a programmer has created 3 new procedures to use in her program. below are the procedures as well as their descriptions/purpose of use.

Answers

Answer 1

Thanks to procedures, which give names to complicated sections of code, programmers may understand programs more quickly.

What is one advantage that procedures have for programmers? Thanks to procedures, which give names to complicated sections of code, programmers may understand programs more quickly.The two primary metrics for calculating algorithm efficiency, which determines how many resources are required for a system to process it, are time and space complexity. Whereas time represents how long it takes to run the algorithm, space measures how much memory is consumed.By being aware of the function of the procedure without understanding how it is carried out, the learner is recycling the procedural abstraction of the computer scientist.      

To learn more about Procedures refer to:

https://brainly.com/question/27064002

#SPJ4


Related Questions

We gauge the danger of a threat by a combination of factors. What
are they?
[mark all correct answers]
a. Our personal fear factor
b. The degree of vulnerability
c. The probability of a threat
Od. The penalty or injury that may occur if the threat succeeds
in causing harm

Answers

The danger of a threat by a combination of factors are

The degree of vulnerabilityThe probability of a threat

What is the danger?

The danger appears with the likelihood of risk which is considered as a possibility for something bad to happen or any unpredictability that could disturb or hurt someone's well-being or an asset in terms of physical harm or monetary loss.

A flaw that has not been protected against threats is referred to as a vulnerability. A threat is something that can cause harm. To lessen the risk of harm, the proper measurements should be applied.

Learn more about Danger, here:

https://brainly.com/question/10557670

#SPJ1

why was the keyboard invented, write a paragraph and you can get a crown and 50 points

Answers

Answer:

The keyboard was invented for the alphabet and numbers so people can talk to others and work on essays, and have a way to communicate to human beings and for stuff like i'm doing right now, writing paragraphs for stuff like this and for school, really the keyboard was invented for anything, you can use it for anything in the whole world.

Explanation:

Hope this helps!!

The keyboard was invented so people can type on a computer

where can i learning cybersecurity for free

Answers

Answer:

You can learn cybersecurity for free on Coursera. They offer 90 cybersecurity courses from top universities and companies to help you start or advance your career skills in cybersecurity. You can learn online for free today!

Explanation:

explain the concepts of sampling and sampling rate

Answers

Sampling is the process of converting a continuous signal into a discrete signal by measuring the signal's amplitude at regular intervals. This is done by taking a series of samples of the continuous signal at specific points in time. The resulting discrete signal can be stored and manipulated more easily than the original continuous signal.

Sampling rate is the number of samples taken per second when converting a continuous signal to a discrete signal. It is measured in Hertz (Hz) and is also known as the sampling frequency. The sampling rate is an important parameter because it determines the quality of the resulting discrete signal. A higher sampling rate means that more samples are taken per second, which results in a more accurate representation of the original continuous signal. However, a higher sampling rate also requires more storage space and processing power. A lower sampling rate means that fewer samples are taken per second, which results in a less accurate representation of the original continuous signal. However, a lower sampling rate requires less storage space and processing power. Therefore, the sampling rate must be chosen carefully based on the specific requirements of the application.

what is the best low end pc recording software​

Answers

Explanation:

democreator

D3DGear

nvidia shadow play etc

DemoCreator. WonderShare DemoCreator application is a great application that is used to create video tutorials and other sessions effectively. FBX Game Recorder. Dxtory. D3DGear. NVIDIA ShadowPlay.

HOPE SO IT HELPS YOU

Which of the following is true? Select all that apply. True False For all queries, the user location changes our understanding of the query and user intent. ----------------------------------------------------------------------- True False On the task page, a blue dot on the map represents a precise user location. ------------------------------------------- True False Queries with a user location can have just one interpretation. -------------------------------------------------- True False All queries with a user location have both visit-in-person and non-visit-in-person intent. -----------------------------------------------------------------

Answers

With regard to queries, note that the options that are true or false are given as follows:

Which options are true or false?

False: For all queries, the user location does not necessarily change our understanding of the query and user intent.

False: On the task page, a blue dot on the map does not necessarily represent a precise user location.

False: Queries with a user location can have multiple interpretations.

False: Not all queries with a user location have both visit-in-person and non-visit-in-person intent.

Learn more queries:
https://brainly.com/question/30900680?
#SPJ1

Write a program that prints the sum of the even numbers and the products of odd numbers on the screen

Answers

Answer:

The program in Python is as follows:

n = int(input("Number of inputs: "))

total = 0; product = 1

for i in range(n):

   num = int(input(": "))

   if num%2 == 0:

       total+=num

   else:

       product*=num

print("Sum of even: ",total)

print("Product of odd: ",product)

Explanation:

This prompts the user for the number of inputs, n

n = int(input("Number of inputs: "))

This initializes sum (total) to 0 and products to 1

total = 0; product = 1

This iterates through n

for i in range(n):

This gets the inputs

   num = int(input(": "))

If input is even, calculate the sum

   if num%2 == 0:

       total+=num

If otherwise, calculate the product

   else:

       product*=num

Print the required outputs

print("Sum of even: ",total)

print("Product of odd: ",product)

A technology that helps instructors evaluate their students learning

Answers

Answer:

calculators im not sure?

Explanation:

sorry if i couldnt help

Some of the arguments are valid, whereas others exhibit the converse or the inverse error. Use symbols to write the logical form of each argument. If the argument is valid, identify the rule of inference that guarantees its validity. Otherwise, state whether the converse or the inverse error is made. If this computer program is correct, then it produces the correct output when run with the test data my teacher gave me. This computer program produces the correct output when run with the test data my teacher gave me.



This computer program is correct.

Let p = "this computer program is correct," and let q = "this computer program produces the correct output when run with the test data my teacher gave me." Is the argument valid or invalid? Select the answer that shows the symbolic form of the argument and justifies your conclusion.

Answers

Hi, you've asked an incomplete/unclear question. I inferred you want a symbolic representation and validity of the argument mentioned.

Answer:

argument is valid

Explanation:

Let's break down the arguments into parts:

Let,

p = "if this computer program is correct,"

q = "this computer program produces the correct output when run with the test data my teacher gave me."

c = "This computer program is correct."

Meaning, p ⇒ q (p results in q), then we can conclude that,

(p ⇒ q ) ∴ ⇒ c

However, the correct converse of the statement is:

If this computer program produces the correct output when run with the test data my teacher gave me, then the computer program is correct,"

q ⇒ p (If q then p)

While the correct inverse of the statement is:

If this computer program is not correct, then this computer program does not produce the correct output when run with the test data my teacher gave me."

Effective presentations are:

Answers

Answer:A good presentation should be concise and should be focused on the topic. It should not move off-track. A good presentation should have the potential to convey the required information. The fear should be transformed into positive energy during the presentation. Be calm and relaxed while giving a presentation.

Explanation:

Most operating system have GUI as part of the system, which is the following best describes an operating system GUI

Answers

A Graphical User Interface (GUI) is the component of an operating system that allows users to communicate with the system using graphical elements. GUIs are generally used to give end-users an efficient and intuitive way to interact with a computer.

They provide an easy-to-use interface that allows users to manipulate various objects on the screen with the use of a mouse, keyboard, or other input device.The primary function of an operating system GUI is to make it easier for users to interact with the system.

This is done by providing visual feedback and a simple way to access various system functions. GUIs can be customized to suit the user's preferences, which means that they can be tailored to meet the specific needs of different users.Some of the key features of a GUI include the use of windows, icons, menus, and buttons.

Windows are used to display information and applications, while icons are used to represent various objects or applications on the screen. Menus and buttons are used to provide users with a way to access various system functions, such as saving a file or printing a document.

The use of a GUI has become a standard feature of most operating systems. This is because GUIs make it easier for users to interact with computers, and they provide an efficient and intuitive way to access various system functions.

For more such questions on Graphical User Interface, click on:

https://brainly.com/question/28901718

#SPJ8

A macro is assigned as a button or a ___________ shortcut.

Answers

Answer:

Quick access toolbar

Describe the impact of a company’s culture on its success in a customer-focused business environment. Discuss why each is important.

Answers

The influence of a corporation's  culture cannot be underestimated when it comes to achieving success in a customer-centric commercial landscape.


What is company’s culture

The values, beliefs, norms, and behaviors that constitute a company's culture have a major impact on how its employees engage with customers and prioritize their requirements.

Having a customer-centric mindset means cultivating a culture that places a strong emphasis on satisfying and prioritizing customers' needs and desires, resulting in employees who are aware of the critical role customer satisfaction plays in ensuring success.

Learn more about company’s culture from

https://brainly.com/question/16049983

#SPJ1

Which of the following tactics can reduce the likihood of injury

Answers

The tactics that can reduce the likelihood of injury in persons whether at work, at home or wherever:

The Tactics to reduce injury risks

Wearing protective gear such as helmets, knee pads, and safety goggles.

Maintaining proper body mechanics and using correct lifting techniques.

Regularly participating in physical exercise and strength training to improve overall fitness and coordination.

Following traffic rules and wearing seatbelts while driving or using a bicycle.

Ensuring a safe and well-lit environment to minimize the risk of falls or accidents.

Using safety equipment and following guidelines in sports and recreational activities.

Being aware of potential hazards and taking necessary precautions in the workplace or at home.

Read more about injuries here:

https://brainly.com/question/19573072

#SPJ1

1.1-2 what is internet (2)? Which of the following descriptions below correspond to a services view of the internet?

1.1-2 what is internet (2)? Which of the following descriptions below correspond to a services view of

Answers

The computer network is a global network of interconnected calculating networks that communicate using patterned communication codes.

What does the internet allow us to do?

It allows users to share facts, communicate, and access miscellaneous services and resources.

The following writings correspond to a duties view of the internet:

Using online banking aids to manage your finances.

Shopping connected to the internet and purchasing goods or aids.

Accessing cloud-based uses and storage solutions.

Communicating accompanying friends and colleagues through electronic mail, messaging apps, or social television platforms.

Streaming television or audio content on demand from various websites.

Conducting research or achieving educational resources through connections to the internet libraries and databases.

Read more about internet here:

https://brainly.com/question/2780939

#SPJ1

Identify the examples of goals. Select three options

Answers

1. To increase company profits by 10% over the next quarter

2. To run a marathon in under 4 hours

3. To become fluent in French within the next year

List and briefly describe various types of Malware?

Answers

Answer:

Here yah go.

Explanation:

Virus: A virus is a malicious program that attaches itself to legitimate files and spreads by infecting other files. It can cause damage to the infected system by corrupting or deleting files, slowing down the computer, or spreading to other connected devices.

Worm: Worms are self-replicating programs that spread over computer networks without the need for user interaction. They exploit vulnerabilities in operating systems or software to propagate themselves and can cause significant damage by consuming network bandwidth or carrying out malicious activities.

Trojan Horse: A Trojan horse appears as a legitimate and harmless program, but it contains malicious code that performs unauthorized activities without the user's knowledge. Trojans can enable remote access to a computer, steal sensitive information, or download and install additional malware.

Ransomware: Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid. It typically displays a ransom note, demanding payment in exchange for the decryption key. Ransomware attacks can be highly disruptive and costly for individuals and organizations.

Spyware: Spyware is designed to secretly monitor a user's activities and gather information without their consent. It can track keystrokes, capture screenshots, record browsing habits, and steal personal or sensitive data. Spyware often aims to collect financial information or login credentials.

Adware: Adware is a type of malware that displays unwanted advertisements on a user's computer. It can redirect web browsers, modify search results, and slow down system performance. Adware is typically bundled with legitimate software and generates revenue for its creators through advertising clicks or impressions.

Keylogger: Keyloggers are designed to record keystrokes on a computer or mobile device. They can capture usernames, passwords, credit card details, and other confidential information. Keyloggers can be delivered through malicious downloads, infected websites, or email attachments.

Botnet: A botnet is a network of compromised computers, also known as "zombies" or "bots," that are controlled by a central command and control (C&C) server. Botnets can be used for various malicious activities, including distributed denial-of-service (DDoS) attacks, spam distribution, or spreading other types of malware.

Rootkit: A rootkit is a type of malware that provides unauthorized access and control over a computer system while hiding its presence from detection by security software. Rootkits often modify operating system components and can be difficult to detect and remove.

Backdoor: A backdoor is a hidden entry point in a system that bypasses normal authentication mechanisms, allowing unauthorized access to a computer or network. Backdoors are often used by attackers to gain persistent access for further exploitation or to create a secret pathway for future access.

It is essential to stay vigilant, use reputable antivirus software, keep systems up to date, and exercise caution when downloading files or clicking on suspicious links to protect against these various types of malware.

Prior to class, for each of the 7 learning techniques discussed by the "Common learning techniques"
reading, determine which two of the learning principles (summarized by Kosslyn 2017) you believe
explain why that learning technique does or does not work well. Provide a brief rationale for how the
principles you identify might be applicable. Note: Different sets of principles often will be evoked for
the different learning techniques. For example, Practice Testing might work primarily because of the
Generation Effect and Deliberate Practice (if one receives feedback about one's performance on the
tes

Answers

The learning principles (summarized by Kosslyn 2017) is that know that the the condition such as communicating is one that can easily be said to be automatic and also Make use of associations.

What is the principles of learning?

Some of the the vital and important principles of learning are:

Learning difficulty is as a result of a lot of factors within the learner himself. Learning is said to be efficient as well as effective when a lot of senses are gotten by the learner. .Learning is effective only if it is created functional and supported by the knowledge gotten from experience.

Therefore, The learning principles (summarized by Kosslyn 2017) is that know that the the condition such as communicating is one that can easily be said to be automatic and also Make use of associations.

Learn more about learning principles from

https://brainly.com/question/26117248

#SPJ1

Prior to class, for each of the 7 learning techniques discussed by the "Common learning techniques" reading, the two learning principles that explain why the learning technique works well are given below.1

Elaboration and Practice Testing are the two principles that work well for Practice Test a brief rationaleing.Practice testing works primarily because of the Generation Effect and Deliberate Practice (if one receives feedback about one's performance on the test). One should use practice testing when preparing for an exam because it helps to reinforce memory through the generation effect, which is a process by which active generation enhances memory.Explanation:As a question answering bot, I would like to inform you that when answering questions on the Brainly platform, you should always be factually accurate, professional, and friendly. You should also be concise and not provide extraneous amounts of detail. Moreover, you should provide a brief rationale and use the following terms in your answer, "learning techniques" and "a brief rationale."

Read more about  techniques here :https://brainly.com/question/26439172

#SPJ11

How does Wireshark differ from NetWitness Investigator?

Answers

Answer is given below

Explanation:

Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.

A huge software development firm has 100 programmers on staff. There are 35 programmers who know java, 30 who know c#, 20 who know python, six who know c# and java, one who knows java and python, five who know c# and python, and only one who knows all three languages. Determine the number of computer programmers that are not proficient in any of these three languages.

Answers

Where the above condition exists, there are 26 programmers who are not proficient in any of these three languages. To solve this problem, we can use the principle of inclusion-exclusion.

What is the explanation of inclusion-exclusion?

The principle of inclusion-exclusion is a counting technique used to find the cardinality of the union of sets by subtracting the intersections of sets and adding back their intersections.

The total number of programmers who know at least one language is:

35 (Java) + 30 (C#) + 20 (Python) - 6 (Java and C#) - 1 (Java and Python) - 5 (C# and Python) + 1 (Java, C#, and Python)

= 74

Therefore, the number of programmers who do not know any of these three languages is:

100 (total programmers) - 74 (programmers who know at least one language)

= 26

So there are 26 programmers who are not proficient in any of these three languages.

Learn more about the principle of  inclusion-exclusion:
https://brainly.com/question/10927267
#SPJ1

Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance to reuse the methods from the parent classes. Solution without using the inheritance will get zero points. re-writting the code that already exists will get zero credit. A call to the methods in the parent classes must be donemethod description
method1 display "Jack 1 Leo 1 "
method2 displays "Don 2 Jack 2"
method3 displays "Jack 3 Leo 3 Don 2 "
toString displays" Jack 3 Leo 1"

Answers

Answer:

public class Leo{

public String method1(){

return "Jack 1 Leo 1";

}

public String method2(){

return "Don 2 Jack 2";

}

public String method3(){

return "Jack 3 Leo 3 Don 2";

}

public String toString(){

return "Jack 3 Leo 1"

}

}

public class Jack extends Leo{

}

Explanation:

Leo is the parent class and jack inherits all of its attributes from Leo

So when you call the following code in the main method:

Jack j = new Jack();

System.out.println(j.method1);

it should print Jack 1 Leo 1

This is because the program first checks if method 1 exists in the Jack class

Because it doesn't exist it then goes to the parent class which is Leo.

And in the Leo class method1 displays "Jack 1 Leo 1 "

So it prints that

Name the computer crime that has to do with posting false information/ accusations about another person online.​

Answers

Answer:

cyberstalking

Explanation:

Which type of photographer documents plants and weather in their natural habitat?

a
Portrait

b
Nature

c
Product

d
Scientific

Answers

B, plants and weather are part pf nature.

Code to be written in R language:

The Fibonacci numbers is a sequence of numbers {Fn} defined by the following recursive relationship:

Fn= Fn−1 + Fn−2, n > 3
with F1 = F2 = 1.

Write the code to determine the smallest n such
that Fn is larger than 5,000,000 (five million). Report the value of that Fn.

Answers

Here is the R code to determine the smallest n such that the Fibonacci number is larger than 5,000,000:

fib <- function(n) {

 if (n <= 2) {

   return(1)

 } else {

   return(fib(n - 1) + fib(n - 2))

 }

}

n <- 3

while (fib(n) <= 5000000) {

 n <- n + 1

}

fib_n <- fib(n)

cat("The smallest n such that Fibonacci number is larger than 5,000,000 is", n, "and the value of that Fibonacci number is", fib_n, "\n")

The output of this code will be:

The smallest n such that Fibonacci number is larger than 5,000,000 is 35 and the value of that Fibonacci number is 9227465.

Learn more about R language here: https://brainly.com/question/14522662

#SPJ1

How to write a java program that asks the user for grades of students. Once the user enters 0 (zero), the program should print the largest of the marks of the students.

Answers

Answer:

import java.util.Scanner;

public class GradeProgram {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       System.out.println("Please enter the student grades: ");

       int grade = sc.nextInt();

       int largestGrade = 0;

       while (grade != 0) {

           if (grade > largestGrade) {

               largestGrade = grade;

           }

           grade = sc.nextInt();

       }

       System.out.println("The largest grade is: " + largestGrade);

   }

}

Explanation:

a really excellent way of getting you started on setting up a workbook to perform a useful function.

Answers

Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.

What is the workbook  about?

One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.

Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.

Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.

Read more about workbook here:

https://brainly.com/question/27960083

#SPJ1

What do you mean by this statement,
“Life is not a grand harmony, Conflict exist. We must learn how to live with it, use it constructive and minimize it’s destructive aspect”.

Answers

Answer with Explanation:

The statement above means that life is not always about happy moments; rather, it also includes unhappy times which teaches us many lessons. People should be aware of this, so that they'd also look at the good side of unhappy/sad moments in life. For example, when a beloved person dies, it is natural for one to cry. However, it is also important to stand up after that experience and become even stronger. This is a constructive way of moving on with life. A destructive aspect would be, not being able to move on and being stuck on one's death without thinking about the future anymore.

The best explanation of the given statement is:

If there is mutual understanding, then this would help in the conflict resolution to minimize the destructive impact.

What is Mutual Understanding?

This refers to the ability of a person or multiple persons to be able to have different points of view but also to understand that one view is NOT absolute.

With this in mind, we can note that because life is not a grand harmony, there will always be conflict, but if there is mutual understanding, then this would help in the conflict resolution to minimize the destructive impact.

Read more about conflict resolution here:

https://brainly.com/question/2267795

When creating a user generated function, what procedure is followed?
a) create a function prototype before main()
b) create a function definition after main()
c) create a function definition before main()
d) all of the above

Answers

When creating a user-generated function, what procedure is followed d) all of the above.

What are the three factors of user-described characteristic?

A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.

The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.

Read more about the prototype :

https://brainly.com/question/7509258

#SPJ1

intellectual property laws cover software and many other digital creations. Which of the following is an example of a positive impact of intellectual property laws?

Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.

Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.

Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.

Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.

Answers

Patents are an example of intellectual property rights. names of domains. industry architecture.

What does intellectual personality entail?

Abstract. When people encounter a social, political, religious, historically significant, or economically significant cultural phenomena, they use their feelings, behaviour, beliefs, attitudes, and methods of reasoning, evaluation, and decision-making to decide whether to accept or reject it. What exactly is intellectual haughtiness? A person who is otherwise clever will often be blinded to the truth by a set of traits known as intellectual hubris. Some examples of these are a lack of logical rigour and the use of preconceived assumptions or what one believes he acquired in school rather than rigorous reasoning.

To know more about rights visit:-

https://brainly.com/question/7721379

#SPJ1

Answer:

the answer is Ricardo!

Explanation:

I got it right

Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("%.2f", yourValue); The output ends with a newline.

Answers

Answer:

const double gasDollarPerGallon = 20 ;

float calCost( double milesPerGallon ) {

   double costPerGallon = milesPerGallon / gasDollarPerGallon;

   System.out.printf ("%.2f/n", &costPerGallon);

int main ( ) {

   scanf ("%2f", &gasDollarPerGallon) ;

   calCost( 20 );

   calCost( 75 );

   calCost( 500 );

Explanation:

The C source code above gets the user input of the gas dollar per gallon from the command prompt and divides the miles per gallon variable in the function call to get the cost of gas for the range of miles. It is also print out as a double with two places.

Answer:

def driving_cost(driven_miles, miles_per_gallon, dollars_per_gallon):

  gallon_used = driven_miles / miles_per_gallon

  cost = gallon_used * dollars_per_gallon  

  return cost  

miles_per_gallon = float(input(""))

dollars_per_gallon = float(input(""))

cost1 = driving_cost(10, miles_per_gallon, dollars_per_gallon)

cost2 = driving_cost(50, miles_per_gallon, dollars_per_gallon)

cost3 = driving_cost(400, miles_per_gallon, dollars_per_gallon)

print("%.2f" % cost1)

print("%.2f" % cost2)

print("%.2f" % cost3)

Explanation:

Other Questions
If you have a piece of round cake that has an area of 100 square inches, and you know the piece sweeps out an angle of 50, find the radius of the cake. Find the angle between the vectors. (First find an exact expression and then approximate to the nearest degree.) a = (2,0,4), b = (2, -1,0) = exact O approximate What is 135 cm in feet? What are red flags symptoms for joint pain? How might a company affect its depreciation expense computation by selecting useful life and salvage value? Find the area of the surface generated by revolving the curve about each given axis. x = 5t, y = 5t, 0 st 5 (a) x-axis 673.1 X (b) y-axis 1346.3 x The rectangular coordinates of a point are given. Plot the point. (-72,-72) 15 10 10 15 -15 -10 -5 O -15 -5 O SE -56 -10 -155 y 15 10 5 5 X -15 -10 -5 -10 10 15 -15 -10 -15 Find two sets of polar coordinates for the point for 0 0 < 2. (r, 8) = (smaller r-value) (r, 8) = (larger r-value) -10 -5 15 10 -5 -10 -15 15 10 5 -5 -10 -15 10 15 5 10 15 X X Please Help its my birthday today !! What is the molarity of a 800. mL solution of magnesium bromide if 57.42 g of MgBr2 is dissolved in water? Find the area of the shaded triangle. Why does the North Central Hills region support diverse forms of agriculture? It has mostly heavy, gray clay soil It has a variety of soil types It has mostly sandy loam soil A runners times (in minutes) in three races are 6.9, 6.6, and 6.5. The runner will run two more races and wants the average time of all five races to be less than 6.8 minutes. Describe the average time needed in the two races to achieve this goal. The average time in the two races must be less than minutes. Q: How did World War I influence the mindset (attitude/ambitions) of many African- Americans? In order to determine causal effects between variables, researchers must use. a. Correlational designs b. Case studies O c Experimental designs O d. All of the above The frequency table shows the results of a survey about favorite exhibits. Find the relative frequency that a randomly selected student's favourite exhibit was either dinosaurs, or planets, express your answer as a decimal.Butterfly: 12Dinosaurs: 25Planets: 17Trains: 6 simplify the expression: 4(-4+n) = What does the author most likely mean by stating I did not wish to live what was not life A bugatti chiron travels 116 m/s for 10 seconds.how far did it travel How do you explain a VLOOKUP in an interview? Sodium sulfate is added to a solution mixture containing potassium nitrate and barium nitrate. After centrifugation, which aqueous ions are present in the supernatant according to recent research, being married to someone who has feminine characteristics is indicative of an unhappy marriage. True or False?