

           int n = rand.nextInt(101);

           myArr[i] = n;

       }

       int evenCount = 0;

       int oddCount = 0;

       for (int x : myArr) {

           if ((x % 2) == 0) {

               evenCount += 1;

               System.out.println(x + " is Even");

           } else {

               oddCount +=1;

               System.out.println(x + " is Odd");

           }

       }

       System.out.println("The Array has a total: ");

       System.out.println(evenCount + " Even Numbers");

       System.out.println(oddCount + " Odd Numbers");

   }

}

JavaFX application for the Sublime Sandwich Shop. The user can order sandwiches by using list boxes and the application displays the price. Each sandwich should allow a choice of at least three main ingredients (chicken, for example) at three different prices. The user should also be able to choose between three different bread types. Use CheckBoxes for additional ingredients - lettuce, tomato, etc.
Create an ArrayList to hold all of the sandwiches associated with an order. Display information about all the sandwiches that were ordered.

Answers

Answer:

package GUI;  

import java.awt.*;  

import java.awt.event.*;  

import javax.swing.*;

// Class SandwichShop definition

public class SandwichShop

{

// Creates a string array for sandwich ingredients  

String sandwichIngredients [] = {"Chicken", "Mutton", "Veg"};

// Creates a string array for bread types

String breadTypes[] = {"Bloomer", "Cob", "Plait"};

// Container object declared

JFrame jf;

JPanel p1, p2, p3, p4, mainP;

// Component object declared

JList ingredient, bread;

JLabel ingL, breadL, amountL;

JTextField amountT;

JButton amountB, exitB;

// Default constructor definition

SandwichShop()

{

// Creates frame

jf = new JFrame("Sandwich Shop");

// Creates panels

p1 = new JPanel();

p2 = new JPanel();

p3 = new JPanel();

p4 = new JPanel();

mainP = new JPanel();

// Creates list box and adds string array

ingredient = new JList<String>(sandwichIngredients);

bread = new JList<String>(breadTypes);

// Creates labels

ingL = new JLabel("Select Sandwich Ingredients");

breadL = new JLabel("Select Bread Types");

amountL = new JLabel("Amount: ");

// Creates text field

amountT = new JTextField(5);

// Creates buttons

amountB = new JButton("Check Amount");

exitB = new JButton("Exit");

// Adds components to panels

p1.add(ingL);

p1.add(ingredient);

p2.add(breadL);

p2.add(bread);

p3.add(amountL);

p3.add(amountT);

p4.add(amountB);

p4.add(exitB);

// Adds panels to main panel

mainP.add(p1);

mainP.add(p2);

mainP.add(p3);

mainP.add(p4);

// Set the main panel layout to 4 rows and 1 column

mainP.setLayout(new GridLayout(4, 1));

// Adds main panel to frame

jf.add(mainP);

// Sets the frame visible property to true

jf.setVisible(true);

// Set the size of the frame to width 400 and height 150

jf.setSize(400, 300);

// Registers action listener to exit button using anonymous class

exitB.addActionListener(new ActionListener()

{

// Overrides the actionPerformed() method

public void actionPerformed(ActionEvent ae)

{

System.exit(0);

}// End of method

});// End of anonymous class

// Registers action listener to amount button using anonymous class

amountB.addActionListener(new ActionListener()

{

// Overrides the actionPerformed() method

public void actionPerformed(ActionEvent ae)

{

// Extracts index of the selected item from the list box

int indexIngredient = ingredient.getSelectedIndex();

int indexBread = bread.getSelectedIndex();

// Checks if ingredient index is 0 and bread index is 0

// then set the amount 100 in text field

if(indexIngredient == 0 && indexBread == 0)

amountT.setText("100");

// Checks if ingredient index is 0 and bread index is 1

// then set the amount 120 in text field

if(indexIngredient == 0 && indexBread == 1)

amountT.setText("120");

// Checks if ingredient index is 0 and bread index is 2

// then set the amount 160 in text field

if(indexIngredient == 0 && indexBread == 2)

amountT.setText("160");

// Checks if ingredient index is 1 and bread index is 0

// then set the amount 190 in text field

if(indexIngredient == 1 && indexBread == 0)

amountT.setText("190");

// Checks if ingredient index is 1 and bread index is 1

// then set the amount 205 in text field

if(indexIngredient == 1 && indexBread == 1)

amountT.setText("205");

// Checks if ingredient index is 1 and bread index is 2

// then set the amount 210 in text field

if(indexIngredient == 1 && indexBread == 2)

amountT.setText("210");

// Checks if ingredient index is 2 and bread index is 0

// then set the amount 97 in text field

if(indexIngredient == 2 && indexBread == 0)

amountT.setText("97");

// Checks if ingredient index is 2 and bread index is 1

// then set the amount 85 in text field

if(indexIngredient == 2 && indexBread == 1)

amountT.setText("85");

// Checks if ingredient index is 2 and bread index is 2

// then set the amount 70 in text field

if(indexIngredient == 2 && indexBread == 2)

amountT.setText("70");

}// End of method

});// End of anonymous class

}// End of default constructor

// main function definition

public static void main(String[] args)

{

// Creates an anonymous object by calling default constructor

new SandwichShop();

}// End of main method

}// End of class

Output:

If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at this intersection.

Answers

Answer:

The red Mustang should be given the right-of-way at this intersection because:

The red Mustang arrived first before the blue Prius and is closer to the stop sign before the arrival of the blue Prius.  This implies that the red Mustang must have waited for its turn, unlike the blue Prius that just arrived at the intersection.

Explanation:

Traffic laws, regulations, and IPDE defensive driving strategy require that drivers always give way to the vehicle that arrived before them at an intersection.   Assuming that multiple vehicles reach the intersection simultaneously, then the vehicle must be given the right-of-way.  Alternatively, the traffic lights at the intersection should be obeyed and be allowed to regulate the movement of vehicles.  IPDE defensive driving strategy requires drivers to be watchful of their driving spaces to determine the appropriate time to move.

1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.

Answers

Answer:

Hence the answer is given as follows,

What are the Strategies to Maintain a Healthy Sales Funnel?

Answers

Answer:

Use LinkedIn Automation Tools to Level Up Your Prospecting GameKnow Your Target AudienceSync With Prospects' InterestsPolish Your LinkedIn Profile

Creating and maintaining a healthy sales pipeline is challenging but not impossible.  

The B2B world has changed, and you need to adopt new strategies to build a healthy pipeline. Choose the best LinkedIn automation tool, optimize your profile, know your audience and share personalized content for quick outcomes.

Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C

Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:

A > 0
B > 0
C > 0

Answers

Answer:

The program in Python is as follows:

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

while A<=0 or B <= 0 or C <= 0:

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

print("Valid inputs")

Explanation:

Get input for A, B and C

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

The loop is repeated until inputs for A, B and C are above 0

while A<=0 or B <= 0 or C <= 0:

Get input for A, B and C

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

Print valid inputs when user inputs are correct

print("Valid inputs")

Other Questions
What are 3 things a ferret could do no one thought it did He said dont be afraid of bull change into indirect speech A car can travel 300 miles on 12 gallons of gas. At this rate, how many miles can the car travel on 1 gallon of gas?12 miles12 miles25 miles25 miles120 miles120 miles312 miles312 miles SCIENCE the different modes of reproduction in animals such as butterflies, mosquitoes, frogs, cats, and dogs (sexual and asexual) a. Cut and paste pictures of animals and their young that are reproduced sexually(cats, dogs, etc.) b. Cut and paste pictures of animals and their young that are reproduced asexually(butterflies, mosquitoespls help me! i need help i will brainlies the good answer! answer this now pls! today is the deadline! Which two characteristics are shared by all thunderstorms, tornados, and hurricanes? clouds and wind eyes and clouds warm, dry air and wind large waves and warm, dry air. Primary demand is a desire for the ________ rather than for a ________; it is often the focus of marketing when there are few competitors with the same product. brand name; product category problem solution; product category product class; specific brand product concept; tangible product novelty; problem solution what subject pronouns would you use for Mi padre What word does the wife of bath repeat in the opening paragraph of her tale what does this tell us about her as a character? The Canterbury tales When an employee remembers the first manager who came and spoke to them on their first day of work, the event is most likely to be stored in the employee's: 5(2x-2)=8x: what is the value of x? The us used ___ to build Panama Canal How many grams of O2 are reacted when 3.5mols of P203 are formed? The Ottoman Empire under Superman is best characterized as a When was the new government of Germany founded? become a little more acquainted with some of the people affected by HIV and AIDS, perform a keyword search on the Internet and find avideo that includes an interview with teenagers who are HIV-positive. You may want to include the keywords HIV, positive, and teens in yoursearch. Which of the following statements describes sound energy?Sound energy does not travel at all.Sound energy needs a medium to travel through.Sound energy can travel in empty space.Sound energy can only travel through air. hii, i need help what battle plans did the north and south adopt? were these plans realistic compared to their strengths and weaknesses? What equipment is generally used to make lyophilized medications suitable for administering to the patient? a) Test tubes or sterile ampules O b) Petri dishes and sterile droppers c) Sterile syringes or graduated cylinders d) Measuring cups and clean, warm water helppppp meee pleaseeeee !!!!! :( What is the pressure of a 1.0 L flask containing 0.12 g of He at 25C? (R= 0.0821 L atm/mol K)