Complete the statement below using the correct term.
One recurring problem in networking is finding that users have used a hub or a switch to circumvent a
________

Answers

Answer 1

Answer:

HURRY

Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.

Part A

Explain how each of the following concepts applies to Dr. Khan’s research.

Survey

Dependent variable

Big Five theory of personality

Part B

Explain the limitations of Dr. Khan’s study based on the research method used.

Explain what Dr. Khan’s research hypothesis most likely was.

Part C

Use the graph to answer the following questions.

How did the trait of agreeableness affect how people responded to the new ad campaign?

How did the trait of conscientiousness affect how people responded to the new ad campaign?


Related Questions

Can anybody please help me with 7.4.7 spelling bee codehs?

Answers

Answer:

word = "eggplant"

print "Your word is: " + word + "."

for i in word:

   print i + "!"

Explanation:

i don't know why but it is

Answer:

word = "eggplant"

print("Your word is !" + word + "!")

for i in word:

INDENT HERE or TAB print( i + "!")

Explanation:

Add an indentation right before the print( i + "!")

What do you consider to be the next big thing in "Small Systems" (technology, hardware, software, etc.) and why?

Answers

Explanation:

The answer is rom or read only storage devices

CS160 Computer Science I In class Lab 10
Objective:
Work with dictionaries
Work with strings
Work with files
Assignment:
This program will read a file of English words and their Spanish translation. It then asks the user for an English word. If it exists in your dictionary the Spanish translation is displayed. If the English word does not exist in the dictionary the program states that the word does not exist in its list of words.
Specifics:
Create a text file, with one English word and a Spanish word per line, separated by a colon. You can create the language file using a text editor, you do not need to write a program to create this file. An example of the file might be:
one:uno
two:dos
three:tres
four:cuatro
five:cinco
six:seis
seven:siete
eight:ocho
nine:nueve
ten:diez
After reading the text file, using it to fill up a dictionary, ask the user for an English word. If the word exists, print out the Spanish version. If the word does not exist state that the word is not in your list. Continue this process of asking for a word until the user does not enter a word (just pressed Enter).
As you might have noticed, there is nothing in the program that limits this Spanish words. This program can be written to work with any translation, so feel free to make it be French, or German or any other language where you can come up with a list of translated words. You also are not limited to 10 words, that is just the list I came up with for the example. The number of key/values pairs that you have in your dictionary is basically limited by the memory in your computer.
Hints
You will need to determine if the key (the English word) exists in the dictionary. Use the in operator with the dictionary, or the get() method. Either can be used to avoid crashing the program, which happens if you attempt to use a key that does not exist.
An example of running the program might be:
Enter the translation file name: oneToTen.txt
> Enter an English word to receive the Spanish translation.
Press ENTER to quit.
Enter an English word: one
he Spanish translation is uno
Enter an English word: ten
The Spanish word is diez
Enter an English word: 5
I don’t have that word in my list.
Enter an English word: three
The Spanish word is tres

Answers

Answer:

The program in Python is as follows:

fname = input("Enter the translation file name: ")

with open(fname) as file_in:

   lines = []

   for line in file_in:

       lines.append(line.rstrip('\n'))

myDict = {}

for i in range(len(lines)):

x = lines[i].split(":")

myDict[x[0].lower()] = x[1].lower()

print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")

word = input("Enter an English word: ")

while(True):

if not word:

 break

if word.lower() in myDict:

 print("The Spanish word is ",myDict[word.lower()])

else:  

 print("I don’t have that word in my list.")

word = input("Enter an English word: ")

Explanation:

This prompts the user for file name

fname = input("Enter the translation file name: ")

This opens the file for read operation

with open(fname) as file_in:

This creates an empty list

   lines = []

This reads through the lines of the file

   for line in file_in:

This appends each line as an element of the list

       lines.append(line.rstrip('\n'))

This creates an empty dictionaty

myDict = {}

This iterates through the list

for i in range(len(lines)):

This splits each list element by :

x = lines[i].split(":")

This populates the dictionary with the list elements

myDict[x[0].lower()] = x[1].lower()

This prints an instruction on how to use the program

print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")

This prompts the user for an English word

word = input("Enter an English word: ")

This loop is repeated until the user presses the ENTER key

while(True):

If user presses the ENTER key

if not word:

The loop is exited

 break

If otherwise, this checks if the word exists in the dictionary

if word.lower() in myDict:

If yes, this prints the Spanish translation

 print("The Spanish word is ",myDict[word.lower()])

If otherwise,

else:

Print word does not exist

 print("I don’t have that word in my list.")

Prompt the user for another word

word = input("Enter an English word: ")

Yo I need to know where to find a ps4 for free or a very cheap price please

Answers

Download offer up from the apple store or play store and search that up there’s many good deals and sometimes comes with games and controls included for cheap!

Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a certain subject. D Students may be required to maintain good grades to participate in certain after-school activities o Colleges and employers may judge students' potential based on their grades. Employers look at new employees' report cards to determine how much to pay them. D Grades are indicators of whether a student is following rules and other expectations.​

Answers

Answer:

1, 2, 3 and 5.

Explanation:

Answer:

a, b, c, e

Explanation:

cuz im smart


4. Why do animals move from one place to another?​

Answers

Answer:

Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.

Answer:

Animals move one place to another because he search food and shelter

search for five ms excel terms

Answers

Answer:

work book, work sheet, cell, columns and rows

Why is it important to isolate evidence-containing devices from the internet?
To save the battery
To hide their location
Devices can be remotely locked or wiped if connected
It is not important to isolate the devices

Answers

Answer:

C.

Devices can be remotely locked or wiped if connected

Explanation:

A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.

Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations

Answers

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

How does an introduction in a set of instructions help an audience of laypeople?

A. It defines unfamiliar terms that are used in the instructions.
B. It provides background information about the instructions.
C. It warns about potential hazards in the instructions.
D. It shows a list of supplies needed to complete the instructions.
E. It cautions against causing damage while carrying out the instructions.

Answers

Answer:

B. It provides background information about the instructions.

Explanation:

It says introduction in a set of audience. A introduction creates a background.

Describing How to Insert a Subdatasheet
Use the drop-down menus to complete the steps for inserting a subdatasheet.
1. Open a table in Design view.
2. Click the
v tab, and in the Records group, click
3. In the drop-down menu, select Subdatasheet.
4. In the Insert Subdatasheet dialog box, select the table you want and click
5. If there is no relationship between the tables, you can
one.
Ve

Answers

Answer:

1. Home

2. More

4. Ok

5. Create

Explanation:

Answer:

1. insert

2. smartart

3. OK

4. close

Explanation:

desktop and personal computer are also known as​

Answers

they are also known as general computers

You own a small hardware store. You have been in business since 1995 and have always been profitable. You’ve never seen a need to do any marketing or advertising since you were able to stay profitable without those things. Plus, you lack any real understanding of how to use technology and it makes you anxious just thinking about technology or social media. However, your son just graduated from college and came home to live with you for the summer before he starts his new marketing manager job at a big firm. He tells you that you are probably losing a big share of the market by avoiding technology and social media. He also says that many of these items can be implemented very easily, and he would volunteer to continue to manage the social media sites in his spare time even after he starts his new job.

Answers

Answer:

Was this a TROLL?

Explanation:

Write the MIPS assembly code to find the area of a given shape. Your program must take a floating-point value and shape (Circle - 1, Triangle - 2, Square - 3) as input and return the circumference/perimeter and area of the shape. Assume the floating-point value units are meters and the triangle is an equilateral triangle. [Note: you can search for the expression to calculate the area and circumference/perimeter of these shapes]

Answers

Answer:

Explanation:

.data

msg1: .asciiz "Enter the floating point value = "

msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "

msg3: .asciiz "\nThe perimeter of the triangle with side = "

msg4: .asciiz " meters is "

msg5: .asciiz " meters.\n"

msg6: .asciiz "\nThe area of the triangle with side = "

msg7: .asciiz " square meters.\n"

msg8: .asciiz "\nThe circumference of the circle with radius = "

msg9: .asciiz "\nThe area of the circle with radius = "

msg10: .asciiz "\nThe perimeter of the square with side = "

msg11: .asciiz "\nThe area of the square with side = "

pi: .float 3.1415816

eq_tr_area: .float 0.43305186

two: .float 2

three: .float 3

four: .float 4

.text

li $v0,4           # system call code for printing string = 4

la $a0,msg1       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,6           # system call code for reading floating point number

syscall           # call operating system to perform read operation

li $v0,4           # system call code for printing string = 4

la $a0,msg2       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,5           # system call code for reading integer

syscall           # call operating system to perform read operation

move $t0,$v0

IF:

bne $t0,1,ELSE_IF   #if not 1 then goto elseif

li $v0,4           # system call code for printing string = 4

la $a0,msg8       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f1,pi

l.s $f3,two

mul.s $f3,$f3,$f1   #calculate 2*pi*radius

mul.s $f3,$f3,$f0

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg5       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg9       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

mul.s $f2,$f0,$f0   #calculate radius *radius

mul.s $f2,$f2,$f1   #calculate pi *r^2

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f2       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg7       # load address of string to be printed into $a0

syscall  

ELSE_IF:

bne $t0,2,ELSE       #if not 2 then check else

li $v0,4           # system call code for printing string = 4

la $a0,msg3       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,three

mul.s $f3,$f3,$f0   #calculate 3*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4            

la $a0,msg5        

syscall            

li $v0,4            

la $a0,msg6        

syscall          

li $v0, 2        

mov.s $f12,$f0        

syscall            

li $v0,4            

la $a0,msg4      

syscall            

l.s $f3,eq_tr_area    

mul.s $f2,$f0,$f0    

mul.s $f2,$f2,$f3    

li $v0, 2      

mov.s $f12,$f2      

syscall            

li $v0,4            

la $a0,msg7        

syscall  

ELSE:

bne $t0,3,END        

li $v0,4            

la $a0,msg10        

syscall            

li $v0, 2        

mov.s $f12,$f0        

syscall            

li $v0,4            

la $a0,msg4        

syscall            

l.s $f3,four      

mul.s $f3,$f3,$f0    

li $v0, 2        

mov.s $f12,$f3      

syscall            

li $v0,4          

la $a0,msg5        

syscall            

li $v0,4          

la $a0,msg11      

syscall            

li $v0, 2        

mov.s $f12,$f0      

syscall            

li $v0,4          

la $a0,msg4        

syscall          

mul.s $f2,$f0,$f0    

li $v0, 2        

mov.s $f12,$f2      

syscall            

li $v0,4            

la $a0,msg7        

syscall  

END:

li $v0,10        

syscall          

Code is as follows:

.data

msg1: .asciiz "Enter the floating point value = "

msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "

msg3: .asciiz "\nThe perimeter of the triangle with side = "

msg4: .asciiz " meters is "

msg5: .asciiz " meters.\n"

msg6: .asciiz "\nThe area of the triangle with side = "

msg7: .asciiz " square meters.\n"

msg8: .asciiz "\nThe circumference of the circle with radius = "

msg9: .asciiz "\nThe area of the circle with radius = "

msg10: .asciiz "\nThe perimeter of the square with side = "

msg11: .asciiz "\nThe area of the square with side = "

pi: .float 3.1415816

eq_tr_area: .float 0.43305186

two: .float 2

three: .float 3

four: .float 4

.text

li $v0,4           # system call code for printing string = 4

la $a0,msg1       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,6           # system call code for reading floating point number syscall           # call operating system to perform read operation

li $v0,4           # system call code for printing string = 4 la $a0,msg2       # load address of string to be printed into $a0 syscall           # call operating system to perform print operation

li $v0,5           # system call code for reading integer syscall           # call operating system to perform read operation move $t0,$v0

IF:

bne $t0,1,ELSE_IF   #if not 1 then goto elseif

li $v0,4           # system call code for printing string = 4

la $a0,msg8       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2 mov.s $f12,$f0       #move the single precision f2 in f12 syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4 la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f1,pi l.s $f3,two

mul.s $f3,$f3,$f1   #calculate 2*pi*radius

mul.s $f3,$f3,$f0

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg5       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg9       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

mul.s $f2,$f0,$f0   #calculate radius *radius

mul.s $f2,$f2,$f1   #calculate pi *r^2

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f2       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg7       # load address of string to be printed into $a0

syscall  

ELSE_IF:

bne $t0,2,ELSE       #if not 2 then check else

li $v0,4           # system call code for printing string = 4 la $a0,msg3       # load address of string to be printed into $a0 syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,three

mul.s $f3,$f3,$f0   #calculate 3*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall  

bne $t0,3,END       #if not 3 then end

li $v0,4           # system call code for printing string = 4

la $a0,msg10       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f0 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,four       # multilply by 4

mul.s $f3,$f3,$f0   #calculate 4*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f3 in f12

syscall           # call operating system to perform print operation

END:  

li $v0,10       # system call code for printing exit (end of program)

syscall           # call operating system to perform print operation

Learn More:https://brainly.com/question/10169933

Explain the IT vendor selection and management processes

Answers

Answer:

The vendor management process includes a number of different activities, such as: Selecting vendors. The vendor selection process includes researching and sourcing suitable vendors and seeking quotes via requests for quotation (RFQs) and requests for proposal (RFPs), as well as shortlisting and selecting vendors. hope it helps

You are installing a new graphics adapter in a Windows 10 system. Which of the following expansion slots is designed for high-speed, 3D graphics adapters?

A: USB
B: Firewire
C: PCI
D: PCIe

Answers

Answer:

pclex16

NIC

the graphic card must be high

disk based recording systems are always (A) digital (B) analog (C) Both digital and analog

Answers

Answer:Disk based recording systems are always Digital.

Write a recursive method named factorial that accepts an integer n as a parameter and returns the factorial of n, or n!. A factorial of an integer is defined as the product of all integers from 1 through that integer inclusive. For example, the call of factorial(4) should return 1 * 2 * 3 * 4, or 24. The factorial of 0 and 1 are defined to be 1. You may assume that the value passed is non-negative and that its factorial can fit in the range of type int. Do not use loops or auxiliary data structures; solve the problem recursively.

Answers

Answer:

The function in Python is as follows:

def factorial(n):

  if n == 1 or n == 0:

      return n

  else:

      return n*factorial(n-1)

Explanation:

This defines the function

def factorial(n):

This represents the base case (0 or 1)

  if n == 1 or n == 0:

It returns 0 or 1, depending on the value of n

      return n

If n is positive, then this passes n - 1 to the factorial function. The process  is repeated until n = 1

  else:

      return n*factorial(n-1)

Design an algorithm to find the weighted average of four test scores. The four test scores and their respective weights are given in the following format: testscore1 weight1 ... For example, the sample data is as follows: 75 0.20 95 0.35 85 0.15 65 0.30 The user is supposed to enter the data and press a Calculate button. The program must display the weighted average.

Answers

Answer:

data = [75, 0.2, 95, 0.35, 85, 0.15]

print (f'Average weight: {sum(data) / len(data)}')

Explanation:

This is python algorithm for finding average weight. To get average weight, you sum up all data involved and divide that amount by the number of data provided.

NEED HELP IMMEDIATELY!!
What is the difference between a worm and a typical virus?
A) Worms are a type of spyware; viruses are a type of malware.
B) Worms are impossible to remove; viruses can be tracked and removed.
C) Worms are stronger than viruses; viruses are stronger than spam.
D) Worms travel independently of human action; viruses require human actions.

Answers

Answer:

Option C

Explanation:

Option A is incorrect as Worm is a form of malware

Option B is incorrect because antivirus can remove all forms of malware

Option C is correct because a worm is more problematic as compared to the virus. Also, viruses are weaker than worm because they need a host file to run but a worm can work independently.

Option D is also incorrect because both are able to self replicate.

Order the steps needed to design a relational database.
Identify the fields holding
Break down the data into
List the fields needed to
Identify the common fields
Distribute the fields into
stored data
smaller parts
gain information
for linking tables
tables by subject
We

Answers

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

The correct matching of the steps for a relational database are:

1. List the fields needed to gain information2. Break down the date into smaller parts

What is a Database?

This refers to the collection of data that is stored in a central system that can be easily retrieved at any time.

The other answers are:

3. identify the fields holding stored data4. distribute the fields into tables by subject5. identify the common fields for linking tables

Read more about databases here:

https://brainly.com/question/6344749

#SPJ2

( This isnt really a homework question, its more of just a general question ) I am starting to code C# and I have downloaded visual studio and dotnet, but when trying to run the code for opening a new console template it keeps giving me this error
" dotnet : The term 'dotnet' is not recognized as the name of a cmdlet, function, script file, or
operable program. Check the spelling of the name, or if a path was included, verify that the
path is correct and try again.
At line:1 char:1
+ dotnet new console
+ ~~~~~~
+ CategoryInfo : ObjectNotFound: (dotnet:String) [], CommandNotFoundException
+ FullyQualifiedErrorId : CommandNotFoundException "
Please help me fix this. ( btw i am using dotnet 6.0 SDK, but before that I was using 5.0.203

Answers

Answer:

Explanation:

This is usually an issue with the Microsoft Visual C++ redistributable. One fix that usually works is to do the following

Open Programs and Features

Uninstall and then choose Repair on Microsoft Visual C++ Redistributable (x86) and x64 version

Reinstall or repair the installation of the .NET Core SDK 1.0.1.

If this does not work, another option would be to manually change the install path of these files from "Program Files (x86) to  "Program Files"

Hope this helps solve your issue.

Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and number of pages for a book. For each field variable create methods to get and set methods. b. Design an application that declares two Book objects. For each object set 2 field variables and print 2 field values. c. Design an application that declares an array of 10 Books. Prompt the user to set all field variables for each Book object in the array, and then print all the values.

Answers

Answer:

Explanation:

The following code is written in Java. I created both versions of the program that was described in the question. The outputs can be seen in the attached images below. Both versions are attached as txt files below as well.

Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) should return 5.0 Use the function in main to loop through reading in pairs of points until the all zeros are entered printing distance with two decimal precision for each pair of points.
For example with input
32 32 54 12
52 56 8 30
44 94 4439 6
5 19 51 91 7.5
89 34 0000
Your output would be:__________.
a. 29.73
b. 51.11
c. 55.00
d. 73.35
e. 92.66

Answers

Answer:

The function in Python3  is as follows

def Distance(x1, y1, x2, y2):

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

   return dist

   

Explanation:

This defines the function

def Distance(x1, y1, x2, y2):

This calculates distance

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

This returns the calculated distance to the main method

   return dist

The results of the inputs is:

[tex]32, 32, 54, 12 \to 29.73[/tex]

[tex]52,56,8,30 \to 51.11[/tex]

[tex]44,94,44,39\to 55.00[/tex]

[tex]19,51,91,7.5 \to 84.12[/tex]

[tex]89,34,00,00 \to 95.27[/tex]

please help me ASAP!

Answers

Answer:

loser

Explanation:

The answer is B. The crisis management plan acts as net for any sudden crises and provides aid to the issue.

name the reactants in the equation P+O​

Answers

Reactants are the factors that yield the subdivision of a molecule. Products are the result of this division. In other words, reactants are left of the equation and products are on the right. P+O are reactants, but the product is not shown.

For this assignment your are to implement the Pet Class described in Programming Exercise 1, starting on page 494 in our textbook. Additionally your program will allow users to enter the pet's information until the user enters in the string "quit". Once the user enters quit the program will print out a summary of all the information that has been entered. Your program should not assume any maximum number of pets that can be added. Items in blue designate output. Items in red designate computer input. Example Test Case: Enter name, type and age of your pet: Name: Momo Type: Bird Age: 33 Enter "quit" to stop entering. Anything else to continue. a Enter name, type and age of your pet: Name: Pooh Type: Dog Age: 8 Enter "quit" to stop entering. Anything else to continue. quit SUMMARY: Name: Momo, Type: Bird, Age: 33. Name: Pooh, Type: Dog, Age: 8.

Answers

Answer:

ohhhvhhffifyuddfuiicfdguc

Suppose that a minus sign in the input indicates pop the stack and write the return value to standard output, and any other string indicates push the string onto the stack. Further suppose that following input is processed:
this parrot - wouldn't voom - if i put -- four thousand --- volts - through it -
What are the contents (top to bottom) left on the stack?
a. through wouldn't this.
b. this wouldn't through.
c. it through wouldn't.
d. it through volta.
e. volts through it.

Answers

Answer:

e. volts through it

Explanation:

volts through it

The contents (top to bottom) left on the stack is volts through it. Thus, option E is correct.

What is standard output?

When a computer program begins execution, standard streams are interconnected input and output channels of communication between the program and its surroundings. The three I/O connections are known as standard input (stdin), standard output (stdout), and standard error (stderr).

A negative sign in the input indicates that the stack should be popped, and the return value should be sent to standard output, whereas any other string means that the string should be pushed into the stack. Assume that the following input is processed: this parrot would not voom if I pushed — four thousand —- volts - through it.

The contents of the stack (from top to bottom) are volts via it. As a result, option E is correct.

Learn more about standard output here:

https://brainly.com/question/30054426

#SPJ5

why do we install doorbells in our house

Answers

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

So when people are at the door they can use the doorbell to inform the people in the house that they are outside.

Which of the following application delivery methods requires Internet access?

Answers

Answer:Cloud hosted

Explanation:

Other Questions
Which graph represents a sequence that converges because the values approach 2? Arjun earned $36 515 in 2019.This was an increase of 9% on his earnings in 2018.Work out his earnings in 2018. Ingroup of 100 persons, 72 people can speakEnglish and 43 can speak French. How manycan speak English Only, How many can speakFrench Only and how many can speak both English and French Match the following. 1. tetanus rickettsia 2. Rocky Mountain spotted fever malaria 3. drinking water rabies 4. decreased body temperature lockjaw 5. animal bite hypothermia 6. mosquito potable I neeed helppp please help me Which of the following is a correct statement about the relationship between natural selection and evolution?(3 points)A. Natural selection results from evolution.B. Natural selection includes evolution as a part of it.C. Natural selection is one mechanism of evolution.D. Natural selection and evolution are the same thing. 21. Which of the responses above is a good exampleof a refusal to drink alcohol?22. Write a response that shows the use of a refusalskill to pressure item number three.23. CRITICAL THINKING Why do you think peoplewho drink try to pressure others to drink? I will give brainliest Pls help SASSSSAASHL how many ml of 10.0 m cacl2 do we need to prepare 3.00 l of a 0.500 m cacl2 solution As world trade increased, European nations competed for colonies overseas. Coloniesprovided European nations with raw materials and ready markets.What European countries competed for colonies? Victor wants to conduct a survey to find how much time the students of his school spent playing football. Which of the following is an appropriate statistical question for this survey?- Who plays football on weekends?- Who plays football the most on Mondays?- How many hours per week do you play football?- How many students play football for one hour every day? Which reaction type? *combination (synthesis)combustiondecompositionsingle replacementdouble replacement What are some basic steps that you can take to protect yourself from identity theft or fraud? Hey, can anyone help me with something ill give you 50 points. Can someone please help me I will mark u brilliant identify vertex of this parabola No file, guessing, or random answersa population has a standard deviation of 20.2. what is the standard error of the sampling distribution if the sample size is 121? round your answer to two decimal places.A) 1.84B) 1.44C) 1.55D) 1.68 Based on the data in the table, what is the probability that the next piece of candy Katherine pulls out of the jar will be blue?OA7/100B.7/50C.7/43D.1/5 Compare the impact of war on health and surgery