You created an interactive application named GreenvilleRevenue. The program prompts a user for the number of contestants entered in this year’s and last year’s Greenville Idol competition, and then it displays the revenue expected for this year’s competition if each contestant pays a $25 entrance fee. The programs also display a statement that compares the number of contestants each year. Using the program you wrote in Case Study 1 of Chapter 2, replace that statement with one of the following messages:_______.
If the competition has more than twice as many contestants as last year, display The competition is more than twice as big this year!
If the competition is bigger than last year’s but not more than twice as big, display The competition is bigger than ever!
If the competition is smaller than last year’s, display, A tighter race this year! Come out and cast your vote!
Grading
When you have completed your program, click the Submit button to record your score.
Code:
using System;
using static System.Console;
class GreenvilleRevenue
{
static void Main()
{
int last, curr;
while(true) {
Console.WriteLine("Enter the number of contestants entered in last year's competition : ");
last = Int32.Parse(Console.ReadLine());
if(last < 0 || last > 30) {
Console.WriteLine("Error. Please enter a value between 0 and 30.");
} else {
break;
}
}
while(true) {
Console.WriteLine("Enter the number of contestants entered in this year's competition : ");
curr = Int32.Parse(Console.ReadLine());
if(curr < 0 || curr > 30) {
Console.WriteLine("Error. Please enter a value between 0 and 30.");
} else {
break;
}
}
if((last >= 0) && (last <= 30) && (curr >= 0) && (curr <= 30))
Console.WriteLine("The revenue expected for this year's competition : $" + curr * 25 + '\n');
if (curr > last * 2)
Console.WriteLine("The competition is more than twice as big this year!\n");
else
if (curr > last && curr <= (last * 2))
Console.WriteLine("The competition is bigger than ever!\n");
else
if (curr < last)
Console.WriteLine("A tighter race this year! Come out and cast your vote!\n");
else
Console.WriteLine("Please enter a valid value\n");
Console.ReadLine();
}
}

Answers

Answer 1

Answer:

Explanation:

The program in this code is written correctly and has the messages applied in the code. Therefore, the only thing that would need to be done is pass the correct integers in the code. If you pass the integer 100 contestants for last year and 300 for current year. Then these inputs will provide the following output as requested in the question.

The competition is more than twice as big this year!

This is because the current year would be greater than double last years (100 * 2 = 200)

Answer 2

Answer:Console.WriteLine("Enter the number of contestants in last year's competition: ");

     int lastYearContestants = int.Parse(Console.ReadLine());

     Console.WriteLine("Enter the number of contestants in this year's competition: ");

     int thisYearContestants = int.Parse(Console.ReadLine());

     Console.WriteLine("Last year's competition had " + lastYearContestants + " contestants" + ", and this year's has " + thisYearContestants + " contestants.");

     int revenue = thisYearContestants * 25;

     Console.WriteLine("Revenue expected this year is $" + revenue + ".00");

     if (thisYearContestants > lastYearContestants)

      Console.WriteLine("It is True that this year's competition is bigger than last year's.");

     else

      Console.WriteLine("It is False that this year's competition is bigger than last year's");

Explanation:

This will out put the correct sentences and gives the revenue in the correct format.


Related Questions

Which function will display 6 as the output in the following formula?
C1*(C2+B1)
where C1 is 6, C2 is 2, and B1 is 4
_________

Answers

Answer:

36

Explanation:

hi add creeper_king101 i need views on snap

Answer: i just did the pretest and the answer was 36 no cap

Explanation:


is an electronics standard that allows different kinds of electronic instruments to
communicate with each other and with computers.

Answers

Explanation:

MIDI is an acronym that stands for Musical Instrument Digital Interface. It is a standard protocol that helps to connects musical instruments with computers and several hardware devices to communicate. It was invented in the 80's as a way to standardize digital music hardwares.

IF IT HELPED U MARK ME AS A BRAIN LIST

http://www.alegrium.com/sgi/2/eibder
yeah.... I kinda want some gems so.... can u ppl like.....help me out?

Answers

Answer:

so what is this uhhhhhhhhhh

In an ancient land, the beautiful princess Eve (or handsome prince Val) had many suitors. Being royalty, it was decided that a special process must be used to determine which suitor would win the hand of the prince/princess. First, all of the suitors would be lined up one after the other and assigned numbers. The first suitor would be number 1, the second number 2, and so on up to the last suitor, number n. Starting at 4 the suitor in the first position, she/he would then count three suitors down the line (because of the three letters in his/her name) and that suitor would be eliminated and removed from the line. The prince/princess would then continue, counting three more suitors, and eliminate every third suitor. When the end of the line is reached, counting would continue from the beginning. For example, if there were 6 suitors, the elimination process would proceed as follows:_____.
12456 Suitor 3 eliminated; continue counting from 4.
1245 Suitor 6 eliminated; continue counting from 1.
125 Suitor 4 eliminated; continue counting from 5.
15 Suitor 2 eliminated; continue counting from 5.
1 Suitor 5 eliminated; 1 is the lucky winner.
Write a program that creates a circular linked list of nodes to determine which position you should stand in to marry the princess if there are n suitors. Your program should simulate the elimination process by deleting the node that corresponds to the suitor that is eliminated for each step in the process.

Answers

Explanation:

public class CircularLinkedListTest  

{

private Node head;

private int size;

private class Node

{

 private int num;

 private Node next;

 public Node(int n)

 {

  num = n;

  next = null;

 }

 public int getNum()

 {

  return num;

 }

 public void setNext(Node n)

 {

  this.next = n;

 }

 public Node getNext()

 {

  return next;

 }

}

public CircularLinkedListTest ()

{

 head = null;

 int numNodes = 0;

}

public void add(int num)

{

 int numNodes = 0;

 if(head == null)

 {

  head = new Node(num);

  head.setNext(head);

  numNodes++;

 }

 else

 {

  Node temp = head;

  while(temp.getNext() != head)

   temp = temp.getNext();

   

  temp.setNext(new Node(num));

  temp.getNext().setNext(head);

  numNodes++;

   

 }

}

public int size()

{

 int numNodes = 0;

 return numNodes;

}

public int get(int index)

{

 Node t = head;

 for(int i = 0; i < index; i++)

  t= t.getNext();

 

 return t.getNum();

}

public int remove(int index)

{

 if(index < 0 || index >= size)

 {

  System.out.println("Error, index out of Qbounds.");

  System.exit(0);

 }

 Node temp = head;

 if(index == 0)

 {

  while(temp.getNext() != head)

   temp = temp.getNext();

  int value = head.getNum();

  if(size > 1)

  {

   head = head.getNext();

   temp.setNext(head);

  }

  else

   head = null;

   size--;

   

  return value;

 }

 else

 {

  for(int i = 0; i < index - 1; i++)

   temp = temp.getNext();

   

  int answer = temp.getNext().getNum();

  temp.setNext(temp.getNext().getNext());

  size--;

  return answer;

 }

}

public static void main(String args[])

{

 CircularLinkedListTest  suitors = new CircularLinkedListTest ();

 for(int i = 1; i <= 6; i++)

  suitors.add(i);  

 int currentIndex = 0;

 while(suitors.size() != 1)

 {

  for(int i = 1; i <= 2; i++)

  {

   currentIndex++;

   if(currentIndex == suitors.size())

    currentIndex = 0;

  }

   

  suitors.remove(currentIndex);

  if(currentIndex == suitors.size())

   currentIndex = 0;

   

  for(int i = 0; i < suitors.size(); i++)

   System.out.print(suitors.get(i) + " ");

  System.out.println();

 }

}

}

What are to be considered before software installation? Why?​

Answers

Answer:

before software installation we should consider the following things:

1. Software must be virus free

2.Required components for software should be installed

3.Computer requirements must be little bit high required for that software

4.software musn't be corrupt

what do you mean by an ISP? why do we need a modem to access the internet? name any two Internet browsers​

Answers

Answer:

ISP means INTERNET SERVICE PROVIDER. These are organisations that provide internet to public.

Modems are needed to access the internet as they act like a server for us to get internet.

Internet browsers-

1. Goo.gle Chrom.e

2. Micro.soft Ed.ge

3. Fire.fox

An if statement must always begin with the word “if.” True False python

Answers

Answer:

true

Explanation:

The given statement is true, that an if statement must always begin with the word “if.” in python.

What is the python?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing.

It supports a variety of paradigms for programming, including functional, object-oriented, and structured programming. An “if” statement must always be the first word in a sentence.

One of the most often used conditional statements in computer languages is the if statement in Python. It determines whether or not particular statements must be performed. It verifies a specified condition; if it is true, the set of code included within the “if” block will be run; if not, it will not.

Therefore, it is true.

Learn more about the python, refer to:

https://brainly.com/question/18502436

#SPJ2

3. Create tables CheckingAccount(CheckingAccountNumber, CustomerName, Balance, CustomerID), SavingsAccount(SavingsAccountNumber, CustomerName, Balance, InterestRate, CustomerID), Transactions(TransactionNumber, TransactionAmount, TransactionType, TransactionTime, TransactionDate, FromAccount, ToAccount, CustomerID). Use varchar(50) for any non-numerical value including AccountNumber and TransactionNumber, and float for any numerical value. CustomerID here means Username.

Answers

Answer:

Your answer is B

She forgot to record a transaction.

Explanation:

Edge 20 it’s right


Answer the following questions:

Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging


Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above


Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode


Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above


Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands


Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above


Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above


Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)


Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes


Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester


Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above


Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender


Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above


Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways


Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM


Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode


Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.



Answers

Explanation:

4) Seperating

5) All the above

6) Interface configuration mode

7) None of the above

8)Configure the negotiate disable interface subcommand

9) B8ZS

10) Synchronous

11) a and b

2) Discrete

3) B8ZS and HDB3

4) Line coding

5) It drops the frame

6) Data link

7) 2 ways

8) NVRAM

9) User mode-Enable mode

20) The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model-

The TCP/IP model has four layers , while the OSI model has seven layers.

After building muscle memory, what comes next when you are learning to type?
Speed
GWPM
Finger placement
Home row keys

Answers

Answer:

B

Explanation:

Its B because i had a test like dat  go it correct.

Hope this helps!

After building muscle memory, GWPM comes next when you are learning to type. Thus, option B is correct.

What are windows key?

The Starting keys are also known as the windows key. It was introduced in 1994 by the Microsoft Natural keyboard. The Numeric keypad is also known as number pad, Numpad, etc. This keypad has a 17-key palm segment of a standard computer keyboard, normally at the far right.    

The cursor is also known as Cursor control keys. These are buttons that push the cursor on a computer keyboard. That's why the answer to this question is "home row".

It is easy to add zero digit number here it will be we can club the two number or we can club two pair so as to form 10 in each of the pair

It will be (8+2) which gives 10

And (9+1) which gives 10

And it will very easy and fast to add 10 + 10

Rather than any other pair.

Therefore, After building muscle memory, GWPM comes next when you are learning to type. Thus, option B is correct.

Learn more about windows key on:

https://brainly.com/question/11884418

#SPJ2

Write a program which asks the user for their name and age. The program should then print a sentence.

What is your name?
Cory
What is your age?
48
Cory is 48 years old.

Answers

Answer:

name = input("What is your name? ")

age = int(input("What is your age? "))

print("%s is %d years old."% (name, age))

Explanation:

This is a solution in python.

Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.

Answers

Answer:

x1 = input("enter x value of first number: ")

y1 = input("enter y value of first number: ")

x2 = input("enter x value of second number: ")

y2 = input("enter y value of second number: ")

ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2

ans = pow(ans, 0.5)

print(ans)

write asswmbly prgram and do the following:
You have two numbers, the first one is 32 bits and the second is a 16 bits number. Find the result of division and store it in memory location called RESULT then store the reminder of division in memory location called MOD. (Use MACRO) ​

Answers

Answer:

I did this last year :/ i feel your pain.

Explanation:

What Is an Antivirus?

Answers

Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.

Answer:

Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.

Explanation:

it is important organic mineral that is found in the soil as ash​

Answers

Answer:

Calcium is the most abundant element in wood ash and gives ash properties similar to agricultural lime. Ash is also a good source of potassium, phosphorus, and magnesium.

Huh this is very confusing

how can u spot fake news through camerawork, audio, and lighting? pls answer asap

Answers

Answer:

Fake news usually would involve heavy editing of the audio and visuals so that what people can see or hear will fit the lies being sold.

Explanation:

With respect to Videos, fake news would usually have very subtle and intelligent cuts and joints such that when pieced together, a speech for instance would contain only the words which fit the fake news. Also. the context would usually be omitted and you'd seldom find a whole unedited video supporting fake news.

With regards to the audio, authentic sources, in most cases, usually, start a recorded audio with their signature jingle. Fake news won't.

Pictures that have been doctored to suit fake news are usually characterized by their low quality, grainy and blurry feel.

It is important to point out, however, that with advances in technology, fake news' are begining to lose most of the qualities listed above.

Cheers

What sequence is used to create a brochure document from a template?
New, File, Brochures
File, New, Brochures
O Brochures, File, New
O Brochures, New, File

Answers

Answer:

I think its a or b

Explanation:

Sorry if I'm wrong

Answer:

The answer is B. File, New, Brochures

Explanation:

PLZ PLZ PLZ GIVE ME BRAINLIEST!!!!

What are the disadvantages of using folders ​

Answers

Answer:

√ folders can cause some inconvenience situation...

√ The decompress / compress action takes time.

√ When you double-click on a file inside a “folder”, what really happens is the file gets extracted to a temporary folder.

heres one:

when you delete a folder, he stuff inside gets deleted, and there isnt a way to get it back.

A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?

Answers

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

You compared each letter in the correct word to the letter guessed.

Assume the correct word is "cloud."

Finish the code to compare the guessed letter to the "u" in "cloud."

if guess == correct(4)
correct(3)
correct[3]
correct[4]

Answers

Answer:

wow

Explanation:

www

Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Leading 0's are not allowed except when the integer part is 0. When the binary points is present, then neither the integer part nor the fractional part are allowed to be empty. If the integer part has more than 3 bits, then grouping with commas is required. Examples: Allowed: -0 1,111,010 -1,111.00 Not allowed: .11 1000 The 4-letter alphabet consists of 0, 1, dot, and comma.

Answers

Solution :

We have to provide an expression for the binary numbers. There can be binary fractions or integers. Whenever there is leading 0, it is not allowed unless the integer part is a 0.

Thus the expression is :

[tex]$(-+ \in )$[/tex] [tex]$[(1+10+11+100+101+110+111)(,000+,001+,010+,011+,111+,100+,101+,110)^*$[/tex] [tex]$(\in +.(0+1)^*(0+1))+(0.(0+1)^*(0+1))]$[/tex]

In this exercise we have to have knowledge about binary code to calculate with these numbers, so we have:

[tex](E+(0+1)*(0+1))[/tex]

What is a binary code?

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often "0" and "1" from the binary number system.

Knowing this now we can perform the calculations like:

[tex](1+10+11+100+101+110+111)(000+001+010+011+111+100+101+110)\\(E+(0+1)*(0+1))[/tex]

See more about binary code at brainly.com/question/7960132

Directions Interview your parent or any member of your family. Identity
v. Performance Tasks
sources of your family income. Classify the types of your family
income if it is Money Income, Real Oncome or Psychic income​

Answers

Answer:

Total family income is first classified by it's four major source, earings of a male head , earings of a wife or female head , earings of a family members , and property or transfer income.

why use a chart legend?

Answers

Answer:

A legend or key helps the user build the necessary associations to make sense of the chart.

Explanation:

Legends summarize the distinguishing visual properties such as colors or texture used in the visualization.

How many components of a computer? ​

Answers

Answer:

There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices. Are devices used for entering data or instructions to the central processing unit.

Explanation:

If a program has no syntax errors, can we assume that it is secure? Why or why not?

Answers

Answer:

We cannot say it is secure until it has gone through security testing.

Explanation:

Syntax errors are caused by errors that occur in the source code. Some of these errors are caused by spellings and punctuation. If the code does not follow the syntax of the programming language that it is being written, it would likely display a syntax error.

A program is secure only when it has gone through security testing and found to be protected from vulnerabilities and attacks.

Your goals as the IT architect and IT security specialist are to:  Develop solutions to the issues that the specified location of IDI is facing.  Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.  Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.  Analyze the strengths and weaknesses in the current systems of IDI.  Address remote user and Web site user’s secure access requirements.  Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.  Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.  Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.  Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Answers


Te chequen casa para ver en su mouse hombre de doble

Create a list called numbers containing the values from 1 through 15, then use slices to perform the following operations consecutively: a. Select number’s even integers. b. Replace the elements at indices 5 through 9 with 0s, then show the resulting list. c. Keep only the first five elements, then show the resulting list. d. Delete all the remaining elements by assigning to a slice. Show the resulting list.

Answers

Answer:

Kindly check explanation

Explanation:

From python :

List containing values from 1 through 15:

my_list = list(range(1,16))

#creates a list of values from 1 to 15,(16 is excluded)

B.) select even integers :

for digits in my_list :

if digit%2 == 0;

print(digit)

# prints numbers in the list which does not leave a remainder when divided by .

C.)

for digits in my_list[4,9]:

my_digit[digits] = 0

my_digits

#Replaces the elements at indices 5 through 9 with 0s, then show the resulting list.

D.)

my_digits[:5]

#selects digits with index 0 up to 4

E.)

del my_digits[:5]

#DELETE elements in my digits starting from the fifth index

what is invention and inovation do more responsible think for making computer a succsessful product?explain​

Answers

Answer:

I can't explain but I think it is the GUI

4.16 LAB: Count characters Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's

Answers

Answer:

In Python:

sttr = input("String: ")

ch = input("Character: ")

count = sttr.count(ch)

print(str(count)+" "+ch, end = '')

if count>1 or count==0:

   print("'s")

Explanation:

This prompts the user for string

sttr = input("String: ")

This prompts the user for character

ch = input("Character: ")

This counts the number of occurrence

count = sttr.count(ch)

This prints the number of occurrence of the character

print(str(count)+" "+ch, end = '')

This checks if the number of occurrence is 0 or greater than 1.

if count>1 or count==0:

If yes, it prints 's

   print("'s")

3.5 code practice question 1

Answers

Answer:

what is this a question or just saying something?

Explanation:

Answer:

uh what?

Explanation:

Other Questions
Please help me I'm in fourth I'll give brainliest if you have a good answer :) What steps must you take to divide fractions? Figurative Language Escape Room: Find the 4-Digit Code will have the most significant impact on how much you disclose.Youra personalityb. education levelc. incomed. careerPlease select the best answer from the choices provided B C D mZQRS = 179 and m_QRG= 105.Find m GRS. A hot dog vendor at Wrigley Field sells hot dogs for $1.50 each. He buys them for $1.20 each. All the hot dogs he fails to sell at Wrigley Field during the afternoon can be sold that evening at Comiskey Park for $1 each. The daily demand for hot dogs at Wrigley Field is normally distributed with a mean of 40 and a standard deviation of 10.a. If the vendor buys hot dogs once a day, how many should he buy?b. If he buys 52 hot dogs, what is the probability that he will meet all of the days demand for hot dogs at Wrigley? The word " _____ " in a word problem probably indicates you may estimate an answer. Describe in your own words what "Spirit of Reform" means. Milk is a(n) protein.complete incomplete Which of the cars above are traveling at the same velocity?A) c and d B) b,c,d and f C) b,c and d D) b and c Dont you guys ever feel like everyone expects too much from you and now you have created a fake personality to please everyone and you havent been yourself in so long that you are starting to break. Cause thats how I feel and Im on the verge of losing it How many quarts of soil are used to fill 2 flower pots?Solve on paper and check your work on Zearn. Select the sentence that does not contain an error:A) She loved the way her jewelry shined when they sat in the sun.B) She loved the way her jewels shined when it sat in the sun.C) She loved the way her jewels shined when hers sat in the sun.D) She loved the way her jewelry shined when it sat in the sun. Find the y intercept What is an observation quite different from the rest of the data called? Need help ASAPThanks + BRAINLIST only for correct answer 1.What piece of advice can you give to those who are being bullied? Plssss help Im in class plsss Anyone know how to do cot^6x=cot^4csc^2x-cot^4x snapchot paid $4.50 to get a roll of 24 pictures developed . how much did he pay for each picture how did president Jackson plan to accomplish the goal mentioned in this excerpt?