Carbohydrates are a huge source of

Answers

Answer 1

Answer:

Energy

Explanation:

Answer 2
Carbohydrates come from fruits, and grains which contain sugars, fibers, and starches which gives us energy

Related Questions

While reviewing a Web site about a medical condition your aunt was just diagnosed with, you decide to check on the writer of the site. You verify that the writer is a well-known doctor and is a frequent television expert on this medical condition. What characteristic of an effective Web site does this show?



reputable author


verified


unbiased


relevant

Answers

Answer:

This is a characteristic of a reputable author

Which audio editing effect removes distortions from the audio composition?
A.
amplify
B.
normalize
C.
fade in
D.
compressor
E.
fade out

Answers

Answer:

The answer is normalize for my plato family.

Explanation:

When normalizing you can use this option to remove distortions in the recorded sound. Ideally, you should normalize a track before using the amplify effect. Otherwise, the amplify effect would amplify the decibel levels of the distortions too.

Tier 1 networks form the internet ____.​

Answers

Answer:

Internet Backbone

Explanation:

The internet is a network of networks, no single tier 1 network (ISP companies like Sprint, IBM, Verizon, AT&T for example, they provide the cables and routers that connect the networks) can reach the entire internet on its own, so they merge together to form the Internet Backbone, a backbone network enables all users and companies to connect with each other.

Amara created a workbook to track the number of minutes she reads each week. Each day, she entered the number of minutes into the workbook. Identify the types of data in the workbook using the drop-down menus. 25: 105: Wed:

Answers

Answer:

25: Value

105:Formula

Wed: Label

Explanation:

Answer:

C- Value

A- Formula

B- Label

Explanation:


What is the output?
answer = 0
for numB in [1,4]
for numA in [2,3]
answer = answer + numA + numB
print (answer)

Answers

Answer:

20

Explanation:

Answer:

its 20 edg 2021

Explanation:

What is one benefit of using a web clipping tool?

It can be used to reuse text and images.
It has a drawing-to-notes feature.
It may provide a personal organizer.
It may have different alarm settings.

Answers

Answer:

the correct answer is A I took the quiz

Explanation:

Answer:

a

Explanation:

What is the power of 3 shch that it's power is 1/3 ?​

Answers

Answer:

3/1-1

Explanation:

Critical Thinking Questions

You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.

Answers

Answer:

One example of syntax in Logo is “[”. Two examples of Java are “;” and “{“or “}”. If you don’t use these parts of syntax then you could get a Syntax error, this will make you have to stop the code and debug.

Explanation:

Answer:

I am giving this answer so the other person can get brainliest

Explanation:

Which of the following was the primary purpose of muckraking, sensationalism, and yellow journalism in the early 1900s?


to improve literacy rates

to expose government corruption

to make a profit

to influence social reform

Answers

Answer:

C

Explanation:

Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer development by dates (chronologically)

Answers

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

please help in this question​

Answers

Answer:

A loop statement is used to execute one of more statement depending on whether.

HELP ASAP IF YOU KNOW PYTHON 2!!!

Please use the attached files for the assignment and understanding it. Note: You can only see the files on the computer version of Brainly.

Answers

Answer:

Thats one long assignment, hard to get answers as we are given a 19 min limit to reply, atleast sub divide the assignment and we'll help you in any walls across yor journey. SORRY

What is the value of the variable? (1 point)
double dNum =
(int) 38.78;

1) 38
2) 38.0
3) 38.78
4) 39
5) Error: incompatible types

Answers

2) 38.0

it’s converted into int in then back to double

Jim wants to shoot a video. This requires him to move from one place to another. Which type of camera support should Jim use?

Answers

Answer:

I think Jim should use a movement tracker camara

Explanation:

since he is moving around the camera would follow him around

Answer:

shoulder mount

Explanation:

A picture drawn in 3 d is called?​

Answers

Answer:

autostereogram

Explanation:

that^

picture drawn in 3d is called a 3d picture

Help me please (⌒-⌒; )

Answers

Answer:

raise the prices

Explanation:

Hope this helped, Have a Great Day/Night!!

How many types of sharing of Google Forms are possible?

Answers

Answer:

Open a form in Google Forms.

In the top right, click More .

Click Add collaborators.

Under "Invite people," type the names or email addresses of the people you want to work with.

Click Send.

wanna play pubg


ill send u my id​

Answers

My sister would what’s your id

Answer:

Nah ill pass

Explanation:

because I don't have module data so I am very sorry

What would this look like if you were to write the pseudocode but for c++?

Answers

Answer:

when make a task list you would not include commands that are for any specific language like C++

Explanation:

pseudocode should be universal. So when creating the task list, you would not include commands that are for any specific language like C++, java, C#, or perl. The point of pseudocode is to design a program that can be translated in to any language.

Calculate and express your answer in decimal form.

12⋅17
34⋅200
(0.2)⋅40
(0.25)⋅60

Answers

Answer:

ポイントが欲しいだけなのかわからない

Explanation:

何語を話していますか

Can someone please help me?

Answers

Answer:

Im pretty sure its a

Explanation:

Monica needs to assess the slide sequence and make quick changes to it. Which view should she use in presentation program?

Answers

Answer:

Slide Sorter View. Using the slide sorter view, Monica can view and change slide position that she prefer quickly.  Slides are presented in series of 3 columns that she can drag and drop to a different position whichever she likes.  

Explanation:

Someone please help will mark as brainliest

Answers

Answer:

The word is "short"

Explanation:

when you add the two letters "er" to "short" it becomes the word "shorter"

I hope this helps.

Answer:the word short?...

Explanation:

All dogs = 199999990158161231
A = B
B = C
C = D
Please help this question makes 0 sense but my teacher asked me it so I gotta figure it out

Answers

Answer:

C=D cause d spells dogs jk I really dont know

Answer:

B

Explanation:

please elp i will give you brainelst answer the question and answer please!!!!!!!!!!!!!!!!
I GIVE YOU BRAINELST 5 STARS AND HEART!!!!

Answers

Answer:

I'd so like one of the Presidents.

Explanation:

research some facts. make sure to use your resources. Put some facts on who their vice president was a stuff

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?
A 5
B 6
C 7
D 8

Answers

Answer: I believe the answer is: A, 5.

Explanation:

The minimum number of bits required to assign a unique bit sequence is 7.

Binary numbers are represented as 0's and 1's

Let n = number of bits [tex] {2}^{n} = required \: sequence[/tex]

Therefore,

[tex] {2}^{n} \geqslant 100[/tex]

The whole number value of n, which is greater than or equal to 100;

[tex] {2}^{7} = 128[/tex]

The value of n which satisfies the inequality is 7

Therefore, the minimum number of bits required is 7.

Learn more : https://brainly.com/question/20865548?referrer=searchResults

Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod). Displays the sum.

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

int x[]={2,3,4,6,7,8,9,1,11,12};//defining 1-D array and assign value

int i,sum=0;//defining integer variable

for(i=0;i<10;i++)//defining loop for count value

{

   if(x[i]%2==1)//defining if block to check odd value

   {

       sum=sum+x[i];//add value in sum variable

   }

}

cout<<sum;//print sum

return 0;

}

Output:

31

Explanation:

In the above-given program, an integer array "x" is declared that holds some integer values, and in the next line two integer variable "i and sum" is defined which is used to calculate the value.

In the next line, a for loop is declared, that counts all array value, and it uses the if block to check the odd value and add all the value into the sum variable.

The code is in Java.

It uses for loop, if-else structure, and mod to calculate the sum of odd numbers in a list.

Comments are used to explain each line of code.

You may see the output in the attachment.

//Main.java

import java.util.*;

public class Main

{

public static void main(String[] args) {

   

    //create a list with some numbers

    List<Integer> lotsOfNumbers = Arrays.asList(7, 20, 1002, 55, 406, 99);

   

    //initialize the sum as 0

    int sumOfOdds = 0;

   

    //create a for each loop to iterate over the lotsOfNumbers list

    //check each number, if it is odd or not using the mod

    //if it is odd, add the number to the sum (cumulative sum)

    for (int number : lotsOfNumbers){

        if(number % 2 == 1)

            sumOfOdds += number;

    }

   

    //print the sum

    System.out.println("The sum of odd numbers: " + sumOfOdds);

}

}

You may check out another question at:

https://brainly.com/question/24914609

Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are neatly trimmed. What habit does Carla demonstrate with these preparations?


motivation

punctuality

personal hygiene and grooming

interpersonal skills

Answers

Answer:

C.) Personal Hygiene and Grooming

Explanation:

The third one I think

PLEASE HELP ASAP!!!!!!!






Is this statement true or false?

You can apply only one of these at a time: underline, bold, or italics.


true

false

Answers

Answer:

i am pretty sure that is false

Explanation:

1. Select the Volatile Memory *

RAM

ROM

Secondary Memory

2. A Malware is a *

program that enables the computer to run faster.

software in a computer that fights against VIRUS.

Harmful software to the computer

3. The full form of LAN is *

Locally Area Network

Local Area Network

Local Area Networking

4. The smallest Unit of data is called as *

Bit

Byte

Megabyte

5. The permanent memory built in your computer is *

Monitor

ROM

RAM

6. Which one of the following is a VIRUS *

Morris Malware

ILOVEYOU Malware

Mellisa malware

7. Which of the following storage devices are found inside the computer? *

Hard disk drive

SSS Drive

Magnetic Tape

8. The full form of ROM is *

Read Only Memory

Reading Only Memory

Read On Memory

9. Choose the Highest Unit of Data from the following. *

Megabyte

Gigabyte

Answers

Answer:

1 no.

ram

2

harmful software to the computer

3

local area network

4

bit

5

ram

6

morris malware

7

hard disk drive

8

read only memory9

gigabyte

hope this will help u

Other Questions
is i am beautiful or not??? Two different locations have a temperature of 36C. One has a relative humidity of 25% and the other has a relative humidity of 85%. Which location will feel hotter? The meal costs $52.95 for 5 people. Jenna ordered a dessert for $2.50. If Jenna deducts this amount from the total, how much will each of the other people pay for their meal? Materials that resist the charges flowing through are Select all equations that can result from adding these two equations or subtracting one from the other. x+y=12 3x-5y=4 PLZ HELP QUICK I WILL GIVE BRAINLYIEST Do you agree about Philippines must prioritize the businesses institutions more than medical institutions. Why did cotton prices drop in the 1920s, harming Oklahoma farmers?A.Sharecroppers chose not to produce enough to meet demand.B.Demand for cotton grew after World War I.C.Cotton became too costly to produce, cutting supplies.D.Too much cotton was being produced nationwide. I really need some help!!! How does the authors discussion of the shared virus between the pigs and the bats help us understand animals role in human disease? Which of the following statements is false?A. Permanent settlements emerged during the Neolithic Era.B. Copper and bronze were first used for toolmaking during the Neolithic Era.C. Ancient Mesopotamian civilizations were the first to use the wheel.D. The Neolithic Era is called "new" because of the shift away from nomadic societies.Please select the best answer from the choices provided.AB0 2. Uncle Bob is as jolly as Santa. The simile jolly as Santa: A Uncle Bob has a white beard and a jelly belly. B Uncle Bob brings us a bag full of gifts. Uncle Bob laughs a lot. What principle will an artist use to control where you look first, second and third? Solve the following inequality using the algebraic approach:5x-1 < 2x + 11 A pet store purchases dog collars from a distributor for $6 per dog collar. The store marked up the price of the dog collars by 35%. What is the selling price of one dog collar? . Describe the journey of a metamorphic rock transforming to a sedimentary rock. Noah says that to find 20% of a number he divides the number by 5. For example, 20% of 60 is 12, because 60 - 5 = 12. Complete thestatement about whether Noah's method always works.His method neverworks because multiplying by does not give the same result as dividing by 5. The figure shown has two parallel lines cut by a transversal:Use the figure to complete the sentence. 6 and ____ are corresponding angles. a2 b3 c7 d8 The scale use for a model of kitchen is 1/4 in = 1/2 ft In the model, the kitchen measures 2 1/2 by 2 3 in. What are actual dimensions of the kitchen Work out what x = Please and explication Santiago's car has an overall average speed of 25 cm/s. If he could increase his car's overall average speed by 10%, what would his car's new overall average speed be? A human eats a meal and afterward their blood glucose levels rise. Explain how the human body responds to return their blood glucose level to normal.