First one who answers gets brainiest

Answers

Answer 1

Answer:

thank for the point anyway


Related Questions

Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​

Answers

Answer:

Write an algorithm to input a natural number, n, and calculate the odd numbers equal or less than n. ... Design an algorithm and flowchart to input fifty numbers and calculate their sum. Algorithm: Step1: Start Step2: Initialize the count variable to zero Step3: Initialize the sum variable to zero Step4: Read a number say x Step 5: Add 1 to the number in the count variable Step6: Add the ..

Explanation:

ghggggggggggggghbbbbbjhhhhhhhh

Answers

Answer:

Something wrong?

Explanation:

What are 3 data Gathering method that you find effective in creating interactive design for product interface and justify your answer?

Answers

Answer:

In other words, you conducted the four fundamental activities that make up the interaction design process – establishing requirements, designing alternatives, prototyping designs, and evaluating prototypes.

Explanation:

Write a function input_poly(ptr1) that reads in two polynomials at a time with coefficient and exponent from a file cp7_in.txt. The file will contain 2n polynomials, where n is an integer that is 10 or less. Space for the polynomial will be allocated in run time and there is no limit to the size of the polynomial, e..g the first two lines of the file is

Answers

Answer:

try this

Explanation:

#include<stdio.h>

#include<malloc.h>

typedef struct poly{ double coff;

int pow;

struct poly *link; }SL;

void create(SL **head)

{

*head=NULL;

}

//Insertion  

void ins_beg(SL ** head, double c, int pw)

{

SL *ptr;

ptr=(SL *)malloc(sizeof(SL));

ptr->coff=c;

ptr->pow=pw;

ptr->link=*head;

*head=ptr;

}

void trav(SL **head)

{

SL *ptr;

ptr=*head;

printf("\n\t Cofficient Exponent\n");

while(ptr!=NULL)

{ printf("\t\t%3.2f \t%d\n",ptr->coff, ptr->pow);

ptr=ptr->link;

}

}

//addition of polynomial............

void mult(SL *pl1, SL *pl2, SL **res)

{

SL trav1, trav2, ptr, new1,*loc;

int x,y;

trav1=*pl1;

while(trav1!=NULL)

{

trav2=*pl2;

while(trav2!=NULL)

{

x=(trav1->coff)*(trav2->coff);

y=(trav1->pow)+(trav2->pow);

//printf("\t%d\t%d\n",x,y);

if(*res==NULL)

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=x;

new1->pow=y;

new1->link=NULL;

*res=new1;

}

else

{

ptr=*res;

while((y<ptr->pow)&&(ptr->link!=NULL))

{

loc=ptr;

ptr=ptr->link;

}

if(y==ptr->pow)

ptr->coff=ptr->coff+x;

else

{

if(ptr->link!=NULL)

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=x;

new1->pow=y;

loc->link=new1;

new1->link=ptr;

}

else

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=x;

new1->pow=y;

ptr->link=new1;

new1->link=NULL;

}

}

}

trav2=trav2->link;

}

trav1=trav1->link;

}

}

//...addition..............

void add(SL *pl1, SL *pl2)

{

SL trav1, ptr, *new1,*loc; trav1=*pl1;

while(trav1!=NULL)

{

loc=ptr=*pl2;

while((trav1->pow<ptr->pow)&&(ptr->link!=NULL))

{

loc=ptr; ptr=ptr->link;

}

if(loc==ptr)

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=trav1->coff;

new1->pow=trav1->pow;

new1->link=*pl2;

*pl2=new1;

}

else

if(trav1->pow==ptr->pow)

{

ptr->coff=ptr->coff+trav1->coff;

//ptr->pow=ptr->pow+trav1->pow;

}

else

if(ptr->link!=NULL)

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=trav1->coff;

new1->pow=trav1->pow;

new1->link=ptr;

loc->link=new1;

}

else

{

new1=(SL *)malloc(sizeof(SL));

new1->coff=trav1->coff;

new1->pow=trav1->pow;

new1->link=NULL;

ptr->link=new1;

}

trav1=trav1->link;

}

}

int main()

{

SL first, sec, *res;

create(&first);

ins_beg(&first,10.25,0);

ins_beg(&first,4,1);

ins_beg(&first,5,2);

ins_beg(&first,4,4);

printf("\nFirst Polinomial:\n");

trav(&first);

create(&sec);

ins_beg(&sec,11,0);

ins_beg(&sec,6,1);

ins_beg(&sec,4,2);

ins_beg(&sec,3,3);

printf("\nSecond Polinomial:\n");

trav(&sec);

create(&res);

printf("\nMultiplication of two Polinomial:\n");

mult(&first,&sec,&res);

trav(&res);

printf("\nAddition of two Polinomial:\n");

add(&first,&sec);

trav(&sec);

//trav(&first);

return 0;

}

Plz hurry it’s timed

Answers

A manufacturing company

Rideshare companies like Uber or Lyft track the x,y coordinates of drivers and customers on a map. If a customer requests a ride, the company's app estimates the minutes until the nearest driver can arrive. Write a method that, given the x and y coordinates of a customer and the three nearest drivers, returns the estimated pickup time. Assume drivers can only drive in the x or y directions (not diagonal), and each mile takes 3.5 minutes to drive. All values are doubles; the coordinates of the user and of the drivers are stored as arrays of length 2. 289222.1780078.qx3zqy7

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

 public static void main (String[]args){

   Scanner input = new Scanner(System.in);

   double user[] = new double[2];    double dr1[] = new double[2];

   double dr2[] = new double[2];    double dr3[] = new double[2];    

   System.out.print("Enter user coordinates: ");

   for(int i =0;i<2;i++){        user[i] = input.nextDouble();    }

   System.out.print("Enter driver 1 coordinates: ");

   for(int i =0;i<2;i++){        dr1[i] = input.nextDouble();    }

   System.out.print("Enter driver 2 coordinates: ");

   for(int i =0;i<2;i++){        dr2[i] = input.nextDouble();    }

   System.out.print("Enter driver 3 coordinates: ");

   for(int i =0;i<2;i++){        dr3[i] = input.nextDouble();    }

   double dr1dist = Math.abs(user[0] - dr1[0]) + Math.abs(user[1] - dr1[1]);

   double dr2dist = Math.abs(user[0] - dr2[0]) + Math.abs(user[1] - dr2[1]);

   double dr3dist = Math.abs(user[0] - dr3[0]) + Math.abs(user[1] - dr3[1]);

   System.out.println("Estimated pickup time of driver 1 "+(3.5 * dr1dist)+" minutes");

   System.out.println("Estimated pickup time of driver 2 "+(3.5 * dr2dist)+" minutes");

   System.out.println("Estimated pickup time of driver 3 "+(3.5 * dr3dist)+" minutes");

 }

}

Explanation:

The following array declarations are for the customer and the three drivers

   double user[] = new double[2];    double dr1[] = new double[2];

   double dr2[] = new double[2];    double dr3[] = new double[2];    

This prompts the user for the customer's coordinates

   System.out.print("Enter user coordinates: ");

This gets the customer's coordinate

   for(int i =0;i<2;i++){        user[i] = input.nextDouble();    }

This prompts the user for the driver 1 coordinates

   System.out.print("Enter driver 1 coordinates: ");

This gets the driver 1's coordinate

   for(int i =0;i<2;i++){        dr1[i] = input.nextDouble();    }

This prompts the user for the driver 2 coordinates

   System.out.print("Enter driver 2 coordinates: ");

This gets the driver 2's coordinate

   for(int i =0;i<2;i++){        dr2[i] = input.nextDouble();    }

This prompts the user for the driver 3 coordinates

   System.out.print("Enter driver 3 coordinates: ");

This gets the driver 3's coordinate

   for(int i =0;i<2;i++){        dr3[i] = input.nextDouble();    }

This calculates the distance between driver 1 and the customer

   double dr1dist = Math.abs(user[0] - dr1[0]) + Math.abs(user[1] - dr1[1]);

This calculates the distance between driver 2 and the customer

   double dr2dist = Math.abs(user[0] - dr2[0]) + Math.abs(user[1] - dr2[1]);

This calculates the distance between driver 3 and the customer

   double dr3dist = Math.abs(user[0] - dr3[0]) + Math.abs(user[1] - dr3[1]);

The following print statements print the estimated pickup time of each driver

  System.out.println("Estimated pickup time of driver 1 "+(3.5 * dr1dist)+" minutes");

   System.out.println("Estimated pickup time of driver 2 "+(3.5 * dr2dist)+" minutes");

   System.out.println("Estimated pickup time of driver 3 "+(3.5 * dr3dist)+" minutes");

Davos has been reading about encryption recently. He begins to wonder how anything can be secure if everyone is using the same set of algorithms. After all, anyone using the same algorithm would be able to decrypt anything that had been encrypted using that algorithm. Which of the following helps make the data unusable by anyone else using that same encryption scheme without having this information?
a. Algorithm
b. Cipher
c. Key
d. Block

Answers

Answer:

The correct answer is B. Cipher.

Explanation:

Cipher is a system of reversible transformations that depends on some secret parameter, called key, and is designed to ensure the secrecy of transmitted information.

The cipher can be a combination of conventional characters or an algorithm for converting ordinary numbers and letters. The process of making a message secret with a cipher is called encryption. An important parameter of any cipher is the key - a parameter of the cryptographic algorithm, which ensures the selection of one transformation from the set of transformations possible for this algorithm. In modern cryptography, it is assumed that all the secrecy of a cryptographic algorithm is concentrated in the key.

Explain the IT vendor selection and management processes

Answers

Answer:

The vendor management process includes a number of different activities, such as: Selecting vendors. The vendor selection process includes researching and sourcing suitable vendors and seeking quotes via requests for quotation (RFQs) and requests for proposal (RFPs), as well as shortlisting and selecting vendors. hope it helps

search for five ms excel terms

Answers

Answer:

work book, work sheet, cell, columns and rows

#Program to calculate statistics from student test scores. midterm_scores = [99.5, 78.25, 76, 58.5, 100, 87.5, 91, 68, 100] final_scores = [55, 62, 100, 98.75, 80, 76.5, 85.25] #Combine the scores into a single list all_scores = midterm_scores + final_scores num_midterm_scores = len(midterm_scores) num_final_scores = len(final_scores) print(num_midterm_scores, 'students took the midterm.') print(num_final_scores, 'students took the final.') #Calculate the number of students that took the midterm but not the final dropped_students = num_midterm_scores - num_final_scores print(dropped_students, 'students must have dropped the class.') lowest_final = min(final_scores) highest_final = max(final_scores) print('\nFinal scores ranged from', lowest_final, 'to', highest_final) # Calculate the average midterm and final scores # Hint: Sum the midterm scores and divide by number of midterm takers # Repeat for the final

Answers

Answer:

try this

Explanation:

#Python program for calculating avg

#Given data

m1 = [99.5, 78.25, 76, 58.5, 100, 87.5, 91, 68, 100]

f1 = [55, 62, 100, 98.75, 80, 85.25]

#combine scores

all_scores = m1 + f1

#number of m1 and f1

num_midterm = len(m1)

num_final = len(f1)

#find avg of scores

avg_midterm = sum(m1) / num_midterm

avg_final = sum(f1) / num_final

#print the avg

print("Average of the m1 score:",round(avg_midterm,2))

print("Average of the f1 score:",round(avg_final,2))

Which principle of layout design is shown below

Answers

…………………………………………………………..

In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise be too costly to compute in terms of run-time or memory resources. One routine example is the approximation of infinite series by a finite series that mostly captures the important behavior of the infinite series.
In this problem you will implement an approximation to the exp(x) as represented by the following infinite series,
exp(x) = Infinity n= 0 xn/xn!
Your approximation will be a truncated finite series with N + 1 terms,
exp(x, N) = Infinityn n = 0 xn/xn!
For the first part of this problem, you are given a random real number x and will investigate how well a finite series expansion for exp(x) approximates the infinite series.
Compute exp(x) using a finite series approximation with N E [0, 9] N (i.e. is an integer).
Save the 10 floating point values from your approximation in a numpy array named exp_approx. exp_approx should be of shape (10,) and should be ordered with increasing N (i.e. the first entry of exp_approx should correspond to exp(x, N) when N = 0 and the last entry when N = 9).

Answers

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

When determining the statement of purpose for a database design, what is the most important question to ask?
O Who will use the database?
O Should I use the Report Wizard?
O How many copies should I print?
O How many tables will be in the database?

Answers

Answer: A. Who will use the database?

Explanation:

When determining the statement of purpose for a database design,the most important question to ask is  Who will use the database?

What is the purpose of statement of purpose for a database ?

Statement of purpose in a data base is very essential to know more about the database, this is why it is important to ask the question Who will use the database?

This question help the programmer to know the kind of data that will be running at the database so as make sure the database serve the required purpose.

Therefore option A is correct.

Read more about database at:

https://brainly.com/question/518894

#SPJ9

In a spreadsheet what does the following symbol mean?

$

Answers

Answer:

$ = dollar sign

Explanation:

In a spreadsheet, the $ symbol is the symbol of the dollar. The dollar is the currency of the United States.

What is currency?

Currency is a form of payment for goods and services. In a nutshell, it is money in the form of paper and coins that is usually issued by a government and is generally accepted as a form of payment at face value.

Currency exchange rates differ between businesses because each one distorts the interbank rate to maximize profits. We encounter numerous competitors who post interbank rates internet as bait to attract new customers, but once the customers are onboard, they drastically change the rate, typically not in the customers' favor.

Therefore, the $ symbol represents the dollar in a spreadsheet. The US dollar is the country's currency.

To learn more about a dollar, refer to the below link:

https://brainly.com/question/23899116

#SPJ2

Write an interface called Shape, inside, there is a method double area(); write a class called Box which implements the Shape. In Box, there are two data members: a double called length, and a double called width. Also implements constructor, and the method area() which calculates the area by multiplying the length and width. Then write a Tester class, which has a main method and creates a box object and displays the area.

Answers

Answer:

Explanation:

The following code is written in Java. It contains the interface Shape, the class Box, and a tester class called Brainly with the main method. Box implements the Shape interface and contains, the instance variables, the constructor which takes in the inputs for length and width, getter methods for length and width, and the defines the area() method from the interface. Then the object is created within the Brainly tester class' main method and the area() method is called on that object. Output can be seen in the image attached below. Due to technical difficulties, I have added the code as a txt file below.

Understanding Join Types
Which join type will only include rows where the joined fields from both tables are equal?
O inner join
O left outer join
Oright inner join
O right outer join

Answers

Answer: inner join

Explanation:Edg. 2021

Write a test program that prompts the user to enter the number of the items and weight for each item and the weight capacity of the bag, and displays the maximum total weight of the items that can be placed in the bag. Here is a sample run:

Answers

Answer:

The program in Python is as follows:

n = int(input("Number of weights: "))

weights= []

for i in range(n):

   inp = float(input("Weight: "))

   weights.append(inp)

capacity = float(input("Capacity: "))

possible_weights = []

for i in range(n):

   for j in range(i,n):

       if capacity >= weights[i] + weights[j]:

           possible_weights.append(weights[i] + weights[j])

print("Maximum capacity is: ",max(possible_weights))

Explanation:

This gets the number of weights from the user

n = int(input("Number of weights: "))

This initializes the weights (as a list)

weights= []

This iteration gets all weights from the user

for i in range(n):

   inp = float(input("Weight: "))

   weights.append(inp)

This gets the weight capacity

capacity = float(input("Capacity: "))

This initializes the possible weights capacity (as a list)

possible_weights = []

This iterates through the weights list

for i in range(n):

   for j in range(i,n):

This gets all possible weights that can be carried by the bag

       if capacity >= weights[i] + weights[j]:

           possible_weights.append(weights[i] + weights[j])

This prints the maximum of all possible weights

print("Maximum capacity is: ",max(possible_weights))

Type the correct answer in the box. Spell all words correctly. Complete the sentence below that describes an open standard in video production. Today, video production has become digital, and all playback devices work on the open standard known as *blank* technology.​

Answers

Answer:

digital

Explanation:

Today, video production has become digital, and all playback devices work on the open standard known as digital technology.​


List any two programs that are required to play multimedia products
List any two programs that are required to create multimedia products​

Answers

Answer:

the two programs to play multimedia products are;windows media player and VLC media player and the two programs to create multimedia products are;photoshop and PowerPoint

The project downloaded contains a package (folder) named Q1 within the src folder. Inside Q1 is a Java class named Questions. The purpose of Question 1 is to examine your understanding of loops and branching conditions. You should implement all of your code for this question in the main method of the Questioni class. While significant detail is provided below to be sure you undertand what is required, please note that the amount of code required to solve this question (Parts a-c) is less than 10 lines (total). In the Question1 class, you are given a line of code that generates a random number between 0 and 1. Math.random(): //generates number between 0 and 1 val
You are to create a loop which, in each iteration, generates a new random value, assigns it to val using the line provided and checks to see if that val is greater than 0.5. If val is greater than 0.5, a variable named counter should be incremented. The loop should continue this process (generate random value, check if it is greater than 0.5) until a total of three random numbers generated are greater than 0.5 (values do not have to be consecutive). You should also use the variable named numIterations, which is included for you, to track how many iterations of your loop were required for you to generate three random numbers greater than 0.5. A printin() statement is included for you that displays the value of numlterations. As an example of how the program should behave, if the following sequence of random numbers are randomly generated from your loop
0.3, 0.7,0.2, 0.6,0.9
then numIterations would equal 5 (the third value greater than 0.5 occured on the fifth iteration).
If
0.6, 0.8, 0.75
was the random sequence of numbers generated by your loop, then numlterations would equal 3 (the third value greater than 0.5 occured on the third iteration).
These are two examples to illustrate the scenario given in Question 1. Since at each iteration of your loop the number generated is random, the value of numIterations that your program observes may be any value greater than or equal to 3. Note that your program does not need to print out each of the random values that it generates. The steps to solve Question 2 are broken down as follows.
a. Implement a branching condition that increases the variable counter by 1 if val is larger than 0.5 1
b. Add a loop around the code created in Part a that continues until counter equals 3.
c. Use the variable numlterations to count how many times your loop iterates.

Answers

Answer:

ok where do i put anwaer?

Explanation:

Why is it important to isolate evidence-containing devices from the internet?
To save the battery
To hide their location
Devices can be remotely locked or wiped if connected
It is not important to isolate the devices

Answers

Answer:

C.

Devices can be remotely locked or wiped if connected

Explanation:

What characteristics should be determined to design a relational database? Check all that apply.
the fields needed
the tables needed
the keys and relationships
the purpose of the database
all of the tables in the database
all of the records in the database
the queries, forms, and reports to generate

Answers

Answer: 1,2,3,4,7

Just took it (:

New cars use embedded computers to make driving safer

Answers

Answer:

true.......................

New cars use embedded computers to make driving safer. The given statement is true.

What is RAM?

The word RAM stands for random-access memory and it is known as memory of short term where data is stored and as required by the processor. This is not there to deal with long term data and it is working after the computer turned off.

Generally, there are three types of RAM and these are SRAM, ECC, and DRAM. The SRAM stands for static random memory, and DRAM stands for dynamic access memory.

CPU stands for central processing unit and commonly it is known as brain of the computer, the main function of CPU is to control the function of the computer or system and it gives command to the parts of computer.

Therefore, New cars use embedded computers to make driving safer. The given statement is true.

Learn more about RAM and CPU here:

brainly.com/question/21252547

#SPJ2

For this assignment your are to implement the Pet Class described in Programming Exercise 1, starting on page 494 in our textbook. Additionally your program will allow users to enter the pet's information until the user enters in the string "quit". Once the user enters quit the program will print out a summary of all the information that has been entered. Your program should not assume any maximum number of pets that can be added. Items in blue designate output. Items in red designate computer input. Example Test Case: Enter name, type and age of your pet: Name: Momo Type: Bird Age: 33 Enter "quit" to stop entering. Anything else to continue. a Enter name, type and age of your pet: Name: Pooh Type: Dog Age: 8 Enter "quit" to stop entering. Anything else to continue. quit SUMMARY: Name: Momo, Type: Bird, Age: 33. Name: Pooh, Type: Dog, Age: 8.

Answers

Answer:

ohhhvhhffifyuddfuiicfdguc

Complete the statement below using the correct term.
One recurring problem in networking is finding that users have used a hub or a switch to circumvent a
________

Answers

Answer:

HURRY

Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.

Part A

Explain how each of the following concepts applies to Dr. Khan’s research.

Survey

Dependent variable

Big Five theory of personality

Part B

Explain the limitations of Dr. Khan’s study based on the research method used.

Explain what Dr. Khan’s research hypothesis most likely was.

Part C

Use the graph to answer the following questions.

How did the trait of agreeableness affect how people responded to the new ad campaign?

How did the trait of conscientiousness affect how people responded to the new ad campaign?

How should work be allocated to the team in a Scrum project?

Answers

Answer:

In a Scrum project, the work or the tasks are not allotted specifically. The Scrum Master is not allowed to assign tasks to the team members under any circumstance. Once the client provides the details regarding their requirements in detail, the tasks are distributed based on the expertise and skills of the employee.

Explanation:

Who is MrBeast?
Answer the question correctly and get 10 points!

Answers

Answer: MrBeast is a y0utuber who has lots of money

Explanation:

Answer:

He is a You tuber who likes to donate do stunts and best of all spend money.

It's like he never runs out of money.

Explanation:

I am a bunch of large LANS spread out over several physical locations. Who am I?

Answers

Answer:

You're WAN

Explanation:

Wide Area Network

Suppose that a minus sign in the input indicates pop the stack and write the return value to standard output, and any other string indicates push the string onto the stack. Further suppose that following input is processed:
this parrot - wouldn't voom - if i put -- four thousand --- volts - through it -
What are the contents (top to bottom) left on the stack?
a. through wouldn't this.
b. this wouldn't through.
c. it through wouldn't.
d. it through volta.
e. volts through it.

Answers

Answer:

e. volts through it

Explanation:

volts through it

The contents (top to bottom) left on the stack is volts through it. Thus, option E is correct.

What is standard output?

When a computer program begins execution, standard streams are interconnected input and output channels of communication between the program and its surroundings. The three I/O connections are known as standard input (stdin), standard output (stdout), and standard error (stderr).

A negative sign in the input indicates that the stack should be popped, and the return value should be sent to standard output, whereas any other string means that the string should be pushed into the stack. Assume that the following input is processed: this parrot would not voom if I pushed — four thousand —- volts - through it.

The contents of the stack (from top to bottom) are volts via it. As a result, option E is correct.

Learn more about standard output here:

https://brainly.com/question/30054426

#SPJ5

Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value with no sign. For example, the absolute value of -5 is 5, and the absolute value of 2 is 2. Test the template in a simple driver program being sure to send the template short, int, double, float, and long data values.

Answers

Answer:

The function in Java is as follows:

public static double func(double num){

       num = Math.abs(num);

       return num;

   }

Explanation:

This defines the function

public static double func(double num){

This determines the absolute function of num

       num = Math.abs(num);

This returns the calculated absolute value

       return num;

   }

Other Questions
HelpSurvival during the most challenging times If an offender is required to pay a victim money, it is calleda. a fine.b. restitution.c. incarceration.d. asset forfeiture. Gerunds, infinitives, and participles are types ofO conjunctionsO predicatesO verbals You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app. Problem: Prove the following: (a) Suppose that a; b > 0. If a < b; then a2 < b2: (b) Suppose that a; b > 0. If a2 < b2; then a < b: Find the area of the composite figure.A. 65.1 sq in B. 90.3 sq in C. 106.3 sq in D. 241.1 sq in write 7.5^{1.25} as a radical Why do you think America wanted to bomb Tokyo, Japan so badly after the Japanese attack on Pearl Harbor? What two numbers equal 6 when multiplied but equal 7 when added? For a thing in spanish i have to write something and i need to now some thing i like to do after school what do yall like to do. Austin drove 819 miles in 13 hours. At the same rate, how long would it take him to drive 693 miles? Which equation describes the circlewith center (5,-1) and radius 7?A (x - 5)' + (y +1)* = 7B (x - 5)* + (y + 1)* = 49(x + 5) * + (y - 1) = 7D(x + 5)' + (y - 1)' = 49 As if merely ___________ according to his self-imposed rules werent strenuous enough Each girl on a cheerleading squad bought a bear. The leader paid for their cheerleading outfits for each of them. She spent $175. Write and solve an equation to find how many cheerleading outfits, c, the leader bought. Cheerleading outfit cost- $12.50 When did WWII end and how? Sixteen percent of videos are shorter than whatlength?The graph shows the distribution of the lengths (inseconds) of videos on a popular video streaming site.The distribution is approximately Normal, with a meanof 264 seconds and a standard deviation of 75seconds.O 39 secondsO 114 secondsO 189 secondsO 339 secondsStreaming Videos I literally forgot how to do this plz help ASAP 1)Which word most logically connects these two sentences?The couple arrived at the prom two hours late. They were not allowed to participate in the activities especiallyorganized for seniors.ng50A)consequentlyB)howevermeanwhileD)nevertheless Weight/Calories per Day 1000 to 1500 cal. 1500 to 2000 cal. 2000 to 2500 cal. Total 120 lb. 90 80 10 180 145 lb. 143 35 25 203 165 lb. 15 27 75 7 117 Total 140 250 110 500 Based on the data in the two-way table, what is the probability that a person weighs 120 pounds, given that he or she consumes 2,000 to 2,500 calories per day? A. 0.09B. 0.12C. 0.22D. 0.35 i need a paragraph of the movie "The Giver". can someone please help me.