Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9

Answers

Answer 1

Answer:

(a) [tex]\bar x_1 = 43.7[/tex]     [tex]\bar x_2 = 30.25[/tex]

(b) [tex]\sigma_1 = 16.93[/tex]    [tex]\sigma_2 = 7.14[/tex]

(c) Smoking increases the time to fall asleep

Explanation:

Solving (a): The sample mean of each group

Mean is calculated as:

[tex]\bar x = \frac{\sum x}{n}[/tex]

So, we have:

Smokers

[tex]n_1= 12[/tex] and

[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]

[tex]\bar x_1 = \frac{524.4}{12}[/tex]

[tex]\bar x_1 = 43.7[/tex]

Non Smokers

[tex]n_2 = 15[/tex] and

[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]

[tex]\bar x_2 = \frac{453.8}{15}[/tex]

[tex]\bar x_2 = 30.25[/tex]

Solving (b): The standard deviation of each group

This is calculated as:

[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

For smokers

[tex]n_1= 12[/tex]

So:

[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]

[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]

[tex]\sigma_1 = \sqrt{286.5491}[/tex]

[tex]\sigma_1 = 16.93[/tex]

For non-smokers

[tex]n_2 = 15[/tex]

So:

[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]

[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]

[tex]\sigma_2 = \sqrt{50.9469}[/tex]

[tex]\sigma_2 = 7.14[/tex]

Solving (c): Impact of smoking on time to sleep

In (b), we have:

[tex]\sigma_1 = 16.93[/tex] --- smokers

[tex]\sigma_2 = 7.14[/tex] --- non-smokers

Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.


Related Questions

what is the most improved Android robot​

Answers

Answer:

They are the humanoid robots.

A collection of wiress connecting the CPU with main memory that is used to identify particular location is called

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

What is CPU?

The electronic equipment that carries out the instructions included in a computer program is known as a central processing unit (CPU), sometimes known as a central processor, main processor, or simply processor.

The CPU executes fundamental mathematical, logical, controlling, and input/output (I/O) activities as directed by the program's instructions. In contrast, specialized processors like graphics processing units and external components like main memory and I/O circuitry (GPUs).

Although CPUs' shape, design, and implementation have evolved throughout time, their basic function has remained mostly same. The arithmetic-logic unit (ALU), which performs arithmetic and logic operations, processor registers.

Therefore, Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/16254036

#SPJ5

After migrating the company’s entire datacenter infrastructure to a private IaaS solution, while at the same time maintaining the current network and server logical configuration, the IT director eliminated 50% of the IT engineering staff. The remaining staff has now shifted focus from a daily server maintenance and upkeep role, to more of a service provisioning, performance, and reporting role. Which of the following was MOST impacted by this migration?
A. Service design
B. Service strategy
C. Service operation
D. Service transition

Answers

Answer: C. Service operation

Explanation:

Based on the information given in the question, the service operation will be mostly impacted by the migration.

Service operation simply means the day-to-day activities, and processes which are responsible for the delivery of value through technology to the business.

Since the the company’s entire datacenter infrastructure has been migrated to a private IaaS solution, this will affect the service operation.

Drag each tile to the correct box.
Match the visual elements of design to the effect they produce.

Answers

Answer:

Creates order and harmony → color

Creates an emotional impact → texture

Brings a feeling of depth to a design → form

Draws or minimizes attention → space

Divides space and redirects the eye → shape

Explanation:

The visual element that creates order and harmony is color

Color can be used to create visible patterns that can be recognized as being in harmony or disagreement

The visual element that creates emotional impact is texture

Texture can be used to convey either the emotions of the object or the artist

The visual element that brings a feeling of depth to a design is form

Form is used to present a 3-D appearance of an art, and therefore, it is used to show depth of a 2-D drawing

The visual element that draws or minimizes attention is space

The arrangement, location, and size of the space occupied by an object can be used to draw or minimize attention

The visual element that divides space and redirects the eye is shape

Shape is used to divide space into areas easily recognizable by the eye

Anyone help me on this ?

Answers

Answer:

The first one is Mobile Marketing Second Box is social media and the last is Search engine

Explanation:

What is the primary function of RAM?


What is the basic unit of measurement for RAM specs?


A computer with sufficient RAM will be able to

with greater ease.


What can you do if a computer is running slowly and you suspect it is because you have insufficient

RAM?


How many bits are in one computer byte?





those questions have a drop-down box.

Answers

Answer :

1 . Stores Information temporarily

2 . byte

3 . switch between applications

4 . upgrade the RAM

5 . 8

JUST DID IT (Edge 2021)

2) The CPU is made from a silicon
b) Chip
C) pendrive
a) Steel

Answers

Answer:

b

Explanation:

a cpu is made from silicon chip

Define the followimg terms as it relates to coding.

Expression

Variable

Assignment operator​

Answers

Answer and Explanation:

In coding, an expression is used to represent values. It may contain variables and/or constant.

Examples of expressions are:

[tex]a - b[/tex]     [tex]a * 2[/tex]     [tex]4 - 3[/tex]

Variables are literally memory locations. They are used to storing values, and they assume the values they store during program execution.

At any point in the program, the value of the variable can be changed.

Lastly, there are guidelines that follow naming variables (depending on the programming language).

Examples of accepted variable names (in C++) are:

num, num_1, num1

Assignment operator

This is the = sign. It is used for assigning values to variables.

Examples of how it is used are:

[tex]num1 = a - b[/tex]

[tex]num\_1 = a*2[/tex]

[tex]num = 4 - 3[/tex]

The following is a wrong usage of the operator

[tex]4 - 3 = num[/tex]

As a basic user of SAP Business One, which feature of the application do you like most? Elaborate on your answer.

Answers

Answer:

Accounting and financial management

Explanation:

The feature of SAP Business One I like most is "Accounting and financial management"

This is because as a new user I always find it helpful as SAP Business One, assists me in perfecting and automating the financial administration of my small business by using the business software algorithms that easily incorporate and combine accounting, sales, and purchasing data.

Generally, the Accounting and financial management features assist me in enhancing margins, decrease or totally remove errors, and helps in the process of taking efficient short-term and long-term decisions.

How do you constrain a background to only appear behind an elements content?

○ background-clip: content

○ background-clip: content-box

○ background-origin: content

○ background-origin: content-box​

Answers

Answer:

Background-origin: Content-box

Explanation:

On CSS, the background-clip command specifies to what extent the background color or image appears in relation to the padding or content of an element

When the setting is background-clip: content-box, where the background is applied in only behind the content of the element, such that the element's border and the element's padding do not have a background color. However, the background extends to the margin of the content.

Recently mobile phones have been used to pay for goods in stores and supermarkets.

One methodof payment involves holding the phone close to a reader in the store.Discuss the advantages and disadvantages of this method of payment compared with other methods of credit/debit card transactions.

Answers

Answer:

The advantages of using mobile phones to pay for goods in stores are;

1) The ability to pay for goods and/or services without having to carry a physical wallet, thereby making payments faster, more convenient, and safer as the contents of a money wallet or purse cannot be seen

2) The generation of security codes for each transactions, the use of PIN input and finger sprint scanning for payment, ensures access to payment authorization is limited and requires definitive authentication and that payment transactions will not need to be scrutinized by merchants to detect fraudulent transactions

3) Paying with the mobile phone increases privacy as the card used for payment will be known only to the person doing the payment, thereby a person can use a credit card with low limit without displaying them

The disadvantages of using mobile phones to pay for goods in stores includes;

1) The possibility of breach in security of the mobile phone during payment. Sensitive information of the mobile phone can be collected during payment and then used in other places without the permission of the owner of the phone

2) Mobile phone payment may not be suitable to people who prefer card or cash payment

3) The different mobile phone payment applications and platforms are not entirely compatible and can lead to payment challenges

Explanation:

In order to preview an attachment in an e-mail, click the attachment in the ______
Pane.

Help ASAP!!!!

Answers

Answer:

preview

Explanation:

plz mark it as brainliest answer as it will also give you 3 pts

Answer: I love you, I hope you figured it out. Thank your for being alive.

Explanation:

5. Lael is always on the lookout for students who might be interested in running for office in student groups. In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to office in a student group, and if not, whether that student meets the qualifications to run in the future: a. If the value in the Elected column is equal to the text "Yes", the formula should display Elected as the text. b. Otherwise, the formula should determine if the value in the Finance Certified column is equal to the text "Yes" and return the text Yes if true And No if false

Answers

Solution :

It is given that Lael always looks out for the students who are interested in running for the office in a student group.

We use an excel sheet to determine whether a student had already elected to the office of the student group or not.

The formula used for the excel sheet used is :

[tex]$=IF(EXACT(K3,"Yes")."ELECTED", "Yes",IF(K3,'Yes),"Yes","No"))$[/tex]

                K                        L                             M                    N          

   Elected group    Finance certificate            

          Yes                    Yes                              Yes

          No                     Yes                               Yes

          No                      No                                No

Find the check digit for the ISBN ‎978147180930

Answers

Answer:

The check digit is 9

Explanation:

An ISBN (International Standard Book Number) is a 10- or 13-digit number used to uniquely identify a book.

The ISBN contains a very important digit called the check digit.

The check digit of an ISBN is very important as it helps in preventing errors in transmission.

When an ISBN is entered into an ISBN reader, the check digit of the ISBN is compared with the check digit calculated from the other digits of the ISBN. If these two digits match, then there is very high chance that the ISBN is correctly entered.

For example, if an ISBN, say, 9781681972718 is entered into the reader,

i. the inputted check digit is the last digit which is 8

ii. the calculated check digit by the reader will also come up with 8.

iii. since the two values match, then the ISBN has actually been entered correctly.

If however, the entered ISBN number was 9781861972718, then,

i. the inputted check digit is the last digit which is 8

ii. the calculated check digit by the reader will also come up with 2.

iii. since the two values do not match, then the ISBN has actually been entered incorrectly.

To calculate the check digit of an ISBN, the steps are;

i. The first 12 digits of the number are taken.

In our case,

the digits are: 978147180930

ii. Multiply the first digit by 1, the second by 3, the third by 1, the fourth by 3 ... in that format until the twelfth digit which will obviously be multiplied by 3.

9 x 1 = 9

7 x 3 = 21

8 x 1 = 8

1 x 3 = 3

4 x 1 = 4

7 x 3 = 21

1 x 1 = 1

8 x 3 = 24

0 x 1 = 0

9 x 3 = 27

3 x 1 = 3

0 x 3 = 0

iii. Find the sum of the answers in (ii) above

9+21+8+3+4+21+1+24+0+27+3+0 = 121

iv. Find the modulo 10 division of the result in (iii). This is just the remainder when the result is divided by 10.

121 mod 10 = 12 remainder 1

v. If the remainder as calculated in (iv) is zero, then the check digit is 0. If otherwise, subtract the remainder from 10 and the result will be the check digit.

The remainder is 1 which is not zero. Therefore, the check digit is

10 - 1 = 9

The check digit is 9 and

the complete ISBN number will be 9781471809309

You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network. You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network. Which tasks should you complete as a part of this milestone? (Select two.) Correct Answer:

Answers

Answer: • Physically secure high-value systems

• Identify and document each user on the network

Explanation:

To develop a manageable network plan, the milestones include:

• prepare to document

• mapping network,

• protect your network

• network accessibility

• user access etc...

When identifying ways to protect the network, the tasks that should be completed are:

•®Physically secure high-value systems

• Identify and document each user on the network

The one who will defeat me in this typing race I will mark the one brainliest:
Just say yes I will send you the link and search for that link in your browser

Answers

Answer:

yes

Explanation:

can you send the link....

Answer:

givee??

Explanation:

list five function key
list two alphabet key
byEmmanuel okorie​

Answers

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

list any three positive impacts of computer technology in our society?

Answers

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)

Please please help me
3. Which of the following are the tips for safe internet browsing?

Customize your security settings.
Turn on Two-Factor Authentication whenever possible.
Bookmark important sites.
O All of the above

Answers

Answer:

increase your browser security settings

The tips for safe internet browsing is to customize your security settings. The correct option is A.

What is internet browsing?

Browsing means searching or exploring the internet. Nowadays, people search on the internet for getting information about something. It needs a computer or an electronic device in which there is access to the internet.

Internet is a wireless connection of various computers together. There are different types of internet connections, like Wi-Fi, hotspot, wire internet, etc. It is used in various things like studying, watching movies, etc. which is necessary for this current time.

Safe internet browsing means being safe from internet crimes, like cyber crimes and saving the computer from viruses, and saving your data on the computer. Do not open unknown sites and emails.

Thus, the correct option is A. Customize your security settings.

To learn more about internet browsing, refer to the link:

https://brainly.com/question/9909761

#SPJ5

You are calculating commissions for sales staff at work. Employees receive ten dollars for every item sold. Your boss also wants to know the grand total paid to all employees as commission. How would you set this up in an Excel workbook and would you use absolute references, relative references, or both?

Answers

Answer:

To find the grand total paid to all employees as commission, we note the following;

The amount received by employees as commission for each item sold, r = $10.00

The information the boss wants to know = The grand total paid to all employees as commission

Let 'n' represent the the total sales, we have;

The grand total commission = Total sales × Commission

1) On MS Excel, four columns are created, labelled, Serial number, Employee Name, Number of Items Sold, Commission

2) In the second row, in the cell under the Commission column heading, Input the formula '=(Cell reference of adjacent Number of Items Sold) × 10' in the cell

3) Copy the the above formula to all the cells in the Commission column by clicking on the cell containing the formula, moving the mouse to the bottom right corner of the cell, and when the mouse pointer changes to a cross sign, left click and hold and drag to all the cells in the column

4) Input the formula =SUM(Argument) in the blank cell below the created Commission list

Where;

Argument = The reference to the range of cells containing the values in the Commission column

5) The output of the =SUM formula is the grand total paid to employees as commission

Explanation:

Please help!! I dont need the answer i just need explaining on how to do this!!!!

Answers

Explanation:

There are only two inputs to the circuit, and one output. There is an internal signal, not an input, between the inverter and the AND gate.

Here, it is convenient to label the top input A, the inverter output B, and the bottom input C. Of course, the output is labeled D.

Then B is the logical inverse of A, and D is the AND of B and C.

_____

Check for you

D will only be 1 for A=0 and C=1. It will be 0 otherwise.

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

Learning Task 1 Write YES if the statement is correct and NO if it is incorrect.

1. Fruit orchards include any facility focused on growing cashew,almond and cacao.

2. Seed orchards focus primarily on growing trees that produceseeds rather than nuts or fruit.

3. Orchard is a piece of land where herbs are maintained for commercial production

4. Cashew, almond and cacao are plants found in the fruit orchard.

5. Papaya and mango orchards are example of Fruit Orchard.​

(ayusin nyo naman po malapit na po yung pasahan namin

Answers

Answer:

1) YES

2) YES

3) YES

4) NO

5) YES

In the Learning Task given above, the response are:

YESYESYES NO YES

What is Orchard?

An orchard is known to be a kind of plantation that is made up of trees or shrubs done or kept for food production.

Note that Fruit orchards include any facility focused on growing cashew, almond and cacao.

Learn more about orchards  from

https://brainly.com/question/11642092

#SPJ2

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Which of the following best explains how symmetric encryption are typically used?

Answers

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

The option that best  explains how symmetric encryption are typically used is; A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Understanding Symmetric Encryption

Symmetric encryption is one of the oldest and best-known technique which makes use of secret key that could be a number, a word, or just a string of random letters, applied to the text of a message in order to change the content in a particular way.

Symmetric encryption involves the use of a key, which is known as the Symmetric Key which contains a series of numbers and letters.

Finally, Symmetric Key is used to encrypt a message as well as the same key is also used to decrypt it.

Looking at the given options from online, the correct option is A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Read more about symmetric encryption at; https://brainly.com/question/20262508

Investigar cuáles son los Sistemas Operativos más utilizados en la actualidad. ¿cuáles son las características principales de cada uno? Ventajas y Desventajas.

Answers

Answer:

Un sistema operativo es un programa de computadora o colección de programas de computadora que tiene como objetivo facilitar el uso de una computadora, proporcionando el enlace entre el hardware de la computadora y los programas de aplicación que el usuario desea ejecutar en la computadora. El sistema operativo es responsable de la gestión del hardware central, la coordinación de las actividades informáticas y la distribución de recursos en la computadora. Puede verse como lo "básico" de la computadora: un conjunto estandarizado de reglas que determina cómo los programas y los usuarios pueden usar las diferentes partes de la computadora.

Los sistemas operativos modernos comunes incluyen Microsoft Windows, Mac OS, Linux, BSD y Solaris. Microsoft Windows tiene una fuerte participación de mercado dominante para computadoras de escritorio y portátiles. Sin embargo, las computadoras que se usan como servidores ejecutan con mayor frecuencia Linux u otros sistemas similares a Unix.

Scientists have put genes into potato plants to make vaccines against cholera and hepatitis B.This type of research is called

Answers

Answer:

Edible vaccines

Explanation:

In the recent years, biotechnologist have developed a new concept known as the edible vaccines. The Edible vaccines are a subunit vaccines. Here the selected genes are first introduced into the plants and then the transgenic plant is induced to make the encoded protein. Foods like potato, corn, banana, soybean, lettuce, legumes and rice are used for these applications.

These edible vaccines can reduce diseases like the cholera, Hepatitis-B, diarrhea and other disease.

A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.


Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

DISPLAY(numFreezing/numDays)

}

B.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

C.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp < 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

D.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

numDays ← numDays + 1

}

}

DISPLAY(numFreezing/numDays)

Answers

Answer:

B.

Explanation:

The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.

numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

Other Questions
help me please: tan3x-tanx-1=0 can somebody help plz If the word rudiment is defined as a fundamental principle or skill, and the suffix -ary is defined as "of or relating to, what does the term rudimentary education mean?the education necessary for getting a joba manual educationan education gained through hard worka basic education A model train is built at a scale of 1 to 60. If the model train is 10 inches long, how many feet long is the actual train? fungsionalisme adalah? I need help pls and thank you Jax earned 144 points on a research project. In this situation, what is the number 144? Group of answer choices data information knowledge output What do the excerpts have in common? Both point out the tragic nature of situations in which children make journeys without their parents. Both describe what immigrant children must do to survive when traveling to the United States. Both explain why most children want to leave Central America without their parents. Both indicate the tragic problems and their consequences that children in Central America must face. Find The Surface Area And Volume Of A Sphere Whose Radius Is 5.6ml Which equation describes the line graphed above? What adaptation of vines help them grow on other plants in order to get more sunlight?a plant growing on a tree trunk Flexible stems Large leaves Strong roots Thick bark what is the role of the controlling tube The diagram shows a man standing next to a dinosaur.Estimate the height of the dinosaur. Write an equation. Let x be the unknown number. 10 is the sum of three and twice a number What is sin(51)?A. 0.51B. 1.23C. 0.78D. 0.63 How are laws of supply and demand similar Which side claimed victory for the Battle of Shiloh?neither the North nor the South.both the North and South.the South.the North. In a wish in the dark who is not connected to in chapter 30-33 Match the following.1. the energy lost to disorder 2. related to or possessing motion 3. all of the chemical reactions in an organism required for maintenance of the processes of life 4. possible; ability to go into action or perform work 5. the study of energy and its transformations kinetic metabolism entropy potential thermodynamics Please help me. I feel really confused and I have no clue on what to do