4.Write a JavaScript program to find if a given word is a palindrome or not. Word is given by user via prompt command.

Answers

Answer 1

Answer:

Here is the JavaScript program:

function Palindrome(word) {

   return word == word.toLowerCase().split("").reverse().join("") ? true : false; }

inputWord = prompt("Enter a word to check its if its palindrome or not?");  

alert(Palindrome(inputWord));

Explanation:

The function Palindrome takes a word as argument.

 return word == word.toLowerCase().split("").reverse().join("") ? true : false; }

This statement first converts the word, which is a string to lower case letters using toLowerCase() method. Next split() method splits the word string into an array of strings, then reverse() method reverses the this array and join() method joins all the elements of the array back to the string. At last the conditional statement checks if the resultant string (reverse of word) is equal  to the original word (that was input by user). If both the word and its reverse are equal/same then the program outputs true otherwise returns false.

inputWord = prompt("Enter a word to check its if its palindrome or not?");   statement uses prompt command to take input from the user. inputWord holds the word that user enters.

alert(Palindrome(inputWord)); statement calls Palindrome() method by passing the inputWord (word entered by user) to check if the input word is a palindrome or not. alert() method displays an alert box ( a message) with true if the inputWord is a palindrome otherwise it displays false.


Related Questions

A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long file names. Can something approximating a hierarchical file system be simulated? How?

Answers

Answer:

Yes

Explanation:

Yes, something approximating a hierarchical file system be simulated. This is done by assigning to each file name the name of the directory it is located in.

For example if the directory is UserStudentsLindaPublic, the name of the file can be UserStudentsLindaPublicFileY.

Also the file name can be assigned to look like the file path in the hierarchical file system. Example is /user/document/filename

12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).

Answers

Answer:

1. Divide each bonus by regular bonus apply this to all the data

2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Explanation:

The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.  

After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}

Answers

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The function adds offsetAmount to each of the first two parameters. Make the first two parameters pass by pointer. Sample output for the given program:

Answers

Answer:

Here is a UpdateTimeWindow() method with parameters timeStart, timeEnd, and offsetAmount

// the timeEnd and timeStart variables are passed by pointer

void UpdateTimeWindow(int* timeStart, int* timeEnd, int offsetAmount){

// this can also be written as  *timeStart = *timeStart + offsetAmount;

*timeStart += offsetAmount;  //adds value of offsetAmount to that of //timeStart

// this can also be written as  *timeEnd = *timeEnd + offsetAmount;

  *timeEnd += offsetAmount;  } //adds value of offsetAmount to that of //timeEnd

Explanation:

The function has three int parameters timeStart, timeEnd, and offsetAmount.

First two parameters timeStart and End are passed by pointer. You can see the asterisk sign with them. Then in the body of the function there are two statements *timeStart += offsetAmount; and *End+= offsetAmount; in these statements the offsetAmount is added to the each of the two parameters timeStart and timeEnd.

How would you represent a single cyan-colored pixel in Base64 encoding? (Hint: first think about how to represent cyan as a three-byte binary number, and then do the Base64 encoding from the lecture.)

Answers

Answer:

The answer is "AP//"

Explanation:

In the given question choices were missing so, the correct choice can be defined as follows:

The 3-bit color description of 'CYAN' is 011 if we convert it into 3- byte binary representation, we get,  the 3- byte binary representation that is equal to 011 =  00000000 11111111 11111111  and to split the 3-byte description into 6-bit subset to transform into Base64. so, we get:  000000 001111 111111 111111

if we have the Base64 alphabet table to convert the 6-bit representation towards its comparable letter or character by the 6-bit subgroup, that can be defined as follows:

In 000000  the decimal value is = 0, which is equal to Base64 character is ='A' . In 001111 the decimal value is = 15, which is equal to Base64 character is= 'P'  The 111111, its decimal value is = 63, in the Base64 its character is = '/' The 111111, its decimal value is = 63, in the Base64 its character is = '/'

A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)
A. LCD power inverter
B. AC adapter
C. Battery
D. Processor
E. VGA card
F. Motherboard
G. Backlit keyboard
H. Wireless antenna

Answers

Answer:

A, B and C

Explanation:

When talking about a computer or laptop charging, there are ONLY 3 things that matter.

The Battery - This is where the electricity or "wall juice" is stored.

AC Adapter - This is how the Battery gets its juice, it plugs into the computer itself.

LCD Power Adapter - This plugs into the wall to pull the electricity from the grid into your computer passing through AC Adapter.

On a side note... the most logical reason the computer could not be going over 15% nor charge anymore than 30mins is because the battery has been shortened by either a storm or a power surge.

What physical security measure is used to ensure that portable devices will be more difficult to steal?
O Cable lock
O Password
O PIN
O VPN

Answers

Cable lock, key word “physical”.

A portable gadget is any equipment that may be transported conveniently. The correct option is A.

What is a portable device?

A portable gadget is any equipment that may be transported conveniently. It is a computer device with a compact form factor that is meant to be handled and utilized in the hands.

The physical security measure that is used to ensure that portable devices will be more difficult to steal is a Cable lock.

Hence, the correct option is A.

Learn more about Portable Device:

https://brainly.com/question/11213213

#SPJ2

The mathematical constant Pi is an irrational number with value approximately 3.1415928... The precise value of this constant can be obtained from the following infinite sum:
Pi^2 = 8+8/3^2+8/5^2+8/7^2+8/9^2+...
(Pi is of course just the square root of this value.)
Although we cannot compute the entire infinite series, we get a good approximation of the value of Pi' by computing the beginning of such a sum. Write a function approxPIsquared that takes as input float error and approximates constant Pi to within error by computing the above sum, term by term, until the difference between the new and the previous sum is less than error. The function should return the new sum
>>>approxPIsquared(0.0001)
9.855519952254232
>>>approxPIsquared(0.00000001)
9.869462988376474

Answers

Answer:

I am writing a Python program:

def approxPIsquared(error):

   previous = 8

   new_sum =0

   num = 3

   while (True):

       new_sum = (previous + (8 / (num ** 2)))

       if (new_sum - previous <= error):

           return new_sum

       previous = new_sum

       num+=2    

print(approxPIsquared(0.0001))

Explanation:

I will explain the above function line by line.

def approxPIsquared(error):  

This is the function definition of approxPlsSquared() method that takes error as its parameter and approximates constant Pi to within error.

previous = 8     new_sum =0      num = 3

These are variables. According to this formula:

Pi^2 = 8+8/3^2+8/5^2+8/7^2+8/9^2+...

Value of previous is set to 8 as the first value in the above formula is 8. previous holds the value of the previous sum when the sum is taken term by term. Value of new_sum is initialized to 0 because this variable holds the new value of the sum term by term. num is set to 3 to set the number in the denominator. If you see the 2nd term in above formula 8/3^2, here num = 3. At every iteration this value is incremented by 2 to add 2 to the denominator number just as the above formula has 5, 7 and 9 in denominator.

while (True):  This while loop keeps repeating itself and calculates the sum of the series term by term, until the difference between the value of new_sum and the previous is less than error. (error value is specified as input).

new_sum = (previous + (8 / (num ** 2)))  This statement represents the above given formula. The result of the sum is stored in new_sum at every iteration. Here ** represents num to the power 2 or you can say square of value of num.

if (new_sum - previous <= error):  This if condition checks if the difference between the new and previous sum is less than error. If this condition evaluates to true then the value of new_sum is returned. Otherwise continue computing the, sum term by term.

return new_sum  returns the value of new_sum when above IF condition evaluates to true

previous = new_sum  This statement sets the computed value of new_sum to the previous.

For example if the value of error is 0.0001 and  previous= 8 and new_sum contains the sum of a new term i.e. the sum of 8+8/3^2 = 8.88888... Then IF condition checks if the

new_sum-previous <= error

8.888888 - 8 = 0.8888888

This statement does not evaluate to true because 0.8888888... is not less than or equal to 0.0001

So return new_sum statement will not execute.

previous = new_sum statement executes and now value of precious becomes 8.888888...

Next   num+=2  statement executes which adds 2 to the value of num. The value of num was 3 and now it becomes 3+2 = 5.

After this while loop execute again computing the sum of next term using       new_sum = (previous + (8 / (num ** 2)))  

new_sum = 8.888888.. + (8/(5**2)))

This process goes on until the difference between the new_sum and the previous is less than error.

screenshot of the program and its output is attached.

When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate

Answers

Answer:

Verifying digital signature

Explanation:

In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.

There is a function we are providing in for you in this problem called square. It takes one integer and returns the square of that integer value. Write code to assign a variable called xyz the value 5*5 (five squared). Use the square function, rather than just multiplying with *. Save

Answers

Answer:

xyz = 25  

result = square(xyz)

print(result)

The above code assigns the value 25 to variable xyz as 5*5=25. Then next statement is a function call to square() function passing xyz to this function in order to compute the square of 25. The output is:

625

Explanation:

The above code can also be written as:

xyz = 5*5

result = square(xyz)

print(result)

The difference is that xyz is assiged 5*5 which is equal to 25 so the output produced will be the same i.e.  625.

The result variable is used to store the value of square of 25 after the square() method computes and returns the square of 25. So print(result) prints the resultant value stored in the result variable i.e. 625

How to set up a simple peer-to-peer network using a star topology?

Answers

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

Each common network setups network unit, such as a firewall, switch, as well as computer. The main network computer serves as either a server as well as the peripheral system serves as just a client.

Suppose that you have a class called Student that is defined in student.h file. The class is in a namespace called fhsuzeng. Fill in the following blanks for the structure of the header file student.h.

#ifndefine STUDENT_H
______________
namespace _______
{
___________Student
{
};
}
_____________________

Answers

Answer:

u r

Explanation:

dumb

It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False

Answers

the answer is a. true
I think the answer is A

SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False

Answers

Answer:

False.

Explanation:

SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.

Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.

The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).

Generally, SONET comprises of four functional layers and these are;

1. Path layer

2. Line layer.

3. Section layer.

4. Physical or Photonic layer.

The SDH comprises of four synchronous transport modules and these are;

1. STM-1: having a basic data rate of 155.52Mbps.

2. STM-4: having a basic data rate of 622.08Mbps.

3. STM-16: having a basic data rate of 2488.32Mbps.

4. STM-64: it has a basic data rate of 9953.28Mbps.

These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.

differentiate between web site and web application?

Answers

Explanation:

A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.

Answer:

Explanation:

A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.

You are in a library to gather information from secondary sources, and you want to find a current print resource that can supplement information from a book. What source should you use

Answers

Answer:

Periodical Literature

Explanation:

In this specific scenario, the best source for you to use would be the periodicals. Periodical Literature is a category of serial publications that get released as a new edition on a regular schedule, such as a magazine, newsletters, academic journals, and yearbooks. Some real-life examples include Sports Illustrated, Discovery, or even Time Magazine. These periodical literary sources all provide up to date data on any topic that is needed.

(Convert letter grade to number) Write a program that prompts the user to enter a letter grade A/a, B/b, C/c, D/d, or F/f and displays its corresponding numeric value 4, 3, 2, 1, or 0.

Sample Run 1 Enter a letter grade: B The numeric value for grade B is 3

Sample Run 2 Enter a letter grade: b The numeric value for grade b is 3

Sample Run 3 Enter a letter grade: T T is an invalid grade

Answers

Answer:

This program is written in Python Programming Language

Program doesn't make use of comments (See Explanation Section for detailed explanation)

letterg = ['A','B','C','D','F']

inp = input("Enter a Letter Grade: ")

for i in range(len(letterg)):

if inp.upper() == letterg[i]:

print('The numeric value for grade ', inp, ' is ',4 - i)

break;

else:

print(inp, "is an invalid grade")

Explanation:

This line initializes all letter grade from A to F

letterg = ['A','B','C','D','F']

This line prompts user for letter grade

inp = input("Enter a Letter Grade: ")

This line iterates through the initialized letter grades

for i in range(len(letterg)):

This line checks if the user input is present in the initialized letter grades (it also takes care of lowercase letters)

if inp.upper() == letterg[i]:

This line is executed if tge about condition is true; the line calculates the number grade and prints it

print('The numeric value for grade ', inp, ' is ',4 - i)

This line terminates the iteration

break;

If the condition above is not true

else:

This line is executed

print(inp, "is an invalid grade")

Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.

Answers

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0

Answers

Answer:

I believe it is A

Explanation:

QUESTION 22 Select the correct statement(s) regarding Carrier Ethernet (CE). a. the Metro Ethernet Forum (MEF) created a CE framework to ensure the interoperability of service provider CE offerings b. MEF certified CE network providers, manufacturers and network professionals to ensure interoperability and service competencies c. MEF certified services include E-Line, E-LAN, E-Tree, E-Access, and E-Transit d. all are correct statements

Answers

Answer:

d. all are correct statements

Explanation:

CARRIER ETHERNET can be defined as the Ethernet which is a telecommunications network providers that provides and enables all Ethernet services to their customers and as well to help them utilize the Ethernet technology in their networks which is why the word “Carrier” in Carrier Ethernet networks is tend to refers to a large communications services providers that has a very wide reach through all their global networks. Example of the carriers are:

They help to provide audio, video, as well as data services to residential and to all business as well as enterprise customers.

CARRIER ETHERNET also make use of high-bandwidth Ethernet technology for easy Internet access and as well as for communication among the end users.

Therefore all the statement about CARRIER ETHERNET NETWORK are correct

a. Metro Ethernet Forum (MEF) is a type of ethernet which created a Carrier Ethernet framework in order to ensure the interoperability of service provider that the Carrier Ethernet is offerings.

b. The MEF also help to certifies CE network providers, as well as the manufacturers and network professionals in order to ensure interoperability as well as a great service competencies.

c. MEF certified services also include E-Line, E-LAN, E-Tree, E-Access, and E-Transit

Hence, MEF is an important part of Carrier Ethernet because they act as the defining body for them, reason been that they are as well telecommunications service providers, cable MSOs, as well as network equipment and software manufacturers among others.

The famous Fibonacci sequence, 1, 1, 2, 3, 5, 8, 13, . . . , begins with two 1s. After that, each number is the sum of the preceding two numbers. Write a program using a recursive function that requests an integer n as input and then displays the nth number of the Fibonacci sequence.

Answers

Yo bro I just need help with you

Answer:

int recursiveFunction(int n) {

 

if (n == 0 || n == 1) {

 

 return n;

}

else {

 

 return recursiveFunction(n - 2) + recursiveFunction(n - 1);

}

Explanation:

The goal of what technology research is to provide solutions to physical and health related problems

Answers

Answer:Crisis-mapping

Explanation:

Answer:

Crisis Mapping

Explanation:

Write a program that asks a user to predict how many rolls of a single die it will take to reach 100. When all rolling is finished, compare the given answer to the results and let them know if they did well or not.

Answers

Answer:

import random

guess = int(input("Make a guess: "))

total = count = 0

while total < 100:

   roll = random.randint(1, 6)

   total += roll

   count += 1

if guess == count:

   print("Your guess is correct")

elif guess > count:

   print("Your guess is high")

else:

   print("Your guess is low")

Explanation:

*The code is in Python.

Import the random module to simulate the dice roll

Ask the user to make a guess

Initialize the total and count as 0

Create a while loop that iterates while the total is smaller than 100. Inside the loop, use random to get a random number between 1 and 6 and set it to the roll. Add the roll to the total. Increment the count by 1.

When the loop is done, check the guess and count. If they are equal, that means the guess is correct. If the guess is greater than the count, that means it is high. If the previous cases are not true, then the guess is low.

24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism

Answers

(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.

Write a program that read two numbers from user input. Then, print the sum of those numbers.

Answers

Answer:

#This is in Python

number1 = raw_input("Enter a number: ")

number2 = raw_input("Enter another number: ")

sum = float(number1) + float(number2)

print(sum)

Explanation:

The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

Answer:

Deployment

Explanation:

A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS

Answers

Answer:

FIN

Explanation:

A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.

The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.

Generally, the TCP in networking is made up of all of the following flag bits, namely;

1. SYN: used for synchronizing packets associated with a connection.

2. ACK: this is mainly where an acknowledgement of packets in a network takes place.

3. FIN:  it is used for closing connections.

4. PSH: used for pushing packets that are to meant to be delivered at the far end.

5. RST: used as a reset in times of errors in the connection.

6. URG: used to denote urgent and high priority packets in the network.

7

List the names of 3 computer scientists

Answers

Hi there! Hopefully this helps!

------------------------------------------------------------------------------------------------------

1. Barbara Liskov.

2. Carl Sassenrath.

3. Larry Page.

Answer:

1. Ellon Musk

2. Larry Page

3. John Hopcroft

Hope that helps!

Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).

Answers

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

public class FourthRoot{ //class to calculate fourth root of 81

public static void main(String[] args) { //start of main() function body

   double square_root; //declares to hold the fourth root of 81

   double number=81; // number is assigned the value 81

/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */

   square_root=Math.sqrt(Math.sqrt(number));

//displays the fourth root of 81 i.e. 3

     System.out.println("Fourth Root of 81 is "+ square_root); } }

Explanation:

The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.

So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.

Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.

public class FourthRoot{

   public static void main(String[] args) {

   double square_root;

   double number=81;

   square_root=Math.sqrt(number);

  System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }

The program along with its output is attached in a screenshot.

based on the condition.
The starting value of looping statement is calle
This is the final (last) value of loop statement a
This is a non-executable statement which is al
of QBASIC.
This statement is used to make variable global
It is declared in the main program and changes
This statement is used to close the one or more​

Answers

Answer:

A subroutine is a block of statements that carries out one or more tasks. ... they share all variables with the rest of the main program. ... Once you have defined a function in your program, you may use it in any appropriate expression, such as: ... Thus, functions can- not change the values of the arguments passed to them.

Explanation:

Other Questions
Help please anyone I neeed help pls help help help help Since the end of 2010, many Arab nations have witnessed demonstrations, marches, uprisings, rallies, and other calls to action in order to try to bring down violent and oppressive governments. In the cases for which the demonstrators are actively seeking democracy, this type of social movement would be classified as reactionary. utopian. revolutionary. rebellion. If Radhika adds these two numbers and represents the sum on an abacus, and if the beads on the ten's place are 2 and the beads on the one's place are 5, how many beads will be there on the hundreds place? Sulphuric acid, also called king of chemicals' has the formula H2SO4. Its appearance is different from that of hydrogen and sulphur. Give two other reasons why sulphuric acid is a compound and not a mixture. Help Ill give you 30 points A Champion for the Soil "Of all the countries of the world," Hugh Bennett said, "we Americans have been the greatest destroyers of land of any race of people barbaric or civilized." Americans changed the land more than "the combined activities of volcanoes, earthquakes, tidal waves, tornadoes and all the excavations of mankind since the beginning of history." Bennett became the first chief of the Soil Conservation Service. Years of Dust, Albert Marrin Which could be an appropriate replacement for the sidebar title A Champion for the Soil? Check all that apply. Hugh Bennett and Soil Conservation Geology and You Understanding a Changing Landscape How to Fertilize Crops Soil, Soil, Soil HELP ASAP!!!According to the author of the US telegraph, why is the Soviet Union participating in theUnited Nations?-to establish a stable world society-to reduce the power of the United States-to pursue the mutual aims of all nations-to prevent the start of a future war How do I solve this problem? Henry Jones contributed equipment, inventory, and $53,300 cash to a partnership. The equipment had a book value of $25,500 and market value of $32,900. The inventory had a book value of $51,900 but only had a market value of $16,000 due to obsolescence. The partnership also assumed a $14,500 note payable owed by Henry that was originally used to purchase the equipment.What amount should Henry's capital account be recorded?a. $69,000b. $104,000c. $84,000d. $89,000 What is the function of the cytoplasm in a eukaryotic cell? Determine the value of x. answers: 1) 116 2) 122 3) 58 4) 238 For three consecutive numbers, the sum of the first number, twice the second and 7 less than the third is 133. What are the three numbers? does 6(x + 5) = 6x + 11 , have on solution, infinitely many solutions, or no solutions? Make a report on the different types of effects of forces acting on an object Which words or phrases in lines 1-11 help you follow the chronological order of theselection?A. "Olympic team. Salt Lake City"B. "finished third," "behind"C. "honored," "thrilled"D. afterward," "by the time" i promise i will mark as brainiest The marginal-cost curve intersects the average-total-cost curve at the output level where average fixed costs are zero.1. True2. False On December 2, 2018, Eshares, Inc. purchases land. In payment for the land, Eshares, Inc. issues 6 comma 000shares of common stock with $ 10par value. The land has been appraised at a market value of $ 480 comma 000.Which of the following is included in the journal entry to record this transaction?a. debit Cash $500,000 b. credit Common Stock-$10.00 Par Value for $100.000 and credit Paid-In Capital in Excess of Par-Common $400000 c. $1000 Par Value for S100 000 and debit Paid-In Capital in Excess of Par debit omm on Stock -Common $400,000 d. credit Common Stock--$10 00 Par Value for $500,000 Click to select your answer The effective management of diversity can enhance the social responsibility goals of an organization. Other areas where sound management of diverse workforces can improve the effectiveness of an organization and its competitive advantages include all but one of the following?a. Problem creationb. Organizational flexibilityc. Marketingd. Resource acquisition