An infinite stream is a stream for which successive exposures always return values.

a. True
b. False

Answers

Answer 1

Answer:

True

Explanation:

Infinite sequential ordered stream return values as the first element are at position 0 in the stream and provided seed. The n > 0 is the element at the position and will result for applying functions f at position n.

Infinite Instream is creating a stream of even numbers that start from 0.

Such as

List<Integer> ints = InStream. iterate(0,i-> i +2)

.mapToObj(Integer:: valueOf)

.limit(10)

.collect(Collectors.tolist());

system.out.printin(ints);

It returns an infinite unordered stream, and the Supplier generates each. The limit() method can be called in the stream to stop the series after several elements.


Related Questions

I bring my _____ computer to work
a. in box
b. ebook
c. attachment
d.blog.
e. delete
f. document
g. download
h. ebook
I. email address
j. file
k. inbox
l. keyboard
m. laptop
n. link
o. online
p. password
q. sign in​

Answers

Answer:

I think it's laptop or sign in

hope this helps

have a good day :)

Explanation:

Pick which one you think is the best choice

Assume that Student, Employee and Retired are all extended classes of Person, and all four classes have different implementations of the method getMoney. Consider the following code where_______ indicates the required parameters for the constructors:
Person p = new Person(...);
int m1 = p.getMoney(); // assignment 1
p = new Student(...);
int m2 = p.getMoney(); // assignment 2
if (m2 < 100000)
p = new Employee(...);
else if (m1 > 50000)
p = new Retired(...);
int m3 = p.getMoney(); // assignment 3

Refer to above code The reference to getMoney() in assignment 1 is to the class:________
a. Person
b. Student
c. Employee
d. Retired
e. This cannot be determined by examining the code

Answers

Answer:

a. Person

Explanation:

The reference getMoney() is a method that is part of the Person class. This can be proven with the code since subclasses can access methods from the parent class but a parent class cannot access methods from the child classes. Since Student, Employee, and Retired are all child classes that extend to the Person parent class then they can access getMoney(), but unless getMoney() is in the Person class, then a Person object shouldn't be able to access it. Since the first object created is a Person object and it is accessing the getMoney() method, then we can assume that the getMoney() method is within the Person class.

which one of the following can be used in a Document name,when saving?
1.Numbers
2.Semi-colon
3.Forward dash
4.Question mark​

Answers

Answer:

3. forward dash would you like an explanation?

Only number can be used in a Document name.

File names are shown in alphabetical order in the folder structure. It is critical to also include the zero for numbers 0-9. This helps to maintain the numerical order when file names contain numbers.

Most software packages are case sensitive, so use lowercase wherever possible. Instead of using commas and underscores, use a hyphen.

So, Option "1" is the correct answer to the following question.

Learn more:

https://brainly.com/question/17429689?referrer=searchResults

How can getchar function be used to read multicharacter strings?​

Answers

69696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V69696969696969969696969696966969696969696

The program below converts US Dollars to Euros, British Pounds, and Japanese Yen # Complete the functions USD2EUR, USD2GBP, USD2JPY so they all return the correct value def USD2EUR(amount): """ Convert amount from US Dollars to Euros. Use 1 USD = 0.831467 EUR args: amount: US dollar amount (float) returns: value: the equivalent of amount in Euros (float) """ #TODO: Your code goes here value = amount * 0.831467 return value

Answers

Answer:

The program in Python is as follows:

def USD2EUR(amount):

   EUR = 0.831467 * amount

   return EUR

def USD2GBP(amount):

   GBP = 0.71 * amount

   return GBP

def USD2JPY(amount):

   JPY = 109.26 * amount

   return JPY

USD = float(input("USD: "))

print("Euro: ",USD2EUR(USD))

print("GBP: ",USD2GBP(USD))

print("JPY: ",USD2JPY(USD))

Explanation:

This defines the USD2EUR function

def USD2EUR(amount):

This converts USD to Euros

   EUR = 0.831467 * amount

This returns the equivalent amount in EUR

   return EUR

This defines the USD2GBP function

def USD2GBP(amount):

This converts USD to GBP

   GBP = 0.71 * amount

This returns the equivalent amount in GBP

   return GBP

This defines the USD2JPY function

def USD2JPY(amount):

This converts USD to JPY

   JPY = 109.26 * amount

This returns the equivalent amount in JPY

   return JPY

The main begins here

This gets input for USD

USD = float(input("USD: "))

The following passes USD to each of the defined functions

print("Euro: ",USD2EUR(USD))

print("GBP: ",USD2GBP(USD))

print("JPY: ",USD2JPY(USD))

Note the program used current exchange rates for GBP and JPY, as the rates were not provided in the question

The following code does sum of the triples of even integersfrom 1 through 10

int total = 0;

for (int x = 1; x <= 10; x++){

if (x % 2 == 0)

{ // if x is even

total += x * 3;

}

}// end of for

Please rewrite the above code using InStream

Answers

Answer:

Explanation:

Using Java, I have recreated that same code using intStream as requested. The code can be seen below and the output can be seen in the attached picture where it is highlighted in red.

import java.util.stream.IntStream;

class Brainly

{

   static int total = 0;

   public static void main(String[] args)

   {

       IntStream.range(0, 10).forEach(

               element -> {

                   if (element % 2 == 0) {

                       total += 3;

                   }

               }

       );

       System.out.println("Total: " + total);

   }

}

¿sharpness or unbreaking people?​

Answers

Really hard decision, but ultimately, it depends on your personal prefrence. I would choose un breakin, however, for some people if you want to kill mobs quicker, than sharpness would be the way to go.

how computer user interact with an application programs​

Answers

Answer:

computer users interact with their programs and applications through external devices called hardware, which allow the user to issue commands to computer programs, while also allowing these programs to issue responses to those commands. Thus, for example, the user interacts with the computer through the keyboard, by means of which he sends commands to certain programs that in turn respond, for example, through the monitor or the speakers.

Does anyone have any tips on what to buy and sell to make quick profits?

Answers

Answer:

lemonaid stand

Explanation:

Answer:

Or you can work in a store like a movie theater or smth

Explanation:

How do I find error corrections in an EAN-8 barcode?

Answers

Answer: I am not sure if I remember but I believe if the single digit matches the last digit on the barcode then the barcode is correct or valid.

But, If the digit is different from the one on your computer then their is an error. I recommend In order to check for error is to remove the received check digit and recalculate it based on the 12-digit identification code. (This I use for EAN-13 but since Ean-8 is basically short version of 13 try it)

How do you write a poem on the topic 'I am good at singing'? answer and get 100 points

Answers

Answer:

ur mom

Explanation:

Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care. Describe the incidents and explain what could have been done to prevent or mitigate them.

Answers

Answer:

Question: Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care.

Answer:

1. TRICARE United States, in 2011:

2. University of Washington Medicine, in 2018

Question: Describe the incidents

Answer:

1. TRICARE:

As a  health care program of the United States Department of Defense Military Health System, TRICARE being overseen by Science Applications International Corporation (SAIC), the defense break also came through an employee of SAIC, the tapes that stores vital information of personnel were physically stolen, and these tapes contain vital information such as the Social Security numbers, phone numbers, prescriptions, of millions of active and retired military personnel.  

2. University of Washington Medicine:

Database which contains important data of over hundred thounsands patients were exposed as a internal files were able to be accessed to the public when searched on the internet as those files appeared saved in search results on search engine.

Question: explain what could have been done to prevent or mitigate them

Answer:

The following would prevented or mitigated the attack:

1. For security breach on TRICARE:

i. The security software should be updated.

ii. Data should be encrypted to further protect it.

iii. The data protection security policies should be reviewed to prevent future attacks.

2. For security breach on University of Washington Medicine:

i. There should be effective risk assessment that would data vulnerabilities.

ii. There should be a limit on internal human error, and sharing of data without adequate protection, encryption should be stoped.

Communication protocols, sets of rules agreed to by all parties, are designed in order to:

Answers

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

Which of the following was most likely used to apply red background and font to some of the cells in column D?

Answers

Answer:

d. conditional formatting

Explanation:

The option that would most likely be used to accomplish this would be conditional formatting. This is an option in which, if a condition is met, the cell is given certain format changes. In this scenario, the condition would be if a cell is located in column D, then apply a red background and specific font. This would be automatic throughout the entire document so that if any new cell is created in column D it would automatically be formatted according to the conditional formatting that was used.

what are the events?

Answers

Answer:

a thing that happens or takes place, especially one of importance.

Which of the following is not a way to build customer loyalty

Answers

Answer: are there option choices? If not I would say

1. not giving back enough change

2. Being rude

3. not giving the right prices

4. Not answering questions

Explanation: hope this helps, have a great day!!

Code in Python

Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.

Sample output with input: 20
10.0
5.0
2.5
1.25
0.625


Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.

My code, it only passes one test with correct outputs
what am I forgetting?

Answers

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
Password must be 8 characters long.
There must be at-least one uppercase letter.
There must be at least one number.
Then show the user, you have set the correct password or not.
Sample output (Ex 6 and 7): Top 2 are for Ex-6 and bottom 2 are for Ex-7
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi123
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi12!
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi123
Your password doesn't meet the criteria.
Uppercase is missing.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi 234
Your password doesn't meet the criteria.
Uppercase is missing.
It's not 8 characters long correct size.

Answers

Answer:

The program in Python is as follows:

print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")

pwd = input("Enter your password: ")

chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0

if len(pwd) == 8:

   chkLength = 1

if (any(x.isupper() for x in pwd)):

   chkUpper = 1

if any(y.islower() for y in pwd):

   chkLower = 1

if any(z.isdigit() for z in pwd):

   chkDigit = 1

if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:

   print("You have set the correct password.")

else:

   print("Your password doesn't meet the criteria.")

   if chkLength == 0:

       print("It's not 8 characters long correct size.")

   if chkDigit == 0:

       print("Digit is missing.")

   if chkLower == 0:

       print("Lowercase is missing.")

   if chkUpper == 0:

       print("Uppercase is missing.")

Explanation:

This prints the instruction

print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")

This prompts the user for password

pwd = input("Enter your password: ")

This initializes check variables to 0 (0 - false)

chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0

If password length is 8

if len(pwd) == 8:

Set check variable of length to 1 (1 - true)

   chkLength = 1

If password has uppercase

if (any(x.isupper() for x in pwd)):

Set check variable of uppercase to 1

   chkUpper = 1

If password has lowercase

if any(y.islower() for y in pwd):

Set check variable of lowercase to 1

   chkLower = 1

If password has digit

if any(z.isdigit() for z in pwd):

Set check variable of digits to 1

   chkDigit = 1

If all check variables is 1, then the password is correct

if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:

   print("You have set the correct password.")

If otherwise,

else:

The password is incorrect

   print("Your password doesn't meet the criteria.")

The following prints the corresponding criteria that is not met, depending on the value of its check variable

   if chkLength == 0:

       print("It's not 8 characters long correct size.")

   if chkDigit == 0:

       print("Digit is missing.")

   if chkLower == 0:

       print("Lowercase is missing.")

   if chkUpper == 0:

       print("Uppercase is missing.")

Therese would now like to preview her slide show to make sure everything is working. She should___.
• switch to Normal slide view
•click on the first slide in the slide pane
• switch to Slide Show view
• click on Slide Show layout in the side pane

Answers

Answer:

c

Explanation:

Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack comparable objects. Assume that pop and push operations are currently implemented using array a as follows, where item is a String and n is the size of the stack. Note: if x andy are objects of the same type, use x.compareTo(y) to compare the objects x and y public void push String item ) { [n++] = iten; } public String pop { return al--n]; } Implement the max operation in two ways, by writing a new method using array a (in 8.1), or updating push and pop methods to track max as the stack is changed (in 8.2). Q8.1 Implement method maxi 5 Points Write a method max() using Out) space and Oin) running time. public String max() {...} Enter your answer here Q8.2 Update push() and popo 5 Points Write a method max() using On) space and 011) run time. You may update the push and pop methods as needed public void push {...} public String pop() {...} public String max() {...}

Answers

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

In the first point, the max method is declared that compares the string and returns its max value.In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.

The probability that the price of a commodity is increasing is 0.62 and the probability that the price is decreasing is 0.18 . What is the probability that the price of the commodity remains constant. Solved numerically​

Answers

bahug ka itlog hduxuwlowv heusuowjdd

Assert statements are a tool programmers employ to help them debug their code more efficiently.

a. True
b. False

Answers

Answer: True

Explanation:

The statement that assert statements are a tool programmers employ in order to help them debug their code more efficiently is true.

They help in debugging as they evaluate whether a statement is either true or false. When it's false, the assert statement will indicate an error which shows that there is a bug that need to be fixed.

2. List the differences between personal
computer operating systems and mainframe
operating systems.

Answers

Explanation:

Mainframes typically run on large boxes with many processors and tons of storage, as well as high-bandwidth busses. PCs are desktop or mobile devices with a single multi-core processor and typically less than 32GB of memory and a few TBs of disk space. Second, a mainframe OS usually supports many simultaneous users.

What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.

Answers

Answer:

It throws an error.

the public class needs a name.

like this:

public class G{ public static void main(String[] args) {

   int x=5 , y = 10;

   if (x>5 && y>=2) System.out.println("Class 1");

   else if (x<14 || y>5) System.out.println(" Class 2");

   else System.out.println(" Class 3"); }// end of main

   }

if you give the class a name and format it, you get:

Class 2

Explanation:

10 POINTS!!!!
Which is a virtual meeting place for developers?
O an online help site
O a user manual
O a developer conference
O a developer forum

Answers

Answer:

A Developer Conference

Explanation:

Due to it being a meeting place, a conference has a high probability whereas a forum is not really a "live" meet but whereas a conference is live and virtual in many cases. Cannot guarantee tho.

Create a program that calculates the total for a purchase at a bookstore. Put the lines of code in order to create the following program.
Sample output:
Bookstore Calculator
Price of Book 29.99
Tax percent 8.75
Tax amount 2.63
Total amount 32.61
1. tax_amount = round(book_price *
(tax_percent / 100), 2)
2.print("Bookstore Calculator")
3. print("Tax amount: ", tax_amount)
4. tax_percent = float(input("Tax percent: "))
5. # get input from the user
6. # display a welcome message
7. total = round(book_price + tax_amount, 2)
8. print("Total amount:", total)
9. # display the results
10. book_price = float(input("Price of book: "))
11. # calculate tip and total amount

Answers

Answer:

The correct order is:

# display a welcome message

print("Bookstore Calculator")

# get input from the user

book_price = float(input("Price of book: "))

tax_percent = float(input("Tax percent: "))

# calculate tip and total amount

tax_amount = round(book_price *(tax_percent / 100), 2)

total = round(book_price + tax_amount, 2)

# display the results

print("Tax amount: ", tax_amount)

print("Total amount:", total)

Explanation:

Given

The above code segment

Required

Place the code in correct order

Using the sample output as a guide:

The first output is a welcome message.

So, the first and second line of the program is:

# display a welcome message

print("Bookstore Calculator")

Next, inputs for book price and tax percent.

So, the next lines are:

# get input from the user

book_price = float(input("Price of book: "))

tax_percent = float(input("Tax percent: "))

Next, outputs for tax amount and total amount.

These outputs must first be calculated.

So, the next lines are:

# calculate tip and total amount

tax_amount = round(book_price *(tax_percent / 100), 2)

total = round(book_price + tax_amount, 2)

Lastly, the results are printed

# display the results

print("Tax amount: ", tax_amount)

print("Total amount:", total)

HELP ME !!!!!!!


Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
D. Domain name

Answers

Answer:

C. Protocol Identifier

The "http://" in a website URL represents the protocol identifier, specifically the Hypertext Transfer Protocol (HTTP). The correct option is C.

A protocol identifier is a string of characters that identifies the type of communication protocol being used to send data between network devices.

The protocol identifier, specifically the Hypertext Transfer Protocol, is represented by the "http://" in a website URL (HTTP).

HTTP is the World Wide Web's underlying protocol that defines how messages are formatted and transmitted between web servers and web browsers.

The domain name in the URL, in this case "briannasblog.com," identifies the specific website being accessed.

The "http://" in the URL is required to indicate that the browser should communicate with the web server and retrieve the website's resources using the HTTP protocol.

For more details regarding Protocol identifier, visit:

https://brainly.com/question/11763983

#SPJ7

A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is located in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
a) The model used by the simulation software cannot be modified once the simulation has been used.
b) The model used by the simulation software often omits details so that it is easier to implement.
c) Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.
d) Running a simulation requires a large number of observations to be collected before it can be used to explore a problem.

Answers

Answer:

d)

Explanation:

The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.

By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola

Answers

Answer:

b. the HIV infection.

Explanation:

Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.

STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.

HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.

Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.

lasses give programmers the ability to define their own types.

a. True
b. False

Answers

Answer:

TRUE.

Explanation:

Other Questions
Charles runs a catering service for large parties. He needs 37 heads of lettuce for salad to feed 100 guests. Which of the following proportions could he use to determine the number of heads of lettuce, x, he would need for 275 guests? The equation shows neutralization of an acid and a base to produce a salt and water which option is the basic unit of water, a compound a. a hydrogen moleculeb. a water moleculec. a water atomd. a hydrogen atom hey! ill give brainliest please help. What is Keller's response to criticisms others have about American materialism in regard to the Empire State Building? Which of the following statements about planetary satellites is true? 4x2+4x+1=0Click all that apply xy-2xy+y=????????? 0.125 C of charge flow out of a5.00 V battery in 6.30 s. Howmuch resistance is attached to thebattery? Which of these is a kind of tax?Group of answer choicesHospitalMusicPropertySchool Helpppp pls quickly pls pls Help pleaseeeeeeeeeeee Psittacines are what type of animal?SnakesTurtlesParrotsCockatiels how many sixths are in 2 5/6? The block slides on a horizontal frictionless surface. The block has a mass of 1.0kg and is pushed 5.0N at 45. What is the magnitude of the acceleration of the block? The man wants to buy bread tells Mel and Al, the couple who are the diner, "May soun' funny to be tight'. In this context, the word "tight" most likely means... A. Uncomfortably close-fittingB. Stingy C. Unyielding D. Troublesome When does it menstruation usually occur and who does it affect and why? When you analyze the claim made by an author, what is your next stepafter identifying the claim? Find the supporting evidence the author provides. Look for the article's main ideas and topic sentences. Read other articles that make similar claims. Decide if the reasons provided for the claim are good ones. 2. The original cost of a clock is $60 but youalso have to pay 6% for sales tax. How muchwill you have to pay for tax? i hope u can help meeeee!!!