On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))

Ex: If the input is:

440
(which is the A key near the middle of a piano keyboard), the output is:

440.00 466.16 493.88 523.25 554.37

Answers

Answer 1

Answer:

In C:

#include <stdio.h>

#include <math.h>

int main(){

   float f0,r,temp;

   r = pow(2.0,1.0/12);

   printf("f0: ");    scanf("%f", &f0);

   temp = f0;

   for(int i = 0; i<=4;i++){

       f0 = f0 * pow(r,i);

       printf("%.2lf ", f0);

       f0 = temp;    }

   return 0;

}

Explanation:

This declares f0, r and temp as float

   float f0,r,temp;

This initializes r to 2^(1/12)

   r = pow(2.0,1.0/12);

This prompts the user for f0

   printf("f0: ");    scanf("%f", &f0);

This saves f0 in temp

   temp = f0;

This iterates the number of keys from 0 to 4

   for(int i = 0; i<=4;i++){

This calculates each key

       f0 = f0 * pow(r,i);

This prints the key

       printf("%.2lf ", f0);

This gets the initial value of f0

       f0 = temp;    }

   return 0;


Related Questions


The process of saving information to a secondary storage device is called...

Answers

Answer:

The process of saving information to a secondary storage device is referred to as embedding.

Explanation:

The process of saving information to a secondary storage device is called embedding.

What is embedding?

One technique a writer or speaker could use to lengthen a sentence is embedding. When two clauses fall into the same category, they can frequently be nested inside of one another. For illustration: The baked product was presented by Norman. My sister didn't know about it.

Her thumb had the thorn embedded in the surface there, locked onto something. A person or thing is said to be embedded when it is a highly important or powerful part of that person, item, etc. Guilt was deeply engrained in my conscience.

The embedding strategy modifies each video frame slightly in an attempt to try covert or undetectable data concealing.

Thus, it is embedding.

For more information about embedding, click here:

https://brainly.com/question/16911950

#SPJ6

Company A’s IT department has a hosting platform specifically for systems used by the company’s large marketing department. This platform provides critical, high-availability hosted IT resources and services. However, the IT department has started to receive complaints about the time it takes to start new marketing campaigns, primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of mergers and acquisitions, the consumers of the services hosted by this platform have become more distributed, with service consumers accessing services from a large variety of locations, and with increasingly different types of devices. In response to these complaints, Company A is considering using a cloud-based hosting platform. Which specific characteristics of a cloud will be helpful for Company A to address its problems?

Answers

Answer:

cloud has the On demand and ubiquitous access characteristics

Explanation:

The specific characteristics of cloud that would be helpful for his problem to be addressed is the fact that cloud offers on demand usage and ubiquitous access.

What is meant by on demand access is that the cloud customer can pay for cloud services and use them whenever they are needed. As long as the cloud service is authorized.  

By Ubiquitous access it means that the cloud customer has reliable access without the presence of any form of disturbances or issues and it can be accessed from anywhere. Different range of devices are supported on the cloud platform and with the presence of internet lots of services can be accessed.

Based on the issues being faced by customers, this characteristics of cloud will be useful to address the problems.

2. How has the internet changed the way that people get news?

Answers

Answer:

Explanation:

you can access news from anywhere and know what is going on

Answer:

Most of the news is fact due to the ablilty of anybody can make it

Explanation:

Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?

Answers

Answer:

The website is

classroom

Explanation:

Which one of the following media is unguided media ?
A : fiber optic
B : Coaxial cable
C : Twisted pair
D : Satellite transmission

Answers

Answer:

Satellite transmission

hy please help me do this​

Answers

Answer:

1 True

2 False

3 False

4 True

5 True

6 True

7 True

8 False

Explanation:

8 robot's are not perfect they make mistakes too

Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2

How does computer hardware and software work together?

Answers

Answer:

Computer software controls computer hardware which in order for a computer to effectively manipulate data and produce useful output I think.

Explanation:

List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice

Answers

Thor Odin and Aries the threes listed powerful

When machining rotors, what is the reason for setting the indexing collars to zero?

A. To know how much metal was taken off of each side.

B. To make sure that no cut exceeds .010 inch

C. To determine the proper cut speed of the Brake Lathe.

D. To measure the depth of the grooves on the rotor surface.

Answers

Answer:

To determine the proper cut speed of the brake lathe

To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

What is indexing collars?

Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.

"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.

By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.

Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

To learn more about indexing collars, refer to the link:

https://brainly.com/question/12608731

#SPJ2

Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).

Answers

Answer:

In Python:

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

day = int(input("Day: "))

month = input("Month: ")

ind = months.index(month)

   

numday = 0

for i in range(ind):

   numday+=daymonths[i]

numday+=day

print(numday)    

Explanation:

This initializes the months to a list

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

This initializes the corresponding days of each month to a list

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

This gets the day from the user

day = int(input("Day: "))

This gets the month from the user

month = input("Month: ")

This gets the index of the month entered by the user

ind = months.index(month)

This initializes the sum of days to 0

numday = 0

This adds up the days of the months before the month entered by the user

for i in range(ind):

   numday+=daymonths[i]

This adds the day number to the sum of the months

numday+=day

This prints  the required number of days

print(numday)    

Note that: Error checking is not done in this program

What is Mobile Edge Computing? Explain in tagalog.​

Answers

Answer:

English: Multi-access edge computing, formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.

Very very rough Tagalog: Ang multi-access edge computing, dating mobile edge computing, ay isang konsepto ng network architecture na tinukoy ng ETSI na nagbibigay-daan sa mga kakayahan sa cloud computing at isang IT service environment sa gilid ng cellular network at, higit sa pangkalahatan sa gilid ng anumang network.

Explanation:

Use devices that comply with _____________ standards to reduce energy consumption.


Energy Star


Energy Plus


Power Pro


Data Center


Power Star

Answers

Answer:

energy star

Explanation:

I just got it correct

The correct option is A. Use devices that comply with Energy Star standards to reduce energy consumption.

How much energy does ENERGY STAR save?

Depending on the comparable model, Energy Star appliances can help you save anywhere between 10% and 50% of the energy needed. If you are replacing an older appliance, you can save even more. The Department of Energy and the Environmental Protection Agency jointly administers the Energy Star program.

Through the use of energy-efficient goods and practices, it seeks to assist consumers, businesses, and industry in making savings and safeguarding the environment. The Energy star badge identifies high-performing, economical houses, buildings, and products.

Thus, the Use of Energy Star-certified equipment to cut down on energy use; is option A.

Learn more about Energy Star here:

https://brainly.com/question/27093872

#SPJ2

Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2) test, (3) assignment, (4) exam, and (5) practice scores. The program should use variables, cout, cin, getline(), type casting, and output manipulators. The user should enter the name of the student and scores ranging from 0 to 100 (integer) for each grading item. The final score is the sum of all grading items. The average score is the average of all grading items. Here is a sample output of the program: Enter the Student's name: John Smith Enter Class Participation Score ranging from 0 to 100: 89 Enter Test Score ranging from 0 to 100: 87 Enter Assignment Score ranging from 0 to 100: 67 Enter Exam Score ranging from 0 to 100: 99 Enter Practice Score ranging from 0 to 100: 80 John Smith: Final Score: 422 Average Score: 84.4 Submit: a flowchart . source file Hw3.cpp The screenshot of output

Answers

Answer:

Following are the code to the given question:

#include<iostream>//defining header file

using namespace std;

int main()//defining main method

{

float clspat,test,asst,exam,practice,total,average;//defining floating variable

char name[100];//defining char variable to input value

cout<<"Enter Name of Student: ";//print message

cin>>name; //input value

cout<<"Enter scores in following scoring items between 0 and 100:"<<"\n";//print message

cout<<"Enter class participation score: ";//print message

cin>>clspat;//input value

cout<<"Enter test score: ";//print message

cin>>test;//input value

cout<<"Enter assignment score: ";//print message

cin>>asst;//input value

cout<<"Enter exam score: ";//print message

cin>>exam;//input value

cout<<"Enter practice score: ";//print message

cin>>practice;//input value

total=clspat+test+asst+exam+practice;//calculating total value

average=total/5;//calculating average value

cout<<endl<<"SCORE CARD OF "<<name<<"\n"<<"-----------------------"<<"\n";//print value with message

cout<<"Total score: "<<total<<"\n";//print message with value

cout<<"Average score: "<<average; //print message with value

}

Output:

please find the attached file.

Explanation:

In this code, the floating-point variable is declared, which is used for input value from the user-end and after input the floating-point value it uses the "total, average" variable to calculate its respective values and store its value with init, after storing the value into the variable it uses the print method to print its values.

A spinner is divided into 4 equal sections colored red, green, blue, and orange. Ennis spins the spinner. What is the probability that he dont not spin orange?

Answers

the probability would be 3/4

grade 11 essay about the year 2020​

Answers

Answer:

This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.

Explanation:

In a word processing program, under which tab or menu option can you adjust the picture brightness?

Answers

Explanation:

You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.

What two windows security updates do most organizations always patch?

Answers

Answer:

Explanation:

Patch Tuesday is the name given to the day each month that Microsoft releases security and other patches for their operating systems and other software. Patch Tuesday is always the second Tuesday of each month and more recently is being referred to as Update Tuesday.

You can Hyperlink by:

Question 5 options:

Press CTRL+K (shortcut)


Go to Insert tab, Link Group, Click on Link Icon


Right click on a word / shape / picture and choose Link


All of the above /

Answers

Answer:

All of the above

Explanation:

I tryed them all

Answer: All of thee above

Def locate_substring(dna_snippet, dna): This function takes in two strings, dna_snippet and dna, where dna_snippet is a substring of dna, and returns all locations of the substring as a list of integers. In other words, dna_snippet may exist in multiple locations within dna; you should return the beginning index position of each occurrence of dna_snippet inside of dna. Example: * Sample DNA snippet (substring): "ATAT" * Sample DNA string: "GATATATGCATATACTT" * The returned position list: [1, 3, 9]

Answers

Answer:

In Python. The function is as follows:

def locate_substring(dna_snippet, dna):

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

   print("The returned position list : " + str(res))

Explanation:

This iterates defines the function

def locate_substring(dna_snippet, dna):

Check for all occurrence

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

print all occrrence

   print("The returned all position list : " + str(res))

Following is the Python program to the given question.

Python

According to the question,

DNA Series: GATATATGCATATACTTDNA

Snippet: ATAT

Program: def locate_substring (dna_snippet, dna):

start = 0 while True: start = dna.

find(dna_snippet, start) #finding the first occurrence of dna_snippet in dna.

if start == -1: return # if dna.find() returns -1 yield start #Resumes next execution start += 1dna=input ("Enter the DNA sequence: ") dna_snippet=input

("Enter the DNA snippet: ") print(list(locate_substring(dna_snippet,dna )))

Program Explanation: Defining a function.

An infinite loop is being utilized just to produce the indexes from which dna snippet begins.

Determining the initial occurrence of dna snippet inside dna. storing the new occurrences of dna snippet throughout the starting point.

Whenever dna.find() returns minus one, it means there was no occurrence identified and the method should be exited.

Find out more information about Python here:

https://brainly.com/question/26497128

The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.

Why did this system fail?

Why would a company spend money and time on a project and then cancel it?

What could have been done to prevent this?​

Answers

The system fail because the company had to pay and spend more money in order to pay the workers.

Which of the following statements is false?


Copyright exists the moment a work is created.


Copyright protects intellectual property such as text, art, film, music, or software.


Omitting the © copyright symbol means your work is not copyrighted.


Copyright is free.


You are not required to register your copyright.

Answers

Everything is false except the third one :)

It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.

What is a copyright?

Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.

The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.

Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.

Thus, the correct option is C.

For more details regarding a copyright, visit:

https://brainly.com/question/14704862

#SPJ2

For a company, intellectual property is _______________.


A) any idea that the company wants to keep secret


B) the same as the company’s policies


C) any topic discussed at a meeting of senior management


D) all of the company’s creative employees


E) a large part of the company’s value

Answers

Yea I think it is b but I’m not sure

For a company, intellectual property is any idea that the company wants to keep secret. Thus the correct option is A.

What is intellectual Property?

The type of integrity is defined as "intellectual property" which includes intangible works developed by humans with an innovative and problem-solving approach.

These intellectual properties are protected by companies to avoid leakage of the secret of development as well as to avoid imitation of the creation. This protection of the intellectual property is legally bounded.

If any violation of this act has been noticed and found guilty will have to face consequences in terms of charges of violation as well as heavy penalties based on the type and importance of the work.

Therefore, option A any idea that the company wants to keep secret is the appropriate answer.

Learn more about intellectual property, here:

https://brainly.com/question/18650136

#SPJ2

Design the program in the following way:

a. Prompt the user for the name of a boat and then for that boat's time (in seconds).
b. Continue to do this until the user presses enter without entering a name or enters a sentinel value.
c. At this point output the name of the race winner along with the time, the average time, the name the slowest boat along with its time.
d. Use a map structure to store the boat names and their associated times. You may use lists within the program as you see fit.

Answers

Answer:

d = {}

while True:

   name = input("Enter the name of the boat (Press Enter or q to stop): ")

   if name == "" or name == "q":

       break

   time = int(input("Enter the time (in seconds): "))

   d[name] = time

winner_name = min(d, key=d.get)

winner_time = min(d.values())

average_time = sum(d.values()) / len(d.values())

slowest_boat = max(d, key=d.get)

slowest_time = max(d.values())

print(f"Winner name: {winner_name} and its time: {winner_time}")

print(f"Average time: {average_time}")

print(f"Slowest boat: {slowest_boat} and its time: {slowest_time}")

Explanation:

*The code is in Python.

Create an empty map(dictionary) to hold the values

Create a while loop. Inside the loop:

Ask the user to enter the name of the boat. Check if the user presses Enter or q, using if and break

Ask the user to enter the time

Insert these values as key-value pair to the map

When the loop is done:

Find the winner_name, the min() function finds the minimum value in a list. In this case, the key=d.get creates a list of the values in the map. The min(d, key=d.get) returns the key of the minimum value

Find the winner_time, min(d.values()) returns the minimum time in our map

Find the average time, the sum() function, returns the sum of the values in a list. In this case, sums all the values in the map. The len() function finds the count of the values. If we divide the sum of times entered by the count of the times entered, we get the average time

Find the slowest_time, the max() function returns the max of the value in a list. In this case, the maximum value is the slowest time

Print the results

Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g

Answers

Answer:

Explanation:

The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.

#include <iostream>

#include <iomanip>

using namespace std;

       int main()

       {

       // Variables

       int units_sold,

       final_price;

       // ask user for number of units sold

       cout << "\nEnter number of units sold: ";

       cin >> units_sold;

       

       //ask for Package price

       cout << "\nEnter Package Price: ";

       cin >> package_price;

       // Total amount before discount

       final_price = units_sold * package_price;

       cout << setprecision(2) << fixed;

       cout << endl;

       return 0;

       }

The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:

int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?

I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only


II and IV


II only


I and IV


II and III

Answers

Answer:

II and III

Explanation:

I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.

Answer:

II and III

Explanation:

When text is used as a Hyperlink, it is usually underlined and appears as a different color.

Question 3 options:
True
False

Answers

True it usually shows up with a blue underline

What Are the Components of a Web Address? *​

Answers

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then answer the following: Are these four steps enough guidance to help us discover truth in this day and age? Justify your answer with supporting arguments.​

Answers

Answer:

A. Summarily, the four steps to accurately sharing information include;

1. consciously employing our senses to examine news deeply so as to accurately determine their source and purpose.

2. determining the origin of the story so as to know when and where it stems from.

3. examining the context of the material so as to find inconsistencies.

4. analyzing the evidence, arguments and information being presented in the story.

B. The four steps presented in the story are enough guidance to help us differentiate between accurate and false information on the net.

I agree with all of the points presented by the author of this article on analyzing information found online. Recently, I viewed a video on the net which was presented as a fact but a little digging revealed that the original video was a prank that had been edited, so as to remove important details. The first point raised by the speaker which is honing my senses to know that something is wrong with the information (it was too bad to be true), helped me to dig deeper. I found a link to the original video that revealed a completely different detail from what I had just seen.

Explanation:

For people who care that the information they share online are true, the points raised by the author of the article, "How to fight lies, tricks, and chaos online", can prove beneficial. The first step is applying one's senses to know when an information is too bad or good to be true. The next step is determining the origin of the story. When and where a story comes from is crucial to knowing if it is truly relevant.

Thirdly, reading in between lines might reveal that the story is deceitful and lacks truth or originality. Lastly weighing the evidence of the story will help the reader in knowing the usefulness of the story to him.

differentiate between a university and a TVET college in terms of what each offers and explain the stigma associated with TVET colleges​

Answers

Answer: See explanation

Explanation:

The main focus of a Technical Vocational Education and Training (TVET) college is to prepare the students and train them so that they'll be functional in a skilled trade. It focuses on vocational training and education. University isn't really concerned about transfer of skills but rather more concerned with the transfer of knowledge to the students

The Technical Vocational Education and Training (TVET) qualification is also faster, cheaper and easier to get than the university certificate which is costlier and takes longer period to get.

The stigma associated with TVET colleges has been created by both the society and the government. Firstly, people believed that only those from poor backgrounds or those that couldn't gain university admisson go to TVET colleges.

Also, the government isn't helping matters as public funding for education are allocated more to universities and not really allocated to TVET colleges. These has brought about the stigma to the TVET.

The difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

University and TVET college

The major difference is University provide students with knowledge the need based on the course they are studying while TVET colleges is more of practical as they provide the students with practical skills they need because they render technical and vocational education and training.

The stigma associated with TVET colleges​ is because people think that University student has higher opportunities when in labor market than TVET colleges student.

Inconclusion the difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

Learn more about University and TVET college here:https://brainly.com/question/26696444

Other Questions
The cost of leveling a square park at Rs.15 per square meter is Rs.6000. Then the side of the square is ________. * Two sides of a triangle have side lengths of 6 inches and 14 inches. Select all measurements that could be the length of the third side of this triangle Which table correctly shows all the sample spaces for tossing a coin to get heads and rolling a number on a six-sided number cube? Coin Number cube Outcome Tails 1 Tails, 1 Tails 2 Tails, 2 Tails 3 Tails, 3 Tails 4 Tails, 4 Tails 5 Tails, 5 Tails 6 Tails, 6 Coin Number cube Outcome Heads 1 Heads, 1 Heads 2 Heads, 2 Heads 3 Heads, 3 Heads 4 Heads, 4 Heads 5 Heads, 5 Heads 6 Heads, 6 Coin Number cube Outcome Heads 1 Heads, 2 Heads 2 Heads, 4 Heads 3 Heads, 6 Tails 4 Tails, 2 Tails 5 Tails, 4 Tails 6 Tails, 6 Coin Number cube Outcome Heads 2 Heads, 1 Heads 4 Heads, 3 Heads 6 Heads, 5 Tails 2 Tails, 1 Tails 4 Tails, 3 Tails 6 Tails, 5 I need help with AP history HELP I NEED THIS DONE FAST! WILL GIVE BRAINLIEST! Write a two page essay in German identifying the Nazi customs in ww2. BRAINLIEST FOR CORRECT ANSWER!!!!!!!!!What's the difference between 1st degree murder, 2nd degree murder, and 3rd degree murder?? bought a computer for ra 25000double column cash book with discount and cash column Why does the human body need proteins Help me in this pls !!!! How would I solve it? I know the formula but not sure how to apply it. Karl used his credit card to buy a 90-inch HD flat-screen TV for $2,600. The credit card company charges 28% compound interest per year. If Karl made no payments for 2 years, how much would he owe the credit card company? thx in advance Which phrase best completes the diagram?Goals of Social PolicyProviding citizens withhealth careMaking sure childrenare educated?A. Adjusting national interest ratesB. Helping peopklwho live in povertyC. Increasing funding for the militaryD. Encouraging banks to give out loans Explain this method (Froth floatation method).......... Hellohello, if you able to help me then please do. (: Mr. Ramirez baked 24 cookies. 5 sixths of the cookies were oatmeal. How many oatmeal cookies did Mr. Ramirez bake? Find the area of the figure. Evaluate the expression 3(2x - 8) /7x when x= -3 The digit 4 has a greater value in because its value is as much as its value in . Which of the following is the best approximation of the volume of the cylinder below?A.22,507.5 m^3B.5626.9 m^3C.1406.7 m^3 Susan Must select music to go along with a presentation she is giving. She starts blasting music while shuffling through song Jack and Charlie are working silently in the same room but cant focus because the music is too loud. What is the correct way to handle this conflict? A. Yell at Susan from across the room to turn down the volume.B. Ignored the situationC. Walk over to Susie and ask her if she can turn down the volume because they are working D. Discuss how Distracting the music is in front of Susan without directly discussing it with her